BRIEF DESCRIPTION OF SEVERAL VIEWS OF THE DRAWINGS
FIG. 1 is a block diagram of a system including a key fob and a host device in accordance with one implementation of the invention.
FIG. 2 illustrates a method of communication between a key fob and a host device in accordance with one implementation of the invention.
FIG. 3 illustrates a method for adjusting the signal strength of a key fob in accordance with one implementation of the invention.
FIG. 4 is a block diagram of a key fob and host devices in accordance with one implementation of the invention.
Like reference symbols in the various drawings indicate like elements.
DETAILED DESCRIPTION OF THE INVENTION
Implementations of the present invention relates generally to digital communications, and more particularly to digital communications between a fob and a host device. The following description is presented to enable one of ordinary skill in the art to make and use the invention and is provided in the context of a patent application and its requirements. Various modifications to implementations and the generic principles and features described herein will be readily apparent to those skilled in the art. Thus, the present invention is not intended to be limited to the implementations shown but is to be accorded the widest scope consistent with the principles and features described herein.
FIG. 1 illustrates a system 100 including a key fob 102 and a host device 104 in accordance with one implementation of the invention. Although the system 100 is shown as including one key fob and one host device, the system 100 can include any number of key fobs and host devices. In general, a user uses the key fob 102 to control one or more functions associated with the host device 104. In one implementation, a user uses the key fob 102 to arm/disarm a theft deterrent system associated with the host device 104, as discussed in greater detail below. In one implementation, the key fob 102 communicates with the host device 104 using wireless technology (e.g., Bluetooth wireless technology). In general, the key fob 102 can communicate with the host device 104 using any radio frequency (RF) technology, including (for example) infrared, Wi-Fi (wireless fidelity), and the like. The host device 104 can be any type of device or object including for example, a workstation, a desktop computer, a laptop computer, a personal digital assistant (PDA), a cell phone, a network, a bicycle, an automobile, or other device (or object) having a function that is controllable by a key fob. In one implementation, the key fob 102 further includes software for dynamically adjusting a signal strength of a communication signal between the key fob 102 and the host device 104 based on a mode of operation of the key fob 102, as discussed in greater detail below.
FIG. 2 illustrates a method 200 of communication between a key fob (e.g., key fob 102) and a host device (e.g., host device 104) in accordance with one implementation. In the implementation shown in FIG. 2, the key fob is operating in accordance with an automatic mode of operation to control a function associated with the host device—e.g., to arm/disarm a theft deterrent system associated with the host device. More generally, functions other than arming/disarming a theft deterrent system can also be performed including, for example, turning on/off the host device, locking/unlocking the host device, waking/putting the host device to sleep, and so on. Although FIG. 2 is described with the key fob operating in an automatic mode of operation, (in one implementation) such a mode of operation is not exclusive of other modes of operation—e.g., a manual mode of operation. For example, in one implementation, while a key fob is operating in an automatic mode, a user can at any time arm/disarm a corresponding host device by pressing a manual arm/disarm button.
The key fob pages periodically (step 202). The host device page-scans periodically to detect a page of the key fob (step 204). Thus, unlike a conventional automatic mode of communication between a key fob and a host device in which one device page-scans continuously, the host device of the present invention only page-scans periodically to conserve power and, therefore, extend the battery life of a battery within the host device (if applicable). A determination is made by the host device whether a page from the key fob has been detected (step 206). If a page from the key fob is detected, then the theft deterrent system associated with the host device is disarmed (if previously armed) or remains unarmed (step 208). If, however, a page from the key fob is not detected, then the theft deterrent system is armed (step 210). After steps 208, 210, the method 200 returns to step 204, in which the host device again page-scans to detect a page from the key fob.
