Parental controls

Information

  • Patent Grant
  • 9741022
  • Patent Number
    9,741,022
  • Date Filed
    Thursday, February 26, 2015
    9 years ago
  • Date Issued
    Tuesday, August 22, 2017
    7 years ago
Abstract
A web service platform to improve end-user engagement in a captive audience environment. Mobile and web-based clients allow application users to authorize and approve usage of entitlements of other users, including their children, based upon preconfigured rules and the proximity between the user requesting and the user approving authorization to use the entitlement.
Description
BACKGROUND

Field of the Invention


The present invention generally relates to web services. More specifically, the present invention concerns parental controls.


Description of the Related Art


Families often separate to enjoy different activities while attending popular attractions such as theme parks, cruise ships, stadiums, sporting venues, and resorts. Parents understandably want to monitor, restrict, or grant permission to their children when they want to view or participate in age or content restricted activities such as watching shows, riding rides, or watching digital content when they are not physically present with their children. Absent being physically present or having some other chaperone, there is no way to ensure proper supervision and restrictions while granting children reasonable freedom and separation.


There is a need in the art for an improved methodology for parents to monitor and grant or deny permission to their children when they want to access content or activities while physically separated from their parents.


SUMMARY OF THE PRESENTLY CLAIMED INVENTION

In a first claimed embodiment of the present invention, a method for controlling access to entitlements is disclosed. An entitlement for a first user is detected. An authorization message is then sent to a second user having control of entitlement access for the first user. Authorization for the first user to enjoy the entitlement is then received from the second user.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 illustrates a system for increasing customer engagement, including redeeming user entitlements.



FIG. 2 is a method for redeeming entitlement rights.



FIG. 3 illustrates an exemplary computing system that may be utilized to implement one or more embodiments of the present invention.





DETAILED DESCRIPTION

The present invention includes a web service platform to enable the user to remotely authorize a different person's access to content or services when not in the presence of the person requesting access. Mobile and web-based clients enable application users to automatically request authorization, grant or deny access.



FIG. 1 illustrates a system 100 for increasing customer engagement, including redeeming user entitlements. The system 100 of FIG. 1 includes an ecosystem of data sources 105 such as mobile devices 110, point-of-sale (POS) or point-of-entry/-exit (POE) terminals 115, and databases 120. Communicatively coupled to data sources 105 are back-end application servers 125. In system 100, application servers 125 can ingest, normalize and process data collected from mobile devices 110 and various POS or POE terminals 115. Types of information gathered from data sources 105 and processed by back-end application servers 125 are generally inclusive of identity (e.g., user profiles, CRM data, entitlements, demographics, reservation systems and social media sources like Pintrest and Facebook), proximity (e.g., GPS and beacons), and time (e.g., schedules, weather, and queue length).


Mobile devices 110 can execute an application on a user mobile device that shares customer engagement data such as current and prior physical locale within a venue as well as wait times and travel times (e.g., how long was a customer at a particular point in a venue and how long did it take the customer to travel to a further point in a venue). Mobile devices 110 are inclusive of wearable devices. Wearable devices (or ‘wearables’) are any type of mobile electronic device that can be worn on the body or attached to or embedded in clothes and accessories of an individual. Processors and sensors associated with a wearable can gather, process, display, and transmit and receive information.


POS data may be gathered at a sales terminal 115 that may interact with a mobile or wearable device 110 to track customer purchase history at a venue or preference for engagement at a particular locale within the venue. POE terminals 115 may provide data related to venue traffic flow, including entry and exit data that can be inclusive of time and volume. POE terminals 115 may likewise interact with mobile and wearable devices 110.


Historical data may also be accessed at databases 120 as a part of the application server 125 processing operation. The results of a processing or normalization operation may likewise be stored for later access and use. Processing and normalization results may also be delivered to front-end applications (and corresponding application servers) that allow for the deployment of contextual experiences and provide a network of services to remote devices as is further described herein.


The present system 100 may be used with and communicate with any number of external front-end devices 135 by way of communications network 130. Communication network 130 may be a local, proprietary network (e.g., an intranet) and/or may be a part of a larger wide-area network. Communication network 130 may include a variety of connected computing device that provide one or more elements of a network-based service. The communications network 130 may include actual server hardware or virtual hardware simulated by software running on one or more actual machines thereby allowing for software controlled scaling in a cloud environment.


