The present invention is generally related to security, and more particularly, is related to ensuring location of a monitored individual within a designated area.
Ensuring location of an individual within a designated area is often of major concern to facilities having individuals that may wander from the designated area without notice. Certain medical conditions require constant monitoring of the individual to ensure proper health. Unfortunately, constant knowledge of the location of such individuals is very important in providing proper care. In addition, certain medical conditions of individuals may affect the memory of the individuals, thereby requiring monitoring of the location of individuals at all time to prevent the individuals from leaving the facility and becoming lost. An example of such an illness is Alzheimer's disease. Typically, although not always the case, such individuals are elderly and located at a retirement home or medical facility.
With the advancement of technology in the telecommunications and the medical industries, individuals disabled by a long-term medical condition are capable of remaining in their homes. Video cameras allow the individual to communicate with their doctor and be remotely seen at the same time. In addition, portable phones and push button devices allow the individual to inform others when they are in need of medical attention.
Persons assigned the task of ensuring proper medical treatment and monitoring of individuals having medical conditions typically hire a nurse or other medical caregiver to check on the medical condition of the individual on a daily basis. Typically, the hired nurse or caregiver will visit the home of the individual and administer required medical treatment during their visit. Unfortunately, for certain illnesses, the short visit provided by the nurse is not sufficient to provide constant monitoring of the individual requiring medical assistance or monitoring. As an example, an individual having a medical condition associated with loss of memory may wander from their home into their wooded backyard. Once in the backyard, due to their medical condition, the individual may not remember how to find their way back to their home, which may lead to medical concerns such as, but not limited to, hypothermia, dangers associated with wild animals, or even dehydration or hunger. Unfortunately, unless someone is always watching the individual having the medical condition, it is difficult to ensure that the individual does not leave his or her home without supervision. In addition, having someone constantly monitoring the location of an individual within a home or facility is quite expensive, thereby minimizing the availability of such a service.
Retirement homes and certain medical facilities also are assigned the task of ensuring that patients do not leave the facility without permission, specifically for the safety of the patient. Certain facilities limit the number of entry and exit points within their facility so as to minimize the number of areas requiring monitoring at all times. Unfortunately, this can restrict the flow of traffic into and out of the facility, in addition to still requiring constant monitoring. With the task of monitoring entry and exiting of the facility at all times assigned to a human, the process of monitoring is subjected to human error. As an example, if an individual is not watching the entry and exiting of the facility at the entry and exit points at all times, the patient may wander out of the facility.
To address this problem, facilities often have entry and exit points locked at all times. Unfortunately, an environment having all entry and exit points locked at all times renders itself more to a prison than to a medical facility or retirement home. Without being able to have a door or window open to let in fresh air and light, patients and individuals requiring constant monitoring or insurance of location within a facility may feel trapped and regret being at the facility.
Thus, a heretofore unaddressed need exists in the industry to address the aforementioned deficiencies and inadequacies.
Embodiments of the present invention provide a system and method for ensuring location of an individual within a designated area. Briefly described, in architecture, one embodiment of the system, among others, can be implemented as follows. The system contains a portable transmitter capable of being removably secured to the individual. A proximity sensor is provided, which is capable of detecting the portable transmitter if the portable transmitter is located within a predefined range of the proximity sensor. The system also contains a sensor that is capable of determining if an object is located within a predefined area. A monitoring station is provided for performing an event if the portable transmitter is detected by the proximity sensor and the object is within the predefined area.
The present invention can also be viewed as providing methods for insuring that an individual is located within a designated area. In this regard, one embodiment of such a method, among others, can be broadly summarized by the following steps: receiving a unique identification signal if a portable transmitter is located within a predefined range of a proximity sensor; receiving a sensed signal if an object is located within a predefined area; and performing an event if the unique identification signal has been received and the sensed signal has been received.
Other systems, methods, features, and advantages of the present invention will be or become apparent to one with skill in the art upon examination of the following drawings and detailed description. It is intended that all such additional systems, methods, features, and advantages be included within this description, be within the scope of the present invention, and be protected by the accompanying claims.
Many aspects of the invention can be better understood with reference to the following drawings. The components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present invention. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views.
The present system and method is intended to assist in ensuring that an individual remains within a designated area. The following description provides the example of the system and method being used in a home of a monitored individual. It should be noted, however, that the present system and method may instead be utilized at a private or public facility having more than one monitored individual therein, such as, but not limited to, a nursing home or a section of a hospital. In addition, while the following describes monitoring of an individual, one having ordinary skill in the art will appreciate that the present system and method may be used to ensure that items remain within a facility. For example, radioactive material in a hospital can be stored within a container that also has a portable transmitter connected to the container. The present system and method would allow responsible parties to ensure that the radioactive material is not removed from the facility. Further description of the system and method is provided below.
