Systems and methods for providing sensor-based location proximity detection and notification
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G08G-001/00
G06Q-010/10
H04W-004/02
출원번호
US-0793915
(2015-07-08)
등록번호
US-9754491
(2017-09-05)
발명자
/ 주소
Del Vecchio, Orin
Van Heerden, Lauren
Nadarajah, Gunalan
Barnett, Jonathan K.
Metwalli, Ashraf
Danielak, Jakub
Loughry, Michael
Siegel, Daniel M.
Sawtschuk, Nikolas
Mehrabi, Sultan
Chan, Paul Mon-Wah
Hamilton, Matthew
Moretti, Christianne
Barbon, John
출원인 / 주소
The Toronto-Dominion Bank
대리인 / 주소
Duane Morris LLP
인용정보
피인용 횟수 :
0인용 특허 :
33
초록▼
The disclosed embodiments include methods and systems for providing a notification relating to a geographical boundary based on monitored sensor data collected by networked devices. The disclosed embodiments include, for example, a method for receiving, by one or more processors, a request to establ
The disclosed embodiments include methods and systems for providing a notification relating to a geographical boundary based on monitored sensor data collected by networked devices. The disclosed embodiments include, for example, a method for receiving, by one or more processors, a request to establish a first boundary around a first location. The method may also include monitoring, by the one or more processors, one or more triggering devices. The method may also include calculating, by the one or more processors, a first boundary extent delimiting the geographical area of the first boundary based on one or more boundary extent parameters. The method may also include detecting, by the one or more processors, whether at least one of the one or more triggering devices is located within the first boundary extent. The method may also include, when the at least one of the one or more triggering devices is detected within the first boundary extent, sending, by the one or more processors, a notification to a client device based on the determining.
대표청구항▼
1. A system, comprising: a storage device; and at least one processor coupled to the storage device, the storage device storing software instructions for controlling the at least one processor when executed by the at least one processor, the at least one processor being operative with the software i
1. A system, comprising: a storage device; and at least one processor coupled to the storage device, the storage device storing software instructions for controlling the at least one processor when executed by the at least one processor, the at least one processor being operative with the software instructions and being configured to: receive, from a client device, a request to establish a first boundary about a target location, the request specifying a triggering device;determine a first boundary extent parameter relevant to expected arrival times of the client device and the triggering device at the target location;monitor the client device and the triggering device to obtain first boundary extent information reflecting the first boundary extent parameter, the client device and the triggering device being connected to the system across a corresponding network;establish, based on the first boundary extent information, a first travel time that reflects a movement of the client device from a current geographic location to the target location;calculate, based on the first boundary extent information and the first travel time, a first boundary extent delimiting a first geographical area of the first boundary disposed about the first location, wherein a second travel time associated with a movement of the triggering device from the first boundary extent to the target location exceeds the first travel time;detect, based on the first boundary extent information, whether the triggering device is located within the first boundary extent;receive a request to establish a second boundary around the target location, the second boundary reflecting a calculated difference in arrival times at the target location of the triggering device and an additional triggering device;monitor the triggering device and the additional triggering device to obtain second boundary extent information reflecting a second boundary extent parameter, the second boundary extent parameter corresponding to the expected difference in arrival times;calculate a second boundary extent delimiting a geographical area of the second boundary based on the second boundary extent information;determine whether the triggering device or the additional triggering device is located within the second boundary extent; andtransmit a first notification to a client device, when the triggering device is detected within the first boundary extent, and when the triggering device or the additional triggering device is determined to be located within the second boundary extent. 2. The system of claim 1, wherein the first boundary extent parameter includes: a location parameter reflecting a location of the triggering device; a speed parameter reflecting a speed of the triggering device; a direction parameter reflecting a direction of the triggering device; a traffic parameter reflecting traffic conditions between the triggering device and the target location; a modified time parameter reflecting a duration of time preceding a time at which the triggering device is expected to reach the target location; or a priority parameter reflecting an expected latent period associated with the triggering device devices. 3. The system of claim 1, wherein: the client device is associated with a first user;the triggering device is associated with a second user; andthe target location corresponds to a location of a scheduled meeting, the first user and the second user being attendees of the scheduled meeting. 4. The system of claim 3, wherein the at least one processor is further configured to obtain, from the client device, information identifying (i) a prerequisite associated with the meeting or (ii) a data requirement associated with the meeting. 5. The system of claim 4, wherein: the obtained prerequisite information identifies a preparation time associated with the meeting; and the at least one processor is further configured to calculate the first boundary extent based on the first boundary extent information and the obtained prerequisite information, the first boundary reflecting the preparation time. 6. The system of claim 1, wherein the at least one processor is further configured to assign (i) a first weight to the first boundary extent information associated with the first boundary extent parameter or (ii) a second weight to the triggering device. 7. The system of claim 1, wherein the at least one processor is further configured to: obtain, from the client device and the triggering device, sensor data indicative of geographic locations of corresponding ones of the client and triggering devices; andgenerate the first boundary extent information based on the sensor data. 8. The system of claim 7, wherein the at least one processor is further configured to: determine, based on the sensor data and the first boundary extent information, that the client device is expected to arrive at the target location after the expected arrival time of the triggering device; andtransmit a second notification to the triggering device, the second notification identifying the expected arrival time of the client device at the target location. 