throbber
PTO/SB./21 (0303)
`Approved for use through 04/30/2003. OMB 0651-0031
`
`7302PTO60/542.208
`
`.lllllllllllllllllllliilllilllllllliilli020404
`
`FEBRUARY 4, 2004
`RAYMOND D FAST
`
`NOT YET ASSlGNED
`
`‘
`
`
`
`
`TRANSMITTAL
`FORM
`
`Application Number .
`
`.
`
`
`
`Filing Date
`First Named Inventor
`
`(to be used for all correspondence after initial filing)
`
`Ari Unit
`
`
`
`lllllliililiiiiilllllllu
`
`IV
`A
`
`3
`. Total Number of Pages in This Submission '
`
`E"a"“"e' Name
`
`Attorney Docket NUITIDBT
`
`NOT YET ASSIGNED
`GUMMS_57435
`
`After Allowance Communication
`to a Technology Center (TC)
`Appeal Communication to Board
`of Appeals and interferences
`Appeal C
`ommunicatidic
`(Appeal Notice, Brief, Reply Brief)
`
`Proprietary information
`
`Status Letter
`
`Other Enciosure(s) (please
`Identify below):
`POSTCARD
`
`Fee Transmittal Form
`
`Fee Attached
`
`Amendment/Reply
`El After Final
`
`’ Affidavits/declaration(s)
`
`Licensing-related Papers
`
`Petition
`Petition to Convert to a
`Provisional Application
`Power of Attorney, Revocation
`Change of Correspondence Address
`
`Extension of Time Request
`
`Terminal Disciaimer
`
`Requesi f°" Re-f“"d
`CD, Number of CD(s)
`Remarks
`
`PROVlSlONAL APPLICATION
`
`Express Abandonment Request
`information Disclosure Statement
`
`Certified Copy of Priority
`Document(s)
`
`Response to Missing Partsl
`incomplete Application
`
`Response to Missing Parts
`under 37 CFR 1.52 or 1.53
`
`SIGNATURE OF APPLICANT, ATTORNEY, OR AGENT
`FULWIDER PATTON LEE & UTECHT, LLP
`ELLSWORTH R. ROSTON, ESQ, REG. N0. 16,310
`
`Firm
`or
`individual
`I
`-
`-u ..u £.£.—ax:~
`
`CERTIFICATE OF TRANSMISSION/MAILING
`
`
`
`
`
`I hereby cenlfy that this correspondence is being facsimile transmitted to the USPTO or deposited with the United
`first class mail in an envelope addressed to: Commissioner for Patents, Washington, DC 20231 on this date:
`
`Typed or printed
`-
`Signature
`0
`
`ELLSWORTH R. ROSTON. REG. NO. 16,310
`'-
`O
`‘Lib
`
`a
`
`
`
`. _
`' -
`-
`.
`02/04/2004
`
`- n '
`
`- . a
`
`fficient postage as
`
`02/04/2004"
`
`Date
`
`This collection of information is required by 37 CFR 1.5. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO to
`process) an application. Confidentiality is governed by 35 U\.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 12 minutes to complete, including
`gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments on the
`amount of time you require to complete this form and/or suggestions ’for*reducing this burden, should be sent to the Chief information Officer, US. Patent and
`Trademark Office. U.S. Department of Commerce, Washington, DC 20231. DO NOT SEND FEES OR COMPLETED FORMS TO THIS ADDRESS. SEND TO:
`Commissioner for Patents, Washington, DC 20231.
`~
`
`If you need assistance in completing the form, call 1-800-PTO-9199 (1-800- 786-9199) and select option 2.
`
`1A
`
`TELETRAC Ex. 1004
`TELETRAC Ex. 1004
`
`1
`
`