As is shown by
The proximity sensor 24 is capable of detecting whether a portable transmitter 40 is within a predefined range of the proximity sensor 24. As an example, the proximity sensor 24 may have a predefined range of approximately five feet, where the proximity sensor 24 is capable of detecting the portable transmitter 40 if the portable transmitter 40 is within five feet of the proximity sensor 24. Of course, the predefined range of the proximity sensor 24 may differ from five feet. In accordance with the first exemplary embodiment of the invention, the portable transmitter 40 is located on an individual that is being monitored (hereafter “the monitored individual) to assure that the individual does not leave the monitored facility. The portable transmitter 20 may be located on different parts of the monitored individual, the present example showing location on the wrist of the monitored individual. Each portable transmitter 40 may broadcast a unique identification signal having a specific radio frequency that is identifiable by the proximity sensor 24. Alternatively, all portable transmitters 40 may transmit the same identification signal. The proximity sensor 24 is preferably located near the entry/exit point 30 so as to be capable of detecting if the monitored individual is within a predefined range of the entry/exit point 30.
The portable transmitter 40 which may be permanently or removably attached to the monitored individual is preferably a wireless transmitter that is capable of being detected by the proximity sensor 24. Since wireless transmitters typically consume a large amount of power, the wireless transmitter has a motion detector 42, as is explained in detail below. It should be noted that the portable transmitter 40 may alternatively not have a motion detector 42.
Returning to
The monitoring system 10 also contains a monitoring station 100 that is in communication with the proximity transceiver 20. Communication capability between the monitoring station 100 and the proximity transceiver 20 may be provided wirelessly or via use of a standard wiring connection. In accordance with the first exemplary embodiment of the invention, the proximity transceiver 20 transmits a detected unique identification signal to the monitoring station 100, received from proximity sensor 24, each time the proximity sensor 24 detects a portable transmitter 40 within its predefined range. When the detected signal is received by the monitoring station 100, the monitoring station 100 interprets the unique identification signal to know that a portable transmitter 40 has been detected by the proximity sensor 24.
Elaborating on the above-mentioned, in accordance with the first exemplary embodiment of the invention, the proximity sensor 24 broadcasts the unique identification signal detected from the portable transmitter 40, to the monitoring station 100, via the proximity transceiver 20, when the proximity sensor 24 detects the portable transmitter 40 and receives the unique identification signal. As is explained in detail below, the unique identification signal may be used by the monitoring station 100 to note when a specific monitored individual is within a predefined distance of the entry/exit point 30. In accordance with a second exemplary embodiment of the invention, the time of detecting the portable transmitter 40, the monitored individual associated with the portable transmitter 40, and the date of the detection of the portable transmitter 40 are stored within the monitoring station 100.
In accordance with the first exemplary embodiment of the invention, the sensor 50 transmits a sensed signal to the monitoring station 100 if the sensor 50 does not receive the optical signal. As will be explained in further detail below, the monitoring station 100 is capable of sounding an alarm or performing another event if the sensed signal and a detected unique identification signal have been received by the monitoring station 100. Alternatively, the monitoring station may cause the alarm to sound if only the detected unique identification signal or the sensed signal has been received by the monitoring station 100. In addition, instead of sounding the alarm, the monitoring station 100 may perform any of a number of other events that will immediately inform a person watching the monitored individual within the monitored facility that the monitored individual is within the predefined range of the proximity sensor 24 and the optical signal is not being received by the sensor 50, thereby signifying that there is an object between the transmitter 22 and the sensor 50.
It should be noted that a bypass feature may be provided to the monitoring system 10 so as to prevent the sensor 50 from determining if it is receiving the optical signal and to prevent the proximity sensor 24 from detecting identification signals of portable transmitters 40. As an example, the bypass feature may take the form of a keypad (not shown) placed outside of the entry/exit point 30. When a predefined code is entered into the keypad, the bypass feature may be activated, thereby allowing a monitored individual to enter or exit the monitored facility. As another example, the bypass feature may be activated with pressing of a doorbell located outside of the entry/exit point 30 so that when the entry/exit point 30 is opened a monitored individual may enter the monitored facility without the monitoring station 100 sounding an alarm. After a predefined period, the monitoring system 10 may turn on again.