9. The system of claim 1, wherein the at least one processor is further configured to: determine whether the first boundary extent information has triggered an alert condition; andtransmit the first notification to the client device when the alert condition is determined to be triggered, the alert condition specifying conditions under which the client device should receive the first notification, and the alert condition including a location distance condition reflecting a distance between the location and the triggering device or a late condition reflecting that the triggering device is expected to arrive at the target location after the expected arrival time. 10. The system of claim 1, wherein the triggering device includes an additional client device or a device associated with a non-human entity. 11. The system of claim 1, wherein the at least one processor is further configured to transmit the first notification to an additional client device. 12. The system of claim 1, wherein the first notification includes information indicating that the triggering device is located within the first boundary extent. 13. The system of claim 1, wherein the at least one processor is further configured to: determine whether the triggering device is located within the second boundary extent; andtransmit a second notification to the client device, when the triggering device is determined to be located within the second boundary extent. 14. The system of claim 1, wherein the at least one processor is further configured to obtain information associated with the triggering device from a social networking site. 15. A computer-implemented method, comprising: receiving, by one or more processors, a request from a client device to establish a first boundary about a target location, the request specifying a triggering device;determining, by the one or more processors, a first boundary extent parameter relevant to expected arrival times of the client device and the triggering device at the target location;monitoring, by the one or more processors, the client device and the triggering device to obtain first boundary extent information reflecting the first boundary extent parameter, the client device and the triggering device being connected to the system across a corresponding network;establishing, by the one or more processors, a first travel time that reflects a movement of the client device from a current geographic location to the target location based on the first boundary extent information;calculating, by the one or more processors, and based on the first boundary extent information and the first travel time, a first boundary extent delimiting a first geographical area of the first boundary disposed about the target location, wherein a second travel time associated with a movement of the triggering device from the first boundary extent to the target location exceeds the first travel time;detecting, by the one or more processors, whether the triggering device is located within the first boundary extent;receiving, by the one or more processors, a request to establish a second boundary around the target location, the second boundary reflecting a calculated difference in arrival times at the target location of the triggering device and an additional triggering device;monitoring, by the one or more processors, the triggering device and the additional triggering device to obtain second boundary extent information reflecting a second boundary extent parameter, the second boundary extent parameter corresponding to the expected difference in arrival times;calculating, by the one or more processors, a second boundary extent delimiting a geographical area of the second boundary based on the second boundary extent information;determining, by the one or more processors, whether the triggering device or the additional triggering device is located within the second boundary extent; andwhen the triggering device is detected within the first boundary extent, and when the triggering device or the additional triggering device is determined to be located within the second boundary extent, transmitting, by the one or more processors, a first notification to a client device. 16. The computer-implemented method of claim 15, wherein the first boundary extent parameter includes: a location parameter reflecting a location of the triggering device; a speed parameter reflecting a speed of the triggering device; a direction parameter reflecting a direction of the triggering device; a traffic parameter reflecting traffic conditions between the triggering device and the target location; a modified time parameter reflecting a duration of time preceding a time at which the triggering device is expected to reach the target location; or a priority parameter reflecting an expected latent period associated with the triggering device devices. 17. The computer-implemented method of claim 15, wherein: the client device is associated with a first user;the triggering device is associated with a second user;the first target location corresponds to a location of a scheduled meeting, the first user and the second user being attendees of the scheduled meeting; andthe computer-implemented method further comprises obtaining, by the one or more processors, from the client device, information identifying (i) a prerequisite associated with the meeting or (ii) a data requirement associated with the meeting. 18. The computer-implemented method of claim 17, wherein: the obtained prerequisite information identifies a preparation time associated with the meeting; and the computer-implemented method further comprises calculating, by the one or more processors, the first boundary extent based on the first boundary extent information and the obtained prerequisite information, the first boundary reflecting the preparation time. 19. The computer-implemented method of claim 15, wherein the calculating further comprises assigning (i) a first weight to the first boundary extent information associated with the first boundary extent parameter or (ii) a second weight to the triggering device. 20. The computer-implemented method of claim 15, wherein: the monitoring comprises monitoring the client device and the triggering device to obtain sensor data indicative of geographic locations of corresponding ones of the client and triggering devices; andthe method further comprises generating, by the one or more processors, the first boundary extent information based on the sensor data. 21. The computer-implemented method of claim 20, further comprising: based the sensor data and the first boundary extent information, determining, by the one or more processors, that the client device is expected to arrive at the first location after the expected arrival time of the triggering device; andtransmitting, by the one or more processors, a second notification to the triggering device, the second notification identifying the expected arrival time of the client device at the first location. 