`
`PTO/SB/17 (10-03)
`Approved for use through 07/31/2006. OMB 0651-0032
`U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`-- ,' Paen/vork Reduction Act of 1995 no ersons are reuired to resond to a collection of information unless it disla s a valid OMB control number.
`
`if Known
`Complet
`NEW APPLICATION
`FEBRUARY 5, 2004
`RAYMOND 0- FAST
`NOT YET ASSIGNED
`NOT YET ASSIGNED
`GUMMS-67436
`
`
`
`
`
`
`
`r
`
`
`
`
`for FY 2004
`
`7 Effective 10/01/2003. Patent fees are subject to annual revision.
`
`
`
`
`
`
`
`
`
`
`
`
`
`1805 1,840‘ Requesting publication of SIR after
`Examiner action
`
`
`
`
`
`
`Money
`Order
`
`3 Other D None
`
`06-2425
`
`E Check D Credit card 3
`D Deposit Account:
`,
`Deposit
`Account
`Number
`Deposit
`Account
`FULWHDER PAT1-ON, et aL
`Name
`The Director Is authorized to: (check all that apply)
`Dcharge fee(s) indicated below
`Credit any overpaymems
`Charge any additional fee(s) or any underpayment of fee(s)
`Dcharge fee(s) indicated below, except for the filing fee
`to the above-identified deposit account.
`FEE CALCULATION
`1. BASIC FILING FEE
`
`
`
`
`
`
`
`
`
`
`
`
`1001 770
`
`2002 170
`' 1002 340
`
`1003 530
`2003 265
`
`
`1004 770
`2004 335
`
`1005 150
`2005
`30
`
`1'‘.
`
`FEE CALCULATION (continued)
`
`
`3. ADDITIONAL FEES
`
`Lar e Enti
`Small Enti
`Fee Fee
`Fee
`Fee
`
`
`
`code (3)
`code (3)
`Fee Description
`.
`
`1051
`2051
`65 Surcharge - late filing fee or oath
`130
`
`
`_
`-
`-
`~
`
`2052
`50
`1052
`25 (S(i,i‘iI’gh:i;g:et late provisional filing fee or
`.
`.
`.
`
`
`_
`1053
`1053
`130
`130 :°nt:|E_ng“sh specltffanon
`rt
`_
`
`1812 2,520 1812 2,520
`or iing a reques or expa e reexamination
`
`1804
`920‘ 1804
`920‘ Requesting publication of SIR prior to
`
`
`Examiner action
`
`
`
`1805 1 .840‘
`
`
`
`
`
`
`
`
`1 10
`1251
`55 Extension for reply within first month
`2251
`
`
`
`1252
`420
`210 Extension for reply within second month
`2252
`
`1253
`950
`475 Extension for reply within third month
`2253
`
`1254
`1,480
`Fee Paid
`Fee Description
`740 Extension for reply within fourth month
`2254
`
`
`1255
`2,010
` 2255 1,005 Extension for reply within fifth month
`Utility filing fee
`
`
`
`1401
`330
`Design filing fee
`2401
`155 Notice of Appeal
`
`1402
`330
`pgant fifing fee
`2402
`165 Filing a brief in support of an appeal
`
`
`1403
`290
`Reissue filing fee
`2403
`145 Relillesi 10' 0'3‘ hearing
`
`1451 1,510
`provisionai fiiing fee
`1451
`1,510 Petition to institute a public use proceeding
`2452
`1452
`55 Petition to revive - unavoidable
`
`SUBTOTAL <1)
`2453
`1453
`665 Petition to revive - unintentional
`
`
`
`, 2. EXTRA CLAIM FEES FOR UTILITY AND REISSUE
`1501 1,330
`2501
`665 Utility issue fee (or reissue)
`Fee from
`Extra claims & Fee Paid
`1502
`480
`2502
`240 Design issue fee
`|T°J3'C'3dl'“$‘ I: -20" = Z X E 1503
`640
`2503
`320 Plant issue fee
`
`,,,_
`n e en en
`Clainas E '3 T E XEE 1460
`130
`1460
`130 Petitions to the Commissioner
`
`I
`M I
`'
`l D
`d
`t
`I:C 1807
`50
`“We em" e"
`1807
`50 Processing fee under 37 CFR1.17(q)
`
`2
`Fee Descri Ho
`1806
`180
`8021
`40
`
`.
`.
`.
`Claims in excess of20
`
`1809
`770
`_
`_
`
`Independent claims in excess of 3
`2203 145 Multiple dependent claim. if not Paid
`2204
`43 " Reissueindependent claims
`over original patent
`" Reissue claims in excess of 20
`an over ongina pa en
`
`.
`
`I
`
`_‘
`2
`
`.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`.
`.
`180 Submission of infonnation Disclosure Stmt
`40 Reoordingeach patent assignment per
`property (times number of properties)
`__
`.
`_
`_
`_
`385 Filing a submission after final rejection
`(37 CFR 1129(3))
`385 For each additional invention to be ‘
`exa”""ed (37 CFR 1'129(b))
`385 Request for Continued Examination (RCE)
`900 Reqéiest for exlpedtited examination ‘
`0 a esign app ica ion
`
`
`
`
`
`2810
`770
`1310
`2801
`770
`1801
`1302
`1302
`900
`
`Other fee (specify)
`
`SUBTOTAL (2)
`
`
`‘Reduced by Basic Filing Fee Paid
`aid, if reater; For Reissues, see above
`
`
`(C°mPleie ('73Pfl/1'C8b'9))
`SUBMIED BY
`Telephone 310-824-5555
`I ELLSWORTH R. ROSTON‘
`02/04/2004
`...€
`WARNING: Information on this form may become public. Credit card information should not
`be included on this form. Provide credit card information and authorization on PTO-2038.
`This collection of information is required by 37 CFR 1.17 and 1.27. The information is required to obtain or retain a benefit by the public which is to tile (and by the
`USPTO to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 12 minutes to complete.
`including gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments on
`the amount of time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief lnforrnation Officer. U.S. Patent and
`Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THIS ADDRESS.
`SEND TO: Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`
`SUBTOTAL (3)
`
`
`
`
`
`10,310
`
`If you need assistance in completing the form. call 2800-PTO-9199 and select option 2.
`
`-
`
`1806
`8021
`
`2809
`
`
`
`
`I1
`
`
`
`
`
`
`
`1203 290
`1204
`as
`
`1205
`
`18
`
`
`
`
`
`
`2205
`
`9
`
`2
`
`

