`Approved for use through 04/30/2003. OMB 0651-0031
`
`7302PTO60/542.208
`
`.lllllllllllllllllllliilllilllllllliilli020404
`
`FEBRUARY 4, 2004
`RAYMOND D FAST
`
`NOT YET ASSlGNED
`
`‘
`
`
`
`
`TRANSMITTAL
`FORM
`
`Application Number .
`
`.
`
`
`
`Filing Date
`First Named Inventor
`
`(to be used for all correspondence after initial filing)
`
`Ari Unit
`
`
`
`lllllliililiiiiilllllllu
`
`IV
`A
`
`3
`. Total Number of Pages in This Submission '
`
`E"a"“"e' Name
`
`Attorney Docket NUITIDBT
`
`NOT YET ASSIGNED
`GUMMS_57435
`
`After Allowance Communication
`to a Technology Center (TC)
`Appeal Communication to Board
`of Appeals and interferences
`Appeal C
`ommunicatidic
`(Appeal Notice, Brief, Reply Brief)
`
`Proprietary information
`
`Status Letter
`
`Other Enciosure(s) (please
`Identify below):
`POSTCARD
`
`Fee Transmittal Form
`
`Fee Attached
`
`Amendment/Reply
`El After Final
`
`’ Affidavits/declaration(s)
`
`Licensing-related Papers
`
`Petition
`Petition to Convert to a
`Provisional Application
`Power of Attorney, Revocation
`Change of Correspondence Address
`
`Extension of Time Request
`
`Terminal Disciaimer
`
`Requesi f°" Re-f“"d
`CD, Number of CD(s)
`Remarks
`
`PROVlSlONAL APPLICATION
`
`Express Abandonment Request
`information Disclosure Statement
`
`Certified Copy of Priority
`Document(s)
`
`Response to Missing Partsl
`incomplete Application
`
`Response to Missing Parts
`under 37 CFR 1.52 or 1.53
`
`SIGNATURE OF APPLICANT, ATTORNEY, OR AGENT
`FULWIDER PATTON LEE & UTECHT, LLP
`ELLSWORTH R. ROSTON, ESQ, REG. N0. 16,310
`
`Firm
`or
`individual
`I
`-
`-u ..u £.£.—ax:~
`
`CERTIFICATE OF TRANSMISSION/MAILING
`
`
`
`
`
`I hereby cenlfy that this correspondence is being facsimile transmitted to the USPTO or deposited with the United
`first class mail in an envelope addressed to: Commissioner for Patents, Washington, DC 20231 on this date:
`
`Typed or printed
`-
`Signature
`0
`
`ELLSWORTH R. ROSTON. REG. NO. 16,310
`'-
`O
`‘Lib
`
`a
`
`
`
`. _
`' -
`-
`.
`02/04/2004
`
`- n '
`
`- . a
`
`fficient postage as
`
`02/04/2004"
`
`Date
`
`This collection of information is required by 37 CFR 1.5. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO to
`process) an application. Confidentiality is governed by 35 U\.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 12 minutes to complete, including
`gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments on the
`amount of time you require to complete this form and/or suggestions ’for*reducing this burden, should be sent to the Chief information Officer, US. Patent and
`Trademark Office. U.S. Department of Commerce, Washington, DC 20231. DO NOT SEND FEES OR COMPLETED FORMS TO THIS ADDRESS. SEND TO:
`Commissioner for Patents, Washington, DC 20231.
`~
`
`If you need assistance in completing the form, call 1-800-PTO-9199 (1-800- 786-9199) and select option 2.
`
`1A
`
`TELETRAC Ex. 1004
`TELETRAC Ex. 1004
`
`1
`
`
`
`PTO/SB/17 (10-03)
`Approved for use through 07/31/2006. OMB 0651-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`-- ,' Paen/vork Reduction Act of 1995 no ersons are reuired to resond to a collection of information unless it disla s a valid OMB control number.
