Systems and methods for providing sensor-based location proximity detection and notification
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G08G-001/00
G06Q-010/10
H04W-004/02
출원번호
US-0794038
(2015-07-08)
등록번호
US-9754492
(2017-09-05)
발명자
/ 주소
Del Vecchio, Orin
Van Heerden, Lauren
Nadarajah, Gunalan
Barnett, Jonathan K.
Metwalli, Ashraf
Danielak, Jakub
Loughry, Michael
Siegel, Daniel M.
Sawtschuk, Nikolas
Mehrabi, Sultan
Chan, Paul Mon-Wah
Hamilton, Matthew
Moretti, Christianne
Barbon, John
출원인 / 주소
The Toronto-Dominion Bank
대리인 / 주소
Duane Morris LLP
인용정보
피인용 횟수 :
0인용 특허 :
32
초록▼
The disclosed embodiments include methods and systems for providing a notification relating to a geographical boundary based on monitored sensor data collected by networked devices. The disclosed embodiments include, for example, a method that monitors positional sensor data received from one or mor
The disclosed embodiments include methods and systems for providing a notification relating to a geographical boundary based on monitored sensor data collected by networked devices. The disclosed embodiments include, for example, a method that monitors positional sensor data received from one or more triggering devices. The method may calculate a first boundary extent delimiting the geographical area of the first boundary based on one or more boundary extent parameters. The method may also detect an occurrence of a triggering condition that impacts a movement of at least one of a client device or at least one of the triggering devices within a geographic region that includes the first location. In response to the detected triggering event, at least one of modified start time or a second location may be established for the event, which may be provided to the client and triggering devices in a notification.
대표청구항▼
1. A system, comprising: a storage device; andat least one processor coupled to the storage device, the storage device storing instructions for controlling the at least one processor when executed by the at least one processor, the at least one processor being operative with the instructions to: det
1. A system, comprising: a storage device; andat least one processor coupled to the storage device, the storage device storing instructions for controlling the at least one processor when executed by the at least one processor, the at least one processor being operative with the instructions to: determine a first boundary extent parameter relevant to expected arrival times of a client device and a triggering device at a first location of an event;monitor the client device and the triggering device to obtain first boundary extent information reflecting the first boundary extent parameter, the client device and the triggering device being connected to the system across a corresponding network;calculate, based on the first boundary extent information, a first boundary extent delimiting a first geographical area of a first boundary disposed about the first location;detect an occurrence of a triggering condition impacting a movement of the client device or the triggering device within a geographic region that includes the first location;in response to the detected triggering condition, determine a (i) a modified start time for the event or (ii) a second location for the event; andtransmit a first notification to the client device and the triggering device, the first notification comprising information identifying the modified start time or the second location, the information instructing the client device and the triggering device to present the first notification through corresponding interfaces;detect whether the triggering device is located within the first boundary extent;determine whether the first boundary extent information has triggered an alert condition; andtransmit a second notification to the client device when the triggering device is detected within the first boundary extent, and when the alert condition is determined to be triggered, the condition specifying conditions under which the client device should receive the second notification, and the alert condition including a location distance condition reflecting a distance between the first location and the triggering device or a late condition reflecting that the triggering device is expected to arrive at the first location after the corresponding one of the expected arrival times. 2. The system of claim 1, wherein the triggering condition comprises an external factor occurring within the geographic region. 3. The system of claim 1, wherein the triggering condition is associated with the first location, the triggering condition affecting the event at the first location. 4. The system of claim 1, wherein the at least one processor is further configured to: compute, based on the first boundary extent information, the expected arrival times of the client device and triggering device at the first location;determine that the expected arrival time of the client device or the expected arrival time of the triggering device falls subsequent to a start time of the event; and compute the modified start time in accordance with the expected arrival times, the modified start time being subsequent to the expected arrival time of the client device or the expected arrival time of the triggering device. 5. The system of claim 4, wherein the at least one processor is further configured to: determine that the modified start time for the event comports with a prerequisite associated with the event or a data requirement associated with the event; andin response to the determination that the modified start time comports with the prerequisite or the data requirement, transmit the first notification identifying the modified start time to the client device and the triggering device. 6. The system of claim 5, wherein the at least one processor is further configured to obtain information identifying the prerequisite or the data requirement from the client device. 7. The system of claim 4, wherein the at least one processor is further configured to: compute delays associated with the expected arrival times of the client device and the triggering device at the first location, the delays reflecting differences between corresponding ones of the expected arrival times and the start time;determine whether a maximum of the delays exceeds a threshold value; andcompute the modified start time when the maximum delay is determined not to exceed the threshold value. 