The usage of location aware devices has become widely spread due to their small size, low price and high precision. In many situations, a user location with respect to a specific area is needed for the generation of alerts or directions. In many applications, the boundary of the area is fixed and determined by certain laws or religion rituals. Users may also need assistance following boundary regulation such in pilgrimages. Friends and relatives may also need to check the user location. In addition, specific areas of the pilgrimage are also related to certain dates. Accordingly, it will be beneficial if the generated alerts are based on a date and location association and the users are presented with personalized alerts. Current pilgrimage guides do not offer personalized guidance.
The foregoing “background” description is for the purpose of generally presenting the context of the disclosure. Work of the inventor, to the extent it is described in this background section, as well as aspects of the description which may not otherwise qualify as prior art at the time of filing, are neither expressly or impliedly admitted as prior art against the present invention. The foregoing paragraphs have been provided by way of general introduction, and are not intended to limit the scope of the following claims. The described embodiments, together with further advantages, will be best understood by reference to the following detailed description taken in conjunction with the accompanying drawings.
The present disclosure relates to a boundary regulation implementation method that stores a list of events, stores one or more dates and times each corresponding to an event, stores one or more predetermined areas determined as a function of a particular event, determines a user location, determines whether a current date and time corresponds with a date and time stored in the memory, generates an alert based on the user location in response to determining that the current date and time corresponds with the date and time, analyzes whether the user location is within a predetermined area corresponding to the event indicated by the date and time, and sends to authorized individuals the user location.
A system for implementing boundary regulation is provided that includes storing in a server a list of events, storing one or more dates and times each corresponding to an event, storing one or more predetermined areas determined as a function of a particular event, determining a user location, determining whether a current date and time corresponds with a date and time stored in the memory, generating an alert based on the user location in response to determining that the current date and time corresponds with the date and time, analyzing whether the user location is within a predetermined area corresponding to the event indicated by the date and time, and sending to authorized individuals the user location.
A more complete appreciation of the disclosure and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings, wherein:
Referring now to the drawings, wherein like reference numerals designate identical or corresponding parts throughout several views, the following description relates to a boundary regulation detection system and associated methodology for determining when a user has entered a predetermined area and for generating appropriate alerts to guide the user. In addition, the system may send notifications to authorized individuals about the user location and health status.
Specially, as shown in the drawings and related discussion, when a current date and time corresponds to a specific date and time, the system may check the user location and based on the user location it can issue appropriate alerts. The system may display, for example, directions to the predetermined area, where the user should be during the specific date and time corresponding to the current date and time. Additionally, the system may continuously monitor the user location to prevent him from leaving the predetermined area by alerting the user if the distance between the user location and a boundary becomes smaller than a preset threshold distance. An alert may be a visual and/or audible alert. The system may send the alert to an external device. In selected embodiments, the external device may be a mobile device. In one embodiment, the method may be directed towards religious pilgrimages such as the Hajj pilgrimage. The Hajj pilgrimage is one of the most important pillars of Islam. Each pilgrim has to follow a set of rules to stay in the predetermined area at the specific date and time. For example, pilgrims have to stay in the predetermined area “Arafat” from afternoon to sunset on the ninth of “Zil-Hijjah” the 12th month of Hijri calendar. The users of the system may be the pilgrims performing the Hajj. In one example, the specifics dates include the 8th, 9th, 10th, 11th, 12th and 13th day of the 12th month of Hijri calendar.
The mobile device 106 location can be determined via various satellite 108 based positioning systems known in the art, as GPS (Global Positioning System). For example, the mobile device 106 can include a location detector. The location detector may be a GPS module to detect a current geographical location of the mobile device 106. In other embodiments, the mobile device location is determined via a cellular tower 104 with which communication has been established using current technologies such as GSM (Global System for Mobile) localization, triangulation, blue-tooth, hotspots, WiFi detection, or other methods as would be understood to one of ordinary skill in the art. In other embodiments, the mobile device location is determined by the network 102. In particular, it may detect a location of the mobile device 106 as a network address on the network 102. The mobile device location corresponds to the user location. Once the mobile device location is determined by any of the techniques described above or other method as known in the art, the user location is likely known. Then in response to a query from the server 100, the mobile device 106 sends the user location to the server 100 via the network 102. The mobile device 106 location may be checked periodically every 1 minute, 5 minutes or any other suitable period. In other embodiments, the mobile device 106 location may be checked only during the specific date and time of interest. As described further below, the mobile device 106 may connect with the server 100 to receive the alerts based on the mobile device 106 location. In selected embodiments, the server 100 may automatically send the alerts to the mobile device 106 via the network 102.
