A full and enabling disclosure including the best mode of practicing the appended claims and directed to one of ordinary skill in the art is set forth more particularly in the remainder of the specification. The specification makes reference to the appended figures, in which:
Use of like reference numerals in different features is intended to illustrate like or analogous components
This disclosure now makes reference in detail to various and alternative exemplary embodiments and to the accompanying drawings, with like numerals representing substantially identical structural elements. Each example is provided by way of explanation, and not as a limitation. In fact, it will be apparent to those skilled in the art that modifications and variations can be made without departing from the scope or spirit of the disclosure and claims. For instance, features illustrated or described as part of one embodiment may be used on another embodiment to yield a still further embodiment. Thus, it is intended that the present disclosure includes modifications and variations as come within the scope of the appended claims and their equivalents.
By way of example, suitable detectors include any RFID reader module or combination of modules that support the type or types of RFID tags used with the system. For instance, suitable readers could include any reader that supports EPC Generation 2 protocol, such as the Thingmagic Mercury 4e/h reader, available from Thingmagic, Inc. of Cambridge, Mass. One of skill in the art will appreciate that the RFID reader(s) and antenna(s) utilized in association with the present subject matter may be of any suitable size, shape, type, or origin so long as the reader(s), antenna(s), and tag(s) are appropriately configured and otherwise compatible.
Based on data obtained from the detectors and one or more predefined safety response models, various actions may be taken to protect users from the hazards posed by hazards 10, 20, and 30. In the examples discussed herein, these actions include activating alarm 12, interrupting the supply of electricity to range 20 by way of circuit breaker 22, and engaging solenoid 32 to lock cabinet 30 and thereby prevent access to hazardous item 34. However, any number and combination of suitable actions may be defined in a safety response model and implemented using appropriate hardware and software.
Processor unit 40 may be located at the same site as the remaining components of the system, or may be remote. For instance, in some embodiments, processor unit 40 may comprise a remote server unit including memory for storing one or more safety response models, with the remote server interfaced with one or more local processing units providing connections to the various RFID and other sensors and output connections to mechanisms for implementing safety response actions.
User terminal 42 represents a computing device configured to allow a user to: specify the extent of perimeters P1, P2, and P3; define responses to be taken when users approach hazards 10, 20, and 30; and provide user information including user skill levels. User terminal 42 may comprise a local computer interfacing to processor unit 40, which, as noted above, may be located on-site or remote from user terminal 42. User terminal 42 may, for example, represent a desktop, laptop, tablet, or portable computer (such as a PDA) including a user interface that allows a supervisory user to define parameters for one or more safety response models. For example user terminal 42 may provide an interface and relay data to and from processor unit 40.
In some embodiments, processor unit 40 and user terminal 42 may comprise the same device, such as a general-purpose computer such as a desktop or laptop computer. In such embodiments, the computer could include appropriate hardware connections to sensors and response mechanisms and also software for storing and implementing the safety response model(s) and interacting with the supervisory user(s).
As will be discussed in further detail below, various embodiments of the presently-disclosed technology utilize different combinations and configurations of the components illustrated in
The technology discussed herein makes reference to servers, databases, software applications, and other computer-based systems, as well as actions taken and information sent to and from such systems. One of ordinary skill in the art will recognize the inherent flexibility of computer-based systems allows for a great variety of possible configurations, combinations, and divisions of tasks and functionality between and among components. For instance, processes discussed herein may be implemented using a single computing device or multiple computing devices working in combination. Databases and applications may be implemented on a single system or distributed across multiple systems. Distributed components may operate sequentially or in parallel. When data is obtained or accessed between a first and second computer system or component thereof, the actual data may travel between the systems directly or indirectly. For example, if a first computer accesses a file or data from a second computer, the access may involve one or more intermediary computers, proxies, and the like. The actual file or data may move between the computers, or one computer may provide a pointer or metafile that the second computer uses to access the actual data from a computer other than the first computer, for instance.
The present disclosure also makes reference to the relay of communicated data over communications networks such as the Internet. It should be appreciated that such network communications may also occur over alternative networks such as a dial-in network, a local area network (LAN), wide area network (WAN), public switched telephone network (PSTN), the Internet, intranet or Ethernet type networks and others over any combination of hard-wired or wireless communication links.