22. The computer-implemented method of claim 15, further comprising: determining, by the one or more processors, whether the first boundary extent information has triggered an alert condition; andtransmitting, by the one or more processors, the notification to the client device when the alert condition is determined to be triggered, the alert condition specifying conditions under which the client device should receive the notification, andthe alert condition including a location distance condition reflecting a distance between the first location and the triggering device or a late condition reflecting that the triggering device is expected to arrive at the target location after the expected arrival time. 23. The computer-implemented method of claim 15, wherein: the triggering device includes an additional client device or a device associated with a non-human entity;the transmitting further comprises transmitting the notification to an additional client device; andthe first notification reflects that the triggering device is located within the first boundary extent. 24. The computer-implemented method of claim 15, further comprising: determining, by the one or more processors, whether the triggering device is located within the second boundary extent; andwhen the triggering device is determined to be located within the second boundary extent, transmitting, by the one or more processors, a second notification to the client device. 25. The computer-implemented method of claim 15, wherein the monitoring includes obtaining information associated with the triggering device from a social networking site. 26. A tangible, non-transitory computer-readable medium storing instructions that, when executed by at least one processor, cause the at least one processor to perform a method, comprising: receiving a request from a client device to establish a first boundary about a target location, the request specifying a triggering device;determining a first boundary extent parameter relevant to expected arrival times of the client device and the triggering device at the target location;monitoring the client device and the triggering device to obtain first boundary extent information reflecting the first boundary extent parameter, the client device and the triggering device being connected to the system across a corresponding network;establishing a first travel time that reflects a movement of the client device from a current geographic location to the target location based on the first boundary extent information;calculating, based on the first boundary extent information and the first travel time, a first boundary extent delimiting a first geographical area of the first boundary disposed about the first location, wherein a second travel time associated with a movement of the triggering device from the first boundary extent to the target location exceeds the first travel time;detecting whether the triggering device is located within the first boundary extent;receiving a request to establish a second boundary around the target location, the second boundary reflecting a calculated difference in arrival times at the target location of the triggering device and an additional triggering device;monitoring the triggering device and the additional triggering device to obtain second boundary extent information reflecting a second boundary extent parameter, the second boundary extent parameter corresponding to the expected difference in arrival times;calculating a second boundary extent delimiting a geographical area of the second boundary based on the second boundary extent information;determining whether the triggering device or the additional triggering device is located within the second boundary extent; andtransmitting a first notification to a client device, when the triggering device is detected within the first boundary extent, and when the triggering device or the additional triggering device is determined to be located within the second boundary extent. 27. The system of claim 1, wherein: the current geographic position of the client device corresponds to a first geographic location; andthe at least one processor is further configured to detect a change in the current geographic position of the client device, the change being indicative of a movement from the first geographic position to a second geographic position. 28. The system of claim 27, wherein the at least one processor is further configured to: compute a modified first travel time in response to the detected change in the current geographic location of the client device, the modified first travel time reflecting a movement of the client device from the second geographic location to the target location;calculate, based on the first boundary extent information and the modified first travel time, a modified first boundary extent delimiting a geographical area of modified first boundary disposed about the target location, wherein a third travel time associated with a movement of the triggering device from the modified first boundary extent to the target location exceeds the modified first travel time;determine that the triggering device is disposed within the modified first boundary extent; andtransmit a second notification to a client device, in response to the determination that triggering device is disposed within the modified first boundary extent. 29. The system of claim 1, wherein the at least one processor is further configured to determine that the triggering device is expected to arrive at the first location prior to the client device based on the first boundary extent information. 30. The system of claim 29, wherein the at least one processor is further configured to: in response to the determination, calculate a modified first boundary extent delimiting a geographical area of a modified first boundary disposed about the target location, wherein a third travel time associated with a movement of the triggering device from the modified first boundary extent to the target location exceeds the first travel time;determine that the triggering device is disposed within the modified first boundary extent; andtransmit a second notification to the client device in response to the determination that the triggering device is disposed within the second boundary.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (33)
Jones, M. Kelly, Advance notification systems and methods utilizing a computer network.
Yoshioka, Mototaka; Ozawa, Jun; Tajima, Takashi, Parental alert and child tracking device which determines if a child has deviated from a predicated travel route.
Horstemeyer, Scott A., Systems and methods for a notification system that enable user changes to quantity of goods and/or services for delivery and/or pickup.
Williams, David Lothele; Chandran, Rohan Koduvayur Krishnan; Chong, Kelvin Voon-Kit; Mandyam, Srinivas A.; Vedati, Krishna, Systems and methods for location sensitive alerts in a mobile communication network.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.