The monitoring station 100 can be implemented in software (e.g., firmware), hardware, or a combination thereof. In the currently contemplated best mode, the monitoring system 100 is implemented partially in hardware and partially in software, as an executable program, and is executed by a special or general purpose digital computer, such as a personal computer (PC; IBM-compatible, Apple-compatible, or otherwise), workstation, minicomputer, or mainframe computer. An example of a general purpose computer that can perform functions of the monitoring station 100 is shown in
Generally, in terms of hardware architecture, as shown in
The monitoring station 100 also contains a storage device 150 for storing data therein. As an example, in accordance with the first exemplary embodiment of the invention, the data may be a series of unique identifications associated with the portable transmitter 40. Storage of the identifications allows the monitoring station 100 to determine if detection of a unique identification signal transmitted by the portable transmitter 40, which is detected by the proximity sensor 24 and received from the proximity transceiver 20, should result in sounding of an alarm. This process is explained further below. In accordance with the second exemplary embodiment of the invention, the identification associated with the portable transmitter 40 is stored within the storage device 150, as well as the time and date of detection of the portable transmitter 40 by the proximity sensor 24, as transmitted by the proximity transceiver 20. It should be noted that information regarding a monitored individual wearing the portable transmitter 40 may also be stored within the storage device 150.
The processor 110 is a hardware device for executing software 122, particularly that stored in memory 120. The processor 110 can be any custom made or commercially available processor, a central processing unit (CPU), an auxiliary processor among several processors associated with the computer, a semiconductor based microprocessor (in the form of a microchi or chip set), a macroprocessor, or generally any device for executing software instructions. Examples of suitable commercially available microprocessors are as follows: a PA-RISC series microprocessor from Hewlett-Packard Company, an 80×86 or Pentium series microprocessor from Intel Corporation, a PowerPC microprocessor from IBM, a Sparc microprocessor from Sun Microsystems, Inc, or a 68xxx series microprocessor from Motorola Corporation.
The memory 120 can include any one or combination of volatile memory elements (e.g., random access memory (RAM, such as DRAM, SRAM, SDRAM, etc.)) and nonvolatile memory elements (e.g., ROM, hard drive, tape, CDROM, etc.). Moreover, the memory 120 may incorporate electronic, magnetic, optical, and/or other types of storage media. Note that the memory 120 can have a distributed architecture, where various components are situated remote from one another, but can be accessed by the processor 110.
The software 122 in the memory 120 may include one or more separate programs, each of which comprises an ordered listing of executable instructions for implementing logical functions. In the example of
The I/O devices 130 may include input devices, for example but not limited to, a keyboard, mouse, scanner, microphone, or other input devices. Furthermore, the I/O devices 130 may also include output devices, for example but not limited to, an alarm, a printer, display, or other output devices. Finally, the I/O devices 130 may further include devices that communicate both inputs and outputs, for instance but not limited to, a modulator/demodulator (modem; for accessing another device, system, or network), a radio frequency (RF) or other transceiver, a telephonic interface, a bridge, a router, etc.
When the monitoring station 100 is in operation, the processor 110 is configured to execute the software 122 stored within the memory 120, to communicate data to and from the memory 120, and to generally control operations of the monitoring station 100 pursuant to the software 122. The software 122 and the O/S 124, in whole or in part, but typically the latter, are read by the processor 110, perhaps buffered within the processor 110, and then executed.
When the monitoring system 100 is implemented in software, as is shown in
In an alternative embodiment, where the monitoring station 100 is implemented in hardware, the monitoring station 100 can be implemented with any or a combination of the following technologies, which are each well known in the art: a discrete logic circuit(s) having logic gates for implementing logic functions upon data signals; an application specific integrated circuit (ASIC) having appropriate combinational logic gates; a programmable gate array(s) (PGA); and a field programmable gate array (FPGA), among others.
As is shown by block 200, the monitoring station 100 is configured. Configuration of the monitoring station 100, in accordance with the first exemplary embodiment of the invention, entails storing therein identification associated with each portable transmitter 40 located within a monitored facility. The identification allows the monitoring station 100 to determine to which portable transmitter 40 a received unique identification signal belongs when the signal is received from the proximity transceiver 20.
In accordance with the second exemplary embodiment of the invention, configuration of the monitoring station 100 entails storing therein identification associated with each portable transmitter 40 located within a monitored facility and storing the name, and/or other information regarding the monitored individual wearing each portable transmitter 40. Storing the name and/or other information regarding the monitored individual wearing each portable transmitter 40 allows the monitoring station 100 to determine who is wearing a detected portable transmitter 40 when a detected unique identification signal is received from the proximity transceiver 20.
