The present disclosure generally relates to the field of contact tracing. In particular, the present disclosure is directed to methods and software for contact tracing and exposure-event suppression using indoor positioning.
Identifying when two people come into close enough proximity to one another, and perhaps also for a long enough period of time, for an infection to spread from one of those two people to the other can have a meaningful impact on inhibiting or controlling the spread of an infectious disease. For example, knowing when a first person that has tested positive for the SARS-CoV-2 virus has been in “transmissive contact” with a second person, including in the recent past, can allow the second person, and any other person or people that the second person has had similar contact with, to be notified that they may have been infected. Consequently, all of the notified people can take appropriate action, such as self-quarantining and/or getting tested for the infection, to inhibit them from further spreading the infectious disease. Here, the term “transmissive contact” does not necessarily mean physical contact. Rather, “transmissive contact” in this context includes any physical proximity (distance) and/or time that have been established as parameters for which an infectious agent, such as a virus or flu, can be transmitted from one person to another. In one example for the SARS-CoV-2 virus, it has been proffered that the virus can be transmitted from one person to another if the two people are within 6 feet of one another for 15 minutes or more.
In the recent COVID-19 pandemic, contact-tracing apps for personal mobile smartphones have been developed and deployed for determining whether or not two people—as measured between the respective smartphones they are carrying—have been within 6 feet of one another for at least 15 minutes. Conventional smartphone contact-tracing apps typically use the BLUETOOTH® radios onboard the smartphones and the perceived signal strengths of the corresponding radio signals to estimate the relevant distance and time to determine whether or not sufficient transmissive contact has occurred for an infectious agent—if present—to be transmitted between the two people.
While these contract-tracing apps can provide significant benefits, they can, and do, provide false positives. For example, conventional contact-tracing apps will identify that two people have had sufficient transmissive contact for an infection to occur when they are, in fact, located in two separate and distinct spaces separated by a sealing partition, such as a sheetrock wall or glass wall. In such cases, if the two people were never in the same room together, there was virtually no chance of infection, despite them being closer together than 6 feet for 15 minutes or more. False positives can cause undesirable stress to the person or people that have been falsely identified as having been exposed to the infectious agent.
In one implementation, the present disclosure is directed to a method of notifying a first person that the first person has been in transmissive contact with a second person that has been infected with an infectious agent, wherein each of the first and second persons carries, respectively, a first mobile device and a second mobile device each containing contact-tracing (CT) software. The method being performed by the first mobile device includes receiving a first CT key transmitted by the second mobile device; receiving an infected CT key indicating that the second person has been infected by the infectious agent; matching the infected CT key and the first CT key to one another; and based on the matching, causing the first mobile device to notify the first person of the transmissive contact.
In another implementation, the present disclosure is directed to a method of controlling a first mobile device deployed in a contact-tracing (CT) system that employs a server for facilitating the CT system and that includes a second mobile device, wherein the first mobile device is carried by a first person and the second device is carried by a second person. The method being performed by the first mobile device includes continually generating, serially, first-mobile-device CT keys and storing the first-mobile-device CT keys; receiving from the first person a self-reporting of infection by an infectious agent; and based on the receiving of the self-reporting, transmitting a set of the first-mobile-device CT keys to the server.
In yet another implementation, the present disclosure is directed to a method of determining whether transmissive contact has occurred between two people carrying, respectively, first and second mobile devices. The method includes exchanging, between the first and second mobile devices, unique contact-tracing (CT) keys and location information in response to detecting that the first and second mobile devices are within a predefined transmissive proximity to one another; wherein each of the first and second mobile devices accepts or rejects the unique CT key received from the other of the first and second mobile devices based on whether or not the location information indicates that the first and second mobile devices are in a same separated space as one another.
For the purpose of illustration, the drawings show aspects of one or more embodiments of the invention(s). However, it should be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, wherein:
In some aspects, the present disclosure is directed to contact-tracing (CT) systems and methods for anonymously identifying when people have come into transmissive contact with one another with a goal of tracing such contact in the event that any of the people report that they have been infected with an infectious agent, such as the current SARS-COV-2 virus, or any other relevant infectious agent identified now or in the future. This allows for alerting all of the people having contact chains that can be traced back to the infected person that they may have been infected with the infectious agent.