`
`
`
`PROVISIONAL APPLICATION
`
`of
`
`RAYMOND D. FAST
`
`Surrey, BC V3R 056
`
`ROBERT R. GOEHRING
`
`Vancouver, BC V62 3A5
`
`KAI LOON NG
`
`Vancouver, BC V5R 6C5
`
`for
`
`UNITED STATES LETTERS PATENT
`
`on
`
`SYSTEM FOR, AND METHOD OF, MONITORING THE MOVEMENTS
`OF MOBILE ITEMS
`
`Client Docket No.: GUMMS-67436
`
`Sheets of Drawings: Twenty-One (21): (Figs. 1-22)
`[40451.1]
`
`Attorneys
`FULWIDER PATTON LEE & UTECHT, LLP
`Howard Hughes Center
`‘
`6060 Center Drive, Tenth Floor
`Los Angeles, California 90045
`
`EXPRESS MAIL NO. EV 327064348US
`
`3
`
`

`
` V‘ STEM FOR, AND METHOD OF, MONITORING THE MOVEMENTS
`
`OF MOBILE ITEMS
`
`This is a provisional application listing Raymond D. Fast, Robert R. Goehring and Kai
`
`5
`
`Loon Ng as inventors, for a System for, and Method of, Monitoring the Movements of Mobile
`
`Items.
`
`4
`
`