Communication network 130 allows for communication between data sources 105 and front-end devices 135 via any number of various communication paths or channels that collectively make up network 130. Such paths and channels may operate utilizing any number of standards or protocols including TCP/IP, 802.11, Bluetooth, GSM, GPRS, 4G, and LTE. Communications network 130 may be a local area network (LAN) that can be communicatively coupled to a wide area network (WAN) such as the Internet operating through one or more network service provider.


Information received and provided over communications network 130 may come from other information systems such as the global positioning system (GPS), cellular service providers, or third-party service providers such as social networks. The system 100 can measure location and proximity using hardware on a user device (e.g., GPS) or collect the data from fixed hardware and infrastructure such as Wi-Fi positioning systems and Radio Frequency ID (RFID) readers. An exemplary location and proximity implementation may include a Bluetooth low-energy beacon with real time proximity detection that can be correlated to latitude/longitude measurements for fixed beacon locations.


Additional use cases may include phone-based, GPS, real-time location (latitude/longitude) measurements, phone geo-fence-real time notifications when a device is moving into or out of location regions, Wi-Fi positioning involving user location detection based on Wi-Fi signal strength (both active or passive), RFID/Near Field Communication (NFC), and cellular tower positioning involving wide range detection of user device location, which may occur at the metro-level.


Front-end devices 135 are inclusive of kiosks, mobile devices, wearable devices, venue devices, captive portals, digital signs, and POS and POE devices. It should be noted that each of these external devices may be used to gather information about one or more consumers at a particular location during a particular time. Thus, a device that is providing information to a customer on the front-end (i.e., a front-end device 135) such as a mobile device executing an application or a specially designed wearable can also function as a data source 105 as described above.


The system 100 of FIG. 1 provides services to connect venue management with visitors and entertainment consumers while simultaneously providing a messaging platform for consumers. For example, the social network of a consumer may be extended into a map and the physical world associated with the map. Services to extend the social network of a user include finding friends and family and management of proximity based parental controls.



FIG. 2 is a method for redeeming entitlement rights. The method of FIG. 2 may be performed by an end user with a mobile device 110 in a system 100 like that of FIG. 1. A web services platform may operate at application server 125 of FIG. 1 either alone or in conjunction with a mobile application or web application executing on mobile device 110.


The method of FIG. 2 allows an authorizing user to not be physically present when the entitlements are redeemed while still providing the opportunity for the authorizing user to make a decision whether to grant access. Further, the authorizing user is only contacted to provide access in the event they are not physically present at the location where the entitlements are being redeemed. The method of FIG. 2 may utilize one or more location based services in the context of system 100.


Through the method of FIG. 2, an end user configures parental controls for a child or other minor at step 200. Configuration includes, but is not limited to, specifying which entitlements will automatically be authorized or rejected, the distance end user must be from their child or minor before they will be notified to grant access, and whether the end user only wants to be notified of entitlement redemptions or wants to grant permission before the entitlement can be redeemed.


Entitlements can have many manifestations. For example, an entitlement may include a ticket to access a physical location such as an amusement park, show, movie, or sporting event. Entitlements might likewise include rights to use a transportation service or for digital goods including rights to purchase, play, use, watch, or listen to content. Use of content may be on a set-top box, mobile device, kiosk, or other form of entertainment system, including tablet devices.


The entitlement holder (such as a younger child) may attempt to redeem an entitlement by presenting a physical ticket or displaying a ticket on a mobile device 110 at step 205. When the entitlement holder presents their entitlement for redemption, an automated ticket reader (e.g., QR Code, RFID reader, Bluetooth beacon) or ticket processing kiosk will at step 210 scan and verify the authenticity of the entitlement. If the entitlement is invalid because it has already been redeemed or for some other reason, access is denied (255).


If the entitlement is valid and no parental control restrictions have been assigned to the entitlement or the individual holding the entitlement as determined at step 215, the user redeeming the entitlement is authorized at step 245 and may proceed to enter the gate or other ticketed area. In the case of content delivery, the user may then begin downloading, playing, watching, or listening to the same.