Before proceeding with describing example CT systems and other features and aspects of the present disclosure, it is noted those skilled in the art will understand that the examples provided herein are simplistic for ease of illustrating basic functionalities of the disclosed embodiments. Actual deployments would typically include many more organization members, many more deployments of mobile CT software, and more complex and numerous transmissive contacts among the monitored members. Those skilled in the art will readily understand how to design and deploy CT systems of any size and in any physical setting(s) without undue experimentation using the present disclosure as a guide.
Referring to
In one scenario, the CT software 104S and 108S on Emily's and Eric's mobile devices 104 and 108 may be part of an overall CT system 112 deployed by an organization, such as a company, educational institution, government, etc., for anonymously monitoring interactions of organization members (Emily and Eric in this example) with one another with the goal of making the members of the organization as safe as possible from becoming infected by one or more infectious agents, such as a virus or flu, among others. An important feature of embodiments of CT systems disclosed herein, such as the CT system 112 of
In the example of
In this example scenario 100, on Day 14 Emily self-reports, as illustrated by arrow 138, that she has been infected with the relevant infectious agent. For example, Emily may have tested positive for the infectious agent and/or presented with symptoms of the infectious agent. In this connection and in an example, the CT software 104S and 108S aboard each of the mobile devices 104 and 108 may implement a self-reporting feature 124 (
In this example scenario 100, as illustrated by arrow 152, each mobile device that is part of the CT system 112, including Eric's mobile device 108, polls the server 120 to retrieve, or pull, any infected CT keys that the server has stored since the last time that device polled the server. In this example, Emily's CT keys 104K(1) to 104K(14) are included in such new infected CT keys. The stored CT keys that Eric's mobile device 108 received from one or more other mobile devices of the overall CT system 112 during a transmissive-contact key exchange includes Emily's CT key 104K(5). Therefore, when Eric's mobile device 108 receives Emily's infected CT keys (collectively represented at 1041K in
As indicated by arrow 156, this match signals to Eric's CT software 108S that there is a chance that Eric was infected by the transmissive contact he had with Emily on Day 5. In turn, Eric's CT software displays an exposure notification 160 on Eric's mobile device 108 that notifies Eric that he may have been infected and should take appropriate response measure(s), such as getting tested for the infectious agent and self-reporting if positive, and/or self-quarantining, among other things. If Eric gets tested and the test is positive for the infectious agent, Eric should self-report so that the CT system 112 can then handle his newly infected CT keys (not shown) in the same manner as Emily's infected keys 104K(1) to 104K(14), including making them available to the mobile devices of those organization members that may have been in transmissive contact with Eric after Day 5, since those members may have become infected, too, from their transmissive contact with Eric.
On the CT team/person 116 side, a member of the CT team knows that Emily self-reported, and thus and as indicated by arrow 164, he can follow up with her directly as needed to obtain more information from Emily and/or provide information to her. For example, John may know how to contact Emily—who is otherwise anonymous via the anonymous CT key process—by virtue of Emily providing her phone number and/or other contact information during the self-reporting discussed above. As noted above, the server 120 designated Emily's Day 5 CT key 104K(5) as an infected CT key 1041K on Day 14 in response to Emily self-reporting on Day 14. In some embodiments, the designation of infected CT keys might not happen automatically in response to an initial self-reporting. For example, the CT team/person 116 may contact the self-reporter to confirm the legitimacy of the self-reporting to ensure that the self-reporting was valid and not, for example, accidental or done maliciously by someone other than Emily gaining access to her mobile device 104. Therefore, in some embodiments, the server 120 may have a dashboard that provides the CT team/person 116 with control over the treatment of CT keys, perhaps among other functionality(ies).
As discussed above relative to
For example and as mentioned above, a false-positive can arise in a situation in which two mobile devices determine that they are within infection-transmission distance of one another, but where the mobile devices, and corresponding organization members, are effectively isolated from one another such that infection transmission cannot occur. Examples of such effective isolation include situations where a partition exists between the two organization members, such as in the case of the organization members being located in adjacent spaces, for example, rooms, physically isolated from one another by a sheetrock, glass, or other type of wall or partition, such that they are considered separated spaces. In these cases, the wall/partition between the two organization members provides a barrier to the transmission of the infecting agent.
In some embodiments, the mobile devices 104, 108 each include map data 104MD, 108MD, as shown on
In some embodiments, the CT system 212 determines whether or not the two mobile devices 104 and 108 are located in the same separated space, such as separated space 220, via the CT software 104S and 108S running on the corresponding mobile devices. This may be accomplished by the CT software 104S and 108S on the two mobile devices 104 and 108, respectively, sending its location metadata, as determined in this example via the triangulation noted above, to the CT software on the other of the two mobile devices. Since the CT software 104S and 108S of each mobile device 104 and 108 has determined its own location, it can determine whether or not the corresponding two mobile devices are in the same space, such as space 220, by comparing the location metadata received from the other mobile device with its own location metadata.
While
However, the CT software 104S, 108S on each of the mobile devices 104, 108 also triangulates the position of the corresponding mobile device using beacons positioned throughout a facility 304, or a portion thereof, where monitoring of transmissive contacts is desired. In the example shown in
In the same manner as discussed above relative to
In one example, Emily's CT software 104S sends “Room B” as the separated-space identifier 104SSI, and Eric's CT software 108 sends “Room C” as the separated-space identifier 108SSI via the BLE radios 104R and 108R, respectively. As illustrated in
In the scenario 400 illustrated in
Referring still to
With reference to the forgoing, including to
It is noted that the terms “first” and “second” as used in methods 500, 600, and 700 do not refer to ordinality, any relative importance, or relationship between differing elements modified by the same one of these words. Rather, “first” and “second” are merely used to indicate that the relevant method 500, 600, and 700 contains two of the same type of element and that, in the method, each of those elements has a particular role relative to the other like element. It is further noted that the number of particular elements addressed in each of the methods 500, 600, and 700 is not necessarily representative of the number of such elements that would be present in an actual implementation. On the contrary, the number of elements in each method 500, 600, and 700 is simply the minimum number of elements used to convey the relevant functionality(ies) to the reader.
Turning first to
At block 505, a first CT key that the second mobile device transmits is received. As discussed above, when one mobile device (here, the first mobile device) receives a CT key from another mobile device (here, the second mobile device), this is an indication that the CT software has determined that the first and second persons are in transmissive contact or suspected transmissive contact with one another. Regarding suspected transmissive contact and as discussed above, in some embodiments the determination of whether transmissive contact has occurred is further refined using location metadata to determine whether or not two mobile devices, such as the first and second mobile devices in this example, are in the same separated space (e.g., in the same room or at the same workstation, etc.).
At block 510, an infected CT key is received. As discussed above, an infected CT key is a CT key associated with a person, here, the second person, self-reporting that they have been infected with an infectious agent for which the CT software has been deployed and/or parameterized. As noted above, the infected CT key may, in some deployments of a CT system, be pushed from a server in response to the second person self-reporting, while in some deployments the infected CT key may be pulled from the server. As discussed above, depending on a number of possible factors, such as when the first CT key was received relative to when the second person self-reported and how many CT keys the second mobile device generated from the time it generated the first CT key and the time the second person self-reported, at block 510 the first mobile device may receive more than one infected CT key.
At block 515, the infected CT key and the first CT key are matched to one another. As discussed above, this matching indicates that during a determined transmissive contact, i.e., the transmissive contact at which the first mobile device received the first CT key, the first and second mobile devices exchanged their then-current CT keys. Specifically, the second mobile device transmitted the first CT key (which is now equivalent to the infected key) to the first mobile device, and the first mobile device transmitted a second CT key to the second mobile device. In the context of
At block 520, based on the matching at block 515, the first mobile device notifies the first person of the transmissive contact. This notification may be through any one or more HMI features on the first mobile device, such as an aural alert, a haptic alert, a message alert, or any combination thereof. As discussed above, this alert is anonymous in that it does not identify either the person that self-reported or when the transmissive contact occurs. A purpose of the notification may be to prompt the first person to get tested to determine whether or not they have been infected with the infectious agent. In an example, if the first person were to test positive for the infectious agent, they would be instructed to self-report so that their CT key(s), such as the second CT key mentioned above, could be stored on the server for pulling, or perhaps pushing, out of a server as an infected CT key, just like the infected CT keys that they received as discussed above.