In selected embodiments, the server may receive via communication circuitry information indicating an emergency in a specific area. A different area boundary coordinates may be uploaded to the server 100 via the network 102 by a third party. The different area location and boundary may be downloaded automatically to the mobile device 106 from the server 100 via the network 102. The server may analyze whether the user location is within the specific area. The server 100 may generate instructions to a designated user to go to the different area upon determining that the designated user is within the specific area. In one example, the emergency may be a catastrophic event such as an earthquake. The third party may be government officials or organizers of the event. The different area boundary may be time specific. The boundary coordinates for the different area and alert may be valid for a specific duration. Many different areas may also be generated. Depending on the designated user current location, the alert may be specific to each individual user to send him to the nearest different area. After the catastrophic event, the user of the mobile device 106 may connect to the server 100 via the network to check if the alert has been generated.
At step S512, the server calculates the distance between the user location and the predetermined area boundary. If the calculated distance is smaller than the preset threshold distance, the system may issue the alert at step S514. The preset threshold distance (e.g., 1 meter) may be preregistered in the server 100. The preset threshold distance may be setup according to the user preference. The preset threshold distance may vary from 1 meter to 2 kilometer. In other embodiments, the preset threshold distance may be dependent on the mode of transportation of the user. For example, if the user is walking, the preset threshold distance may vary from 1 meter to 10 meter while if the user is using a car the preset threshold may vary from 1 kilometer to 2 km. The preset threshold distance is chosen in such a way to give the user enough time to respond to the alert. In selected embodiments, the preset threshold may depend on the accuracy of the localization method used to determine the user location. For example, if the localization method used has an error margin of 2 meters then the preset threshold may be set to 1 meter. In selected embodiments, the alert may be accompanied by a sound. The volume of the sound may depend on the distance from the user current location and the predetermined area boundary. The closer the user current location is to the predetermined area boundary the higher volume. The alert may inform the user of the distance between the location of the mobile device 106 and the boundary (e.g., 1 meter) and that the user is about to leave the predetermined area. In other embodiments, the mobile device may further alert the user if he is walking towards or away from the boundary.
If the distance is greater than the preset threshold distance then the user location is checked at step S512 after a wait has been performed at step S516. An example of performing the wait is to wait a predetermined period, such as one second. In selected embodiments, the device can detect movement via a motion sensor such as an accelerometer and then proceed to step S512. In other word, in order to conserve battery power the mobile device 106 location may be determined only once it has been determined that the mobile device 106 is moving. In selected embodiments, the accelerometer must detect a motion greater than a predetermined threshold distance to avoid false movement alert when the accelerometer detects a small motion. For example, the user may be changing the location of the mobile device 106 on a table and thus the mobile device location should not be checked in this case.
The server 100 may send alerts to all users or in selected embodiments to a group of users. The users may be grouped based on their location. The server 100 may send information to the group of users based on their location and time. The server 100 may send the alert to the group of users that they can leave a certain area and proceed to the next area. In pilgrimage this features can be used to control the user and avoid injuries due to stampede. Each member of the group may send information to one or more member of the group via the network 102.
a is a diagram illustrating an exemplary user interface of a mobile device 106 using the boundary regulation detection method. The mobile device 106 may be, for example, a tablet, a personal digital assistant, a cellular telephone or a smart phone. In one example, the mobile device 106 may include a touchscreen 1000 and a button 1004. The mobile device 106 may display the alert received from the server 100 via the internet 102. A user interaction with the alert may be received through the touchscreen 1000 or the button 1004. Processing the user interaction may include dismissing the alert, accepting or following the instructions displayed on the touchscreen 1000. In the example shown, the user is instructed to swipe 1002.
In selected embodiments, the user may choose a set of authorized individuals such as the user's friends and family members. The user may save a list of the authorized individual's names in the server 100. In other embodiments, an individual may need to be authenticated in order to be added to the list of authorized individuals. The process of authenticating the individual may involve a mobile phone number, a full name and a country entered for example, in a registration page. The individual may then send a request to the user to be considered as an authorized individual. The user may then approve the request upon verification of the information. The individual is then added to the list of authorized individuals using the interface of the mobile device 106.