If the parental control settings defined in step 200 have assigned restrictions to the entitlement or the entitlement holder (or both), then further authorization is required at step 215 before the entitlement holder is authorized to access the content or proceed into the otherwise ticketed or prohibited area. In the event that permissions are required, the web service will determine whether parent end-user, is currently in the physical presence of the user redeeming the entitlement at step 220. The location of parental end user may be determined based on location based technology in a mobile device 110 or wearable reporting its location to web services platform executing at application server 135 or through monitoring of the location of end user with proximity technology such as Wi-Fi MAC address harvesting, which would also be reported to web services platform. For entitlements that grant access to a physical location, the location of the entitlement holder may be determined based on the location of the point of sale or gate control system. The entitlement holder's location may also be determined based on mobile technologies like those discussed above.


At step 220, if the authorizing end user is in proximity of the user redeeming the entitlement and the preferences defined at step 300 are configured to allow access based on proximity of end user 48 and the entitlement holder, the web service platform will authorize access in step 245. Indication of authorization may be transmitted to a mobile device, wearable, or other device such as a kiosk or ticket scanning device.


If the end user is not in the same location as the entitlement holder, the web service platform will require additional permission from the end user before authorizing the entitlement holder to proceed in step 220. If the entitlement holder is redeeming the entitlement on a mobile device 110 or wearable, the device may display a message or indicator light at step 225 indicating that authorization is required before they can proceed. If the entitlement is being redeemed at a gate using the likes of a point of sale system or kiosk, a message or indicator light may be displayed to the operator that authorization is required before the entitlement holder can proceed.


In such an event, end user will be contacted at step 230 to grant the entitlement holder access. Contact may take the form of a message sent to a mobile device or wearable. In some embodiments, a phone call may be initiated be a real-person or an automated system. The method of contact can be determined based on the user preferences defined in step 200.


If the entitlement redemption is authorized in step 235, notification may be displayed in the point of sale, gate control system, or kiosk at step 240. The entitlement is then redeemed at step 245. If the entitlement redemption is authorized in step 235, notification of authorization being granted by end user may be displayed to the mobile device of the entitlement holder at step 240 and the entitlement is redeemed at step 245.


If the entitlement redemption is denied in step 235, notification may be displayed in the point of sale, gate control system, or kiosk at step 250; access would formally be denied in step 255. If the entitlement redemption is denied in step 235, notification of the authorization being denied by end user may be displayed to the entitlement holder by way of their mobile device or wearable at step 250.



FIG. 3 illustrates an exemplary computing system that may be utilized to implement one or more embodiments of the present invention. System 300 of FIG. 3, or portions thereof, may be implemented in the likes of client computers, application servers, web servers, mobile devices, wearable devices, and other computing devices. The computing system 300 of FIG. 3 includes one or more processors 310 and main memory 320. Main memory 320 stores, in part, instructions and data for execution by processor 310. Main memory 320 can store the executable code when in operation. The system 300 of FIG. 3 further includes a mass storage device 330, portable storage medium drive(s) 340, output devices 350, user input devices 360, a graphics display 370, and peripheral device ports 380.


While the components shown in FIG. 3 are depicted as being connected via a single bus 390, they may be connected through one or more internal data transport means. For example, processor 310 and main memory 320 may be connected via a local microprocessor bus while mass storage device 330, peripheral device port(s) 380, portable storage device 340, and display system 370 may be connected via one or more input/output (I/O) buses.


Mass storage device 330, which could be implemented with a magnetic disk drive or an optical disk drive, is a non-volatile storage device for storing data and instructions for use by processor 310. Mass storage device 330 can store software for implementing embodiments of the present invention, including the method 200 described in the context of FIG. 2.


Portable storage medium drive(s) 340 operates in conjunction with a portable non-volatile storage medium such as a flash drive or portable hard drive to input and output data and corresponding executable code to system 300 of FIG. 3. Like mass storage device 330, software for implementing embodiments of the present invention (e.g., method 200 of FIG. 2) may be stored on a portable medium and input to the system 300 via said portable storage.


Input devices 360 provide a portion of a user interface. Input devices 360 may include an alpha-numeric keypad, such as a keyboard, for inputting alpha-numeric and other information, or a pointing device, such as a mouse. Input device 360 may likewise encompass a touchscreen display, microphone, and other input devices including virtual reality (VR) components. System 300 likewise includes output devices 350, which may include speakers or ports for displays, or other monitor devices. Input devices 360 and output devices 350 may also include network interfaces that allow for access to cellular, Wi-Fi, Bluetooth, or other hard-wired networks.