As noted above, the determination of transmissive contact can be enhanced using location metadata. In the context of
At block 530, second location metadata may be received from the second mobile device indicating the location of the second mobile device. The first mobile device may receive the second location metadata in conjunction with receiving the first CT key, meaning that the second mobile device transmits the second location metadata at or around (e.g., within a second) the same time it transmits the first CT key.
At block 535, the first and second location metadata are compared with one another to determine whether or not the locations of the first and second mobile devices are the same. At block 540, when the first and second location metadata match, the first mobile device stores the first CT key in its memory. Because the first mobile device has stored the first CT key, the first CT key is available for matching at block 515. At block 545, when the first and second location metadata do not match, the first mobile device does not store the first CT key. Therefore, the first CT key is not available for matching at block 515, so the first mobile device will not notify the first person that transmissive contact had occurred when their first mobile device exchanged the first and second CT keys with the second mobile device.
At block 605, first-mobile-device CT keys are continually generated serially and stored. As discussed above, the continual generation of the first-mobile-device keys may proceed in any suitable manner, such as on a set time schedule (e.g., daily, hourly, every 10 minutes, etc.) or by triggering from one or more events (e.g., moving from one separated space to another, booting-up of the first mobile device, etc.) or any suitable combination thereof. Each of the generated first-mobile-device CT keys is stored in memory aboard the first mobile device. In embodiments in which the infectious agent has a well-defined incubation period, the CT software aboard the first mobile device may purge any stored first-mobile-device CT keys that are from a period prior to the presumed beginning of the incubation period. For example, if the incubation period is 9 days, then, as a current time, the CT software may purge any stored first-mobile-device CT key(s) older than 9 days. In another embodiment, incubation period consideration may not be handled as a purging but rather at the time that the first person self-reports that they have been infected—or likely infected—with the infectious agent. In such embodiments, the CT software aboard the first mobile device may only send the first-mobile-device CT keys stored during the 9 days leading up to the self-reporting. As those skilled in the art will readily appreciated in situations wherein the incubation period of the relevant infectious agent is well-established, limiting the number of the first-mobile-device CT keys stored and/or transmitted will minimize the number of transmissive contacts that are truly not transmission events.
At block 610, the first mobile device receives a self-reporting of (suspected) infection by the first person. As discussed elsewhere herein, this may be done by the CT software aboard the first mobile device displaying a self-reporting feature, such as a self-reporting soft control (e.g., button, slider, etc.) and then receiving a user selection or activation of the self-reporting feature. As discussed above, any self-reporting may or may not be accompanied by the first person providing any additional information, such as a phone number and/or other contact information, for example, if a CT team wants/needs to follow up with the first person regarding the self-reporting. Also noted above, the self-reporting may be predicated on the occurrence of any one or more events, such as receiving test results indicating infection, receiving a professional assessment indicating infection, or making a self-diagnosis of infection based on personal assessment of experienced symptoms, among others.
At block 615, based on receiving the self-reporting of infection at block 610, the first mobile device transmits a set of the stored first-mobile-device CT keys to the server. As discussed elsewhere herein, the CT system will use the first-mobile-device CT keys transmitted with the self-reporting to anonymously notify other persons that are part of the CT system, such as the second person, that the CT system has determined that they have been in transmissive contact with a person (here, anonymously the first person) that has been infected, or is at least suspected to have been infected, with the relevant infectious agent. In some embodiments, this is done by other mobile devices, such as the second mobile device pulling from the server the set of the first-mobile-device CT keys as a set of infected keys. The CT software on each mobile device in the CT system, such as the CT software aboard the second mobile device, then uses the infected CT keys to determine whether or not any of these infected CT keys matches any of the exchanged CT keys it has stored in its own memory based on prior transmissive contacts. As noted above relative to block 605, if the CT software aboard the first mobile device controls the number of the first-mobile-device CT keys transmitted based on a known incubation period, for example, either by memory purging or transmission control, the set of the first-mobile-device CT keys transmitted at block 615 may be limited to only the ones of the first-mobile-device CT keys from during the incubation period. Alternatively, the server may be configured to handle this optional functionality, for example, by only making available the ones of the first-mobile-device CT keys received from the first mobile device that are from the incubation period.
At block 705, the first and second mobile devices exchange unique CT keys and location information in response to whether the first and second devices are in physical proximity to one another. In some embodiments, and as noted elsewhere herein, each of the first and second mobile devices may continually generates their own unique and anonymous CT keys on a schedule and/or based on the occurrence of certain events. Physical proximity can be determined using any suitable means, such as signal strength of radios aboard the first and second device, among other things. In some embodiments, the physical proximity can be defined by whether or not one, the other, or both of the first and second mobile devices detects when the other one of the first and second mobile devices is within an envelope, or bubble, having a radius equal to any maximum transmissive distance established for the infectious agent at issue. As noted above, physical proximity can, but need not, be augmented, for example, with a transmissive time, which is equal to the minimum amount of time that two people need to be within the maximum transmissive distance for the infectious agent to be presumed to be transmitted from one of the two people to the other of the two people.
The location information may be, for example, location metadata, such as a separated space identifier that identifies the specific separate space that each of the first and second mobile device determines itself to be located in. As noted elsewhere herein, examples of separated spaces include, but are not limited to, rooms within a facility and workstations within a common workspace, among others.
At block 710, each of the first and second mobile devices either accepts or rejects the CT key received from the other one of the first and second mobile devices based on whether or not the location information it received from the other one of the first and second mobile devices indicates that these two mobile devices are in the same separated space. Acceptance and rejection can be based on the act of storing or not storing the received CT key. That is, if it is determined that the first and second mobile devices are located in the same separated space, then each of the two mobile devices will store the received CT key. This will, for example, make it available in the event that the person associated with the one of the first and second mobile devices that transmitted the CT key self-reports being infected so that the CT system, primarily the CT software aboard the relevant one of the two mobile devices, can determine whether or not the associated person was involved in a transmissive contact. Conversely, if it is determined that the first and second mobile devices are not located in the same separated space, then each of the two mobile devices will simply not store the received CT key. Therefore, it will not be available in the event that the person associated with the one of the first and second mobile devices that transmitted the CT key self-reports being infected. This precludes any determination that the two people were in transmissive contact with one another, which is a local result since they were in fact in two different-separated spaces where it would be impossible for transmissive contact to occur.
In some embodiments, functionalities that the server 808 provides may include, but not be limited to: receiving, from the plurality of mobile devices 812(1)-(N) and over the communications network 816, self-reports (collectively, 808SR) of infection by the possessors of the mobile devices; receiving, from the plurality of mobile devices and over the communications network, infected CT keys (collectively, 808IK) from the mobile devices; providing a dashboard user interface (UI) 808UI for use by an optional CT team/person 820; releasing, based on continual pull polling by mobile devices that are part of the CT system 804, infected CT keys to the mobile devices using the communications network (or perhaps pushing out infected keys); and/or using incubation information to determine which infected CT keys to release to the mobile devices over the communications network; among other functionalities, or any suitable subset thereof. Those skilled in the art will readily understand how to configure and code the server CT software 808S to perform any one or more of these functionalities using the present disclosure as a functional specification of sorts. It should go without saying that the server 808 includes, among other things: one or more microprocessors 808MP for executing the CT-server software 808S and other software (not shown) for appropriately controlling the server; various types of hardware storage media (i.e., memory) 808M for storing or holding, permanently or temporarily dependent on the purpose of the storing/holding, all data, such as infected CT keys and any data corresponding to the self-reports, stored on the server and all software, including the server CT software, that runs on the server; and one or more communications ports 808CP for allowing the server to communicate with the communications network.
Those skilled in the art will readily understand that each microprocessor 808MP can be any suitable microprocessor, such as a general processing unit. Those skilled in the art will also readily understand that the memory 808M is a collective representation of all physical memory that is part of the server 808, including, but not limited to transient physical memory, such as cache memory that may be aboard the microprocessor(s) 808MP and certain types of RAM, among others, and long-term-storage memory, such as, but not limited to, solid-state-device drives (e.g., DRAM, flash memory, etc.), magnetic storage media (e.g., disks, bubble, tape, etc.), and optical storage media, among others. Fundamentally, there is no limitation on the types of memory that can be used as the memory 808M of the server 808. For the sake of clarity, it is specifically noted that the terms “hardware storage medium” and “hardware storage media” exclude transitory signals, such as radio-frequency signals, optical signals, ultrasonic signal, and any wire, fiber, or other signal conductor(s) (including space) that are provided for the purpose of conducting transitory signals. Further, those skilled in the art will readily understand that each communications port 808CP may be any suitable type of communications port, such as a Ethernet port or a wireless communications port, among many others.
A desired characteristic of the mobile devices 812(1)-(N) is that the people that are participating in the CT of the CT system 804 carry them, or otherwise keep them at least within arm's reach, generally throughout the entire period during which CT is desired to be monitored. Presently, smartphones are virtually ubiquitous devices that their users typically carry with them nearly constantly throughout the day, and so, smartphones are presently one type of mobile device for implementing as the mobile client devices 812(1)-(N) of the CT system 804. Indeed, current smartphones typically have instruments and features, such as WI-FI® radios, Bluetooth® radios, graphic-display-based UIs, global positioning systems (GPSs), among others, that a CT system of the present disclosure, such as CT system 804 of
In this example, the mobile CT software 812S is designed and coded so that when it is executed by the microprocessor(s) 812MP it performs a variety of functionalities that may include, but not be limited to: continually generating new unique anonymous CT keys; storing the generated CT keys in the memory 812M; determining whether or not the first mobile device 812(1) is in proximity to another one of the mobile devices 812(2) to 812(N) (e.g., using the BLE radio or other instrument 8121 aboard the first mobile device); tracking the amount of time that the first mobile device is in proximity to another of the mobile devices; receiving a CT key from another one of the mobile devices; accepting or rejecting the received CT key; determining position data for the location of the first mobile device (e.g., by triangulation (such as use of the BLE radio), GPS, etc.); determining location metadata (e.g., using a stored map and the location data); presenting a self-reporting feature to the person carrying the first mobile device; presenting a self-reporting UI to the person carrying the first mobile device; receiving a self-reporting from the person carrying the first mobile device; sending to the server 808 stored CT keys generated by the first mobile device; receiving one or more infected keys from the server; and alerting the person carrying the first mobile device of involvement in a transmissive contact incident; among others, or any suitable subset thereof. Examples of these and other functionalities that the CT software 812S may provide are described elsewhere in this disclosure.
For the sake of illustration,
The communications network 816 can be any one or more communications networks/paths needed for the mobile devices 812(1)-(N) and the server 808 to communicate with one another. Examples of such networks/paths include, but are not limited to, cellular-service networks, the Internet, wide-area networks, and local area networks, among others, and any interconnections therebetween and to server 808 and the mobile devices 812(1)-(N).
As an example use case, and referring to
As another example use case, and also referring to
In an extension of this scenario, Eric leaves his workstation, along with his mobile device, to meet with Emily in her workstation. When Eric's mobile device is within six feet of Emily's mobile device, their respective CT software begins the process of exchanging keys and location metadata. Because Eric's mobile device is continually updating location information by triangulating using the low-energy beacons in the manufacturing facility, his CT software updates his location metadata to “Emily's Workstation”, such that when Emily's and Eric's mobile devices exchange keys and check each other's location metadata, the location metadata accompanying both CT keys, here, “Emily's Workstation”, matches one another. This causes each of the mobile devices to store the received CT key, signifying that transmissive contact has occurred between Emily and Eric for the purposes of contact tracing.
In each of the examples above that use mobile-device location, the local positioning system may use beacons for triangulation. For example, BLE-beacon-based indoor positioning systems are known, as are techniques for triangulating position using BLE beacons. However, for the sake of illustration some aspects and example implementations are described briefly here. Generally, the BLE beacons are located at fixed known positions relative to a facility, such as inside one or more spaces inside the facility, outside the facility, and/or surrounding the facility. When the BLE radio receiver of a mobile device picks up a signal from each of a number, N, of beacons, a suitable triangulation algorithm that uses relative signal strength can triangulate the position of the BLE radio receiver within or relative to the facility. In some embodiments, the positioning calculation can be performed every second or so such that the position of the corresponding mobile device can essentially be determined in real time.
Signal strength of signals from at least 3 BLE beacons is used to triangulate position. Example criteria may be that: 1) at least one BLE signal shall be measured by each mobile device with a level of −70 dBm or stronger; 2) at least 3 BLE signals shall be measured by each mobile device with a level of −80 dBm or stronger, including the dominant beacon measured at −70 dBm or stronger; and 3) at least 6 BLE signals shall be measured by each mobile device (including the dominant beacon at −70 dBm or stronger, plus beacons at −80 dBm or stronger, plus other beacon(s) detected in the area.
The output of the location algorithm may be a 3D location fix plus a confidence circle typically corresponding to 90% confidence, as well as geonotifications, for example, ID, location name, content, and end time. The location algorithm may, for example, include a foreground mode (BLE/GPS/map) and a background mode, support indoor/outdoor transitions, be device-centric, and able to work offline. Geonotification may include a beacon proximity mode and have a fine mode that leverages background location.
It is noted that while BLE signals are used in specific examples throughout this disclosure for the various proximity, location, and communication functionalities, other signals, including other radio signals, may be used. In addition, different signal types, such as radio signals of differing types (e.g., WI-FI®, Zigbee®, etc.), optical signals, and/or ultrasonic signals, may be used for differing functionalities. For example, the signal type used for proximity may be different from the signal type used for location. As another example, the signal type for communications may be different from one or both of the signal type(s) of the proximity and location functionalities.
Each mobile device may be any mobile computing device, such as a smartphone, smartwatch, smartbadge, etc., that has the requisite processing power, memory, and communications device(s) (e.g., radio(s)) to perform the necessary functions. Those skilled in the art will readily understand the hardware requirements needed for a mobile device to implement a CT system of the present disclosure. Those skilled in the art will also readily understand how to configure the software necessary to perform the functionalities needed for such mobile devices. Similarly, those skilled in the art will readily understand the hardware needed for the server(s) described herein, as well as the communications networks (e.g., cellular, Internet, local area, wide area, personal area, etc.) needed to enable the functionalities described herein. In addition, those skilled in the art will readily understand how to configure a location positioning system of the present disclosure, such as a BLE-beacon-based location positioning system.
Regarding software for the mobile devices and the server for implementing a CT system and/or a CT methodology of the present disclosure, those skilled in the art will readily understand how to create the software modules, app(s), algorithms, etc., and/or other code, necessary to cause the relevant hardware to perform the necessary functions. Consequently, the software need not be described in detail for those skilled in the art to implement the broad features, singly or in any suitable combination, of the present disclosure without undue experimentation.
It is noted that the foregoing examples describe the people carrying the mobile devices as “organization members”. However, the people do not necessarily need to be members of an organization. For example, at least one of the people may be of another type, such as a visitor to a monitored facility, a temporary contractor working at the monitored facility, or another type of non-member, such as any member of the general public in a geographic region, city, state, territory, nation, continent, island, etc., where aspects of any CT methodology and/or CT system of the present disclosure may be implemented.
The server-side functionalities of a CT system of the present disclosure may be implemented as a standalone CT monitoring software application or as part of other software, such as a critical event management software system. In some embodiments, the server-side functionalities may be part of a cloud-based multi-tenant system or it may be implemented on an onsite enterprise server. Fundamentally, there are no limitations on the manner and/or architecture in which the server-side functionalities may be implemented.
Various modifications and additions can be made without departing from the spirit and scope of this disclosure. Features of each of the various embodiments described above may be combined with features of other described embodiments as appropriate in order to provide a multiplicity of feature combinations in associated new embodiments. Furthermore, while the foregoing describes a number of separate embodiments, what has been described herein is merely illustrative of the application of the principles of the present disclosure. Additionally, although particular methods herein may be illustrated and/or described as being performed in a specific order, the ordering is highly variable within ordinary skill to achieve aspects of the present disclosure. Accordingly, this description is meant to be taken only by way of example, and not to otherwise limit the scope of this disclosure.
Exemplary embodiments have been disclosed above and illustrated in the accompanying drawings. It will be understood by those skilled in the art that various changes, omissions and additions may be made to that which is specifically disclosed herein without departing from the spirit and scope of the present disclosure.
This application claims the benefit of priority of U.S. Provisional Patent Application Ser. No. 63/077,980, filed Sep. 14, 2020, and titled “METHODS AND SOFTWARE FOR CONTACT TRACING AND EXPOSURE-EVENT SUPPRESSION USING INDOOR POSITIONING”, which is incorporated by reference herein in its entirety.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2021/050073 | 9/13/2021 | WO |
Number | Date | Country | |
---|---|---|---|
63077980 | Sep 2020 | US |