`
`IN THE DRAWINGS:
`
`Figure 1 is a schematic diagram of hardware in a system constituting this invention for
`
`monitoring the movement items under the control of beacons coupled to the items;
`
`Figure 2 is another schematic diagram of the hardware shown in Figure 1;
`
`Figure 3 is a schematic diagram of software architecture in the system;
`
`Figure 4 is a flow chart on an overview basis of a beacon controller interface included in
`
`the system;
`
`Figure 5-8 are flow charts showing the operation of the beacon controller interface in
`
`additional detal;
`
`10
`
`Figure 9, 10 and 10a are graphs showing the operation of the beacon controller interface
`
`in the system;
`
`Figures 11 and 12 are flow charts showing the operation of a scenario manager in the
`
`system;
`
`Figure 13 is a logic flow chart showing the operation of a guardian administration module
`
`15
`
`in the system;
`
`Figure 14 is a logic flow chart showing the operation of a partner, dealer portal in the
`
`system;
`
`Figure 15 is a logic flow chart showing the operation of an incident handling in the
`
`system;
`
`20
`
`Figure 16 is a logic flow chart showing the operation of an incident handling in the
`
`system;
`
`Figure 17 is a flow chart showing the operation of a recovery interface in the system;
`
`Figure 18 is an illustrative map of an area where the recovery interface is operating to
`
`recover an item (e.g., child) who may have wandered outside of a prescribed zone;
`
`1a5
`
`Provisional -Application
`
`5
`
`

`
`Figure 19 is a flow chart‘ showing the interrelationship between the various flow charts
`
`shown in the previous Figures;
`
`Figure 20 is a schematic diagram showing the operation of the beacon controller interface
`
`under the control of the Guardian Monitoring System in controlling the operation of a number of
`
`different beacons;
`
`Figure 21 is a chart indicating a plurality of individual symbols for providing different
`
`operations in the system, these individual symbols being provided in the flow charts specified
`
`above; and
`
`Figure 22 is a schematic diagram showing the interrelationship betweengthe Guardian
`
`10
`
`Mobile Monitoring System (GMMS), individual partners, individual dealers and individual
`
`subscribers in monitoring mobile items in accordance with the flow charts shown in the previous
`
`Figures.
`
`lb
`
`Provisional Application
`
`6
`
`

`
`GMMS System and Software Architecture
`
`Overview .
`There has never before been a system that performs the functions of the GMMS system.
`It is a machine consisting of many components and the system’s unique functionality is
`provided by the combination of the interconnected components and the software that ties
`them together.
`
`The combination of components is referred to as the network. The GMMS network
`actually includes the integration of several separate networks such as wireless
`communications networks, the Internet, and the Public Switched Telephone Network
`(PSTN).
`
`The GMMS system software can best be understood by describing two different aspects,
`the architecture and the applications. The architecture is the design of the structure of the
`sofiware, which allows it to tie together the various components of the network and to
`allow the various functions, or applications, that control those components to be created.
`
`This document first discusses the unique interconnection of components that create the
`GMMS network. It then describes the unique software architecture, and finally it
`describes some the functionality of the applications provided by the system. There are
`additional GMMS documents that describe severalspecific modules of the software that
`provide unique fiinctionality.
`
`7
`
`