Display system 370 may include a liquid crystal display (LCD), LED display, touch screen display, or other suitable display device. Display system 370 receives textual and graphical information, and processes the information for output to the display device. In some instances, display system 370 may be integrated with or a part of input device 360 and output device 350 (e.g., a touchscreen). Peripheral ports 380 may include any type of computer support device to add additional functionality to the computer system. For example, peripheral device(s) 380 may include a modem or a router or other network communications implementation (e.g., a MiFi hotspot device).


The components illustrated in FIG. 3 are those typically found in computer systems that may be suitable for use with embodiments of the present invention. In this regard, system 300 represents a broad category of such computer components that are well known in the art. System 300 of FIG. 3 can be a personal computer, hand held computing device, smart phone, tablet computer, mobile computing device, wearable, workstation, server, minicomputer, mainframe computer, or any other computing device.


System 300 can include different bus configurations, network platforms, processor configurations, and operating systems, including but not limited to Unix, Linux, Windows, iOS, Palm OS, and Android OS. System 300 may also include components such as antennas, microphones, cameras, position and location detecting devices, and other components typically found on mobile devices. An antenna may include one or more antennas for communicating wirelessly with another device. An antenna may be used, for example, to communicate wirelessly via Wi-Fi, Bluetooth, with a cellular network, or with other wireless protocols and systems. The one or more antennas may be controlled by a processor, which may include a controller, to transmit and receive wireless signals. For example, processor execute programs stored in memory to control antenna transmit a wireless signal to a cellular network and receive a wireless signal from a cellular network. A microphone may include one or more microphone devices which transmit captured acoustic signals to processor and memory. The acoustic signals may be processed to transmit over a network via antenna.


The foregoing detailed description of the technology herein has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the technology to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. The described embodiments were chosen in order to best explain the principles of the technology and its practical application to thereby enable others skilled in the art to best utilize the technology in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the technology be defined by the claims appended hereto.

Claims
  • 1. A method for controlling access, the method comprising: receiving an entitlement access request at an access control system from a venue device within a venue and associated with the venue in response to the venue device retrieving ticket information from a first user device associated with a first user, the entitlement access request associated with access to a physical area within the venue for the first user;identifying at the access control system that a distance between a location of the first user device associated with the first user and a location of a second user device associated with a second user exceeds a previously specified distance;sending an authorization request message from the access control system to the second user device via a network connection in response to receipt of the entitlement access request at the access control system and in response to the identification that the distance between the location of the first user device and the location of the second user device exceeds the previously specified distance;receiving an entitlement access authorization at the access control system from the second user device via the network connection following transmission of the authorization request message to the second user device; andpermitting the first user to access the physical area within the venue in response to receipt of the entitlement access authorization at the access control system.
  • 2. The method of claim 1, wherein the first user is a child, and wherein the second user is at least one of a parent or legal guardian.
  • 3. The method of claim 1, further comprising receiving a distance configuration message at the access control system from the second device, the distance configuration message identifying the previously specified distance.
  • 4. The method of claim 1, wherein the physical area is the venue, and wherein permitting the first user to access the physical area includes permitting the first user to enter the venue.
  • 5. The method of claim 1, wherein the physical area is a ride area, and wherein permitting the first user to access the physical area includes permitting the first user to ride the ride.
  • 6. The method of claim 1, wherein the physical area is a transportation service area, and wherein permitting the first user to access the physical area includes permitting the first user to use the transportation service.
  • 7. The method of claim 1, wherein the entitlement access request is also associated with digital content, further comprising permitting a third device to transmit digital content to the first user device in response to receipt of the entitlement access authorization at the access control system.
  • 8. The method of claim 1, wherein the entitlement access request is also associated with digital content, further comprising permitting a third device to output the digital content to the first user in response to receipt of the entitlement access authorization at the access control system.
  • 9. The method of claim 1, wherein permitting the first user to access the physical area includes transmitting an authorization indication from the access control system to an operator device, thereby triggering a visual indicator to be displayed to an operator via the operator device, the visual indicator indicating that access is to be permitted.
  • 10. The method of claim 1, wherein permitting the first user to access the entitlement includes transmitting an authorization indication from the access control system to an entryway control system, thereby triggering an entryway to open via the entryway control system.
  • 11. The method of claim 1, further comprising receiving an entitlement configuration message at the access control system from the second device, the entitlement configuration message identifying a second entitlement, and identifying that the access control system is to automatically reject the first user from accessing the second entitlement upon receiving a second entitlement access request associated with the second entitlement from the first user device.
  • 12. The method of claim 1, further comprising receiving an entitlement configuration message at the access control system from the second device, the entitlement configuration message identifying a second entitlement, and identifying that the access control system is to automatically permit the first user to access the second entitlement upon receiving a second entitlement access request associated with the second entitlement from the first user device.
  • 13. The method of claim 1, wherein the authorization request message includes text.
  • 14. The method of claim 1, wherein the authorization request message includes audio.
  • 15. The method of claim 1, further comprising: receiving at the access control system the location of the first user device from the first user device; andsending a location message from the access control system to the second user device via the network connection, wherein the location message identifies the location of the first user device.
  • 16. The method of claim 1, wherein the venue device is communicatively coupled to a ticket reader device, and wherein the venue device retrieves the ticket information from the first user device by reading the ticket information from a display screen of the first user device via the ticker reader device.
  • 17. The method of claim 1, further comprising: receiving the ticket information at the access control system from the venue device; andverifying the authenticity of the ticket at the access control system based on the ticket information.
  • 18. A system for controlling access, the system comprising: a communication transceiver that receives an entitlement access request from a venue device within a venue and associated with the venue in response to the venue device retrieving ticket information from a first user device associated with a first user, the entitlement access request associated with access to a physical area within the venue for the first user;a memory that stores instructions; anda processor coupled to the memory, wherein execution of the instructions by the processor causes the system to: identify that a distance between a location of the first user device associated with the first user and a location of a second user device associated with a second user exceeds a previously specified distance,transmit an authorization request message to the second user device via a network connection in response to receipt of the entitlement access request and in response to the identification that the distance between the location of the first user device and the location of the second user device exceeds the previously specified distance,receive an entitlement access authorization from the second user device via the network connection following transmission of the authorization request message to the second user device, andpermit the first user to access the physical area within the venue in response to receipt of the entitlement access authorization.
  • 19. The system of claim 18, wherein the communication transceiver further receives a distance configuration message from the second device, the distance configuration message identifying the previously specified distance.
  • 20. A non-transitory computer-readable storage medium, having embodied thereon a program executable by a processor to perform a method for controlling access, the method comprising: receiving an entitlement access request at an access control system from a venue device within a venue and associated with the venue in response to the venue device retrieved ticket information from a first user device associated with a first user, the entitlement access request associated with access to a physical area within the venue for the first user;identifying at the access control system that a distance between a location of the first user device associated with the first user and a location of a second user device associated with a second user exceeds a previously specified distance;sending an authorization request message from the access control system to the second user device via a network connection in response to receipt of the entitlement access request at the access control system and in response to the identification that the distance between the location of the first user device and the location of the second user device exceeds the previously specified distance;receiving an entitlement access authorization at the access control system from the second user device via the network connection following transmission of the authorization request message to the second user device; andpermitting the first user to access the physical area within the venue in response to receipt of the entitlement access authorization at the access control system.
CROSS-REFERENCE TO RELATED APPLICATIONS

The present application claims the priority benefit of U.S. provisional application No. 61/945,053 filed Feb. 26, 2014 and entitled “System and Method for Increasing Customer Engagement,” the disclosure of which is incorporated herein by reference.