8. The system of claim 7, wherein the at least one processor is further configured to: when the maximum delay is determined to exceed the threshold value, identify a proposed alternate date or a proposed alternate time for the event;transmit a third notification to the client device and the triggering device, the third notification comprising information identifying the proposed alternate date or time;receiving responses to the third notification from the client device and the triggering device; andbased on the received responses, perform operations that reschedule the event to the proposed alternate date or time. 9. The system of claim 1, wherein the at least one processor is further configured to: identify, based on the first boundary extent information, candidate second locations for the event;determine that a corresponding one of the candidate second locations comports with a prerequisite associated with the event or a data requirement associated with the event; andin response to the determination that the corresponding one of the candidate second locations comports with the prerequisite or the data requirement, establish the corresponding one of the second candidate locations as the second location. 10. The system of claim 1, wherein the at least one boundary extent parameter includes: a location parameter reflecting a location of the triggering device; a speed parameter reflecting a speed of the triggering device; a direction parameter reflecting a direction of the triggering device; a traffic parameter reflecting traffic conditions between the triggering device and the first location; a modified time parameter reflecting a duration of time preceding a time at which the triggering device is expected to reach the first location; or a priority parameter reflecting an expected latent period associated with the triggering devices. 11. The system of claim 1, wherein the first boundary is associated with the expected arrival time of the triggering device at the first location. 12. The system of claim 1, wherein the at least one processor is further configured to receive a first boundary creation request to establish the first boundary around the first location, the first request specifying the triggering device. 13. The system of claim 12, wherein the at least one processor is further configured to: receive a request to establish a second boundary around the first location, the second boundary reflecting a calculated difference in the expected arrival time at the first location of the triggering device and an expected arrival time at the first location of an additional triggering device;calculate a second boundary extent delimiting a geographical area of the second boundary;determine whether the triggering device or the additional triggering device is located within the second boundary extent; andtransmit the second notification to the client device, when the triggering device or the additional triggering device is determined to be located within the second boundary extent. 14. The system of claim 1, wherein the triggering includes an additional client device or a device associated with a non-human entity. 15. The system of claim 1, wherein the at least one processor is further configured to obtain information associated with the triggering device from a social networking site. 16. A computer-implemented method, comprising: determining, by one or more processors, a first boundary extent parameter relevant to expected arrival times of a client device and a triggering device at a first location of an event;monitoring, by the one or more processors, the client device and the triggering device to obtain first boundary extent information reflecting the first boundary extent parameter;calculating, by the one or more processors, and based on the first boundary extent information, a first boundary extent delimiting a first geographical area of a first boundary disposed about the first location;detecting, by the one or more processors, an occurrence of a triggering condition impacting a movement of the client device or the triggering device within a geographic region that includes the first location;in response to the detected triggering condition, determining, by the one or more processors, a (i) a modified start time for the event or (ii) a second location for the event; andtransmitting, by the one or more processors, a first notification to the client device and the triggering device, the first notification comprising information identifying the modified start time or the second location, the information instructing the client device and the triggering device to present the first notification through corresponding interfaces;detecting, by the one or more processors, whether the triggering device is located within the first boundary extent;determining, by the one or more processors, whether the first boundary extent information has triggered an alert condition; andtransmitting, by the one or more processors, a second notification to the client device when the triggering device is detected within the first boundary extent, and when the alert condition is determined to be triggered, the condition specifying conditions under which the client device should receive the second notification, and the alert condition including a location distance condition reflecting a distance between the first location and the triggering device or a late condition reflecting that the triggering device is expected to arrive at the first location after the corresponding one of the expected arrival times. 17. The computer-implemented method of claim 16, wherein the at least one triggering condition comprises an external factor occurring within the geographic region. 18. The computer-implemented method of claim 16, wherein the triggering condition is associated with the first location, the triggering condition affecting the event at the first location. 19. The computer-implemented method of claim 16, further comprising: based on the first boundary extent information, computing, by the one or more processors, the expected arrival times of the client device and the triggering device at the first location;determining, by the one or more processors, that the expected arrival time of the client device or the expected arrival time of the triggering device falls subsequent to a start time of the event; andcomputing, by the one or more processors, the modified start time in accordance with the expected arrival times, the modified start time subsequent to the expected arrival time of the client device or the expected arrival time of the triggering device. 20. The computer-implemented method of claim 19, further comprising: determining, by the one or more processors, that the modified start time for the event comports with a prerequisite associated with the event or a data requirement associated with the event; andin response to the determination that the modified start time comports with the prerequisite or the data requirement, transmitting, by the one or more processors, the first notification identifying the modified start time to the client device and the triggering device. 21. The computer-implemented method of claim 20, further comprising obtaining, by the one or more processors, information identifying the prerequisite or the data requirement from the client device. 22. The computer-implemented method of claim 19, further comprising: computing, by the one or more processors, delays associated with the expected arrival times of the client device and triggering device at the first location, the delays reflecting differences between corresponding ones of the expected arrival times and the start time;determining, by the one or more processors, whether a maximum of the delays exceeds a threshold value; andcomputing, by the one or more processors, the modified start time when the maximum delay is determined not to exceed the threshold value. 23. The computer-implemented method of claim 22, further comprising: when the maximum delay is determined to exceed the threshold value, identifying, by the one or more processors, a proposed alternate date or a proposed alternate time for the event;transmitting, by the one or more processors, a second notification to the client device and the triggering device, the second notification comprising information identifying the proposed alternate date or time;receiving, by the one or more processors, responses to the second notification from the client device and the triggering device; andbased on the received responses, performing, by the one or more processors, operations that reschedule the event to the proposed alternate date or time. 24. The computer-implemented method of claim 16, further comprising: based on the first boundary extent information, identifying, by the one or more processors, candidate second locations for the event;determining, by the one or more processors, that a corresponding one of the candidate second locations comports with a prerequisite associated with the event or a data requirement associated with the event; andin response to the determination that the corresponding one of the candidate second locations comports with the prerequisite or the data requirement, establishing, by the one or more processors, the corresponding one of the second candidate locations as the second location. 25. The computer-implemented method of claim 16, wherein the first boundary extent parameter includes: a location parameter reflecting a location of the triggering device; a speed parameter reflecting a speed of the triggering device; a direction parameter reflecting a direction of the triggering device; a traffic parameter reflecting traffic conditions between the triggering device and the first location; a modified time parameter reflecting a duration of time preceding a time at which the triggering device is expected to reach the first location; or a priority parameter reflecting an expected latent period associated with the triggering device. 26. The computer-implemented method of claim 16, wherein the first boundary is associated with the expected arrival time of the triggering device at the first location. 27. The computer-implemented method of claim 16, further comprising receiving, by the one or more processors, a first boundary creation request to establish the first boundary around the first location, the first request specifying the triggering device. 28. The computer-implemented method of claim 27, further comprising: receiving, by one or more processors, a request to establish a second boundary around the first location, the second boundary reflecting a calculated difference in the expected arrival time at the first location of the triggering device and an expected arrival time at the first location of an additional triggering device;calculating, by the one or more processors, a second boundary extent delimiting a geographical area of the second boundary;determining, by the one or more processors, whether the triggering device or the additional triggering device is located within the second boundary extent; andwhen the triggering device or the additional triggering device is determined to be located within the second boundary extent, transmitting, by the one or more processors, the second notification to the client device. 29. The computer-implemented method of claim 16, wherein the triggering device includes an additional client device or a device associated with a non-human entity. 30. A tangible, non-transitory computer-readable medium storing instructions that, when executed by at least one processor, cause the at least one processor to perform a method, comprising: determining a first boundary extent parameter relevant to expected arrival times of a client device and a triggering device at a first location of an event;monitoring the client device and the triggering device to obtain first boundary extent information reflecting the first boundary extent parameter;calculating, based on the first boundary extent information, a first boundary extent delimiting a first geographical area of a first boundary disposed about the first location;detecting an occurrence of a triggering condition impacting a movement of the client device or the triggering device within a geographic region that includes the first location;in response to the detected triggering condition, determining a (i) a modified start time for the event or (ii) a second location for the event;transmitting a first notification to the client device and the triggering device, the first notification comprising information identifying the modified start time or the second location, the information instructing the client device and the triggering device to present the first notification through corresponding interfaces;detecting whether the triggering device is located within the first boundary extent;determining whether the first boundary extent information has triggered an alert condition; andtransmitting a second notification to the client device when the triggering device is detected within the first boundary extent, and when the alert condition is determined to be triggered, the alert condition specifying conditions under which the client device should receive the second notification, and the alert condition including a location distance condition reflecting a distance between the first location and the triggering device or a late condition reflecting that the triggering device is expected to arrive at the first location after the corresponding one of the expected arrival time. 31. A system, comprising: a storage device; andat least one processor coupled to the storage device, the storage device storing instructions for controlling the at least one processor when executed by the at least one processor, the at least one processor being operative with the instructions to: receive a first boundary creation request to establish a first boundary about a first location of an event, the first request specifying a first triggering device and a second triggering device;determine a first boundary extent parameter relevant to expected arrival times of a client device and of the first and second triggering devices at the first location of the event;monitor the client device and the first and second triggering devices to obtain boundary extent information reflecting the first boundary extent parameter, the client device and the first and second triggering devices being connected to the system across a corresponding network;calculate a first boundary extent delimiting a first geographical area of the first boundary based on the boundary extent information;detect an occurrence of a triggering condition impacting a movement of the client device, the first triggering device, or the second triggering device within a geographic region that includes the first location;determine a (i) a modified start time for the event or (ii) a second location for the event in response to the detected triggering condition; andtransmit a first notification to the client device, the first triggering device, and the second triggering device, the first notification comprising information identifying the modified start time or the second location, the information instructing the client device and the first and second triggering devices to present the first notification through corresponding interfaces;detect whether the first triggering device or the second triggering device is located within the first boundary extent;receive a request to establish a second boundary around the first location, the second boundary reflecting a calculated difference in the expected arrival times at the first location of the first triggering device and the second triggering device;calculate a second boundary extent delimiting a geographical area of the second boundary;determine whether the first triggering device or the second triggering devices is located within the second boundary extent; andtransmit a third notification to the client device, when the first triggering device or the second triggering device is determined to be located within the second boundary extent, and when the first triggering device or the second triggering device is detected within the first boundary extent. 32. A computer-implemented method, comprising: receiving, by one or more processors, a first boundary creation request to establish a first boundary about a first location of an event, the first request specifying a first triggering device and a second triggering device;determining, by one or more processors, a first boundary extent parameter relevant to expected arrival times of a client device and of the first and second triggering devices at the first location of the event;monitoring, by one or more processors, the client device and the first and second triggering devices to obtain boundary extent information reflecting the first boundary extent parameter, the client device and the first and second triggering devices being connected to the system across a corresponding network;calculating, by one or more processors, a first boundary extent delimiting a first geographical area of the first boundary based on the boundary extent information;detecting by one or more processors, an occurrence of a triggering condition impacting a movement of the client device, the first triggering device, or the second triggering device within a geographic region that includes the first location;determining, by one or more processors, a (i) a modified start time for the event or (ii) a second location for the event in response to the detected triggering condition; andtransmitting, by one or more processors, a first notification to the client device, the first triggering device, and the second triggering device, the first notification comprising information identifying the modified start time or the second location, the information instructing the client device and the first and second triggering devices to present the first notification through corresponding interfaces;detecting, by one or more processors, whether the first triggering device or the second triggering device is located within the first boundary extent;receiving, by one or more processors, a request to establish a second boundary around the first location, the second boundary reflecting a calculated difference in the expected arrival times at the first location of the first triggering device and the second triggering device;calculating, by one or more processors, a second boundary extent delimiting a geographical area of the second boundary;determining, by one or more processors, whether the first triggering device or the second triggering devices is located within the second boundary extent; andtransmitting, by one or more processors, a third notification to the client device, when the first triggering device or the second triggering device is determined to be located within the second boundary extent, and when the first triggering device or the second triggering device is detected within the first boundary extent.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (32)
Jones, M. Kelly, Advance notification systems and methods utilizing a computer network.
Yoshioka, Mototaka; Ozawa, Jun; Tajima, Takashi, Parental alert and child tracking device which determines if a child has deviated from a predicated travel route.
Horstemeyer, Scott A., Systems and methods for a notification system that enable user changes to quantity of goods and/or services for delivery and/or pickup.
Williams, David Lothele; Chandran, Rohan Koduvayur Krishnan; Chong, Kelvin Voon-Kit; Mandyam, Srinivas A.; Vedati, Krishna, Systems and methods for location sensitive alerts in a mobile communication network.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.