In selected embodiments, the authorized individuals may create additional conditions to receive an alert. For example, the authorized individuals may choose to get the alert in response to determining by the processing circuitry that the user is not at a particular area during a particular time. For example, the authorized individuals may choose to receive the alert in response to determining that the user is not in his hotel during nighttime. In another example, the authorized individuals may choose to receive the alert when the user leaves or enters a new country but not when the user leaves or enters a new city.
In selected embodiments, the authorized individuals may display the current location of the user on a map. The authorized individuals may also download from the server 100 via communication circuitry information related to the user. The information may include prayer time, weather and news related to the predetermined area. The user may limit access to certain information to selected authorized individuals.
In selected embodiments, the mobile device 106 may be further equipped with health sensors. The health sensors may detect a heartbeat, an electrocardiography (ECG), and a blood pressure. In other embodiments, the health sensors may be independent of the mobile device 106. Physiological readings from the health sensors may be transmitted, via the network 102, to the server 100.
In other embodiments, the user and the authorized individuals may share text, image and audio with each other. In addition, the user may share geotagged photo, geotagged text, and geotagged audio and video with the authorized individuals. The user may also upload the geotagged photos to their social networks such as Facebook and twitter via the network 102.
Further, the claimed advancements may be provided as a utility application, background daemon, or component of an operating system, or combination thereof, executing in conjunction with CPU 1700 and an operating system such as Microsoft Windows 7, UNIX, Solaris, LINUX, Apple MAC-OS and other systems known to those skilled in the art.
CPU 1700 may be a Xenon or Core processor from Intel of America or an Opteron processor from AMD of America, or may be other processor types that would be recognized by one of ordinary skill in the art. Alternatively, the CPU 1700 may be implemented on an FPGA, ASIC, PLD or using discrete logic circuits, as one of ordinary skill in the art would recognize. Further, CPU 1700 may be implemented as multiple processors cooperatively working in parallel to perform the instructions of the inventive processes described above.
The server in
The server further includes a display controller 1708, such as a NVIDIA GeForce GTX or Quadro graphics adaptor from NVIDIA Corporation of America for interfacing with display 1710, such as a Hewlett Packard HPL2445w LCD monitor. A general purpose I/O interface 1712 interfaces with a keyboard and/or mouse 1714 as well as a touch screen panel 1716 on or separate from display 1710. General purpose I/O interface also connects to a variety of peripherals 1718 including printers and scanners, such as an OfficeJet or DeskJet from Hewlett Packard.
A sound controller 1720 is also provided in server, such as Sound Blaster X-Fi Titanium from Creative, to interface with speakers/microphone 1722 thereby providing sounds and/or music.
The general purpose storage controller 1724 connects the storage medium disk 1704 with communication bus 1726, which may be an ISA, EISA, VESA, PCI, or similar, for interconnecting all of the components of the mobile device. A description of the general features and functionality of the display 1710, keyboard and/or mouse 1714, as well as the display controller 1708, storage controller 1724, network controller 1706, sound controller 1720, and general purpose I/O interface 1712 is omitted herein for brevity as these features are known.
A system which includes the features in the foregoing description provides numerous advantages to users. In particular, the device helps pilgrims perform Hajj with a peace of mind and in a correct manner without worrying about boundary guidelines. Other Hajj guides didn't provide individualized alerts. Following the different boundaries guidelines can be confusing. The present disclosure addresses this concern by providing an easy method to guide and alert the users about various steps as required by religious laws (rituals). The system helps the friends and relatives of the pilgrim have peace of mind by checking on the pilgrim location and health status.
Obviously, numerous modifications and variations are possible in light of the above teachings. It is therefore to be understood that within the scope of the appended claims, the invention may be practiced otherwise than as specifically described herein.
Thus, the foregoing discussion discloses and describes merely exemplary embodiments of the present invention. As will be understood by those skilled in the art, the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. Accordingly, the disclosure of the present invention is intended to be illustrative, but not limiting of the scope of the invention, as well as other claims. The disclosure, including any readily discernible variants of the teachings herein, define, in part, the scope of the foregoing claim terminology such that no inventive subject matter is dedicated to the public.
The above disclosure also encompasses the embodiments listed below.
(1) A method for implementing boundary regulation, including: storing, in a memory, a list of events; storing, in the memory, one or more dates and times corresponding to each event; storing, in the memory, one or more predetermined areas determined as a function of a particular event; determining, by processing circuitry, a user location; determining, by the processing circuitry, whether a current date and time corresponds with a date and time stored in the memory; generating an alert based on the user location in response to determining that the current date and time corresponds with the date and time; analyzing, by the processing circuitry, whether the user location is within a predetermined area corresponding to the event indicated by the date and time; and sending to authorized individuals the user location.
(2) The method for implementing boundary regulation of (1), further including: analyzing, by the processing circuitry, whether the user location is within a predetermined area corresponding to the event indicated by the date and time; and sending, in response to determining that the user location is not within the predetermined area, an alert to the authorized individuals indicating that the user is not within the predetermined area.
(3) The method for implementing boundary regulation of (1) or (2), further including: collecting, using health sensors, physiological readings; determining, by the processing circuitry, whether the physiological readings are normal by comparing the physiological readings to predetermined values stored in the memory; and sending, in response to determining that the physiological readings are not normal, an alert to the authorized individuals.
(4) The method for implementing boundary regulation of any one of (1) to (3), further including: storing, in the memory, a user log indicating at least one of a predetermined area, a country and a city based on the user location.
(5) The method for implementing boundary regulation of (4), further including: analyzing, by the processing circuitry, whether a current user location is within boundaries of the predetermined area indicated in the user log; and sending, in response to determining that the current user location is not within the boundaries of the predetermined area indicated in the user log, an alert to the authorized individuals.
(6) The method for implementing boundary regulation of (4), further including: analyzing, by the processing circuitry, whether a current user location is within boundaries of the country indicated in the user log; and sending, in response to determining that the current user location is not within the boundaries of the country indicated in the user log, an alert to the authorized individuals.
(7) The method for implementing boundary regulation of (4), further including: analyzing, by the processing circuitry, whether a current user location is within boundaries of the city indicated in the user log; and sending, in response to determining that the current user location is not within the boundaries of the city indicated in the user log, an alert to the authorized individuals.
(8) The method for implementing boundary regulation of any one of (1) to (7), wherein the authorized individuals access information about the user through a server.
(9) The method for implementing boundary regulation of (8), wherein the user restricts access to certain information to selected authorized individuals.
(10) The method for implementing boundary regulation of any one of (1) to (9), wherein the user and an authorized individual share at least one of a text, an image, and an audio message.
(11) The method for implementing boundary regulation of any one of (1) to (10), wherein boundaries of the predetermined areas are determined based on Islamic law.
(12) The method for implementing boundary regulation of any one of (1) to (11), wherein the events are religious events including at least one of Hajj and Umrah.
(13) The method for implementing boundary regulation of any one of (1) to (12), wherein the user location is determined by at least one of a satellite system and a cellular network.
(14) A system to implement boundary regulation, including: memory configured to store a list of events, store one or more dates and times corresponding to each event, and store one or more predetermined areas determined as a function of a particular event, and processing circuitry configured to determine a user location, determine whether a current date and time corresponds with a date and time stored in the memory, generate an alert based on the user location in response to determining that the current date and time corresponds with the date and time, analyze whether the user is within a predetermined area corresponding to the event indicated by the date and time, and send to authorized individuals the user location.
(15) The system to implement boundary regulation of (14), wherein boundaries of the predetermined areas are determined based on Islamic law.
(16) The system to implement boundary regulation of (14) or (15), wherein the events are religious events including at least one of Hajj and Umrah.
(17) A non-transitory computer readable medium storing computer-readable instructions therein which when executed by a computer causes the computer to perform a method for implementing boundary regulation, the method including: storing a list of events; storing one or more dates and times each corresponding to each event; storing one or more predetermined areas determined as a function of a particular event; determining a user location; determining whether a current date and time corresponds with a date and time stored in the memory; generating an alert based on the user location in response to determining that the current date and time corresponds with the date and time; analyzing whether the user location is within a predetermined area corresponding to the event indicated by the date and time; and sending, to authorized individuals, the user location.
This application is a continuation application of PCT International Application No. PCT/IB2014/002242 filed Oct. 27, 2014, which claims priority to the U.S. Provisional Application 62/048,552, filed on Sep. 10, 2014, both of which are herein incorporated by reference in their entirety for all purposes.
Number | Date | Country | |
---|---|---|---|
62048552 | Sep 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | PCT/IB2014/002242 | Oct 2014 | US |
Child | 14606467 | US |