`
`-Objectives of the GMMS system
`The GMMS system provides a complete, easy and novelmethod for enabling existing
`companies, or new companies, to offer mobile security services. The system can
`remotely enable many and various companies to offer the mobile security services
`simultaneously. Even though they are all accessing the same GMMS system, each
`company can offer its own service packages, bill for its own account types, display its
`own brand, and securely maintain its own data.
`
`The business process created by the system allows customers to buy monitored mobile
`security services from their security company. The services provide security for mobile
`objects in a manner very similar to the way they are provided for fixed structures, namely
`that the security company has operators available at all times to assist with security
`related issues. The primary form of assistance is typically to dispatch police, fire,
`ambulance, or rescue personnel to the location of the emergency. An additional form of
`assistance is to notify the owner or manager of the structure about the emergency,
`enabling them to make arrangements for repairs, etc.
`A
`
`In a traditional monitored security system (for stationary objects) the security company’s
`operators are alerted automatically upon various events that would be considered alarm
`conditions. For the security system of a stationary structure this would include such
`things as detecting the opening or breaking of a window or door, detecting motion in a
`building that is supposed to be unoccupied, detecting fire, gas, water or some other
`unwanted substance.
`
`For a monitored security system for mobile objects the monitoring station operators are
`alerted if a panic button is activated, an object is not where it was specified to be at a -
`given time, an object is moving at a velocity greater than it was specified to be moving,
`triggering of any sensor attached to the mobile monitoring device is detected, or
`tampering with the mobile monitoring device itself is detected. In all cases the mobile
`device, a component of the GMMS systems called a beacon, provides the operator with
`its present location.
`-
`
`A key component to enabling the security company to provide the required assistance for
`these mobile security situation is for the system to provide the location of the mobile
`object. Another key component is the means to notify the appropriate personnel with the
`appropriate information, either automatically or manually. The GMMS system provides
`several means of enabling these for mobile applications.
`'
`
`Benefits of the GMMS System
`Because of the structure of the GMMS system, its fimctionality can be upgraded
`simultaneously for all its users, without their intervention. Updates may include new
`wireless network access, availability of new beacon types, new location technologies,
`new map data, or any new software features and functions.
`
`_
`
`2A
`
`8
`
`

`
`Definitions
`
`The following are definitions of terms as they are used throughout this document.
`
`GMMS
`
`The Guardian Mobile Monitoring System — not the company called
`
`Guardian Mobile Monitoring Systems, Inc.
`
`Partner
`
`A company that has a business relationship with Guardian Mobile
`
`Monitoring Systems, Inc. and is enabled by the GMMS to provide
`
`wholesale and retail mobile security services. Partners generally
`
`operate a security alarm monitoring station, but could be other
`
`business entities as well.
`
`Dealer
`
`A company that is enabled by the GMMS, either directly or
`
`through a Partner, to provide retail mobile security services.
`
`Subscriber
`
`The person or company that is the consumer or end-User of mobile
`
`security services.
`
`Monitoring Station
`
`A station, such as one operated by a security alarm monitoring
`
`company, typically staffed 24 hours per day by operators who
`
`watch for incoming alarm signals and manage security incidents as
`
`necessary.
`
`Beacon
`
`A locatable wireless device. A beacon consists of a location
`
`Item
`
`Guardian
`
`determining equipment, a communications modem, and a
`processor that executes commands.
`
`Anything or anyone that carries or has a Beacon attached
`
`An individual who is assigned by a Subscriber to have temporary
`
`responsibility for an Item.
`
`9
`
`

`
`~:.\
`
`Entity
`
`User
`
`Any destination within the GMMS or accessible by the GMMS
`
`where a message can be sent.
`
`Anyone who can access the GMMS via any of its Portals or User
`
`interfaces.
`
`Wireless Carrier
`
`Companies that operate mobile phone systems. Examples are
`
`AT&T Mobile, Verizon, Sprint PCS, T-Mobile, Cingular, NexTel,
`
`Bell Mobility and Microcell.
`
`Wireless Technology
`
`The standards implemented in wireless communications networks.
`
`Examples are :
`
`AMPS (Advanced Mobile Phone System)
`
`TDMA (Time Division Multiple Access)
`
`GSM (Global System for Mobile communications)
`
`CDMA (Code Division Multiple Access)
`
`iDEN (integrated Digital Enhanced Network)
`
`GPRS (General Packet Radio Service)
`
`Location Technology
`
`The technology used in wireless devices such as Beacons and
`
`Tracking Terminals to determine their geographic location.
`
`Examples are the Global Positioning System (GPS) and Hybrid
`
`Assisted GPS (HA-GPS) systems such as gpsOne"" designed by
`
`Qualcomm and deployed in several wireless networks such as
`
`Sprint PCS and Verizon.
`
`Wireless Gateway
`
`The equipment that controls access into wireless networks from
`
`outside wireline networks. In order for the GMMS to
`
`communicate with a Beacon it must generally gain access to the
`
`wireless network through the wireless carrier’s gateway.
`
`10
`
`10
`
`