Accordingly, in one implementation, a communication schedule is provided below in which both the key fob and the host device are respectively paging and page-scanning periodically, e.g., to conserve power. The communication schedule provided below is an example communication schedule that is applicable to Bluetooth wireless technology. Other communication schedules can be implemented for the Bluetooth wireless technology and other RF technologies that are consistent with the principles discussed herein. In one implementation, the host device page-scans at a rate substantially within the range of −20 ms every 1.28 seconds to 20 ms every 100 ms. Increasing the page-scan rate decreases generally decreases a response time of the host device (or the device performing the page-scanning). In an implementation, in which the host device is page-scanning for 20 ms every 100 ms, such a rate still provides a relatively large bandwidth—e.g., 80% bandwidth—for (Bluetooth) wireless communication of devices (other than the key fob) with the host device. In one implementation, when in range (in the automatic mode), the key fob enters into a sniff mode and sniffs (or pages) for 3.125 ms every 250 ms. Thus, assuming a radio current of 44 mA, a baseband-only current of 20 mA, and a sleep current of 0.07 mA, a key fob would only require a 220 mAh battery to operate in range for 1 month (ignoring loss in other circuits, LEDs, and so on). To further conserve battery life, the key fob can reduce its communication frequency when out of range of a corresponding host device. For example, (in one implementation) the key fob pages at a rate of 20 ms every 2.56 seconds when out of range of the corresponding host device. Such a communication schedule is summarized in Table 1 below.
TABLE 1
|
|
Key Fob Out of Range
|
Key Fob In Range of Host Device
of Host Device
|
|
250 ms sniff interval
20 ms sniff interval
|
3.125 ms sniff window
2.56 seconds sniff window
|
44 mA radio current
44 mA active current
|
20 mA baseband-only current
0.07 mA sleep current
|
0.07 mA sleep current
|
0.439125 mA average
0.413203 mA average
|
220 mAh battery capacity
220 mAh battery capacity
|
500.9963 hours
532.4258 hours
|
20.87485 days
22.18441 days
|
|
FIG. 3 illustrates a method 300 for adjusting the signal strength of a key fob (e.g., key fob 102) in accordance with one implementation of the invention. A key fob is provided having a plurality of modes of operations (step 302). In one implementation, a key fob is provided having a manual mode of operation and an automatic mode of operation. In the manual mode of operation, a user is operable to manually control a function associated with a corresponding host device (e.g., host device 104) by, e.g., pressing a button on the key fob. In the automatic mode of operation, the key fob is operable to automatically activate a function associated with a corresponding host device without user intervention. In one implementation, in the automatic mode, the key fob automatically activates a function associated with a corresponding host device dependent upon whether the key fob is in range (or out of range) of the host device. Other schemes for automatic activation of functions associated with a host device can also be implemented. In one implementation, the operation modes of the key fob are not exclusive of one another. For example, (in one implementation), as discussed above, while a key fob is operating in an automatic mode, a user can at any time arm/disarm a corresponding host device by pressing a manual arm/disarm button. In this implementation, the key fob can have a switch (or button) that turns on/off an automatic mode of operation for the key fob.
Referring to FIG. 3, user input selecting a given mode of operation for the key fob is received from the user (step 304). In one implementation, the user selects a mode of operation for the key fob by pressing a button (or switch), or by selecting a menu item in a display screen of the key fob. In one implementation, the key fob can be toggled between an automatic mode or a manual mode of operation. In another implementation, the key fob can be toggled between an automatic mode-on or automatic mode-off, in which case a manual mode of operation is available (e.g., by the user pressing a manual button on the key fob) regardless of whether the automatic mode is enabled. The (communication) signal strength of the key fob is (automatically) dynamically adjusted in accordance with the mode of operation selected (or desired) by the user (step 306). Thus for example, in one implementation, when a user selects a manual mode of operation (or when a manual arm/disarm button is pressed while the key fob operating in an automatic mode of operation), the signal strength of the key fob is increased to permit the user to have maximum control over the host device from a relatively large distance (e.g., 30 meters or more). In like manner, when the user selects an automatic mode of operation, the signal strength of the key fob is reduced so that, e.g., a theft deterrent system of the host device can be activated when the user is a relatively shorter distance from the host device. In one implementation, the signal strength of the key fob can be adjusted in real-time by a user. In one implementation, the signal strength of the key fob is adjustable through a software application running on the host device. In this implementation, the software program can, for example, throttle the radio frequency (RF) range of the host device.
FIG. 4 illustrates a system 400 including a key fob 402 in accordance with one implementation. In one implementation, the key fob 402 includes a mode selector 404 and a controller 406 that controls a signal strength 408 of a signal 410 from the key fob 402. As shown in FIG. 4, the key fob 402 can wirelessly communicate with one or more of a laptop 412, an automobile 414, and/or an object 416. The object 416 can be any object, device, or system having a function that can be controlled by a key fob. In one implementation, the key fob 402 is operable to control a function associated with each of the laptop 412, the automobile 414, and the object 416. Or, for example, the key fob 402 can be used to control multiple objects of the same type—e.g., three different laptops. In another implementation, a separate key fob is required to communicate with each of the laptop 412, the automobile 414, and the object 416. In yet another implementation, multiple key fobs can be associated with a single device or object.
The mode selector 404 provides a user with the ability to select a mode of operation for the key fob. In one implementation, the mode selector 404 comprises a switch or a button. In another implementation, the mode selector 404 comprises a display screen that displays a menu of mode of operations selectable by the user. Thus, in operation, the controller 406 adjusts the signal strength 408 of the (communication) signal 410 in accordance with the mode of operation selected by the user. In one implementation, the signal strength 408 corresponding to each mode of operation is pre-determined based on application requirements.
The methods described above can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. Apparatus of the invention can be implemented in a computer program product tangibly embodied in a machine-readable storage device for execution by a programmable processor; and method steps of the invention can be performed by a programmable processor executing a program of instructions to perform functions of the invention by operating on input data and generating output. The invention can be implemented advantageously in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device. Each computer program can be implemented in a high-level procedural or object-oriented programming language, or in assembly or machine language if desired; and in any case, the language can be a compiled or interpreted language. Suitable processors include, by way of example, both general and special purpose microprocessors. Generally, a processor will receive instructions and data from a read-only memory and/or a random access memory. The essential elements of a computer are a processor for executing instructions and a memory. Generally, a computer will include one or more mass storage devices for storing data files; such devices include magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and optical disks. Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM disks. Any of the foregoing can be supplemented by, or incorporated in, ASICs (“application-specific integrated circuits”).
To provide for interaction with a user, the invention can be implemented on a computer system having a display device such as a monitor or LCD screen for displaying information to the user and a keyboard and a pointing device such as a mouse or a trackball by which the user can provide input to the computer system. The computer system can be programmed to provide a graphical user interface through which computer programs interact with users.
Various implementations for digital communications between a key fob and a host device have been described. Nevertheless, various modifications may be made to the implementations, and such modifications would be within the scope of the present invention. For example, methods discussed above can be performed in a different order to achieve desirable results. In addition, although FIG. 2 is described above with the key fob paging and the host device page-scanning, the roles of the two devices can be reversed—i.e., with the host device paging and the key fob page-scanning. Moreover, a key fob can be implemented such that each mode of operation (e.g., automatic/manual) are exclusive of one another, or the key fob can be implemented such that the modes of operation of the key fob are not exclusive of one another—e.g., a manual mode of operation is always available regardless of whether the key fob is operating in the automatic mode. The manual mode of operation generally includes controls to arm and disarm a host device; however, both functions do not have to be provided by the key fob. The difference in signal strengths can be dynamically set via location profiles set by (e.g.) a theft deterrent system as part of a security level definition (e.g., airport security setting vs. office setting may drive different preferences in signal level strengths). The techniques discussed above are applicable to other technologies including, for example, Ultra Wideband (UWB), 802.11a/b/g/n, Zigbee, IR, RFID, proprietary 2.4 Ghz protocols, or any other wireless technology (e.g., long range technology like WWAN or WiMax or any future developed technology). Accordingly, many modifications may be made by one of ordinary skill in the art without departing from the spirit and scope of the following claims.