`
`if Known
`Complet
`NEW APPLICATION
`FEBRUARY 5, 2004
`RAYMOND 0- FAST
`NOT YET ASSIGNED
`NOT YET ASSIGNED
`GUMMS-67436
`
`
`
`
`
`
`
`r
`
`
`
`
`for FY 2004
`
`7 Effective 10/01/2003. Patent fees are subject to annual revision.
`
`
`
`
`
`
`
`
`
`
`
`
`
`1805 1,840‘ Requesting publication of SIR after
`Examiner action
`
`
`
`
`
`
`Money
`Order
`
`3 Other D None
`
`06-2425
`
`E Check D Credit card 3
`D Deposit Account:
`,
`Deposit
`Account
`Number
`Deposit
`Account
`FULWHDER PAT1-ON, et aL
`Name
`The Director Is authorized to: (check all that apply)
`Dcharge fee(s) indicated below
`Credit any overpaymems
`Charge any additional fee(s) or any underpayment of fee(s)
`Dcharge fee(s) indicated below, except for the filing fee
`to the above-identified deposit account.
`FEE CALCULATION
`1. BASIC FILING FEE
`
`
`
`
`
`
`
`
`
`
`
`
`1001 770
`
`2002 170
`' 1002 340
`
`1003 530
`2003 265
`
`
`1004 770
`2004 335
`
`1005 150
`2005
`30
`
`1'‘.
`
`FEE CALCULATION (continued)
`
`
`3. ADDITIONAL FEES
`
`Lar e Enti
`Small Enti
`Fee Fee
`Fee
`Fee
`
`
`
`code (3)
`code (3)
`Fee Description
`.
`
`1051
`2051
`65 Surcharge - late filing fee or oath
`130
`
`
`_
`-
`-
`~
`
`2052
`50
`1052
`25 (S(i,i‘iI’gh:i;g:et late provisional filing fee or
`.
`.
`.
`
`
`_
`1053
`1053
`130
`130 :°nt:|E_ng“sh specltffanon
`rt
`_
`
`1812 2,520 1812 2,520
`or iing a reques or expa e reexamination
`
`1804
`920‘ 1804
`920‘ Requesting publication of SIR prior to
`
`
`Examiner action
`
`
`
`1805 1 .840‘
`
`
`
`
`
`
`
`
`1 10
`1251
`55 Extension for reply within first month
`2251
`
`
`
`1252
`420
`210 Extension for reply within second month
`2252
`
`1253
`950
`475 Extension for reply within third month
`2253
`
`1254
`1,480
`Fee Paid
`Fee Description
`740 Extension for reply within fourth month
`2254
`
`
`1255
`2,010
` 2255 1,005 Extension for reply within fifth month
`Utility filing fee
`
`
`
`1401
`330
`Design filing fee
`2401
`155 Notice of Appeal
`
`1402
`330
`pgant fifing fee
`2402
`165 Filing a brief in support of an appeal
`
`
`1403
`290
`Reissue filing fee
`2403
`145 Relillesi 10' 0'3‘ hearing
`
`1451 1,510
`provisionai fiiing fee
`1451
`1,510 Petition to institute a public use proceeding
`2452
`1452
`55 Petition to revive - unavoidable
`
`SUBTOTAL <1)
`2453
`1453
`665 Petition to revive - unintentional
`
`
`
`, 2. EXTRA CLAIM FEES FOR UTILITY AND REISSUE
`1501 1,330
`2501
`665 Utility issue fee (or reissue)
`Fee from
`Extra claims & Fee Paid
`1502
`480
`2502
`240 Design issue fee
`|T°J3'C'3dl'“$‘ I: -20" = Z X E 1503
`640
`2503
`320 Plant issue fee
`
`,,,_
`n e en en
`Clainas E '3 T E XEE 1460
`130
`1460
`130 Petitions to the Commissioner
`
`I
`M I
`'
`l D
`d
`t
`I:C 1807
`50
`“We em" e"
`1807
`50 Processing fee under 37 CFR1.17(q)
`
`2
`Fee Descri Ho
`1806
`180
`8021
`40
`
`.
`.
`.
`Claims in excess of20
`
`1809
`770
`_
`_
`
`Independent claims in excess of 3
`2203 145 Multiple dependent claim. if not Paid
`2204
`43 " Reissueindependent claims
`over original patent
`" Reissue claims in excess of 20
`an over ongina pa en
`
`.
`
`I
`
`_‘
`2
`
`.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`.
`.
`180 Submission of infonnation Disclosure Stmt
`40 Reoordingeach patent assignment per
`property (times number of properties)
`__
`.
`_
`_
`_
`385 Filing a submission after final rejection
`(37 CFR 1129(3))
`385 For each additional invention to be ‘
`exa”""ed (37 CFR 1'129(b))
`385 Request for Continued Examination (RCE)
`900 Reqéiest for exlpedtited examination ‘
`0 a esign app ica ion
`
`
`
`
`
`2810
`770
`1310
`2801
`770
`1801
`1302
`1302
`900
`
`Other fee (specify)
`
`SUBTOTAL (2)
`
`
`‘Reduced by Basic Filing Fee Paid
`aid, if reater; For Reissues, see above
`
`
`(C°mPleie ('73Pfl/1'C8b'9))
`SUBMIED BY
`Telephone 310-824-5555
`I ELLSWORTH R. ROSTON‘
`02/04/2004
`...€
`WARNING: Information on this form may become public. Credit card information should not
`be included on this form. Provide credit card information and authorization on PTO-2038.
`This collection of information is required by 37 CFR 1.17 and 1.27. The information is required to obtain or retain a benefit by the public which is to tile (and by the
`USPTO to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 12 minutes to complete.
`including gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments on
`the amount of time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief lnforrnation Officer. U.S. Patent and
`Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THIS ADDRESS.
`SEND TO: Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`
`SUBTOTAL (3)
`
`
`
`
`
`10,310
`
`If you need assistance in completing the form. call 2800-PTO-9199 and select option 2.
`
`-
`
`1806
`8021
`
`2809
`
`
`
`
`I1
`
`
`
`
`
`
`
`1203 290
`1204
`as
`
`1205
`
`18
`
`
`
`
`
`
`2205
`
`9
`
`2
`
`
`
`
`
`PROVISIONAL APPLICATION
`
`of
`
`RAYMOND D. FAST
`
`Surrey, BC V3R 056
`
`ROBERT R. GOEHRING
`
`Vancouver, BC V62 3A5
`
`KAI LOON NG
`
`Vancouver, BC V5R 6C5
`
`for
`
`UNITED STATES LETTERS PATENT
`
`on
`
`SYSTEM FOR, AND METHOD OF, MONITORING THE MOVEMENTS
`OF MOBILE ITEMS
`
`Client Docket No.: GUMMS-67436
`
`Sheets of Drawings: Twenty-One (21): (Figs. 1-22)
`[40451.1]
`
`Attorneys
`FULWIDER PATTON LEE & UTECHT, LLP
`Howard Hughes Center
`‘
`6060 Center Drive, Tenth Floor
`Los Angeles, California 90045
`
`EXPRESS MAIL NO. EV 327064348US
`
`3
`
`
`
` V‘ STEM FOR, AND METHOD OF, MONITORING THE MOVEMENTS
`
`OF MOBILE ITEMS
`
`This is a provisional application listing Raymond D. Fast, Robert R. Goehring and Kai
`
`5
`
`Loon Ng as inventors, for a System for, and Method of, Monitoring the Movements of Mobile
`
`Items.
`
`4
`
`
`
`IN THE DRAWINGS:
`
`Figure 1 is a schematic diagram of hardware in a system constituting this invention for
`
`monitoring the movement items under the control of beacons coupled to the items;
`
`Figure 2 is another schematic diagram of the hardware shown in Figure 1;
`
`Figure 3 is a schematic diagram of software architecture in the system;
`
`Figure 4 is a flow chart on an overview basis of a beacon controller interface included in
`
`the system;
`
`Figure 5-8 are flow charts showing the operation of the beacon controller interface in
`
`additional detal;
`
`10
`
`Figure 9, 10 and 10a are graphs showing the operation of the beacon controller interface
`
`in the system;
`
`Figures 11 and 12 are flow charts showing the operation of a scenario manager in the
`
`system;
`
`Figure 13 is a logic flow chart showing the operation of a guardian administration module
`
`15
`
`in the system;
`
`Figure 14 is a logic flow chart showing the operation of a partner, dealer portal in the
`
`system;
`
`Figure 15 is a logic flow chart showing the operation of an incident handling in the
`
`system;
`
`20
`
`Figure 16 is a logic flow chart showing the operation of an incident handling in the
`
`system;
`
`Figure 17 is a flow chart showing the operation of a recovery interface in the system;
`
`Figure 18 is an illustrative map of an area where the recovery interface is operating to
`
`recover an item (e.g., child) who may have wandered outside of a prescribed zone;
`
`1a5
`
`Provisional -Application
`
`5
`
`
`
`Figure 19 is a flow chart‘ showing the interrelationship between the various flow charts
`
`shown in the previous Figures;
`
`Figure 20 is a schematic diagram showing the operation of the beacon controller interface
`
`under the control of the Guardian Monitoring System in controlling the operation of a number of
`
`different beacons;
`
`Figure 21 is a chart indicating a plurality of individual symbols for providing different
`
`operations in the system, these individual symbols being provided in the flow charts specified
`
`above; and
`
`Figure 22 is a schematic diagram showing the interrelationship betweengthe Guardian
`
`10
`
`Mobile Monitoring System (GMMS), individual partners, individual dealers and individual
`
`subscribers in monitoring mobile items in accordance with the flow charts shown in the previous
`
`Figures.
`
`lb
`
`Provisional Application
`
`6
`
`
`
`GMMS System and Software Architecture
`
`Overview .
`There has never before been a system that performs the functions of the GMMS system.
`It is a machine consisting of many components and the system’s unique functionality is
`provided by the combination of the interconnected components and the software that ties
`them together.
`
`The combination of components is referred to as the network. The GMMS network
`actually includes the integration of several separate networks such as wireless
`communications networks, the Internet, and the Public Switched Telephone Network
`(PSTN).
`
`The GMMS system software can best be understood by describing two different aspects,
`the architecture and the applications. The architecture is the design of the structure of the
`sofiware, which allows it to tie together the various components of the network and to
`allow the various functions, or applications, that control those components to be created.
`
`This document first discusses the unique interconnection of components that create the
`GMMS network. It then describes the unique software architecture, and finally it
`describes some the functionality of the applications provided by the system. There are
`additional GMMS documents that describe severalspecific modules of the software that
`provide unique fiinctionality.
`
`7
`
`
`
`-Objectives of the GMMS system
`The GMMS system provides a complete, easy and novelmethod for enabling existing
`companies, or new companies, to offer mobile security services. The system can
`remotely enable many and various companies to offer the mobile security services
`simultaneously. Even though they are all accessing the same GMMS system, each
`company can offer its own service packages, bill for its own account types, display its
`own brand, and securely maintain its own data.
`
`The business process created by the system allows customers to buy monitored mobile
`security services from their security company. The services provide security for mobile
`objects in a manner very similar to the way they are provided for fixed structures, namely
`that the security company has operators available at all times to assist with security
`related issues. The primary form of assistance is typically to dispatch police, fire,
`ambulance, or rescue personnel to the location of the emergency. An additional form of
`assistance is to notify the owner or manager of the structure about the emergency,
`enabling them to make arrangements for repairs, etc.
`A
`
`In a traditional monitored security system (for stationary objects) the security company’s
`operators are alerted automatically upon various events that would be considered alarm
`conditions. For the security system of a stationary structure this would include such
`things as detecting the opening or breaking of a window or door, detecting motion in a
`building that is supposed to be unoccupied, detecting fire, gas, water or some other
`unwanted substance.
`
`For a monitored security system for mobile objects the monitoring station operators are
`alerted if a panic button is activated, an object is not where it was specified to be at a -
`given time, an object is moving at a velocity greater than it was specified to be moving,
`triggering of any sensor attached to the mobile monitoring device is detected, or
`tampering with the mobile monitoring device itself is detected. In all cases the mobile
`device, a component of the GMMS systems called a beacon, provides the operator with
`its present location.
`-
`
`A key component to enabling the security company to provide the required assistance for
`these mobile security situation is for the system to provide the location of the mobile
`object. Another key component is the means to notify the appropriate personnel with the
`appropriate information, either automatically or manually. The GMMS system provides
`several means of enabling these for mobile applications.
`'
`
`Benefits of the GMMS System
`Because of the structure of the GMMS system, its fimctionality can be upgraded
`simultaneously for all its users, without their intervention. Updates may include new
`wireless network access, availability of new beacon types, new location technologies,
`new map data, or any new software features and functions.
`
`_
`
`2A
`
`8
`
`
`
`Definitions
`
`The following are definitions of terms as they are used throughout this document.
`
`GMMS
`
`The Guardian Mobile Monitoring System — not the company called
`
`Guardian Mobile Monitoring Systems, Inc.
`
`Partner
`
`A company that has a business relationship with Guardian Mobile
`
`Monitoring Systems, Inc. and is enabled by the GMMS to provide
`
`wholesale and retail mobile security services. Partners generally
`
`operate a security alarm monitoring station, but could be other
`
`business entities as well.
`
`Dealer
`
`A company that is enabled by the GMMS, either directly or
`
`through a Partner, to provide retail mobile security services.
`
`Subscriber
`
`The person or company that is the consumer or end-User of mobile
`
`security services.
`
`Monitoring Station
`
`A station, such as one operated by a security alarm monitoring
`
`company, typically staffed 24 hours per day by operators who
`
`watch for incoming alarm signals and manage security incidents as
`
`necessary.
`
`Beacon
`
`A locatable wireless device. A beacon consists of a location
`
`Item
`
`Guardian
`
`determining equipment, a communications modem, and a
`processor that executes commands.
`
`Anything or anyone that carries or has a Beacon attached
`
`An individual who is assigned by a Subscriber to have temporary
`
`responsibility for an Item.
`
`9
`
`
`
`~:.\
`
`Entity
`
`User
`
`Any destination within the GMMS or accessible by the GMMS
`
`where a message can be sent.
`
`Anyone who can access the GMMS via any of its Portals or User
`
`interfaces.
`
`Wireless Carrier
`
`Companies that operate mobile phone systems. Examples are
`
`AT&T Mobile, Verizon, Sprint PCS, T-Mobile, Cingular, NexTel,
`
`Bell Mobility and Microcell.
`
`Wireless Technology
`
`The standards implemented in wireless communications networks.
`
`Examples are :
`
`AMPS (Advanced Mobile Phone System)
`
`TDMA (Time Division Multiple Access)
`
`GSM (Global System for Mobile communications)
`
`CDMA (Code Division Multiple Access)
`
`iDEN (integrated Digital Enhanced Network)
`
`GPRS (General Packet Radio Service)
`
`Location Technology
`
`The technology used in wireless devices such as Beacons and
`
`Tracking Terminals to determine their geographic location.
`
`Examples are the Global Positioning System (GPS) and Hybrid
`
`Assisted GPS (HA-GPS) systems such as gpsOne"" designed by
`
`Qualcomm and deployed in several wireless networks such as
`
`Sprint PCS and Verizon.
`
`Wireless Gateway
`
`The equipment that controls access into wireless networks from
`
`outside wireline networks. In order for the GMMS to
`
`communicate with a Beacon it must generally gain access to the
`
`wireless network through the wireless carrier’s gateway.
`
`10
`
`10
`
`
`
`PDE
`
`A special server called Position Determining Equipment used in
`
`conjunction with certain location technologies such as gpsOne"”.
`
`The PDE communicates with gpsOne enabled mobile phone
`
`handsets and Beacons to assist them in determining their position.
`When a PDE is used as a component of the location technology of
`
`a Beacon, the GMMS communicates with the PDE rather than the
`
`Beacon itself to determine the Beacon’s location.
`
`Wireline Networks
`
`Networks such as the PSTN and the Internet that are generally
`
`operated via wired connections as opposed to wireless.
`
`PSTN
`
`The Public Switched Telephone Network
`
`11
`
`11
`
`
`
`The GMMS system can be used either as a stand-alone system or integrated with other
`, systems in an existing business. As a stand-alone system it is a tum-key platform on
`which to operate a mobile security service. For companies already in the security
`business, the GMMS system also has the ability to integrate with several business
`systems they may be using and may wish to have integrated. These business systems are
`typically c1ient—server applications running on servers located on the companies’
`premises. One such system is the “Automation System” used by security alarm
`monitoring stations to automate the process of handling alarms associated with buildings
`that they monitor. The GMMS system can integrate into these automation systems
`regardless of which system it is or where it is located. Other examples of business
`systems that may require integration with the GMMS system are: customer databases,
`billing systems, inventory management systems, and customer relationship management
`systems. The GMMS system can also integrate with any of these various systems.
`
`The GMMS system provides for access by four categories of users: system
`administrators, operators, subscribers, and rescue personnel. All users access the system
`via the Internet using web browsers running on either fixed or mobile computing devices.
`Operators’ access to the system is mandatory because its functions are utilized every time
`the service provider is involved in providing any component of the service. It is a feature
`of the GMMS system’s design that Subscribers have the option of using the web interface
`or not. Subscribers are each given access to a dedicated portal that offers many self-serve
`functions and preference settings, but subscribers may not have Internet access, may not
`be interested, or may not be capable of using them. They may instead choose to call their
`service provider and have an operator perform all the tasks for them. Rescue personnel
`are the private or public safety officers that may be involved in performing a rescue, a
`recovery, or resolving an incident. These personnel can be given temporary, limited
`access to certain features of the GMMS system for the duration of an incident.
`
`One of the primary advantages of the GMMS system is its ability to utilize various
`wireless networks and various wireless location technologies. This means that the mobile
`security service providers can offer a greater variety of beacon types, and have a greater
`chance of offering a service with good wireless coverage in their region. Since the
`mobile security services can also be provided to users of locatable handsets (wireless
`telephones) it means that service providers have a greater range of existing wireless
`customers to offer services to. Some wireless location technologies are independent of
`the wireless network, but some are integrated into the wireless network itself. The
`GMMS system provides the flexibility to work with any of these situations. Another
`fundamental benefit of this structure is the ability to quickly adapt to any new wireless
`network technologies or location technologies as they are developed in the future.
`
`A fundamental benefit of the GMMS system is its ability to enable many mobile security
`service providers through a single system. Security and privacy of each service
`provider’s data is ensured through what is called the multi-tenant architecture of the
`system. (More detail of this is provided in the Software Architecture section.) A benefit
`of aggregation of users is the sharing of resources, resulting in cost savings. This is
`typical of any ASP (enabling all users through centralized servers) but the GMMS system
`
`6
`
`12
`
`12
`
`
`
`has additional features. It also aggregates all users’ traffic on the wireless networks in the
`system, facilitating bulk buying, resulting in further cost savings. The GMMS system
`also automates some of the account management functions particular to the needs of
`mobile security service providers. (More detail on this is provided in the operator’s portal
`section.) This automation reduces the account management burden on the wireless
`carrier, and the resulting increase in efficiency allows them to provide better pricing.
`
`A major component of the GMMS system is the server network. This is the network that
`interconnects the various servers in the data center, and interconnects the servers with the
`external networks and devices. The following objectives are met by creating the server
`network architecture that is disclosed in this document:
`
`0 Performance
`
`Multiple webservers and application servers are deployed to allow optimum usage
`of resources, which in turn optimizes the performance of the system.
`
`0 Availability
`All layers in the server network have redundancy built in, ensuring that the system
`provides maximum availability.
`
`0
`
`_ 0
`—
`
`Security
`A secure network is ensured through the application of three disciplines - the use
`of firewalls to lock down all unused ports, the use of SSL between browsers and
`the servers, and the constant update of sofiware security patches in the server
`operating systems and applications.
`
`Scalability
`Additional servers can be added to the webserver farm or the application server
`cluster to support higher volumes of users without having any impact on the
`existing services.
`
`0 Reliability
`Redundancy built into all layers of the network ensures the reliability of the
`system. In addition, the System Health Monitor provides constant automated
`checking to ensure the reliability of the system.
`
`0 Extensibility
`The architecture utilized by GMMS has been designed to be extensible, providing
`the ability to add and extend the features and fimctions within the system without
`requiring significant changes to the underlying network architecture.
`
`13
`
`13
`
`
`
`Structure of the‘f}MMS System
`The GMMS system is essentially a large, distributed machine comprising several sub-
`systems, namely: ASP servers, ASP sofiware applications, beacons, wireless data '
`communications networks, wirelessplocation systems, users’ terminals, computer-
`telephony-integration equipment, a system health monitor, the public switched telephone
`network, and the Internet.
`
`Deployment
`The system is deployed as an Application Service Provider (ASP) meaning that the
`servers are installed in a secure data center in a central location, or redundant i
`locations, and all applications are accessible electronically from anywhere. Users of
`the system need only a web browser to access all the applications; however, in some
`cases a thin client application may be installed on certain users’ terminals to enhance
`the speed and usability of the system.
`'
`
`Full redundancy is created by deploying a set of servers in at least two data centers,
`widely separated geographically, with automatic failover should one of the data
`centers experience a complete failure.
`
`It is possible to deploy many separate instances of the GMMS system. This would be ‘
`done in cases where service providers want exclusive use of a set of servers, perhaps
`housing them on their own premises. These constitute a licensed installation rather
`than ASP. In these cases, the multi-tenant features are disabled because they are
`unnecessary.
`
`Figures 1' and 2 show the system hardware. The different components in the system
`shown in Figures 1 and 2 have identical numerical designations which are indicated
`below. A discussion as to the construction and operation of each of these numerically
`identified components is provided below.
`
`A
`Wireless Location'SyTtéffis such as GPS (1)
`The GMMS system uses wireless location as a standard component of its
`fimctionality. Because the system is designed for wide area use, and because wireless
`communications between beacons and servers is an additional requirement, location
`systems designed for mobile phone networks are generally utilized.
`
`Mobile phone location technologies fall into three broad categories: handset—based,
`network-based, and hybrid. Handset-based location technologies require that beacons
`have stand-alone location fimctionality. A system such as GPS is typical of this
`category. Network-based location technologies typically use signals generated by the
`network to calculate location based on triangulation from several communications
`antenna towers. These technologies, such as TDOA, EOTD and AFLT, do not
`require any special functionality within the handset — they can theoretically determine
`the location of any mobile device that is capable of communicating via the network.
`Hybrid location technologies such as gpsOne (a wireless location technology from
`Qualcomm) incorporate both network and handset functionality to provide the
`accuracy of GPS with the signal strength of the terrestrial wireless network.
`
`The GMMS system is designed to utilize any of the above location technologies and
`can readily be adapted to any new location technologies as they are developed.
`
`14
`
`14
`
`
`
`0 Wireless Data Communications Networks (2)
`The GMMS system provides integration with various wireless communications
`networks, which are used for communications between the servers and all of the
`beacons and tacking terminals. Communications is typically data only, but may
`include voice and/or video.’ There are many systems and technologies used in
`wireless communications networks, and the GMMS system is capable of interfacing
`with any of them. More information as to how this is accomplished is provided in the
`software architecture description.
`
`Communications between the GMMS servers and the location networks is typically
`done through the open webservices standards, which use the HTTP/HTTPS ports.
`For the GMMS system it is necessary to have communications in both directions --
`both from the servers to the beacons and vice-versa. Messages are passed from the
`servers to the Beacons for many purposes. The following are examples of messages
`that will be sent to GMMS beacons:
`
`Transmit your present location, altitude and velocity
`Enter tracking mode
`
`Disable ignition
`
`Enable ignition
`Set geofence zone parameters
`Set speed notification parameters
`Unlock door
`
`Activate audible alarm
`
`Enable microphone and transmit audio
`Transmit the status of your battery’s charge
`Your request for assistance has been received
`Activate vibrating notification
`
`The following are examples of messages that will be received from GMMS
`beacons:
`
`0
`
`Panic button activated
`
`Zone violation detected
`
`Speed violation detected
`
`Door opened
`Vehicle engine started
`Vehicle engine turned off
`Physical tampering detected
`Electronic Tampering detected
`Battery needs recharging
`
`Battery energy is dangerously low
`Tremble circuit detects motion
`
`Arm Here (set my present location as my allowed zone till disarmed)
`
`15
`
`15
`
`
`
`Beacons (9)
`Beacon is the term used to generically describe any locatable wireless device within
`the GMMS network.
`
`A beacon typically contains both a wireless location determining module and a
`wireless communications module. The location determining module will typically be
`a GPS receiver, which has the ability to calculate its own geographic position based
`on signals it receives from satellites. The communications module provides the
`ability for the GMMS software applications and the beacon to communicate with
`each other, including the ability for an application to query a beacon for its location.
`
`The location technology associated with some wireless networks may perfonn the
`location calculations outside of the beacon. This is done either as a completely
`network centric location technology or as a hybrid of functionality in the beacon and
`in the network. In these cases the GMMS applications communicate with the location
`servers at the wireless_ networks to determine beacon locations.
`
`Beacons are designed for various purposes and various installations so they have
`various form factors and interconnection ports. A beacon may be designed to be
`carried or worn by a person or attached to an object. In that case it would typically be
`a self-contained unit with integral antennas and battery. Other beacons are designed
`for use in vehicles. These may have integral or external antennas, and would ofien
`have connection ports for linking into various vehicle fiinctions. Another type of
`beacon is one that is designed for integration into some form of product. This may be
`just a small electronic module where only the location and communications fimctions
`are provided. Electrical power may be provided by the product that the beacon is
`being incorporated into.
`
`In addition to location, the communications function of the beacon may be used to
`provide various other communications between the GMMS sofiware applications and
`the beacon itself, or devices attached to the beacon. Examples of external devices are-
`such things as panic button switches, vehicle power door locks, motion sensors,
`vehicle ignition disable relays, etc.
`
`The GMMS system is designed to integrate with various beacons regardless .of which
`location technology they incorporate, which wireless communications technology
`they use, or what functions they provide besides location.
`"
`
`Handsets (8)
`Many wireless communications networks offer handsets that incorporate, or are
`compatible with, some form of location technology. This makes the handsets a viable
`form of beacon for use with the GMMS system. Because of this, mobile security
`service providers can offer their services to any users of compatible handsets.
`
`Whether locatable or not, subscribers to the system may use wireless handsets for
`receiving notifications from the system or for communicating with operators at the
`
`10
`
`16
`
`16
`
`
`
`service providers’ monitoring stations. Notifications to the handsets_can be in the
`form of text messages, automated voice recordings, or calls from operators.
`
`GPS Signals (3)
`The GMMS system in not limited to GPS as a location technology, but GPS is the
`most prevalent wireless locations system in use today. GPS signals are transmitted by
`the constellation of Globalstar satellites for the purpose of global positioning and
`navigation. GPS receivers detect these signals and de