`
`PDE
`
`A special server called Position Determining Equipment used in
`
`conjunction with certain location technologies such as gpsOne"”.
`
`The PDE communicates with gpsOne enabled mobile phone
`
`handsets and Beacons to assist them in determining their position.
`When a PDE is used as a component of the location technology of
`
`a Beacon, the GMMS communicates with the PDE rather than the
`
`Beacon itself to determine the Beacon’s location.
`
`Wireline Networks
`
`Networks such as the PSTN and the Internet that are generally
`
`operated via wired connections as opposed to wireless.
`
`PSTN
`
`The Public Switched Telephone Network
`
`11
`
`11
`
`

`
`The GMMS system can be used either as a stand-alone system or integrated with other
`, systems in an existing business. As a stand-alone system it is a tum-key platform on
`which to operate a mobile security service. For companies already in the security
`business, the GMMS system also has the ability to integrate with several business
`systems they may be using and may wish to have integrated. These business systems are
`typically c1ient—server applications running on servers located on the companies’
`premises. One such system is the “Automation System” used by security alarm
`monitoring stations to automate the process of handling alarms associated with buildings
`that they monitor. The GMMS system can integrate into these automation systems
`regardless of which system it is or where it is located. Other examples of business
`systems that may require integration with the GMMS system are: customer databases,
`billing systems, inventory management systems, and customer relationship management
`systems. The GMMS system can also integrate with any of these various systems.
`
`The GMMS system provides for access by four categories of users: system
`administrators, operators, subscribers, and rescue personnel. All users access the system
`via the Internet using web browsers running on either fixed or mobile computing devices.
`Operators’ access to the system is mandatory because its functions are utilized every time
`the service provider is involved in providing any component of the service. It is a feature
`of the GMMS system’s design that Subscribers have the option of using the web interface
`or not. Subscribers are each given access to a dedicated portal that offers many self-serve
`functions and preference settings, but subscribers may not have Internet access, may not
`be interested, or may not be capable of using them. They may instead choose to call their
`service provider and have an operator perform all the tasks for them. Rescue personnel
`are the private or public safety officers that may be involved in performing a rescue, a
`recovery, or resolving an incident. These personnel can be given temporary, limited
`access to certain features of the GMMS system for the duration of an incident.
`
`One of the primary advantages of the GMMS system is its ability to utilize various
`wireless networks and various wireless location technologies. This means that the mobile
`security service providers can offer a greater variety of beacon types, and have a greater
`chance of offering a service with good wireless coverage in their region. Since the
`mobile security services can also be provided to users of locatable handsets (wireless
`telephones) it means that service providers have a greater range of existing wireless
`customers to offer services to. Some wireless location technologies are independent of
`the wireless network, but some are integrated into the wireless network itself. The
`GMMS system provides the flexibility to work with any of these situations. Another
`fundamental benefit of this structure is the ability to quickly adapt to any new wireless
`network technologies or location technologies as they are developed in the future.
`
`A fundamental benefit of the GMMS system is its ability to enable many mobile security
`service providers through a single system. Security and privacy of each service
`provider’s data is ensured through what is called the multi-tenant architecture of the
`system. (More detail of this is provided in the Software Architecture section.) A benefit
`of aggregation of users is the sharing of resources, resulting in cost savings. This is
`typical of any ASP (enabling all users through centralized servers) but the GMMS system
`
`6
`
`12
`
`12
`
`