The various systems discussed herein are not limited to any particular hardware architecture or configuration. Any suitable programming, scripting, or other type of language or combinations of languages may be used to implement the teachings contained herein. Suitable computing devices include multipurpose microprocessor-based computer systems accessing stored software, application-specific integrated circuits and other programmable logic, and combinations thereof.
As a general principle, RFID tags which are utilized in embodiments of the present systems and methods may be of any configuration. For example, the tags may comprise active, semi-active, or passive RFID tags. The tags may be configured as wearable items, such as bracelets or ankle tags. The tags may be integrated into other products that are initially not associated with the personal safety enhancement system. For example, suitable RFID tags may include passive RFID tags embedded into clothing products or other personal items, such as tags originally included with an item to identify the item for inventory, sale, or other purposes. By way of example, suitable RFID tags include those sold by the Avery Denison Corporation RFID Division of Clinton, S.C., such as the AD-220 Gen2 UHF RFID tag. However, one or skill in the art will appreciate that the RFID tags utilized in association with the present subject matter may be of any suitable size, shape, type, or origin, so long as such tags are compatible with the arrangement and configuration of the RFID reader(s) and antenna(s) comprising the system.
Regardless of origin, RFID tags are initially programmed for use with the personal safety enhancement system. The tags may be programmed or reprogrammed as part of a “check-in” process by a supervisory user using RFID read/write device 44 and terminal 42 and processing device 40. However, it will be appreciated that RFID read/write device 44 may be dispensed with if at least one of detectors D1, D2, or D3 is capable of reading and writing RFID tags. In such a case, the check-in process could be performed at a suitable computer terminal, with the RFID tag reading and reprogramming performed by one of detectors D1, D2, or D3 in concert with processing unit 40 and/or terminal 42. Alternatively, pre-programmed tags may be made available for use by a supervisory user, for example, tags with data for use in conjunction with a “generic” safety response model.
In some embodiments, as part of the setup of the system, a supervisory user will also have to define at least one safety response model. The safety response model comprises one or more actions to be implemented when a protected user is detected within range of a safety hazard. Safety response models may be implemented in any suitable fashion that sets forth conditions and actions to be taken when such conditions are met. For example, a safety response model may define one or more hazard areas associated with one or more particular sensors. The model may further provide for one or more actions to be taken when a particular user is detected in or near a hazard based on identifying the user from RFID tag data and consulting a database or other record of information specifying the user's skill level. Alternatively, the actions may be based on a direct correlation of a skill level and a hazard based on reading skill level data stored on and read from the RFID tag(s).
For example, the safety response model may define a plurality of actions to be taken upon detection of users within range of swimming pool 10. The actions may include sounding alarm 12, or sending a notification to a supervisory user or rescue authorities. Actions that may be taken in response to a user being detected near range 20 may include sending a signal to circuit breaker 22 to interrupt the flow of current to range 20. Actions which may be implemented in response to detection of a user near cabinet 30 may include sending a signal to solenoid 32 such that cabinet 30 is locked and access to item 34 is prohibited.
The safety response model may be configured to tailor responses to the skill level of particular users. For example, if a supervising user wishes to enhance the safety of two children, the appropriateness of a particular action may depend upon the age and skill level of each of the children. For example, with regard to swimming pool 10, an infant may generally require greater protection than a child with at least some swimming capabilities. Accordingly, the safety response model may be configured so that when the child with swimming capability enters perimeter P1, alarm 12 may be sounded to play a pre-recorded warning directing the child away from the pool. However, if an infant is detected within range of perimeter P1, a message may be sent to several supervisory users and alarm 12 may be activated to send an alert siren. If a highly skilled swimmer is detected near pool 10, the safety response model may be configured such that only a notification message is sent to a supervisory user, or no action is taken at all unless further conditions are met.
Similarly, the safety response model may specify different actions for different users with regard to range 20 and/or cabinet 30. For example, a child of suitable age may be allowed to contribute to household activities such as cooking and cleaning. To accommodate such a situation, the safety response model may be configured to send a message to a supervisory user when the skilled child is within range of range 20 and cabinet 30, but to still allow access and use the range and cabinet. For example, the safety response model may be configured to allow access to range 20 and cabinet 30 during pre-determined time periods (such as when a parent is home) but to disallow access during other time periods. However, with regard to an infant, the safety response model may provide that range 20 and cabinet 30 always pose a hazard, so the system will be configured to deactivate range 20 and lock cabinet 30 at any time an infant is detected within range of such hazards.
In some embodiments, the safety response model may specify actions based on detection of multiple users in proximity to one another and one or more hazards. For example, the safety response model may be configured to implement one or more different actions if a protected user of a first skill level is accompanied to a hazard by another user of another skill level. Using the examples above regarding a child assisting in household activities, assume that the child is skilled enough to handle the range and chemicals, but only under parental supervision. In addition to or in alternative to specifying pre-determined time periods, a safety response model may be configured to allow access to range 20 and/or cabinet 30 for the child when a parent (or other user of sufficiently-high skill level) is also detected in proximity to range 20 and/or cabinet 30. In such embodiments, the parent (or other user) would, of course, carry one or more RFID tags suitably associated with the system such that the system could determine the parent (or other user's) skill level(s) relative to the hazards. One of skill in the art will appreciate that a wide variety of actions may be specified based on detection of multiple users in proximity to one or more hazards based on the skill level(s) of the multiple users.
It also will be appreciated that the safety response model may include parameters other than those discussed in the examples herein. For example, in addition to the user skill level, actions may be defined on the basis of other factors including time of day, day of the week, user identity, and the like. Actions may be further specified based on input from sensors and sources other than detectors D1, D2, and D3, such as the status of one or more secondary alarm systems associated with each hazard. The safety response model may also specify conditional or global exceptions.
For example, swimming pool 10 may include additional sensors, such as wave or splash sensors configured to detect the presence or absence of a person in the pool. If a protected user is detected within perimeter P1 and the splash or wave sensor indicates that an object greater than 15 pounds has entered pool 10, the response may be greater in intensity than if a user is detected within the perimeter but no activity in the pool is detected. For example, if the secondary alarm system indicates that a protected user has fallen in the pool, the systems may immediately contact emergency authorities, such as by dialing 911 and providing a pre-recorded message.
Similarly, secondary alarms systems may be associated with range 20 and/or cabinet 30. For instance, a heat sensor may determine whether range 20 has been activated by a user within perimeter P2, and/or a door sensor may indicate whether the range door has opened. If such activities are occurring, the response may be increased in intensity. Cabinet 30 may be associated with a door sensor as well to determine whether a user has opened a door to access hazardous material 34. Additionally, for any or all of hazards 10, 20, and 30, perimeters P1, P2, and P3 may be further monitored by additional sensors such as infrared or other motion sensors. Such secondary sensors may be used to confirm whether a user has entered the prohibited areas surrounding each hazard or, for example, is only near the perimeter but not yet in any real danger.
The safety response model may be configured to provide an initial response and then escalate with one or more further responses based on continuing monitoring the RFID detectors and other secondary sensors. Returning to the example of the semi-skilled child near pool 10, if the child ignores the initial response (pre-recorded warning), the system may be configured to play the warning again if the child still remains near the pool. If the child enters the pool (as indicated by, e.g., wave/splash sensors and/or motion detectors), a message may be sent to a supervisory user.
Although the present disclosure uses the term “the” safety response model, it will be understood that safety response models may take multiple logical forms. For example, a safety response model may be defined for individual hazards, for multiple hazards at a single location, or globally by hazard type. A particular system may utilize one safety response model or several models in combination. Similarly, user skill levels may be custom-defined, hazard-specific, or hazard-generic. In some embodiments, user skill levels may be defined in a standardized manner. User skill levels may be defined in any suitable fashion; for instance, the system may define user skill levels on the basis of data input regarding the user's age, capability, judgment, etc. The system may have overall configuration parameters, such as on/off times, or may switch between safety response models on a pre-scheduled basis and/or in response to user input. For example, when a supervisory user is at swimming pool 10, the user may deactivate all alarms; this could be through manual intervention or specified as part of the model.
The safety response model may be implemented using any suitable combination of hardware and/or software. For example, the parameters and conditions defining the safety response model(s) and user characteristics may be stored in one or more databases, computer files, and/or other machine-readable format(s). Functionality for implementing the safety response model(s) may be provided by one or more applications or processes implemented in any suitable fashion, including via executable files, scripts, drivers, or a combination of such components, for example.
For example, one or more processes or applications may be configured to monitor the status of the RFID and other sensors or await active messages from the sensors. Such processes or applications may actively poll the sensors at regular or irregular intervals or may continuously monitor the sensors for changes in status. Additional applications and/or processes may obtain or receive sensor data and access the safety response model(s) to evaluate whether one or more actions are to be implemented; such evaluation(s) may occur continuously, at regular or irregular intervals, or upon the receipt of data from sensors (such as interrupt or other messages indicating a change in sensor status, for instance). Still further applications and/or processes may monitor the status of the various response systems and mechanisms (such as alarm 12, circuit breaker 22, and lock 32) and provide appropriate signals to the response mechanisms and systems based on the results of evaluating the safety response model and sensor data. Additional software may provide for network connectivity and user interface and interaction. As noted earlier, software functionality discussed herein may be implemented using any suitable combination of applications, processes, and the like. For example, the above-discussed processes/applications may be integrated into a single application, may comprise modular components, or may be otherwise distributed or combined in any suitable fashion.
Perimeters surrounding safety hazards such as pool 10, range 20, and cabinet 30 may be established through any suitable sensor configuration and placement. Although illustrated in
Processor unit 40 is also connected to communication network 100, which may include the Internet, telephone system, or any other suitable medium by which processor unit 40 may send and receive data. For example, communication network 100 may comprise the telephone connection used by processor unit 40 to report the presence of a protected user in pool 10. Processor unit 40 may, of course be connected to multiple communication mediums at once.
Alternatively, each sensor may have access to a generic safety response model including several actions associated with particular skill levels. User terminal 42 could be configured to program RFID tags with skill levels corresponding to those specified in the generic safety response model based on user selection. As noted above, pre-programmed tags corresponding to the generic safety response levels may also be available and suitable for use in the system. One of skill in the art will note that the “generic” safety response model and/or “generic” RFID tags may be suitable for use in any embodiments (or combinations or variants thereof) discussed herein.
In embodiments in which network 102 is a local network, one or more components illustrated in
The following example is provided for purposes of illustration only. In this example, a supervisory user P wishes to enhance the household safety of two children: infant I and child C with regard to a swimming pool, range, and storage cabinet housing cleaning chemicals.
Initially, a personal safety enhancement system is set up by strategically placing RFID antennas around the perimeter of P's pool. The antennas are linked to an RFID reader that is connected to a computer. In this example, P uses a home computer to supervise the system, although, as noted earlier, the system could be configured with some or all components being network-based. An alarm is further connected to the computer and positioned near the pool. P also purchases a cabinet or retrofits an existing cabinet to include a remotely-triggered power lock. P positions a second RFID antenna and reader near the cabinet, and connects the power lock and second RFID reader to the computer.
P activates one or more software applications using the computer to further configure the system. P initially defines the protected users I and C. The software application allows P to provide various information about I and C, including skill levels. For example, the software prompts P to enter the ages of I and C, which are, in this example, 2 and 11, respectively. Based on the ages and other information, the system automatically creates a profile of I and C and assigns skill levels of (IV—Minimal Skill) to infant I and (III—Low Skill) to child C.
P may adjust the skill levels in his or her discretion. For example, C may have attended swimming lessons or is otherwise viewed by P as additionally skilled, and so P may change C's skill level to (II—Moderate Skill). The system may support global skill levels for each user and/or may allow supervisory users to specify skill levels for specific hazards. In this example, P may specify both a default skill level and, if desired, hazard-specific skill levels. P specifies C's default skill level as (III—Low Skill), but adds additional data indicating C's skill level regarding the pool as (II—Moderate Skill (Pool Only)). P assigns a skill level of (I—High Skill) to him or herself.
Also as part of configuring the system, P may define one or more safety response models. In this example, a single model will be used. P specifies desired responses based on particular hazards and the skill level of the person approaching such hazards.
In this example, P configures the system to sound an alarm if low-skilled persons such as infant I approach the pool under any circumstances. However, if child C approaches the pool, the system may first play a recording, such as P's voice, directing the child away from the pool. In this example, as noted above, the system treats C as having skill level of (II—moderate) with regard to the pool, but a skill level of (III—Low) regarding other hazards. The recording may be specific to child C or generic; P may make or select the recording as part of the setup process. P further specifies that, if child C (or other approaching person) does not heed the no-approach warning (i.e. continues to be detected), a supervisory user is notified.
Regarding the chemical cabinet, P specifies that the cabinet door locks if any user other than one having a skill level of (I—advanced) approaches the cabinet. However, to enable C to help clean on Saturday mornings under the supervision of P, P specifies an exception. P's exemplary entries are provided in the table below, although any particular format may be used to enter and display parameters for the response model(s). As for the range, P specifies that C may use the range only if C is assisting P in cooking (i.e. only if P is also in proximity).
The safety enhancing system may be implemented alongside other systems, for example, as part of a burglar alarm or other conventional safety system(s). For instance, the system may further provide for an alarm to sound if any person approaches the pool at night based on a motion sensor, or if a splash is detected in the pool but no motion is detected afterwards, which could indicate a drowning.
One of skill in the art will appreciate that the conditions and actions may be specified in any suitable manner. For instance, in this example, some of the conditions are specified using Boolean “AND” relationships between Conditions 1 and 2 and using Boolean “OR” relationships within condition 1. However, other suitable logical operators may be utilized. Furthermore, other logic rule sets and rule definitions may be used to specify the various conditions and actions in safety response models.
Once P has specified protected users and at least some responses based at least in part on user skill levels, P may then proceed to associate RFID tags with protected users. For example, P may program one or more RFID-carrying articles, such as bracelets or anklets for child C and infant I (and P him or herself) to carry or wear. Alternatively, P may purchase pre-programmed RFID articles. The particular data programmed into the RFID tags will vary according to implementations of the system.
For example, the system may be configured to recognize particular users by reading identification data stored on the RFID tag(s) and cross-referencing the identification data to stored information for the particular users. For example, the system may access a database or other store of user profiles based on a user ID number. Based on the user's profile, the user's skill level(s) may be determined and the safety response model implemented. Alternatively, the RFID tag(s) may include data specifying the user's skill level(s). The system may then directly access the safety response model on the basis of the skill level. As noted above, responses may be based on skill level alongside other factors, such as user identity.
P may additionally “check-in” items containing RFID inventory or other identification tags and associate such tags with child C and infant 1. For example, P may purchase a package of diapers for infant 1, with the diapers containing RFID tags. P may use an RFID read/write device to reprogram the tags with data specific to infant I. For example, the RFID tag could be programmed to store data identifying infant I's skill level of (III—Low Skill). P may similarly program other items containing RFID tags such as clothing or accessories with I and C's respective data.
Programming RFID tags with data including user skill levels based on a generic or standardized skill level specification may prove advantageous when users of one system interact with a second system. For example, assume P's neighbor N also has an infant and a swimming pool with a personal safety system programmed to respond based on user skill levels. Further assume N configures his system to be in “high alert” mode during working hours, such that the responses are as follows (N's model for non-working hours is not illustrated in this example):
If, during working hours, P's infant I wanders away and into N's yard, I may be in danger if I approaches N's pool. However, since I's skill level is specified by RFID diaper tags, I's approach will be detected by N's safety response system, even though N's safety response system (in this example) has not been specifically programmed to recognize I individually. One of skill in the art will recognize that RFID tags may be programmed with both a standards-compliant skill level and a system-specific skill level. For example, as noted above, P may have specified that C has a swimming-specific skill level of II. C's RFID tags may be programmed with data including both a standardized skill level (Level III—Low Skill) and P's custom skill level (Level II—Moderate Skill (Pool Only)). However, N's system may not recognize the variance in skill level for pools, and therefore may treat C as having a skill level of (III—Low Skill). Similarly, if N's children approach any hazards specified by P, P's system can implement non-specific responses based on N's children‘s’ skill levels.
It is appreciated by persons skilled in the art that what has been particularly shown and described above is not meant to be limiting, but instead serves to show and teach various exemplary implementations of the present subject matter. As set forth in the attached claims, the scope of the present invention includes both combinations and sub-combinations of various features discussed herein, along with such variations and modifications as would occur to a person of skill in the art.