US Referenced Citations (132)
Number Name Date Kind
5978744 McBride Nov 1999 A
6142368 Mullins et al. Nov 2000 A
6320496 Sokoler et al. Nov 2001 B1
6352205 Mullins et al. Mar 2002 B1
6414635 Stewart et al. Jul 2002 B1
6474557 Mullins et al. Nov 2002 B2
6493630 Ruiz et al. Dec 2002 B2
6587787 Yokota Jul 2003 B1
6663006 Mullins et al. Dec 2003 B2
6687608 Sugimoto et al. Feb 2004 B2
6997380 Safael et al. Feb 2006 B2
7222080 Hale et al. May 2007 B2
7558678 Jones Jul 2009 B2
7992773 Rothschild Aug 2011 B1
8368695 Howell et al. Feb 2013 B2
8424752 Rothschild Apr 2013 B2
8427510 Towfiq et al. Apr 2013 B1
8433342 Boyle et al. Apr 2013 B1
8625796 Ben Ayed Jan 2014 B1
8651369 Rothschild Feb 2014 B2
8936190 Rothschild Jan 2015 B2
9448085 Bass Sep 2016 B2
9485322 Krishnaswamy et al. Nov 2016 B2
20020029226 Li et al. Mar 2002 A1
20020055863 Behaylo May 2002 A1
20030007464 Balani Jan 2003 A1
20040224703 Takaki et al. Nov 2004 A1
20060074550 Freer et al. Apr 2006 A1
20060087474 Do et al. Apr 2006 A1
20060106850 Morgan et al. May 2006 A1
20070032269 Shostak Feb 2007 A1
20070174115 Chieu et al. Jul 2007 A1
20070197247 Inselberg Aug 2007 A1
20070270166 Hampel et al. Nov 2007 A1
20080059889 Parker et al. Mar 2008 A1
20080183582 Major Jul 2008 A1
20080186164 Emigh et al. Aug 2008 A1
20080290182 Bell et al. Nov 2008 A1
20080306826 Kramer et al. Dec 2008 A1
20090017798 Pop Jan 2009 A1
20090027418 Maru et al. Jan 2009 A1
20090089131 Moukas et al. Apr 2009 A1
20090265428 Light et al. Oct 2009 A1
20090319306 Chanick Dec 2009 A1
20100037141 Carter et al. Feb 2010 A1
20100042320 Salmre et al. Feb 2010 A1
20100077036 DeLuca Mar 2010 A1
20100161432 Kumanov et al. Jun 2010 A1
20100194784 Hoff et al. Aug 2010 A1
20110054976 Adler et al. Mar 2011 A1
20110078026 Durham Mar 2011 A1
20110090123 Sridhara et al. Apr 2011 A1
20110136507 Hauser et al. Jun 2011 A1
20110173545 Meola Jul 2011 A1
20110221745 Goldman et al. Sep 2011 A1
20110246148 Gupta et al. Oct 2011 A1
20110267369 Olsen et al. Nov 2011 A1
20120069131 Abelow Mar 2012 A1
20120081250 Farrokhi et al. Apr 2012 A1
20120096490 Barnes Apr 2012 A1
20120166960 Salles Jun 2012 A1
20120172055 Edge Jul 2012 A1
20120214515 Davis et al. Aug 2012 A1
20120239504 Curlander et al. Sep 2012 A1
20120270573 Marti et al. Oct 2012 A1
20120271691 Hammad et al. Oct 2012 A1
20120274642 Ofek et al. Nov 2012 A1
20120284117 Karandikar Nov 2012 A1
20130024265 Lotzof Jan 2013 A1
20130036455 Bodi Feb 2013 A1
20130052990 Zhang Feb 2013 A1
20130059603 Guenec Mar 2013 A1
20130085834 Witherspoon et al. Apr 2013 A1
20130132230 Gibson et al. May 2013 A1
20130137464 Kramer et al. May 2013 A1
20130157655 Smith, II Jun 2013 A1
20130158867 Sidhu et al. Jun 2013 A1
20130173377 Keller et al. Jul 2013 A1
20130191213 Beck et al. Jul 2013 A1
20130225282 Williams Aug 2013 A1
20130231135 Garskof Sep 2013 A1
20130267260 Chao et al. Oct 2013 A1
20130281084 Batada et al. Oct 2013 A1
20130317944 Huang et al. Nov 2013 A1
20130339073 Dabbiere Dec 2013 A1
20140025466 Borton et al. Jan 2014 A1
20140073363 Tidd et al. Mar 2014 A1
20140082509 Roumeliotis Mar 2014 A1
20140118113 Kaushik et al. May 2014 A1
20140122040 Marti May 2014 A1
20140128103 Joao et al. May 2014 A1
20140129266 Perl et al. May 2014 A1
20140162693 Wachter et al. Jun 2014 A1
20140164761 Kufluk Jun 2014 A1