A predefined (i.e., detection) range of the proximity sensor 24 is predefined (block 202) prior to use of the monitoring system 10. Since the proximity sensor 24 is located next to the entry/exit point 30, the predefined range of the proximity sensor 24 is capable of sensing when a portable transmitter 40 is within the predefined range of the entry/exit point 30. As an example, the predefined range of the proximity sensor 24 may be set at five feet, thereby detecting when a portable transmitter 40 is within five feet of the proximity sensor 24 or entry/exit point 30.
As is shown by block 204, a determination is made as to whether the sensor 50 is receiving an optical signal. If the sensor 50 is receiving an optical signal, the monitoring system 10 continues to determine if the sensor 50 is receiving an optical signal. Alternatively, as has been mentioned above, a different method of determining if an object is located between the sensor 50 and the transmitter 22, or simply obstructing the entry/exit point 30, may be used.
If the sensor 50 is not receiving the optical signal a determination is made as to whether the proximity sensor 24 has detected a unique identification signal transmitted by a portable transmitter 40 (block 206). If the proximity sensor 24 has not detected a unique identification signal transmitted by a portable transmitter 40 a determination is again made as to whether the sensor 50 is receiving an optical signal. If the proximity sensor 24 has detected a unique identification signal, the unique identification signal is transmitted to the monitoring station 100 by the proximity transceiver 20 (block 208). When the monitoring station 100 receives the unique identification signal from the proximity transceiver 20, the monitoring station 100 determines whether it should sound an alarm (block 210), signifying that the monitored individual is within detection range of the entry/exit point 30 and the sensor 50 is not receiving the optical signal from the transmitter 22. To determine whether the monitoring station 100 should sound the alarm, the monitoring station 100 checks the identification stored within the storage device 150. If the unique identification signal is stored within the storage device 150, the alarm sounds.
It should be noted that if the entry/exit point 30 is a door, opening of the door would result in the sensor 50 not receiving the optical signal. As a result, sounding of the alarm may mean that the monitored individual has exited the monitored facility, or is about to exit the monitored facility.
In accordance with the second exemplary embodiment of the invention, when the monitoring station 100 receives the unique identification signal from the proximity transceiver 20, the monitoring station 100 also stores the time and date that the proximity sensor 24 detected the portable transmitter 40. Therefore, in accordance with the second exemplary embodiment of the invention, the storage device 150 contains a database of the names of the monitored individuals wearing portable transmitters 40 at the time of detection by the proximity sensor 24, and the time and date of detection by the proximity sensor 24.
It should be emphasized that the above-described embodiments of the present invention are merely possible examples of implementations, merely set forth for a clear understanding of the principles of the invention. Many variations and modifications may be made to the above -described embodiments of the invention without departing substantially from the spirit and principles of the invention. All such modifications and variations are intended to be included herein within the scope of this disclosure and the present invention and protected by the following claims.
Number | Name | Date | Kind |
---|---|---|---|
4272762 | Geller et al. | Jun 1981 | A |
4682155 | Shirley | Jul 1987 | A |
4812810 | Query et al. | Mar 1989 | A |
5440290 | McCullough et al. | Aug 1995 | A |
5475377 | Lee | Dec 1995 | A |
5493278 | Mackenzie et al. | Feb 1996 | A |
5523927 | Gokey | Jun 1996 | A |
5590953 | Haslam et al. | Jan 1997 | A |
5597233 | Lau | Jan 1997 | A |
5649761 | Sandell et al. | Jul 1997 | A |
5802479 | Kithil et al. | Sep 1998 | A |
5933534 | Yoshimoto et al. | Aug 1999 | A |
5945981 | Paull et al. | Aug 1999 | A |
5973611 | Kulha et al. | Oct 1999 | A |
6104295 | Gaisser et al. | Aug 2000 | A |
6225903 | Soloway et al. | May 2001 | B1 |
6225906 | Shore | May 2001 | B1 |
6310548 | Stephens, Jr. et al. | Oct 2001 | B1 |
6348691 | Sandell et al. | Feb 2002 | B1 |
6370195 | Watanabe et al. | Apr 2002 | B1 |
6496539 | Watanabe et al. | Dec 2002 | B2 |
6720874 | Fufido et al. | Apr 2004 | B2 |
6803945 | Needham | Oct 2004 | B1 |
6812836 | Soloway et al. | Nov 2004 | B2 |
6813372 | Standridge et al. | Nov 2004 | B2 |
20040100386 | Tendler | May 2004 | A1 |
20040189471 | Ciarcia et al. | Sep 2004 | A1 |
20050040952 | Dearing et al. | Feb 2005 | A1 |
Number | Date | Country | |
---|---|---|---|
20060152374 A1 | Jul 2006 | US |