`
`has additional features. It also aggregates all users’ traffic on the wireless networks in the
`system, facilitating bulk buying, resulting in further cost savings. The GMMS system
`also automates some of the account management functions particular to the needs of
`mobile security service providers. (More detail on this is provided in the operator’s portal
`section.) This automation reduces the account management burden on the wireless
`carrier, and the resulting increase in efficiency allows them to provide better pricing.
`
`A major component of the GMMS system is the server network. This is the network that
`interconnects the various servers in the data center, and interconnects the servers with the
`external networks and devices. The following objectives are met by creating the server
`network architecture that is disclosed in this document:
`
`0 Performance
`
`Multiple webservers and application servers are deployed to allow optimum usage
`of resources, which in turn optimizes the performance of the system.
`
`0 Availability
`All layers in the server network have redundancy built in, ensuring that the system
`provides maximum availability.
`
`0
`
`_ 0
`—
`
`Security
`A secure network is ensured through the application of three disciplines - the use
`of firewalls to lock down all unused ports, the use of SSL between browsers and
`the servers, and the constant update of sofiware security patches in the server
`operating systems and applications.
`
`Scalability
`Additional servers can be added to the webserver farm or the application server
`cluster to support higher volumes of users without having any impact on the
`existing services.
`
`0 Reliability
`Redundancy built into all layers of the network ensures the reliability of the
`system. In addition, the System Health Monitor provides constant automated
`checking to ensure the reliability of the system.
`
`0 Extensibility
`The architecture utilized by GMMS has been designed to be extensible, providing
`the ability to add and extend the features and fimctions within the system without
`requiring significant changes to the underlying network architecture.
`
`13
`
`13
`
`

`
`Structure of the‘f}MMS System
`The GMMS system is essentially a large, distributed machine comprising several sub-
`systems, namely: ASP servers, ASP sofiware applications, beacons, wireless data '
`communications networks, wirelessplocation systems, users’ terminals, computer-
`telephony-integration equipment, a system health monitor, the public switched telephone
`network, and the Internet.
`
`Deployment
`The system is deployed as an Application Service Provider (ASP) meaning that the
`servers are installed in a secure data center in a central location, or redundant i
`locations, and all applications are accessible electronically from anywhere. Users of
`the system need only a web browser to access all the applications; however, in some
`cases a thin client application may be installed on certain users’ terminals to enhance
`the speed and usability of the system.
`'
`
`Full redundancy is created by deploying a set of servers in at least two data centers,
`widely separated geographically, with automatic failover should one of the data
`centers experience a complete failure.
`
`It is possible to deploy many separate instances of the GMMS system. This would be ‘
`done in cases where service providers want exclusive use of a set of servers, perhaps
`housing them on their own premises. These constitute a licensed installation rather
`than ASP. In these cases, the multi-tenant features are disabled because they are
`unnecessary.
`
`Figures 1' and 2 show the system hardware. The different components in the system
`shown in Figures 1 and 2 have identical numerical designations which are indicated
`below. A discussion as to the construction and operation of each of these numerically
`identified components is provided below.
`
`A
`Wireless Location'SyTtéffis such as GPS (1)
`The GMMS system uses wireless location as a standard component of its
`fimctionality. Because the system is designed for wide area use, and because wireless
`communications between beacons and servers is an additional requirement, location
`systems designed for mobile phone networks are generally utilized.
`
`Mobile phone location technologies fall into three broad categories: handset—based,
`network-based, and hybrid. Handset-based location technologies require that beacons
`have stand-alone location fimctionality. A system such as GPS is typical of this
`category. Network-based location technologies typically use signals generated by the
`network to calculate location based on triangulation from several communications
`antenna towers. These technologies, such as TDOA, EOTD and AFLT, do not
`require any special functionality within the handset — they can theoretically determine
`the location of any mobile device that is capable of communicating via the network.
`Hybrid location technologies such as gpsOne (a wireless location technology from
`Qualcomm) incorporate both network and handset functionality to provide the
`accuracy of GPS with the signal strength of the terrestrial wireless network.
`
`The GMMS system is designed to utilize any of the above location technologies and
`can readily be adapted to any new location technologies as they are developed.
`
`14
`
`14
`
`