20140188614 Badenhop Jul 2014 A1
20140207509 Yu et al. Jul 2014 A1
20140244332 Mermelstein Aug 2014 A1
20140256357 Wang et al. Sep 2014 A1
20140257991 Christensen et al. Sep 2014 A1
20140278054 Tidd et al. Sep 2014 A1
20140292481 Dumas Oct 2014 A1
20140342760 Moldavsky et al. Nov 2014 A1
20150038171 Uilecan et al. Feb 2015 A1
20150052460 Mohammad Mirzaei et al. Feb 2015 A1
20150080014 Ben-Yosef et al. Mar 2015 A1
20150100398 Narayanaswami et al. Apr 2015 A1
20150127445 Jaffee May 2015 A1
20150176997 Pursche et al. Jun 2015 A1
20150181384 Mayor et al. Jun 2015 A1
20150222935 King et al. Aug 2015 A1
20150233715 Xu et al. Aug 2015 A1
20150237473 Koepke Aug 2015 A1
20150241238 Bass Aug 2015 A1
20150242890 Bass et al. Aug 2015 A1
20150262086 Mader et al. Sep 2015 A1
20150262216 Aziz et al. Sep 2015 A1
20150296347 Roth Oct 2015 A1
20150334569 Rangarajan et al. Nov 2015 A1
20150334676 Hart et al. Nov 2015 A1
20160005003 Norris et al. Jan 2016 A1
20160050526 Liu et al. Feb 2016 A1
20160063537 Kumar Mar 2016 A1
20160105644 Smith et al. Apr 2016 A1
20160127351 Smith May 2016 A1
20160150370 Gillespie et al. May 2016 A1
20160242010 Parulski et al. Aug 2016 A1
20160316324 Sahadi Oct 2016 A1
20160321548 Ziskind Nov 2016 A1
20160323708 Sahadi Nov 2016 A1
20170010119 Bass Jan 2017 A1
20170011348 Ziskind Jan 2017 A1
20170162006 Sahadi Jun 2017 A1
Foreign Referenced Citations (8)
Number Date Country
WO 2011159811 Dec 2011 WO
WO 2013163444 Oct 2013 WO
WO 2015017442 Feb 2015 WO
WO 2015130969 Sep 2015 WO
WO 2015130971 Sep 2015 WO
WO 2016172731 Oct 2016 WO
WO 2016176506 Nov 2016 WO
WO 2016179098 Nov 2016 WO
Non-Patent Literature Citations (10)
Entry
PCT Application No. PCT/US2015/017827, International Search Report and Written Opinion dated Jun. 11, 2015.
Feng et al., Yue ; “Effective venue image retrieval using robust feature extraction and model constrained matching for mobile robot localization”, Machine Vision and Applications, DOI 10.1007/s00138-011-0350-z, Oct. 28, 2010.
Krueger, Robert; Thom, Dennis; Ertl, Thomas; “Visual Analysis of Movement Behavior using Web Data for Context Enrichment” Institute for Visualization and Interactive Systems (VIS), Published in Pacific Visualization Symposium (Pacific Vis), 2014 IEEE, pp. 193-200.IEEE, 2014.
Sim, Robert; Dudek, Gregory; “Effective Exploration Strategies for the Construction of Visual Maps”, Centre for Intelligent Machines, Published in: Intelligent Robots and Systems, 2003. (IROS 2003). Proceedings. 2003 IEEE/RSJ International Conference on (vol. 4) Date of Conference: Oct. 27-31, 2003.
PCT Application No. PCT/US2004/12667, International Search Report dated Oct. 29, 2004.
PCT Application No. PCT/US2016/029260, International Search Report and Written Opinion dated Jul. 27, 2016.
PCT Application No. PCT/US2016/029880, International Search Report and Written Opinion dated Jul. 27, 2016.
PCT Application No. PCT/US2016/030424, International Search Report and Written Opinion dated Jul. 29, 2016.
PCT Application No. PCT/US2016/067582, International Search Report and Written Opinion dated Mar. 17, 2017.
PCT Application No. PCT/US2015/017829, International Search Report and Written Opinion dated Jun. 8, 2015.
Related Publications (1)
Number Date Country
20150244725 A1 Aug 2015 US
Provisional Applications (1)
Number Date Country
61945053 Feb 2014 US