Multi-level database management system and method for an object tracking service that protects user privacy
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-029/08
H04L-029/06
H04W-004/00
H04W-004/02
H04W-004/04
H04W-004/20
H04W-012/08
H04W-084/12
G06K-007/10
G06Q-010/00
G08B-005/22
출원번호
US-0483682
(2017-04-10)
등록번호
US-9871874
(2018-01-16)
발명자
/ 주소
Diem, Darrell
출원인 / 주소
PERDIEMCO LLC
대리인 / 주소
Vector IP Law Group
인용정보
피인용 횟수 :
0인용 특허 :
144
초록▼
An improved system and method for defining an event based upon an object location and a user-defined zone and managing the conveyance of object location event information among computing devices where object location events are defined in terms of a condition based upon a relationship between user-d
An improved system and method for defining an event based upon an object location and a user-defined zone and managing the conveyance of object location event information among computing devices where object location events are defined in terms of a condition based upon a relationship between user-defined zone information and object location information. One or more location information sources are associated with an object to provide the object location information. One or more user-defined zones are defined on a map and one or more object location events are defined. The occurrence of an object location event produces object location event information that is conveyed to users based on user identification codes. Accessibility to object location information, zone information, and object location event information is based upon an object location information access code, a zone information access code, and an object location event information access code, respectively.
대표청구항▼
1. A database management system used in a mobile device tracking service that tracks locations of a plurality of mobile devices identified by corresponding device identification codes (DID codes) in one or more databases, said database management system accessing the one or more databases by one or
1. A database management system used in a mobile device tracking service that tracks locations of a plurality of mobile devices identified by corresponding device identification codes (DID codes) in one or more databases, said database management system accessing the one or more databases by one or more centralized or distributed servers controlled under a first level of administrative privilege of an administrator of the mobile device tracking service, the mobile device tracking service being provided to a plurality of users who are identified by corresponding user identification codes (UID codes) who track the plurality of mobile devices, said plurality of users including users who are allowed to receive certain alerts relating to the locations of the tracked mobile devices and users who are not allowed to receive the certain alerts, the one or more servers being configured to: check the first level of administrative privilege of the administrator before the administrator performs a first set of administrative functions that include: specifying a plurality of groups of users of the plurality of users who track the plurality of mobile devices, including a group identified by a group identification code (GID code), said group being associated with a first mobile device identified by a first DID code and a second mobile device identified by a different second DID code and one or more users identified by corresponding UID codes in the group identified by the GID code, said UID codes being different from each other and the first and second DID codes;controlling user membership in the groups;specifying an authorized user ID code (AUID code) that identifies an authorized user other than the administrator in the group identified by the GID code;giving a second level of administrative privilege to the authorized user to perform a second set of administrative functions, wherein the administrator having the first level of administrative privilege does not perform the second set of administrative functions performed under the second level of administrative privilege given to the authorized user;check a first level of access control based on the AUID code before the administrator gives the second level administrative privilege to the authorized user; andcheck the second level of administrative privilege of the authorized user before the authorized user performs the second set of administrative functions that includes: i. setting an event for the group that occurs when the first mobile device or the second mobile device crosses a zone comprising a boundary location on a reference coordinate system that is defined after the group is specified; andii. specifying an information access code comprising an access list that identifies by corresponding UID codes which users of the plurality of the users are allowed to receive 1) location information from a first location information source associated with the first DID code or a second location information source associated with the second DID code over a wireless network and 2) event information other than location information conveyed when the database management system determines that the event has occurred, wherein the location of the zone is independent of locations of the plurality of mobile devices, and wherein the access list comprises one or more UID codes that identify one or more users as recipients who are allowed to receive an alert when the event occurs such that any user who is not identified on the access list is not a recipient of the alert when the event occurs, wherein the alert is only conveyed to the one or more recipients of the alert identified on the access list when the event occurs;receive the location information of the first and second mobile devices identified by the first DID code and the second DID code;determine whether to send the alert based on a comparison of the location of the zone with the location information of the first or second mobile devices in the group;check a second level of access control based on one or more UID codes in the access list to cause the alert to be sent to the one or more recipients identified on the access list such that only identified users of the plurality of users can receive the alert when the event occurs, andconvey the location information of the first or second mobile devices to one or more recipients identified on the access list such that only identified users of the plurality of users can receive the location information. 2. The system of claim 1, wherein the second set of administrative functions further include: specifying a sub-group of users in the group identified by the GID code;identifying the sub-group with a sub-group ID code (SGID code) on the access list;specifying a second user ID code for a second user in the sub-group. 3. The system of claim 2, wherein the second set of administrative functions further include giving a third level of administrative privilege to the second user to identify one or more users in the sub-group on the access list as one or more recipients of the alert in the sub-group. 4. The system of claim 3, wherein the one or more servers are further configured to: a) check the second level of administrative privilege of the authorized user before the authorized user gives the third level of administrative privilege to the second user; and b) check a third level of access control based on the UID code of the second user to perform a set of functions that are assigned to the second user based on the authorized user's role in an organization or the authorized user's security-clearance. 5. The system of claim 4, wherein the one or more servers are further configured to check the third level of administrative privilege of the second user before performing the set of functions that are assigned to the second user based on the second user's role in the organization or the second user's security-clearance. 6. The system of claim 3, wherein the one or more servers are further configured to check the third level of administrative privilege of the second user before enabling the second user to specify a second access list comprising UID codes identifying one or more recipients in the sub-group who are allowed to receive a second alert different from the alert; and check a fourth level of access control based on the second access list before causing the second alert to be sent only to the one or more recipients in the sub-group. 7. The system of claim 1, wherein the one or more servers are further configured to determine the occurrence of a second event that is different from the event, said second event being based on a condition determined by the proximity of the first and second mobile devices to each other or to a mobile object identified by a mobile object ID code (OID code) different from the DID codes, and wherein the occurrence of the second event is determined based on the OID code and the first or second DID codes, wherein a mobile object and a mobile device are of different kinds. 8. The system of claim 7, wherein the one or more servers are further configured to determine occurrence of the second event based on location information received from one or more wireless proximity location information sources used to provide location information of the mobile object identified by the OID code. 9. The system of claim 8, wherein the proximity location source provides proximity locations of the mobile object to the first mobile device or to the second mobile device or to another identified fixed or mobile object. 10. The system of claim 9, wherein the proximity device is an NFC device, a Bluetooth device, an RFID device or a sensor device that measures temperature, humidity, heart rate, speed or motion. 11. A method for tracking locations of a plurality of mobile objects associated with one or more wireless location information sources that provide mobile object locations which allows a plurality of users of a tracking service provider having an administrator with a first level of administrative privilege of controlling user membership in groups to track the plurality of mobile objects, the mobile device tracking service being provided by the administrator to the plurality of users in the groups who track the plurality of mobile devices, the method being executed in a database management system that interfaces with one or more databases that identify the plurality of mobile objects by corresponding object identification codes (OID codes) and the plurality of users by corresponding user identification codes (UID codes) to determine which users are allowed to be recipients of certain notification information when events based on the mobile object locations occur, wherein one or more users are not allowed to be recipients of the certain notification information when such events occur, said method comprising: a. checking the first level of administrative privilege of the administrator before controlling user membership in one or more groups specified by the administrator, said groups including a group identified by a group ID code (GID code) of users of the plurality of users who are identified by corresponding UID codes, wherein the group includes 1) an authorized user other than the administrator identified by an authorized user ID code (AUID code) having a second level of administrative privilege given by the administrator to authorized user to control conveyance of notifications in the group, wherein the administrator having the first level of administrative privilege does not exercise the second level of administrative privilege given to the authorized user, and 2) a second user identified by a second user ID code (SUID code) different from the AUID code and 3) a mobile object identified by an OID code different from the AUID code and SUID code; andb. checking the second level of administrative privilege of the authorized user based on the AUID code before providing one or more users interfaces to the authorized user to specify: i. an event condition based on the mobile object locations that causes a group event to occur; andii. an information access code comprising an access list that identifies one or more users of the plurality of users by corresponding UID codes including the SUID code of the second user who are recipients of a notification information when the group event occurs such that any user of the plurality of users who is not identified on the access list is not a recipient of the notification information when the group event occurs; andc. checking a first level of access control based on the UID codes to determine which users of the plurality of users can receive the notification information when the group event occurs; andd. checking a second level of access control based on the information access code before sending the notification information when the database management system determines that the group event has occurred; the notification information being sent to the one or more recipients identified on the access list including the second user to protect user privacy such that only identified users of the plurality of users on the access list can receive the notification information. 12. The method of claim 11 further comprising the step of receiving the mobile object locations before determining whether the group event has occurred. 13. The method of claim 11, wherein any user of the plurality of users without knowledge of the information access code on the access list can receive the notification information if identified on the access list. 14. The method of claim 13 further comprising the steps of allowing the plurality of users to log into a tracking service network operated by the tracking service provider based on corresponding UID codes and user login passwords before providing the one or more user interfaces based on the second level of administrative privilege, and allowing the notification information to be sent to a recipient identified on the access list who has entered the corresponding UID code and the user login password to log into the tracking service network. 15. The method of claim 14 further including the steps of: a. checking the first level of access control based on 1) the AUID code and the authorized user login password before providing one or more user interfaces that enables the authorized user identified by the AUID code to use the second level of administrative privilege to control user membership as a second administrator of a sub-group of users within the group;b. checking the second level of access control based on the SUID code and the second user's login password before givingc. sending a third level of administrative privilege to the second authorized user to control conveyance of notifications in the sub-group of users, wherein the third level of administrative privilege of the second authorized user is used to specify a second information access code different from the first information access code comprising a second access list of recipients of notifications. 16. The method of claim 14, wherein the first level of access control is based on a UID code and a user login password and an additional passcode conveyed to the user that must be entered before providing the one or more user interfaces. 17. The method of claim 11 further including the step of checking the first level of administrative privilege before configuring one or more centralized or distributed servers of the tracking service provider to interface with the database management system to associate one or more OID codes with one or more location information sources of mobile objects in the group. 18. The method of claim 11, wherein the event condition is based on the mobile object's locations relative to or within a zone comprising a location on a referenced coordinate. 19. The method of claim 18 further comprising the step of determining the mobile object's locations before determining whether the group event occurred and receiving an information package including an image, video, or multi-media file that is incorporated into the information package when the mobile object is within the zone and accessing the image, video, or multi-media file based on the information access code. 20. The method of claim 11, wherein the mobile objects comprise mobile sensor devices having one or more wireless sensor information sources that provide a measure of temperature, humidity, heart rate, motion or speed, wherein the event condition is based the location-of the measure. 21. The method of claim 20 further comprising the step of receiving the measure before determining whether the group event has occurred and including the measure in the notification information when the group event occurs. 22. The method of claim 20, wherein the mobile sensor devices operate in a sensor network of the one or more wireless sensor information sources, and wherein the event condition is further based on sensor information received from the sensor network operating independent of one or more central or distributed servers of the tracking service provider. 23. The method of claim 22 further including the step of checking the first level of administrative privilege before configuring one or more centralized or distributed servers to interface with the sensor network based on a sensor network administrative privilege that provides sensor services to the plurality of users, wherein the sensor network administrative privilege is independent of the first level of administrative privilege. 24. The method of claim 11, wherein the mobile objects comprise proximity devices associated with one or more wireless proximity location information sources, and wherein the event condition is based on proximities of a mobile object to another fixed or mobile object comprising a second object identified different from the mobile object. 25. The method of claim 24 further comprising the step of receiving a proximity location information from a proximity device before determining whether the group event has occurred. 26. The method of claim 24, wherein the proximity device comprises a Bluetooth or RFID code or NFC device. 27. The method of claim 25, wherein the proximity devices operate in a proximity network of the one or more wireless proximity location information sources, and wherein the event condition is based on proximity locations received from the proximity network operating independent of one or more central or distributed servers of the tracking service provider. 28. The method of claim 27 further including the step of checking the first level of administrative privilege before configuring the one or more centralized or distributed servers to interface with the proximity network based on a proximity network administrative privilege that provides proximity services to the plurality of the users, wherein the proximity network administrative privilege is independent of the first level of administrative privilege. 29. The method of claim 11 further comprising the steps of: 1) specifying a second event condition based on measures of temperature, humidity, heart rate, motion or speed by an identified fixed or mobile wireless sensor device other than the mobile object, wherein the mobile object and the fixed or mobile wireless sensor device are not the same kind, and wherein satisfaction of the second event condition causes a second event to occur and 2) checking the second level of access control based on the information access code before sending a notification information when the database management system determines based on the second event condition that the second event has occurred. 30. The method of claim 29 further comprising the step of receiving a measure before determining whether the second event has occurred and including the measure in the notification information when the group event occurs. 31. The method of claim 11 further comprising the steps of specifying: 1) a second event condition based on the proximity of the mobile object to another fixed or mobile object comprising at least one second object, wherein satisfaction of the second event condition causes a second event to occur and 2) checking the second level of access control based on the information access code before sending a notification information when the database management system determines based on the second event condition that the second event has occurred. 32. The method of claim 31, wherein the second object is a proximity device associated with one or more wireless proximity location information sources, the method further comprising the step of receiving a proximity location from the proximity device before determining whether the second event has occurred. 33. The method of claim 11 further comprising the steps of specifying : 1) a second event condition that is based on the mobile object's locations relative to a zone comprising a location in a reference coordinate system , wherein satisfaction of the second event condition causes a second event to occur and 2) checking the second level of access control based on the information access code before sending a notification information when the database management system determines based on the second event condition that the second event has occurred. 34. The method of claim 33 further comprising the step of receiving the mobile object's locations before determining whether the second event has occurred. 35. The method of claim 32, wherein a mobile objects comprises a GPS device, wherein the group event condition is based on the GPS device's location and the second event condition is based on the proximity of the GPS device to the proximity device. 36. The method of claim 35, wherein the proximity device comprises a Bluetooth or RFID code or NFC device. 37. The method of claim 32, wherein the mobile objects are identified by corresponding OIDs codes and second objects are identified by second OID codes (SOID codes), wherein an OID code identifies a vehicle and an SOID code identifies a proximity device associated with a driver identification code (driver ID code), wherein the event condition is based on the vehicle's location relative to a boundary and the second event is based on the proximity of the diver identified by the driver ID code to the vehicle identified by the OID code. 38. The method of claim 37, wherein the proximity device comprises an NFC device. 39. The method of claim 31, wherein the mobile object is associated with one or more wireless location information sources that provide the mobile object locations and one or more wireless proximity location information sources that provide the proximity locations of the mobile object to the second object, and wherein the group event condition is based on the mobile object locations and the second event condition is based on the proximity locations. 40. The method of claim 39, wherein a proximity location information source comprises a proximity device. 41. The method of claim 40, wherein the proximity device comprises a Bluetooth or RFID code or NFC device. 42. The method of claim 11, wherein the group event occurs based on a sequence of events specified by the authorized user, wherein the event condition is based on the mobile object locations and the sequence of events that cause the group event to occur. 43. The method of claim 11, wherein the occurrence of the group event is based on the event condition being determined by a remote computing device that provides event determination information to one or more computing devices of the database management system to determine whether the group event occurred. 44. A method that uses a wireless system having an administrator for tracking locations of a plurality of mobile objects received from one or more location information sources over a wireless location network that provides the mobile object locations to a database management system that determines which users of a plurality of users of a tracking service provider are privileged to receive notification information when events that are based on the locations of the mobile objects occur, wherein one or more users are not privileged to receive such notification information when the events occur, the method being executed in the database management system interfacing with the wireless location network and a database that identifies the plurality of the users by corresponding user identification codes and the plurality of the mobile objects by corresponding object identification codes, said method comprising the steps of: a. configuring one or more centralized or distributed servers of the tracking service provider to interface with the database management system to identify groups of users of the plurality users who the track mobile objects under at least three different levels of access control, including: i. a first level of access control of the administrator of the tracking service provider identified by an administrator ID code (AID code), the administrator having a first level of administrative privilege to control user membership in the group by specifying authorized users;ii. a second level of access control of an authorized user other than the administrator identified by an authorized user ID code (AUID code), the authorized user having a second level of administrative privilege given by the administrator to control conveyance of a notification to the group, wherein the administrator having the first level of administrative privilege does not exercise the second level of administrative privilege given to the authorized user, andiii. a third level of access control of a second user identified by a second user ID code (SUID code) specified by the authorized user identified by the AUID code before the second user receives the notification information;b. checking the first level of access control based on the AID code before identifying a group by a group ID code (GID code) that includes the authorized user, the second user and a mobile object identified by a mobile object identification code (OID code); andc. checking the second level of access control based on the AUID code before allowing the authorized user to use the second level of administrative privilege to specify 1) an event condition based on the mobile object's locations that causes a group event to occur and 2) an information access code comprising an access list that identifies one or more users who are privileged to be recipients of a notification information when the group event occurs such that any user who is not identified on the access list is not a recipient of the notification information when the group event occurs and 3) identify the SUID code on the access list; andd. determining the mobile object's locations based on the OID code;e. determining whether the group event occurred based on the event condition and the mobile object's locations; andf. checking the third level of access control based on the SUID code before sending the notification information to the second user when the group event occurs such that only identified users of the plurality of users on the access list can receive the notification. 45. The method of claim 44, wherein the second level of access control is used by the authorized user to assign a role in an organization or a security-clearance to the second user, wherein the one or more central or distributed servers are configured to interface with the database management system such that the second user is given privilege to perform one or more administrative functions that are based on the assigned role or the security-clearance. 46. The method of claim 44, wherein the second level of access control is based on the AUID code and an additional passcode conveyed to the authorized that must be entered before allowing the authorized user to perform the second set of administrative functions. 47. The method of claim 46, wherein the third level of access control is based on the SUID code and an additional passcode conveyed to the second user that must be entered before allowing the second user to receive the notification information. 48. The method of claim 44 further comprising the step of configuring one or more centralized or distributed servers to interface with the database management system based on the first level of administrative privilege for associating a location information source with the OID. 49. The method of claim 44, wherein any user without knowledge of the information access code can receive the notification information if identified on the access list.
Wright, Michael; Boucher, Peter; Nault, Gabe; Smith, Merrill; Jacobson, Sterling K.; Wood, Jonathan; Mims, Robert, Administration of protection of data accessible by a mobile device.
Chang, Hoon; Lee, Hyun-Seok; Kim, Dae-Gyun; Koo, Chang-Hoi, Apparatus and method for exchanging variable-length data according to radio link protocol in mobile communication system.
Cao, Kevin Trung; Ford, Daniel Alexander; Kraft, Reiner, Group notification system and method for implementing and indicating the proximity of individuals or groups to other individuals or groups.
MacDoran Peter F. ; Mathews Michael B. ; Ziel Fred A. ; Gold Kenn L. ; Anderson Steven M. ; Coffey Mark A. ; Denning Dorothy E., Method and apparatus for authenticating the location of remote users of networked computing systems.
Minborg, Per-{hacek over (A)}ke; Pohjanvuori, Timo, Method and apparatus for event-triggered exchange of location-based information in a communications network.
Millard,Thomas A.; Sannipoli,Charles J.; Strole,Norman C., Method and application for automatic tracking of mobile devices for computer network processor systems.
Sandhu, Kulbir S.; Fan, Roderic C.; Mleczko, David; Nguyen, Kenny; Fan, Carey, Method and system for a plurality of mobile units to locate one another.
Janis Frederick L. (Keller TX), Method and system for variable authority level user access control in a distributed data processing system having multip.
Staton,Houston; Ashley, Sr.,James; Ashley, Jr.,James; Mooney,Frank; Mooney,Patrick; Lang,Edward; Maggs,Charles; Santos,German, Method and system to configure and utilize geographical zones.
Horstemeyer,Scott A., Notification systems and methods enabling a response to cause connection between a notified PCD and a delivery or pickup representative.
Wilson Dennis A. (McHenry IL) Williamsen Mark S. (Crystal Lake IL), Peripheral data acquisition, monitor, and adaptive control system via personal computer.
Hinshaw, Foster D.; Meyers, David L.; Zane, Barry M., Programmable streaming data processor for database appliance having multiple processing unit groups.
Iverson, Timothy James; Kwong, Kai Cheung; Ju, Ken J.; Leung, Pak Chiu; Le, Son Hoanh Phuoc, Real-time positioning internet protocol method and apparatus.
Irish, Jeremy; Alvord, Elias, System and method for executing user-definable events triggered through geolocational data describing zones of influence.
Irish, Jeremy; Alvord, Elias, System and method for executing user-definable events triggered through geolocational data describing zones of influence.
Rappaport,Theodore S.; Skidmore,Roger R., System and method for indicating the presence or physical location of persons or devices in a site specific representation of a physical environment.
Schick, Louis A; Mangino, Kimberley M.; Hampson, Gregory James; Cuddihy, Paul Edward; Fera, Gregory John; Bliley, Richard Gerald; Meneses, Luis Ivan Gomez; Pierro, Michael James; Schlabach, James E.; Schneider, William Roy, System and method for managing a fleet of remote assets.
Meadows, Vernon; Harper, Michael S., System and method for monitoring the location of individuals via the world wide web using a wireless communications network.
Meadows,Vernon; Harper,Michael S., System and method for monitoring the location of individuals via the world wide web using a wireless communications network.
Moore,Timothy M.; Huitema,Christian; Eydelman,Vadim; Venable, Sr.,Jeffrey C., System and methods for providing physical location information and a location method used in discovering the physical location information to an application on a computing device.
Zhou, Peter Y.; Pang, Dexing; Tong, Yiu-Cho Alan; Lin, Ning; Addington, David Ralph; Albanna, Rowena Lampa; Albanna, Amro; Bolton, Keith I., System for localizing and sensing objects and providing alerts.
Wilson,Brian; Bhuyan,Krishna; Feinstein,Jacob, System for providing location-based services in a wireless network, such as modifying locating privileges among individuals and managing lists of individuals associated with such privileges.
Uhlmann, Eugenie V.; O'Farrell, Desmond J.; Schofield, Kenneth; Lynam, Niall R., Vehicle-based navigation system with smart map filtering, portable unit home-base registration and multiple navigation system preferential use.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.