`
`0 Wireless Data Communications Networks (2)
`The GMMS system provides integration with various wireless communications
`networks, which are used for communications between the servers and all of the
`beacons and tacking terminals. Communications is typically data only, but may
`include voice and/or video.’ There are many systems and technologies used in
`wireless communications networks, and the GMMS system is capable of interfacing
`with any of them. More information as to how this is accomplished is provided in the
`software architecture description.
`
`Communications between the GMMS servers and the location networks is typically
`done through the open webservices standards, which use the HTTP/HTTPS ports.
`For the GMMS system it is necessary to have communications in both directions --
`both from the servers to the beacons and vice-versa. Messages are passed from the
`servers to the Beacons for many purposes. The following are examples of messages
`that will be sent to GMMS beacons:
`
`Transmit your present location, altitude and velocity
`Enter tracking mode
`
`Disable ignition
`
`Enable ignition
`Set geofence zone parameters
`Set speed notification parameters
`Unlock door
`
`Activate audible alarm
`
`Enable microphone and transmit audio
`Transmit the status of your battery’s charge
`Your request for assistance has been received
`Activate vibrating notification
`
`The following are examples of messages that will be received from GMMS
`beacons:
`
`0
`
`Panic button activated
`
`Zone violation detected
`
`Speed violation detected
`
`Door opened
`Vehicle engine started
`Vehicle engine turned off
`Physical tampering detected
`Electronic Tampering detected
`Battery needs recharging
`
`Battery energy is dangerously low
`Tremble circuit detects motion
`
`Arm Here (set my present location as my allowed zone till disarmed)
`
`15
`
`15
`
`

`
`Beacons (9)
`Beacon is the term used to generically describe any locatable wireless device within
`the GMMS network.
`
`A beacon typically contains both a wireless location determining module and a
`wireless communications module. The location determining module will typically be
`a GPS receiver, which has the ability to calculate its own geographic position based
`on signals it receives from satellites. The communications module provides the
`ability for the GMMS software applications and the beacon to communicate with
`each other, including the ability for an application to query a beacon for its location.
`
`The location technology associated with some wireless networks may perfonn the
`location calculations outside of the beacon. This is done either as a completely
`network centric location technology or as a hybrid of functionality in the beacon and
`in the network. In these cases the GMMS applications communicate with the location
`servers at the wireless_ networks to determine beacon locations.
`
`Beacons are designed for various purposes and various installations so they have
`various form factors and interconnection ports. A beacon may be designed to be
`carried or worn by a person or attached to an object. In that case it would typically be
`a self-contained unit with integral antennas and battery. Other beacons are designed
`for use in vehicles. These may have integral or external antennas, and would ofien
`have connection ports for linking into various vehicle fiinctions. Another type of
`beacon is one that is designed for integration into some form of product. This may be
`just a small electronic module where only the location and communications fimctions
`are provided. Electrical power may be provided by the product that the beacon is
`being incorporated into.
`
`In addition to location, the communications function of the beacon may be used to
`provide various other communications between the GMMS sofiware applications and
`the beacon itself, or devices attached to the beacon. Examples of external devices are-
`such things as panic button switches, vehicle power door locks, motion sensors,
`vehicle ignition disable relays, etc.
`
`The GMMS system is designed to integrate with various beacons regardless .of which
`location technology they incorporate, which wireless communications technology
`they use, or what functions they provide besides location.
`"
`
`Handsets (8)
`Many wireless communications networks offer handsets that incorporate, or are
`compatible with, some form of location technology. This makes the handsets a viable
`form of beacon for use with the GMMS system. Because of this, mobile security
`service providers can offer their services to any users of compatible handsets.
`
`Whether locatable or not, subscribers to the system may use wireless handsets for
`receiving notifications from the system or for communicating with operators at the
`
`10
`
`16
`
`16
`
`

`
`service providers’ monitoring stations. Notifications to the handsets_can be in the
`form of text messages, automated voice recordings, or calls from operators.
`
`GPS Signals (3)
`The GMMS system in not limited to GPS as a location technology, but GPS is the
`most prevalent wireless locations system in use today. GPS signals are transmitted by
`the constellation of Globalstar satellites for the purpose of global positioning and
`navigation. GPS receivers detect these signals and de

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket