U.S. patent application number 13/668621 was filed with the patent office on 2013-04-18 for method and system for dynamic information exchange on location aware mesh network devices.
This patent application is currently assigned to Mobitrum Corporation. The applicant listed for this patent is Mobitrum Corporation. Invention is credited to Ray WANG.
Application Number | 20130094538 13/668621 |
Document ID | / |
Family ID | 48085975 |
Filed Date | 2013-04-18 |
United States Patent
Application |
20130094538 |
Kind Code |
A1 |
WANG; Ray |
April 18, 2013 |
METHOD AND SYSTEM FOR DYNAMIC INFORMATION EXCHANGE ON LOCATION
AWARE MESH NETWORK DEVICES
Abstract
A method and system for dynamic information exchange on mesh
network devices. Mobile location aware mesh network devices
automatically exchange information with other mobile location aware
devices that are located at a pre-determined distance of each other
at a desired physical location. A server network device compares
electronic profiles that include stated interests of the mobile
location aware devices. The server network device also provides
additional information to the mobile location aware mesh network
devices based on stated interests in the electronic profiles of the
mobile location aware network devices.
Inventors: |
WANG; Ray; (McLean,
VA) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
Mobitrum Corporation; |
McLean |
VA |
US |
|
|
Assignee: |
Mobitrum Corporation
McLean
VA
|
Family ID: |
48085975 |
Appl. No.: |
13/668621 |
Filed: |
November 5, 2012 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
12884521 |
Sep 17, 2010 |
8305935 |
|
|
13668621 |
|
|
|
|
11880271 |
Jul 20, 2007 |
7801058 |
|
|
12884521 |
|
|
|
|
60833741 |
Jul 27, 2006 |
|
|
|
Current U.S.
Class: |
375/141 |
Current CPC
Class: |
H04B 1/707 20130101;
H04W 4/02 20130101; H04L 67/18 20130101; H04L 63/102 20130101; H04W
4/023 20130101; H04L 67/306 20130101; H04W 4/029 20180201; H04W
4/20 20130101; H04L 63/0428 20130101; H04W 76/14 20180201; H04W
84/18 20130101; H04L 67/12 20130101; H04L 63/08 20130101 |
Class at
Publication: |
375/141 |
International
Class: |
H04B 1/707 20060101
H04B001/707 |
Claims
1. A method for dynamic information interchange for mesh network
devices, comprising: receiving a first wireless message including a
first set of profile information from a first mesh network device
with one or more processors on a server network device with one or
more processors over a wireless communications network, wherein the
first wireless message includes a request to track a physical
location of the first mesh network device, wherein the first
wireless message includes comparison information that is used to
connect the first mesh network device with one or more other mesh
network devices that have similar comparison information, and
wherein the first mesh network device includes an ultra-wideband
wireless transceiver and a mesh network protocol adapter with
Complementary Code Keying (CCK), Differential Quaternary Phase
Shift Keying (DQPSK) or Orthogonal Frequency Division Multiplexing
(OFDM) encoders; storing the first set of profile information in a
database associated with the server network device; tracking a
current physical location of the first mesh network device from the
server network device via the wireless communications network;
receiving a second wireless message on the server network device
via the wireless communications network indicating the first mesh
network device has is located at a new physical location; comparing
on the server network device the stored first set of profile
information from the first mesh network device to a plurality of
other stored sets of profile information from a plurality of other
mesh network devices that have comparison information similar to
the first mesh network device; sending one or more third wireless
messages from the server network device via the wireless
communications network to the first mesh network device and one or
more of the plurality of other mesh network devices that are
located within a pre-determined distance of the new physical
location of the first mesh network device and have comparison
information similar to the first mesh network device; and
exchanging automatically one or more fourth wireless messages
between the first mesh network device, the one or more of the
plurality of other mesh network devices and the server network
device via the wireless communications network, wherein selected
ones of the one or more fourth wireless messages including a first
set of additional information generated by the server network
device as a result of the match in the comparison information and
other selected ones of the one or more fourth wireless messages
includes a second set of additional information generated by the
first mesh network device and the one or more of the plurality of
other mesh network devices as the result of the match in comparison
information and the pre-determined distance of the new physical
location.
2. A non-transitory computer readable medium having stored therein
a plurality of instructions for causing one or more processors to
execute the steps of: receiving a first wireless message including
a first set of profile information from a first mesh network device
with one or more processors on a server network device with one or
more processors over a wireless communications network, wherein the
first wireless message includes a request to track a physical
location of the first mesh network device, wherein the first
wireless message includes comparison information that is used to
connect the first mesh network device with one or more other mesh
network devices that have similar comparison information, and
wherein the first mesh network device includes an ultra-wideband
wireless transceiver and a mesh network protocol adapter with
Complementary Code Keying (CCK), Differential Quaternary Phase
Shift Keying (DQPSK) or Orthogonal Frequency Division Multiplexing
(OFDM) encoders; storing the first set of profile information in a
database associated with the server network device; tracking a
current physical location of the first mesh network device from the
server network device via the wireless communications network;
receiving a second wireless message on the server network device
via the wireless communications network indicating the first mesh
network device has is located at a new physical location; comparing
on the server network device the stored first set of profile
information from the first mesh network device to a plurality of
other stored sets of profile information from a plurality of other
mesh network devices that have comparison information similar to
the first mesh network device; sending one or more third wireless
messages from the server network device via the wireless
communications network to the first mesh network device and one or
more of the plurality of other mesh network devices that are
located within a pre-determined distance of the new physical
location of the first mesh network device and have comparison
information similar to the first mesh network device; and
exchanging automatically one or more fourth wireless messages
between the first mesh network device, the one or more of the
plurality of other mesh network devices and the server network
device via the wireless communications network, wherein selected
ones of the one or more fourth wireless messages including a first
set of additional information generated by the server network
device as a result of the match in the comparison information and
other selected ones of the one or more fourth wireless messages
includes a second set of additional information generated by the
first mesh network device and the one or more of the plurality of
other mesh network devices as the result of the match in comparison
information and the pre-determined distance of the new physical
location.
3. The method of claim 1 wherein the first set of profile
information includes an e-mail address, an Internet Protocol (IP)
address, a hardware address, a universal resource locator (URL), a
name, a street address, a telephone number, an instant message
identifier, a text message identifier, an encryption key, a digital
signature, a secure message digest, a security identifier, a mesh
network identifier, a physical location information, a QR barcode,
public or emergency notices or location specific information
including location-aware information, an electronic coupon site
identifier, a dating web-site identifier or a social networking
web-site login identifier.
4. The method claim 1 wherein the wireless communications messages
include an IEEE 802.15.4 (ZigBee), IEEE 802.11a, 802.11b, 802.11g,
802.11n, 802.16a, 802.16g, Bluetooth or Infrared wireless protocol
communications message.
5. The method of claim 1 wherein the step of the step of sending a
first wireless message includes securely sending the first wireless
message from the first mesh network device to the server network
device using a pre-determined security method over the wireless
communications network.
6. The method of claim 1 wherein the one or more electronic
identifiers for one or more designated location contact network
devices include a telephone number, an e-mail identifier, an
instant message identifier, a text message identifier, a mesh
network identifier, a Radio Frequency Identifier (RFID) identifier
a QR barcode identifier or a social networking web-site
identifier.
7. The method of claim 1 wherein the first mesh network device
includes a mobile telephone, personal digital/data assistant (PDA),
smart phone, tablet computer, Radio Frequency IDentification (RFID)
tag, RFID sensor or RFID biometric tag mesh network device.
8. The method of claim 1 wherein the ultra-wideband wireless
transceiver includes a Worldwide Interoperability for Microwave
Access (WiMAX) wireless transceiver.
9. The method of claim 1 wherein the server network device further
includes a gateway, router, switch, wired access point, wireless
access point or Radio Frequency IDentification (RFID) sensor
portal, RFID tag portal, or RFID biometric tag portal network
device.
10. The method of claim 1 wherein the similar comparison
information includes desired preferences for mobile commerce
information, advertising information, electronic coupon
information, social networking information, dating information,
lost and found information or physical presence information.
11. The method of claim 1 wherein the first set of profile
information includes information decoded from a QR barcode.
12. The method of claim 1 wherein the first mesh network device
includes a smart phone or a tablet computer.
13. The method of claim 12 wherein the first mesh network device
includes a smart software application including a software mesh
network protocol adapter.
14. The method of claim 1 wherein the selected ones of the one or
more fourth wireless messages include mobile commerce information,
advertising information, electronic coupon information, social
networking information, dating information, lost and found
information or physical presence information.
15. The method of claim 1 wherein the other selected ones of the
one or more fourth wireless messages include an e-mail address, a
name, a street address, a telephone number, an instant message
identifier, a text message identifier, an encryption key, a mesh
network identifier, a physical location information, a QR barcode,
an electronic coupon identifier, a dating web-site identifier or a
social networking web-site identifier.
16. The method of claim 1 wherein the one or more fourth wireless
messages include a voice message, an e-mail message, a text message
or an instant message.
17. The method of claim 1 wherein the current physical location
includes Global Positioning Satellite (GPS) information, cellular
telephone tower information, street address information,
two-dimensional (2D) (X,Y) or three-dimensional (3D) (X, Y, Z)
physical location information.
18. A system for dynamic information interchange for mesh network
devices, comprising in combination: means for receiving a first
wireless message including a first set of profile information from
a first mesh network device with one or more processors on a server
network device with one or more processors over a wireless
communications network, wherein the first wireless message includes
a request to track a physical location of the first mesh network
device, wherein the first wireless message includes comparison
information that is used to connect the first mesh network device
with one or more other mesh network devices that have similar
comparison information, and wherein the first mesh network device
includes an ultra-wideband wireless transceiver and a mesh network
protocol adapter with Complementary Code Keying (CCK), Differential
Quaternary Phase Shift Keying (DQPSK) or Orthogonal Frequency
Division Multiplexing (OFDM) encoders; means for storing the first
set of profile information in a database associated with the server
network device; means for tracking a current physical location of
the first mesh network device from the server network device via
the wireless communications network; means for receiving a second
wireless message on the server network device via the wireless
communications network indicating the first mesh network device has
is located at a new physical location; means for comparing on the
server network device the stored first set of profile information
from the first mesh network device to a plurality of other stored
sets of profile information from a plurality of other mesh network
devices that have comparison information similar to the first mesh
network device; means for sending one or more third wireless
messages from the server network device via the wireless
communications network to the first mesh network device and one or
more of the plurality of other mesh network devices that are
located within a pre-determined distance of the new physical
location of the first mesh network device and have comparison
information similar to the first mesh network device; and means for
exchanging automatically one or more fourth wireless messages
between the first mesh network device, the one or more of the
plurality of other mesh network devices and the server network
device via the wireless communications network, wherein selected
ones of the one or more fourth wireless messages including a first
set of additional information generated by the server network
device as a result of the match in the comparison information and
other selected ones of the one or more fourth wireless messages
includes a second set of additional information generated by the
first mesh network device and the one or more of the plurality of
other mesh network devices as the result of the match in comparison
information and the pre-determined distance of the new physical
location.
Description
CROSS REFERENCES TO RELATED APPLICATIONS
[0001] This application is a Continuation-In-Part (CIP) of Ser. No.
12/884,521, filed Sep. 17, 2010, that issued as U.S. Pat. No.
8,305,935, on Nov. 6, 2012, which is a CIP of U.S. utility patent
application Ser. No. 11/880,271, filed Jul. 20, 2007, which issued
as U.S. Pat. No. 7,801,058, on Sep. 21, 2010, utility patent
application Ser. No. 11/880,271 claims priority to U.S. Provisional
Patent Application 60/833,741, filed Jul. 27, 2006, the contents of
all which are incorporated by reference.
FIELD OF THE INVENTION
[0002] This invention relates to mesh networks. More specifically,
it relates to a method and system for dynamic information exchange
on location aware mesh network devices.
BACKGROUND OF THE INVENTION
[0003] There are many types of computer and communications networks
in existence. One variety of such networks is a mesh network.
[0004] A mesh network is a self-organizing network built from
plural mesh network nodes that may spontaneously create an
impromptu network, assemble the network themselves, dynamically
adapt to device failure and degradation, manage movement of mesh
network nodes, and react to changes in task and network
requirements. The plural mesh network nodes are reconfigurable
smart network nodes that are self-aware, self-reconfigurable and
autonomous.
[0005] A mesh network is a network that employs one of two
connection arrangements, "full mesh" topology or "partial mesh"
topology. In the full mesh topology, each node is connected
directly to each of the others. In the partial mesh topology, nodes
are connected to only some, not all, of the other nodes.
[0006] There are a number of problems associated with wired and
wireless mesh networks. One problem is that a number of independent
mesh devices each make a local decision and then try to combine
these decisions at a central point to generate a global decision.
Routing, bandwidth, and power constraints determine the quality of
the distributed detection and/or estimation decision. Another
problem is that is often difficult to determine a load on a mesh
network and what resources are required to determine a desired
quality of service.
[0007] Another problem is that some mesh networks are mobile
networks in which it is assumed at least some of the nodes of the
network are mobile units that change position over time. The
dynamic management of complex routing information is very
difficult. Mobile sensor networks include plural client units in
such as a personal digital/data assistant (PDA), mobile phone, or
other mobile unit for airport lounges, shopping malls, offices,
etc.
[0008] There have been attempts to solve some of the problems
associated with mesh networks. For example, U.S. Pat. No. 6,785,725
entitled "Signaling address resolution in a communication network,"
that issued to Ramanan teaches "a network configuration and method
provide communication setup between neighbor nodes in a
communication network, without broadcasting this setup information
over the network. A signaling bandwidth separated from the data
communication channel bandwidth facilitates address resolution over
a common transmission medium. The user is not required to know any
physical address properties of the neighbor nodes. This reduces the
complexity of the information that a network administrator is
required to manage. This processing feeds into a complete address
resolution table, which is employed for controlling network
communication over the main data communication channel bandwidth.
Typically, substantially continuous transmission and/or reception
over the signaling bandwidth is useful not only to determine the
neighbor node's active address upon startup, but also while the
network is running, to detect if a signaling element has been
exchanged or has changed activity. The address resolution is
automatically updated to reflect a new configuration."
[0009] U.S. Published Patent Application No. 20050272430 entitled
"Reconfigurable micro-mesh communication system," that was
published by Griebling teaches "wide area wireless networks with
high network throughput and low provisioning and maintenance costs.
The wireless networks comprise a distributed reconfigurable
micro-mesh cluster having direct wireless link capability. Multiple
channels operating at different frequencies can be used per direct
wireless link. To further reduce the provisioning and maintenance
costs, narrow beam antennas are used at the point of presence. To
expand the wide area wireless networks into the home market,
adjustable antennas are installed at homes."
[0010] U.S. Published Patent Application No. 20050243765 entitled
"Mesh network and piconet work system and method" that was
published by Schrader et al. teaches "a method of distributed
control of a wireless mesh network without knowledge of global
topology. The method includes: a station joining the network with
any current member by propagating the join-request, or two meshes
merging using the steps of: one mesh joining the other as a whole
and then re-synchronizing its timing. The method further includes:
first, each station periodically transmits a beacon; second, in
response to a beacon being no longer detected, a station
transmitting a bitmap of stations that it can still receive; third,
each station responds by adding stations that it can receive with
all of the bitmaps received from other members, and retransmitting
the updated bitmap; fourth, after time for all stations to respond,
all stations base current membership on the bitmap. The method
further includes: determining sharable time slots that will not
interfere with neighbors or other slot sharers, using and then
releasing those slots."
[0011] U.S. Published Patent Application No. 20050190778 entitled
"Multi-system mesh network," that was published by Ozluturk teaches
"a transmission is simultaneously provided on multiple mesh
networks. Retransmission between two nodes may be performed for the
same communication along multiple networks in a mesh topography for
the multiple networks. This permits communication to be effected in
a mesh topography where one or all systems would not be able to
provide a complete network connection within any given system."
[0012] U.S. Published Patent Application No. 20050074019 entitled
"method and apparatus for providing mobile inter-mesh communication
points in a multi-level wireless mesh network," that was published
by Handforth et al. teaches "a mobile backhaul inter-mesh
communication point forms an interface between a wireless mesh
network on a first level and a wireless mesh network on a second,
higher bandwidth, level. The two wireless networks are
differentiated, e.g., by causing the mesh networks to be formed
using different spectra, protocols or coding, or antennae. The
mobile intra-mesh communication point functions as an access point
in the lower level mesh network and as a relay point in the upper
level mesh network. Utilizing mobile inter-mesh communication
points facilitates deployment of wireless network access points
while enabling the location of access points to follow the
concentration of network users. Mobile inter-mesh communication
points may be deployed in personal vehicles such as cars, trucks,
and motorcycles, public transportation vehicles such as busses,
trains, and aircraft, emergency vehicles such as fire trucks and
ambulances, and many other types of vehicles."
[0013] However, none of these solutions solve all of the problems
associated with mesh networks. Thus, it would be desirable to solve
some of the problems associated with mesh networks.
SUMMARY OF THE INVENTION
[0014] In accordance with preferred embodiments of the present
invention, some of the problems associated with sensor networks are
overcome. A method and system for dynamic information exchange on
location aware mesh network devices is provided
[0015] Mobile location aware mesh network devices automatically
exchange information with other mobile location aware devices that
are located at a pre-determined distance of each other at a desired
physical location. A server network device compares electronic
profiles that include stated interests of the mobile location aware
devices. The server network device also provides additional
information based on stated interests in the electronic profiles of
the mobile location aware network devices.
[0016] The foregoing and other features and advantages of preferred
embodiments of the present invention will be more readily apparent
from the following detailed description. The detailed description
proceeds with references to the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
[0017] Preferred embodiments of the present invention are described
with reference to the following drawings, wherein:
[0018] FIG. 1 is a block diagram of an exemplary mesh network;
[0019] FIG. 2 is a block diagram of an exemplary hardware
architecture for an mesh network device;
[0020] FIG. 3A is a block diagram illustrating a specific exemplary
implementation of the mesh network device of FIG. 2;
[0021] FIG. 3B is a block diagram illustrating a specific exemplary
implementation of the mesh network device of FIG. 3A;
[0022] FIG. 4 is a flow diagram illustrating a method for mesh
networking;
[0023] FIG. 5 is a block diagram illustrating an N-way mesh network
formed using the mesh network device of FIG. 2; and
[0024] FIG. 6 is a flow diagram illustrating a method for dynamic
information interchange for mesh network devices;
[0025] FIG. 7 is a block diagram illustrating a data flow for
dynamic information interchange for mesh network devices;
[0026] FIG. 8 is a flow diagram illustrating a method for enabling
dynamic information interchange for mesh network devices;
[0027] FIGS. 9A and 9B are a flow diagram illustrating a method for
dynamic information interchange for location aware mesh network
devices;
[0028] FIGS. 10A and 10B are a flow diagram illustrating a method
for dynamic information interchange for location aware mesh network
devices;
[0029] FIG. 11A is a block diagram illustrating a mesh activity
message for entering a secure area;
[0030] FIG. 11B is a block diagram illustrating a mesh activity
message for automatically and dynamically managing HVAC;
[0031] FIG. 11C is a block diagram illustrating a mesh activity
message for providing 3D emergency location information;
[0032] FIGS. 12A and 12B are a flow diagram illustrating a method
for dynamic information exchange for location aware network
devices;
[0033] FIG. 13 is a block diagram illustrating a data flow for the
method of FIG. 12; and
[0034] FIG. 14 is a block diagram illustrating display of an
exemplary QR barcode.
DETAILED DESCRIPTION OF THE INVENTION
Exemplary Mesh Network System
[0035] Mesh networking is a type of networking wherein each node in
the mesh network may act as an independent gateway/router/switch,
regardless of whether it is connected to another communications
network or not. It allows for continuous connections,
disconnections and reconfigurations until a desired destination is
reached. Mesh networks differ from other communications networks
(e.g., the Internet, an intranet, the Public Switch Telephone
Network (PSTN), a data network (e.g., Transmission Control Protocol
(TCP)/Internet Protocol (IP), etc.) in that component parts can all
connect to each other via multiple hops. Mesh networks are also
considered as one type of ad hoc network. Mesh networks are
self-healing: the network can still operate when one node breaks
down or a connection goes bad. As a result, the network may
typically be very reliable, as there is often more than one path
between a source and a destination in the network.
[0036] One advantage of wireless mesh networks--as opposed to wired
or fixed wireless non-mesh networks--is that they are truly
wireless. Most traditional "wireless" access points still need to
be wired to another non-mesh communications network to broadcast
their wireless signal. For large wireless communications network
wire cables need to be buried in ceilings and walls and throughout
public areas. In a wireless mesh network, only one mesh node needs
to be physically wired to a network connection like a DSL or cable
modem. That one wired node then shares its Internet connection
wirelessly with all other mesh nodes in its vicinity. Those mesh
nodes then share the connection wirelessly with the nodes closest
to them. The more nodes, the further the connection spreads,
creating a wireless mesh "cloud of connectivity" that can serve a
small area or a city of millions.
[0037] FIG. 1 is a block diagram of an exemplary mesh network 10. A
mesh network is a short range local area network (LAN) that employs
one of two connection arrangements, "full mesh topology" or
"partial mesh topology." In the full mesh topology 12, each node is
a mesh network device 14, 16, 18 is connected directly to each of
the other mesh network device. In the partial mesh topology 20 some
mesh network devices 22 are connected to all the others, but some
of the mesh network devices 22 are connected only to those other
mesh network devices 18 with which they exchange the most data. The
connections can be wired or wireless in a mesh network 12 or
partial mesh 20 network topologies. A mesh network is reliable and
offers redundancy. If one mesh node can no longer operate, all the
rest can still communicate with each other, directly or through one
or more intermediate nodes. Mesh networks work well when the nodes
are located at scattered points that do not lie near a common line.
The mesh network 12 and the partial mesh network 20 includes both
wireless 3 and wired mesh networks 5 and wireless 3 and wired
partial mesh networks 5.
[0038] Some characteristics for mesh networks 12 or partial-mesh
networks 20 include a network infrastructure that is decentralized,
avoids a central point of failure and control, is cost effective
and be maintained and expanded locally. A mesh network 12 or
partial mesh network 20 includes many-to-many connections and is
capable of dynamically updating and optimizing these connections.
The mesh networks 12 or partial-mesh networks 20 include "mobile
mesh networks" in which it is assumed that one or more of the mesh
network devices dynamically change geographical location over time.
Such mesh network devices may continuously change geographical
location over time.
[0039] The mesh networks 12, 20 may also include embedded mesh
network devices that form an "embedded mesh network." An embedded
mesh network is typically a component of a larger more complex mesh
network. Industrial machines, automobiles, medical equipment,
cameras, household appliances, airplanes, vending machines, toys,
etc. typically include embedded mesh networks. For example, an
automobile may include a first embedded mesh network for anti-lock
braking, a second for monitoring and maintaining oil pressure, etc.
An embedded mesh network is designed to run on its own without
intervention, responds to events (e.g., data collection, data
transfer, etc.) in-real time and provides data to the larger more
complex network.
[0040] The plural mesh network devices 14, 16, 18, 22 include, but
are not limited to, multimedia capable desktop and laptop
computers, facsimile machines, mobile phones, non-mobile phones,
tablet computers (e.g, IPAD by APPLE, etc.) Internet phones,
Internet appliances, personal digital/data assistants (PDA),
two-way pagers, digital cameras, cable television set-top boxes,
digital televisions including high definition television (HDTV) and
other types of network devices. The plural mesh network devices 14,
16, 18, 22 also include embedded mesh network devices.
[0041] The plural mesh network devices 14, 16, 18, 22 may also
include mesh network tags and/or sensors and/or biometrics. A mesh
network sensor is a device that receives and responds to a signal
or stimulus. For example a mesh network sensor may be used to
measure a physical quantity such as temperature, pressure, sound,
etc. and convert it into an electronic signal (e.g., digital data,
digital signal, etc.). A mesh network sensor may also measure an
electrical quantity (e.g., a radio signal, Radio Frequency
IDentification signal (RFID) signal, etc.) and convert it into
another electronic signal.
[0042] As is known in the art, an "RFID tag" is an object that can
be applied to or incorporated into a product, animal, or person for
the purpose of identification and/or tracking using RF signals.
[0043] As is known in the art, an "RFID sensor" is a device that
measures a physical quantity and converts it into an RF signal
which can be read by an observer or by an instrument (e.g., RFID
controller/RFID portal server network device, etc.)
[0044] As is known in the art, a "biometric" is method for uniquely
recognizing humans or non-human entities based upon one or more
intrinsic physical or behavioral traits. Thus, an RFID biometric
tag is an object that can be applied to or incorporated on or into
a human or animal for the purpose of identification.
[0045] The plural mesh network devices 14, 16, 18, 22 may be used
for unique identity identification via voice, biometrics, supply
chain management, medical, for Data, Information and Knowledge
(DIaK) sensors and sensor tracking extended services such as those
used as part of capabilities offered by Integrated Systems Health
Management (ISHM) and for other applications.
[0046] The architecture plural mesh network devices 14, 16, 18, 22
brings a rich set of state-of the-art capabilities to support ISHM
systems for sensing, processing, control, and distribution. Such
devices enable a mesh network, a mesh sensor network or other
sensor network to significantly to increase capabilities for
improved identification and tracking, data sharing, information
dissemination, online data processing, automated feature
extraction, data fusion, and parallel and distributed computing
functions.
[0047] In one embodiment, the mesh network sensor is a simple
device that includes an electrical circuit and a wired or wireless
transceiver. In another embodiment, the mesh network sensor is a
complex device (e.g., computer, PDA, mobile phone, etc.) including
additional sensor functionality.
[0048] The plural network devices 14, 16, 18, 22 include one or
more of a wired interface and/or a wireless interface used to
connect to a mesh network 12 or partial mesh network 20 to provide
voice, video and data communications.
[0049] The plural network devices 14, 16, 18, 22 include one or
more of a wired interface and/or a wireless interface used to
connect to non-mesh communications network 23 to provide voice,
video and data communications such as the Internet, an intranet,
the Public Switch Telephone Network (PSTN), etc. The non-mesh
network communications network 23 has a non-mesh architecture based
on the Open System Interconnection (OSI) model, Internet Protocol
suite model, or other conventional non-mesh networking models.
[0050] The non-mesh communications network 23 may include one or
more gateways, routers, bridges or switches As is known in the art,
a gateway connects computer networks using different network
protocols and/or operating at different transmission capacities. A
router receives transmitted messages and forwards them to their
correct destinations over the most efficient available route. A
bridge is a device that connects networks using the same
communications protocols so that information can be passed from one
network device to another. A switch is a device that connects
communications paths for voice, video and data streams.
[0051] The non-mesh communications network 23 may include one or
more server network devices 25 (one of which is illustrated) and
one or more web-sites accessible by users to send and receive
information. The one or more servers 25, may also include one or
more associated databases 25' for storing electronic
information.
[0052] Preferred embodiments of the present invention include mesh
network devices, non-mesh network devices and wired and wireless
interfaces that are compliant with all or part of standards
proposed by the Institute of Electrical and Electronic Engineers
(IEEE), International Telecommunications Union-Telecommunication
Standardization Sector (ITU), European Telecommunications Standards
Institute (ETSI), Internet Engineering Task Force (IETF), U.S.
National Institute of Security Technology (NIST), American National
Standard Institute (ANSI), Wireless Application Protocol (WAP)
Forum, Bluetooth Forum, or the ADSL Forum. However, network devices
based on other standards could also be used.
[0053] An operating environment for devices and interfaces of the
present invention include a processing system with one or more high
speed Central Processing Unit(s) (CPU) or other processors and a
memory. In accordance with the practices of persons skilled in the
art of computer programming, the present invention is described
below with reference to acts and symbolic representations of
operations or instructions that are performed by the processing
system, unless indicated otherwise. Such acts and operations or
instructions are referred to as being "computer-executed," "CPU
executed" or "processor executed."
[0054] It will be appreciated that acts and symbolically
represented operations or instructions include the manipulation of
electrical signals by the CPU. An electrical system represents data
bits which cause a resulting transformation or reduction of the
electrical signals, and the maintenance of data bits at memory
locations in a memory system to thereby reconfigure or otherwise
alter the CPU's operation, as well as other processing of signals.
The memory locations where data bits are maintained are physical
locations that have particular electrical, magnetic, optical, or
organic properties corresponding to the data bits.
[0055] The data bits may also be maintained on a computer readable
medium including magnetic disks, optical disks, organic memory, and
any other volatile (e.g., Random Access Memory (RAM)) or
non-volatile (e.g., Read-Only Memory (ROM)) mass storage system
readable by the CPU. The computer readable medium includes
cooperating or interconnected computer readable medium, which exist
exclusively on the processing system or be distributed among
multiple interconnected processing systems that may be local or
remote to the processing system.
[0056] As is known in the art, the Open Systems Interconnection
(OSI) reference model is a layered architecture that standardizes
levels of service and types of interaction for computers exchanging
information through a communications network. The OSI reference
model separates network device-to-network device communications
into seven protocol layers, or levels, each building- and
relying--upon the standards contained in the levels below it. The
OSI reference model includes from lowest-to-highest, a physical,
data-link, network, transport, session, presentation and
application layer. The lowest of the seven layers deals solely with
hardware links; the highest deals with software interactions at the
application-program level.
[0057] In one embodiment of the present invention, the wired and
wireless interfaces include wired and wireless interfaces and
corresponding networking protocols for wired connections to the
non-mesh communications network 23 including, a Public Switched
Telephone Network (PSTN) or a cable television network (CATV)
including HDTV that connect the network devices 14, 16, 18, 22 via
one or more twisted pairs of copper wires, digital subscriber lines
(e.g. DSL, ADSL, VDSL, etc.) coaxial cable, fiber optic cable,
other connection media or other wired connection interfaces. The
PSTN is any public switched telephone network provided by AT&T,
GTE, Sprint, MCI, SBC, Verizon and others.
[0058] The non-mesh communications network 23 may also include a
paging and wireless messaging network, a wireless cellular
telephone network, a Packet Cellular Network (PCN), Global System
for Mobile Communications, (GSM), Generic Packet Radio Services
(GPRS), network/Personal Communications Services network (PCS), a
Cellular Digital Packet Data (CDPD), Wireless Application Protocol
(WAP), Digital Audio Broadcasting (DAB) network, Transmission
Control Protocol (TCP)/User Datagram Protocol (UDP)/Internet
Protocol (IP) network, Voice over IP (VoIP network or other types
of network.
[0059] The wireless cellular telephone network includes, but is not
limited to Code Division Multiple Access (CDMA), Time Division
Multiple Access (TDMA), or other wireless technologies.
[0060] As is known in the art, PCS networks include network that
cover a range of wireless, digital communications technologies and
services, including cordless phones, mobile phones, voice mail,
paging, faxing, mobile personal digital/data assistants (PDAs),
etc. PCS devices are typically divided into narrowband and
broadband categories.
[0061] Narrowband devices, which operates in the 900 MHz band of
frequencies, typically provide paging, data messaging, faxing, and
one- and two-way electronic messaging capabilities. Broadband
devices, which operate in the 1850 MHz to 1990 MHz range typically
provide two-way voice, data, and video communications. Other
wireless technologies such as GSM, CDMA and TDMA are typically
included in the PCS category.
[0062] As is known in the art, GSM is another type of digital
wireless technology widely used throughout Europe, in Australia,
India, Africa, Asia, and the Middle East. GSM is gaining popularity
in the United States. GSM is a wireless platform based on TDMA to
digitize data. GSM includes not only telephony and Short Message
Services (SMS) but also voice mail, call forwarding, fax, caller
ID, Internet access, and e-mail.
[0063] As is known in the art, SMS is type of communications
service that enables a user to allow private message communications
with another user. GSM typically operates at three frequency
ranges: 900 MHz (GSM 900) in Europe, Asia and most of the rest of
the world; 1800 MHz (GSM 1800 or DCS 1800 or DCS) in a few European
countries; and 1900 MHz (GSM 1900 also called PCS 1900 or PCS) in
the United States. GSM also operates in a dual-band mode including
900/1800 Mhz and a tri-band mode include 900/1800/1900 Mhz.
[0064] As is known in the art, GPRS is a standard for wireless
communications, which runs at speeds up to 150 kilo-bits-per-second
("kbit/s"). GPRS, which supports a wide range of bandwidths is an
efficient use of limited bandwidth and is particularly suited for
sending and receiving small bursts of data such as e-mail and Web
browsing, as well as large volumes of data.
[0065] As is known in the art, CDPD is a wireless standard
providing two-way, 19.2-Kbps or higher packet data transmission
over existing cellular telephone channels. As is known in the art,
a Packet Cellular Network (PCN) includes various types of
packetized cellular data.
[0066] In one embodiment, of the invention, the wireless interfaces
include WPAN wireless personal area network (WPAN) interfaces. As
is known in the art, a WPAN is a personal area network for
interconnecting devices centered around an individual person's
devices in which the connections are wireless. A WPAN interconnects
all the ordinary computing and communicating devices that a person
has on their desk (e.g. computer, etc.) or carry with them (e.g.,
PDA, mobile phone, two-way pager, etc.)
[0067] Typically, a wireless personal area network uses some
technology that permits communication only within about 10 meters.
One such technology is "Bluetooth." Another such technology is
"Zigbee."
[0068] A key concept in WPAN technology is known as "plugging in."
In the ideal scenario, when any two WPAN-equipped devices come into
close proximity (within several meters of each other) or within a
few kilometers of a central server (not illustrated), they can
communicate via wireless communications as if connected by a cable.
WPAN devices can also lock out other devices selectively,
preventing needless interference or unauthorized access to secure
information.
[0069] In one embodiment of the present invention, the wireless
interfaces include but are not limited to, an IEEE 802.11a,
802.11b, 802.11g, 802.11n, 802.15.4 (ZigBee), 802.16a, 802.16g,
"Wireless Fidelity" (WiFi), "Worldwide Interoperability for
Microwave Access" (WiMAX), ETSI High Performance Radio Metropolitan
Area Network (HIPERMAN) "RF Home," or other types of wireless
interfaces. However, the present invention is not limited to such
wireless interface and other types of wireless interfaces can also
be used.
[0070] In another embodiment of the present invention, the wireless
mesh network device 14, 16, 18, 22 includes a wireless sensor
device that comprises an integral or separate Bluetooth and/or
infra data association (IrDA) module for wireless Bluetooth or
wireless infrared communications.
[0071] As is known in the art, an 802.11b is a short-range wireless
network standard. The IEEE 802.11b standard defines wireless
interfaces that provide up to 11 Mbps wireless data transmission to
and from wireless devices over short ranges. 802.11a is an
extension of the 802.11b and can deliver speeds up to 54M bps.
802.11g deliver speeds on par with 802.11a. However, other 802.11xx
interfaces can also be used and the present invention is not
limited to the 802.11 protocols defined. The IEEE 802.11a, 802.11b
and 802.11g standards are incorporated herein by reference.
[0072] As is known in the art, WiFi is a type of 802.11xx
interface, whether 802.11b, 802.11a, dual-band, etc. WiFi devices
include an RF interfaces such as 2.4 GHz for 802.11b or 802.11g and
5 GHz for 802.11a.
[0073] As is known in the art, 802.15.4 (Zigbee) is low data rate
network standard used for mesh network devices such as sensors,
interactive toys, smart badges, remote controls, and home
automation. The 802.15.4 standard provides data rates of 250 kbps,
40 kbps, and 20 kbps., two addressing modes; 16-bit short and
64-bit IEEE addressing, support for critical latency devices, such
as joysticks, Carrier Sense Multiple Access/Collision Avoidance,
(CSMA-CA) channel access, automatic network establishment by a
coordinator, fully handshaked protocol for transfer reliability,
power management to ensure low power consumption for multi-month to
multi-year battery usage and up tol6 channels in the 2.4 GHz
Industrial, Scientific and Medical (ISM) band (Worldwide), 10
channels in the 915 MHz (US) and one channel in the 868 MHz band
(Europe). The IEEE 802.15.4-2003 standard is incorporated herein by
reference.
[0074] As is known in the art, WiMAX is an industry trade
organization formed by leading communications component and
equipment companies to promote and certify compatibility and
interoperability of broadband wireless access equipment that
conforms to the IEEE 802.16XX and ETSI HIPERMAN. HIPERMAN is the
European standard for metropolitan area networks (MAN).
[0075] The IEEE The 802.16a and 802.16g standards are wireless MAN
technology standard that provides a wireless alternative to cable,
DSL and T1/E1 for last mile broadband access. It is also used as
complimentary technology to connect IEEE 802.11XX hot spots to the
Internet.
[0076] The IEEE 802.16a standard for 2-11 GHz is a wireless MAN
technology that provides broadband wireless connectivity to fixed,
portable and nomadic devices. It provides up to 50-kilometers of
service area range, allows users to get broadband connectivity
without needing direct line of sight with the base station, and
provides total data rates of up to 280 Mbps per base station, which
is enough bandwidth to simultaneously support hundreds of
businesses with T1/E1-type connectivity and thousands of homes with
DSL-type connectivity with a single base station. The IEEE 802.16g
provides up to 100 Mbps.
[0077] The IEEE 802.16e standard is an extension to the approved
IEEE 802.16/16a/16g standard. The purpose of 802.16e is to add
limited mobility to the current standard which is designed for
fixed operation.
[0078] The ESTI HIPERMAN standard is an interoperable broadband
fixed wireless access standard for systems operating at radio
frequencies between 2 GHz and 11 GHz.
[0079] The IEEE 802.16a, 802.16e and 802.16g standards are
incorporated herein by reference. WiMAX can be used to provide a
WLP.
[0080] The ETSI HIPERMAN standards TR 101 031, TR 101 475, TR 101
493-1 through TR 101 493-3, TR 101 761-1 through TR 101 761-4, TR
101 762, TR 101 763-1 through TR 101 763-3 and TR 101 957 are
incorporated herein by reference. ETSI HIPERMAN can be used to
provide a WLP.
[0081] As is known in the art, Bluetooth is a short-range radio
frequency technology aimed at simplifying communications among
network devices and between network devices. Bluetooth wireless
technology supports both short-range point-to-point and
point-to-multipoint connections. The Bluetooth Specification, GL
11r02, March 2005, prepared by the Bluetooth SIG, Inc. is
incorporated herein by reference.
[0082] As is known in the art, IP is an addressing protocol
designed to route traffic within a network or between networks. For
more information on IP see IETF RFC-791 incorporated herein by
reference.
[0083] TCP provides a connection-oriented, end-to-end reliable
protocol designed to fit into a layered hierarchy of protocols that
support multi-network applications. For more information on TCP see
RFC-793, incorporated herein by reference.
[0084] UDP provides a connectionless mode of communications with
datagrams in an interconnected set of networks. For more
information on UDP see ITEF RFC-768 incorporated herein by
reference.
[0085] As is known in the art, VoIP is a set of facilities for
managing the delivery of voice information using IP packets. In
general, VoIP is used to send voice information in digital form in
discrete data packets (i.e., IP packets) over data networks rather
than using traditional circuit-switched protocols used on the PSTN.
VoIP is used on both wireless and wired data networks.
[0086] VoIP typically comprises several applications (e.g., Session
Initiation Protocol (SIP), Service Location Protocol (SLP), H.323,
H.324, Domain Name System (DNS), Authentication Authorization and
Accounting (AAA), codecs (G.7xx), etc.) that convert a voice signal
into a stream of packets (e.g., IP packets) on a packet network and
back again. VoIP allows voice signals to travel over a stream of
data packets over a communications network.
Security and Encryption
[0087] Devices and interfaces (e.g., security interface 46) of the
present invention include plural security and/or encryption methods
for secure communications. Wireless Encryption Protocol (WEP) (also
called "Wired Equivalent Privacy) is a security protocol for WiLANs
defined in the IEEE 802.11b standard. WEP is cryptographic privacy
algorithm, based on the Rivest Cipher 4 (RC4) encryption engine,
used to provide confidentiality for 802.11b wireless data.
[0088] As is known in the art, RC4 is cipher designed by RSA Data
Security, Inc. of Bedford, Mass., which can accept encryption keys
of arbitrary length, and is essentially a pseudo random number
generator with an output of the generator being XORed with a data
stream to produce encrypted data.
[0089] One problem with WEP is that it is used at the two lowest
layers of the OSI model, the physical layer and the data link
layer, therefore, it does not offer end-to-end security. One
another problem with WEP is that its encryption keys are static
rather than dynamic. To update WEP encryption keys, an individual
has to manually update a WEP key. WEP also typically uses 40-bit
static keys for encryption and thus provides "weak encryption,"
making a WEP device a target of hackers.
[0090] The IEEE 802.11 Working Group is working on a security
upgrade for the 802.11 standard called "802.11i." This supplemental
draft standard is intended to improve WiLAN security. It describes
the encrypted transmission of data between systems 802.11X WiLANs.
It also defines new encryption key protocols including the Temporal
Key Integrity Protocol (TKIP). The IEEE 802.11i draft standard,
version 4, completed Jun. 6, 2003, is incorporated herein by
reference.
[0091] The 802.11i is based on 802.1x port-based authentication for
user and device authentication. The 802.11i standard includes two
main developments: Wireless or Wi-Fi Protected Access (WPA) and
Robust Security Network (RSN).
[0092] WPA uses the same RC4 underlying encryption algorithm as
WEP. However, WPA uses TKIP to improve security of keys used with
WEP. WPA keys are derived and rotated more often than WEP keys and
thus provide additional security. WPA also adds a
message-integrity-check function to prevent packet forgeries.
[0093] RSN uses dynamic negotiation of authentication and
selectable encryption algorithms between wireless access points and
wireless devices. The authentication schemes proposed in the draft
standard include Extensible Authentication Protocol (EAP). One
proposed encryption algorithm is an Advanced Encryption Standard
(AES) encryption algorithm.
[0094] Dynamic negotiation of authentication and encryption
algorithms lets RSN evolve with the state of the art in security,
adding algorithms to address new threats and continuing to provide
the security necessary to protect information that WiLANs
carry.
[0095] The NIST developed a new encryption standard, the Advanced
Encryption Standard (AES) to keep government information secure.
AES is intended to be a stronger, more efficient successor to
Triple Data Encryption Standard (3DES).
[0096] As is known in the art, DES is a popular symmetric-key
encryption method developed in 1975 and standardized by ANSI in
1981 as ANSI X.3.92, the contents of which are incorporated herein
by reference. As is known in the art, 3DES is the
encrypt-decrypt-encrypt (EDE) mode of the DES cipher algorithm.
3DES is defined in the ANSI standard, ANSI X9.52-1998, the contents
of which are incorporated herein by reference. DES modes of
operation are used in conjunction with the NIST Federal Information
Processing Standard (FIPS) for data encryption (FIPS 46-3, October
1999), the contents of which are incorporated herein by
reference.
[0097] The NIST approved a FIPS for the AES, FIPS-197. This
standard specified "Rijndael" encryption as a FIPS-approved
symmetric encryption algorithm that may be used by U.S. Government
organizations (and others) to protect sensitive information. The
NIST FIPS-197 standard (AES FIPS PUB 197, November 2001) is
incorporated herein by reference.
[0098] The NIST approved a FIPS for U.S. Federal Government
requirements for information technology products for sensitive but
unclassified (SBU) communications. The NIST FIPS Security
Requirements for Cryptographic Modules (FIPS PUB 140-2, May 2001)
is incorporated herein by reference.
[0099] As is known in the art, RSA is a public key encryption
system which can be used both for encrypting messages and making
digital signatures. The letters RSA stand for the names of the
inventors: Rivest, Shamir and Adleman. For more information on RSA,
see U.S. Pat. No. 4,405,829, now expired, incorporated herein by
reference.
[0100] As is known in the art, "hashing" is the transformation of a
string of characters into a usually shorter fixed-length value or
key that represents the original string. Hashing is used to index
and retrieve items in a database because it is faster to find the
item using the shorter hashed key than to find it using the
original value. It is also used in many encryption algorithms.
[0101] Secure Hash Algorithm (SHA), is used for computing a secure
condensed representation of a data message or a data file. When a
message of any length <2.sup.64 bits is input, the SHA-1
produces a 160-bit output called a "message digest." The message
digest can then be input to other security techniques such as
encryption, a Digital Signature Algorithm (DSA) and others which
generates or verifies a security mechanism for the message. SHA-512
outputs a 512-bit message digest. The Secure Hash Standard, FIPS
PUB 180-1, Apr. 17, 1995, is incorporated herein by reference.
[0102] Message Digest-5 (MD-5) takes as input a message of
arbitrary length and produces as output a 128-bit "message digest"
of the input. The MD5 algorithm is intended for digital signature
applications, where a large file must be "compressed" in a secure
manner before being encrypted with a private (secret) key under a
public-key cryptosystem such as RSA. The IETF RFC-1321, entitled
"The MD5 Message-Digest Algorithm" is incorporated here by
reference.
[0103] As is known in the art, providing a way to check the
integrity of information transmitted over or stored in an
unreliable medium such as a wireless network is a prime necessity
in the world of open computing and communications. Mechanisms that
provide such integrity check based on a secret key are called
"message authentication codes" (MACS). Typically, message
authentication codes are used between two parties that share a
secret key in order to validate information transmitted between
these parties.
[0104] Keyed Hashing for Message Authentication Codes (HMAC), is a
mechanism for message authentication using cryptographic hash
functions. HMAC is used with any iterative cryptographic hash
function, e.g., MD5, SHA-1, SHA-512, etc. in combination with a
secret shared key. The cryptographic strength of HMAC depends on
the properties of the underlying hash function. The IETF RFC-2101,
entitled "HMAC: Keyed-Hashing for Message Authentication" is
incorporated here by reference.
[0105] As is known in the art, an Electronic Code Book (ECB) is a
mode of operation for a "block cipher," with the characteristic
that each possible block of plaintext has a defined corresponding
cipher text value and vice versa. In other words, the same
plaintext value will always result in the same cipher text value.
Electronic Code Book is used when a volume of plaintext is
separated into several blocks of data, each of which is then
encrypted independently of other blocks. The Electronic Code Book
has the ability to support a separate encryption key for each block
type.
[0106] As is known in the art, Diffie and Hellman (DH) describe
several different group methods for two parties to agree upon a
shared secret in such a way that the secret will be unavailable to
eavesdroppers. This secret is then converted into various types of
cryptographic keys. A large number of the variants of the DH method
exist including ANSI X9.42. The IETF RFC-2631, entitled
"Diffie-Hellman Key Agreement Method" is incorporated here by
reference.
[0107] However, the present invention is not limited to the
security or encryption techniques described and other security or
encryption techniques can also be used.
[0108] As is known in the art, the HyperText Transport Protocol
(HTTP) Secure (HTTPs), is a standard for encrypted communications
on the World Wide Web. HTTPs is actually just HTTP over a Secure
Sockets Layer (SSL). For more information on HTTP, see IETF
RFC-2616 incorporated herein by reference.
[0109] As is known in the art, the SSL protocol is a protocol layer
which may be placed between a reliable connection-oriented network
layer protocol (e.g. TCP/IP) and the application protocol layer
(e.g. HTTP). SSL provides for secure communication between a source
and destination by allowing mutual authentication, the use of
digital signatures for integrity, and encryption for privacy.
[0110] The SSL protocol is designed to support a range of choices
for specific security methods used for cryptography, message
digests, and digistal signatures. The security method are
negotiated between the source and destingation at the start of
establishing a protocol session. The SSL 2.0 protocol
specification, by Kipp E.B. Hickman, 1995 is incoroporated herein
by reference.
[0111] As is known in the art, Transport Layer Security (TLS)
provides communications privacy over the Internet. The protocol
allows client/server applications to communicate over a transport
layer (e.g., TCP) in a way that is designed to prevent
eavesdropping, tampering, or message forgery. For more information
on TLS see IETF RFC-2246, incorporated herein by reference.
[0112] In one embodiment, the security functionality includes Cisco
Compatible EXtensions (CCX). CCX includes security specifications
for makers of 802.11xx wireless LAN chips for ensuring compliance
with Cisco's proprietary wireless security LAN protocols. As is
known in the art, Cisco Systems, Inc. of San Jose, Calif. is
supplier of networking hardware and software, including router and
security products.
Exemplary Mesh Network Device
[0113] FIG. 2 is a block diagram illustrating an exemplary mesh
network device architecture 24. The architecture 24 includes, but
is not limited to, a mesh network device 26 comprising a universal
serial bus (USB) interface (UF) 28, a selectable communications
bit-interface (e.g., 16/32 bit) 30, a flash memory 32, an erasable
electronically programmable read only memory (EEPROM) 34, a
first-in-first-out (FIFO) buffer 36, a data-link chip 38 (e.g.,
Medium Access Control (MAC) chip, etc.), a baseband and/or ultra
wideband transciever (e.g., Zigbee, Bluetooth, WiFi, WiMax, etc.)
40, a wireless Radio Frequency (RF) antenna 42, a clock 44, and a
security interface 46.
[0114] The EEPROM 34 may include one or more software modules used
for networking (e.g., TCP/IP/UDP, etc.), security or for other
purposes. In one embodiment, the security interface 46 is not a
separate hardware interface but includes one more software modules
included in the EEPROM 34 or in the flash memory 32.
[0115] As is known in the art, a "baseband" transceiver is a
transceiver in which information is carried in digital form in one
or more channels on a transmission medium. A baseband includes any
frequency band on which information is superimposed, whether or not
a frequency band is multiplexed and on which digital information
can be sent on sub-bands.
[0116] In one embodiment, the mesh network device 26 further
comprises an external power source 48 (e.g., via USB, etc.), an
external flash memory or external disk drive 50, an external
wireless radio frequency (RF) front end 52 (e.g., a wireless RF
antenna, etc.) and an external host network device 54 (e.g.,
computer, PDA, mobile phone, etc.). The external flash or disk
drive 50 includes, but is not limited to, a removable device such
as a Compact Flash (CF), Secure Digital Card (SD), Memory Stick
(MS), Micro Drive, MultiMediaCard (MMC) xD-Picture Card (xD),
SmartMedia (SM) card or other removable device. However, the
present invention is not limited to this embodiment and more, fewer
or other components can also be used to practice the invention.
[0117] In one embodiment, the mesh network device 26 includes
Complementary Code Keying (CCK). As is known in the art, CCK is a
modulation scheme used with wireless networks (WLANs) that employ
the IEEE 802.11b specification. A complementary code includes a
pair of finite bit sequences of equal length, such that a number of
pairs of identical elements (e.g., one or zero) with any given
separation in one sequence are equal to a number of pairs of unlike
elements having the same separation in the other sequence.
[0118] In one embodiment, the mesh network device 26 includes
differential quadrature phase shift keying (DQPSK). DQPSK modulates
using differential quaternary phase shift keying. DQPSK transmits
only differences between values of a phase of a sin wave, rather
than a full absolute value. DQPSK makes use of two carrier signals,
separated by 90-degrees. The output is a baseband representation of
the modulated signal.
[0119] In one embodiment, the mesh network device 26 includes
differential binary phase shift keying (DBPSK). DBPSK modulates
using the differential binary phase shift keying. DBPSK maps phase
differences of .theta. and .pi.+.theta., respectively, to outputs
of zero and one, respectively, where .theta. is a phase rotation
parameter. The output is a baseband representation of the modulated
signal.
[0120] In one embodiment, the mesh network device 26 includes
Orthogonal frequency division multiplexing (OFDM). OFDM is also
called discrete multi-tone modulation (DMT) and is a transmission
technique based upon the idea of frequency-division multiplexing
(FDM) where multiple signals are sent out at different frequencies.
OFDM uses a composite of narrow channel bands to enhance its
performance in high frequency bands (such as 5.x GHz) in urban and
rural applications where building clutter and foliage can
negatively impact the propagation of radio waves for wireless
devices.
[0121] In one embodiment, the mesh network device 26 includes
Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA).
CSMA/CA is a data-link layer protocol used in the data-link chip 38
for carrier transmission in 802.11xx networks. CSMA/CA acts to
prevent collisions before they happen.
[0122] In one embodiment, the mesh network device 26 is an internal
device to a mesh network device 12, 14, 16, 22. In another
embodiment, the mesh network device an external portable removable
device as illustrated in FIG. 3. However, the present invention is
not limited to such an embodiment and other embodiments can be used
to practice the invention.
[0123] FIG. 3 is a block diagram illustrating an outer view 56 of a
specific exemplary implementation 58 of the mesh network device 26
of FIG. 2.
[0124] FIG. 3B is a block diagram illustrating an inner view 59
specific exemplary implementation 58 of the mesh network device of
FIG. 3A. Mesh network device 26 can be used as an embedded
component in other electronic devices (e.g., mobile phone, PDA,
smart phone, etc.) with or without the USB interface component
28.
[0125] In one embodiment, the mesh network device 58 further
comprises a first light emitting diode (LED) 60 indicating when the
mesh network device is connected to a mesh network or partial mesh
network and a second LED 62 indicating whether the mesh network
device is active. The mesh network device 58 further includes a
cover 64 for the USB interface 28.
[0126] In one specific exemplary embodiment, the mesh network
device 58 is called "MOBEE.RTM." and is a self-contained USB
based-mesh network device for exchanging multimedia content between
mesh network devices (e.g., host devices, PC/Laptop/PDA/Smart
Phone/Mobile/Smart Home devices, etc.) through a meshed mobile
network to maximize communication portability.
[0127] In one embodiment, functionality of the mesh network device
58 is implemented in a software application 61. In such an
embodiment, the software application 58 uses a wireless
communications interface integral to mesh network device 14, 16,
18, 22. In one specific embodiment, the software application 61 is
a software application for a smart phone 16 or a tablet computer
22. However, the present invention is not limited to such an
embodiment and other types of software applications can be used to
practice the invention.
[0128] In one embodiment, a mesh network device 26, 58 further
includes a Smart Transducer Interface Modules (STIM) with an Ultra
wideband transceiver (e.g., in a physical layer), a mesh network
protocol adapter (e.g., in a data-link layer (e.g. MAC layer, with
CCK, DBPSK, OFDM encoding etc.)) and authentication and encryption
software (e.g., in data-link layer).
[0129] Ultra-wideband (UWB) refers to a radio communications
technique based on transmitting very-short-duration pulses, often
of duration of only nanoseconds or less, whereby the occupied
bandwidth goes to very large values.
[0130] In another embodiment, the mesh network device 58 includes a
Wireless Sensor Portal (WSP) with a Thin Film Transistor (TFT)
high-resolution user graphic interface (GUI) 65 for displaying WSP
information and sensor topology information and an Organizing Agent
(OA). The OA manages the WSP and TFT. The OA is also responsible
for collecting and organizing sensor data in a fashion that allows
for a particular class of mesh network queries to be answered.
However, the present invention is not limited to these embodiments
and other embodiments can also be used.
[0131] As is known in the art, a TFT is type of LCD flat panel
display screen in which each pixel is controlled by one to four
transistors. TFT displays are sometimes called active matrix Liquid
Crystal Diodes (LCDs).
[0132] In one exemplary embodiment, the mesh network device 26, 58
is a tiny device that integrates at least three elements together:
(1) a wireless baseband module 40 such as 802.11g/b/a, 802.15.4
(ZigBee), Bluetooth, Ultra wideband 802.16x, (e.g., WiMAX, etc.)
etc. (2) a flash memory 32; and (3) an external power source 46.
The mesh network device 26, 58 may further include an external
removable memory module 48 such as a Secure Digital (SD) card, Pro
Multimedia Card (MMC), Memory Stick (MS), Microdrive, XD card or
other external storage cards. However, the present invention is not
limited to this embodiment and more, fewer or other components can
also be used to practice the invention.
[0133] In one embodiment the mesh network device 26, 58 includes at
least the features illustrated in Table 1. However, the present
invention is not limited to the features listed in Table 1 and
more, fewer or other components can also be used to practice the
invention.
TABLE-US-00001 TABLE 1 Wireless module such as: IEEE802.11a/b/g,
IEEE 802.15.4 (ZigBee), Bluetooth, Ultra wideband, or IEEE 802.16
(WiMAX) Wireless + NAND Flash combo solution with external
removable Flash memory such as Secure Digital (SD) card, Pro
Multimedia Card (MMC), Memory Stick (MS), Microdrive, and XD. Mesh
networking and WPAN software USB 2.0 interface and compatible with
USB 1.1 IEEE 1394 TCP/IP/UDP Programmable wireless RF interface
High level security includes, but are not limited to,
WEP64/128/256, WPA (HW TKIP support) and AES128. Auto-installation
function Software wireless access point
[0134] In another embodiment, the specific implementation 58 of the
mesh network of FIG. 3 includes at least the features illustrated
in Table 2. However, the present invention is not limited to the
features listed in Table 2 and more, fewer or other components can
also be used to practice the invention.
TABLE-US-00002 TABLE 2 Wireless Standards IEEE 802.11b/g, 802.15.4
Host Interface 28 USB 2.0 Plug and Play Wireless Antenna Connector
42 Chip Antenna Frequency Range 2.412 GHz-2.4835 GHz Number of
Selectable Channels USA, Canada: 11 channels Europe: 13 channels
Asia (e.g, Japan): 14 channels Modulation Techniques Direct
Sequence Spread Spectrum (CCK, DQPSK, DBPSK) Orthogonal frequency
division multiplexing (OFDM) Security 46 64/128/256 bit WEP, WPA,
WPA2, CCX1.0, CCX2.0, 802.1x Data-Link 38 Protocol CSMA/CA
(Collision Avoidance) with acknowledgment Output RF Power 11 g: 13
dBM 11 b: 16 dBM Sensitivity -71 dBM@54 Mbps -84 dBM@11 Mbps Data
Rate 802.11 g (54 Mbps, 48 Mbps, 36 Mbps, 24 Mbps, 18 Mbps, 12
Mbps, 9 Mbps, 6 Mbps) 802.11 b (11 Mbps, 5.5 Mpbs, 2 Mbps, 1 Mbps)
Throughput 33 Mbps @ 11 g + mode 24 Mbps @ 11 g mode LEDs 58, 60
Link: Green Active: Green Weight 10 g Dimensions 71.5 mm (L)
.times. 19 mm (W) .times. 9 mm (H) Power 48 Requirements Operating
Voltage: 5 V DC Continuous TX Current: 350 mA @54 Mbps Continuous
TX Current: 330 mA @11 Mbps Continuous RX Current: 245 mA Typical
Current 240 mA
Exemplary Mesh Network Device Method of Use
[0135] FIG. 4 is a flow diagram illustrating a Method 66 for mobile
mesh networking. At Step 68, a first mobile mesh network device
(e.g., 14) moves within a pre-determined distance of a second
mobile mesh network device (e.g., 16), wherein the second mobile
mesh network device 16 is also moving. At Step 70, mobile mesh
network data is exchanged over a secure communications channel
between the first mobile mesh network 14 and the second mesh
network device 16. At 72, the mesh network data is verified on the
second mobile mesh network device. At Step 74, the verified mesh
network data is distributed to other mesh network devices (e.g.,
18), if any, on the mesh network 12, thereby creating an N-way
mobile mesh network 12 between the plural network devices 14, 16,
18.
[0136] Method 66 is illustrated with an exemplary embodiment.
However, the present invention is not limited to such and
embodiment and other embodiments can also be used to practice the
invention. In such an exemplary embodiment at Step 68, a first
mobile mesh network device (e.g., 14) moves within a pre-determined
distance of a second mobile mesh network device (e.g., 16). The
first mobile mesh network device 14 and the second mobile mesh
network device 16 include implementations 26, 58 described
above.
[0137] At Step 70, mesh network data is exchanged over a secure
communications channel between the first mobile mesh network 14 and
the second mesh network device 16 to create a mobile mesh network
12. The mesh network data includes, but is not limited to, routing
data, spatial data, mesh network load data and other mesh network
data.
[0138] At 72, the mesh network data is verified o the second mesh
network device 16. The verification includes verifying routing
paths, spatial data, mesh network load data and other mesh network
data.
[0139] At Step 74, the verified mesh network device is distributed
to other mesh network devices (e.g., 18), if any, on the mesh
network 12, thereby creating an N-way mobile mesh network 12
between the plural network devices 14, 16, 18.
[0140] FIG. 5 is a block diagram 76 illustrating an N-way mesh
network formed using the mesh network device of FIG. 2. FIG. 5
illustrates two additional network devices including a television
78 and a laptop computer 80. The network devices 14, 16, 18, 22,
78, 80 in FIG. 5 are attached to the mesh network device 26 that is
used to create an N-way mesh network. FIG. 5 illustrates a full
mesh topology 12. However, the mesh network devices 26,58 can also
be used to form a partial mesh topology 20 (not illustrated in FIG.
4).
Wireless Mesh Sensor Networks
[0141] Wireless sensor networks provide distributed network and
Internet access to sensors, controls, and processors that are
deeply embedded in equipment, facilities, and the environment.
Wireless sensor networks provide monitoring and control capability
for applications in transportation, manufacturing, health care,
environmental monitoring, and safety and security. Wireless sensor
networks provide low power signal processing, low power
computation, and low power, low cost wireless networking capability
in a compact system. Wireless sensor networks provide sensing,
local control, and embedded intelligent systems in structures,
materials, and environments.
[0142] In one embodiment, the mesh network device 26, 56 is an
embedded mesh network device. In such an embodiment, the mesh
network device 26, 56 is embedded into a mobile telephone, PDA,
hand-held gaming device, smart phone, RFID tag, and other
portable/mobile electronic devices.
[0143] In another embodiment, the mesh network device 26, 56 is a
wireless mesh network sensor to collect and monitor spatial data.
In such an embodiment, the mesh network device 26, 56 may include
only selected ones of the components illustrated in FIG. 2 to make
the wireless mesh sensor device simpler, smaller and less
expensive.
[0144] Mesh sensor networks are used to determine spatial data
including the location of objects. Location prediction is used to
determine locations of a spatial phenomenon from maps of other
spatial features such as building walls, natural phenomenon such as
mountains, etc.
[0145] The method and system described herein also integrate
wireless and wired sensor data acquisition for distributed sensing
and monitoring for example, for rocket propulsion testing,
agricultural efficiency, coastal management, disaster management,
ecological forecasting, energy management, homeland security, and
detecting ice accretion and detection of emissions, air quality,
other data sensed around specific environments and other
applications.
[0146] The method and apparatus described herein can be used for at
least these exemplary applications: (1) Sensing and monitoring for
Aircraft--icing on wings--data from heaters and sensors; (2)
Aircraft emissions--collection of data around airports; (3)
Verification and validation of equipment (e.g., Radio Frequency
Identifiers "RFID"); and (4) Security--geo-location and personal
location. However, the present invention is not limited to these
applications and the present invention can be applied to other
applications.
[0147] The method and apparatus described herein may provide at
least the following advantages: (1) Spatial data is Extremely
Difficult to Intercept--Wideband pulsed radar spreads the signal
and allows more users access to a limited amount of scarce
frequency spectrum, thus allowing spectrum reuse; (2) Multipath
Immunity--A low path loss and low energy density minimizes
interference to other services. UWB is very tolerant of
interference, enabling operation within buildings, urban areas, and
forests; (3) Precision Network-wide timing--Real-time, continuous
position location down to a centimeter of resolution results in
precision geolocation systems (4) Low Cost--Requires minimal
components resulting in small size and weight; (5) Low
Power--Typical consumption is in microwatts; and (6) Antennas--Can
be very small (2 cm) because they are non-resonant.
Mesh Network Device Dynamic Information Exchange
[0148] FIG. 6 is a flow diagram illustrating a Method 78 for
dynamic information interchange for mesh network devices. At Step
80, a first set of profile information is received on a first mesh
network device. At Step 82, a wireless signal is periodically sent
from the first network device to a mesh network including plural
other mesh network devices including other sets of profile
information. At Step 84, one or more wireless signals from the
plural other mesh network devices on the mesh network are received
on the first mesh network device. The one or more wireless signals
include other sets of profile information stored on the plural of
other mesh network devices. At Step 86, a test is conducted to
determine from the received one or more wireless signals whether
any items in first set of profile information on the first network
device match any items in other sets of profile information stored
on the plural other mesh network devices. At Step 88, if any
profile items match, a set of data is exchanged between the first
network device and the one or more other mesh network devices via
the mesh network.
[0149] Method 78 is illustrated with one exemplary embodiment.
However, the present invention is not limited to such an embodiment
and other embodiments can also be used to practice the
invention.
[0150] In such an exemplary embodiment at Step 80, the mesh network
device 56 is equipped with a short-range wireless module and flash
memory as is illustrated in FIGS. 2 and 3. In another embodiment,
the small mesh network device is embedded within an audio player
(e.g., MP3 player, etc.) or other popular handheld devices.
[0151] At Step 80, the user profile information 91, 91' (FIG. 7)
includes, but is not limited to, an e-mail address, an IP address,
a hardware address (e.g., Medium Access Control (MAC) address,
etc.), a URL, a name, an address, an telephone number, an instant
message identifier, a text message identifier, a encryption key, a
digital signature, a secure message digest, a security identifier,
a mesh network identifier or other types of profile information
such as advertisements, public or emergency notices, location
specific information including location-aware information and/or
physical location information (e.g., Global Positioning Satellite
(GPS) information, street address information, two-dimensional (2D)
(e.g., X,Y) (e.g., building, floor), three-dimensional (3D) (X, Y,
Z) (e.g., building, floor, floor location) or other physical
location information. However, the present invention is not limited
to such profile information and other profile information can also
be used.
[0152] At Step 80, a user profile 91 is entered or edited through a
template stored on the mesh network device 56 or via a web-site on
a server on the mesh network 12 or on another public or private
network such as the Internet or an intranet. The user profile 91 is
saved to the first mesh network device 56 via USB connection.
Personal information is stored in the flash 32. The user of the
mesh network device selects one, several or all of the items in the
user profile to match to user profiles in other mesh network
devices. The profile information may also be entered through the
display 66.
[0153] At Step 82, a wireless signal is periodically sent out via
the wireless antenna 42 periodically to the mesh network 12. (e.g.,
sent out to other mesh network devices up to 10 meters away).
[0154] The user profile includes virtually any type of information
such as, gender, age, Looking for . . . , Hobby, e-mail address,
home address, home telephone number, work information, advertising,
etc.
[0155] At Step 84, one or more wireless signals from the plural
other mesh network devices 56', 56'' on the mesh network 12 are
received on the first mesh network device 56. The one or more
wireless signals include other sets of profile information stored
on the plural of other mesh network devices 56', 56''.
[0156] At Step 86, a test is conducted to determine if the first
set of profile information matches any other sets of profile
information stored on other mesh network devices 56', 56'', and if
so, the first mesh network device 56 exchanges a set of data with
the one or more other mesh network devices 56', 56''.
[0157] At Step 88, when a mesh network device 56' 56'', etc.
matches any selected information (one, several, all items) in the
first mesh network device 56, data is dynamically exchanged
wirelessly and stored on each other's Flash memory in the mesh
network devices. In one embodiment, the data is securely exchanged
using a pre-determined security and/or encryption method.
[0158] The received data is retrievable via display 66, a computer
or other interface (e.g., web-site page, etc.). The data
dynamically exchange includes one, several or all items stored in
the profile and/or other types of data stored on the mesh network
devices. For example, a user of the first mesh network device 26,
56, may wish to dynamically exchange audio files such as MP3 files,
etc. with a friend's mesh network device 26', 56'. At Step 88, the
two mesh user devices 26, 56 and 26' and 56' may exchange MP3 files
based on a set of designated e-mail addresses (e.g., the first
user's and the friend's e-mail, etc.).
[0159] As is known in the art Motion Picture Expert Group (MPEG)
Audio Layer 3, more commonly referred to as "MP3," is a popular
encoding format for audio information.
[0160] In such an example both the user profile on the first mesh
network device 26, 56 and the friend's mesh network device 26', 56'
may include both e-mail addresses. In another embodiment, the user
profiles may only include one designated e-mail address (e.g., the
e-mail address of the user of the first mesh network device,
etc.).
[0161] FIG. 7 is a block diagram illustrating a data flow 90 for
dynamic information interchange for mesh network devices using
Method 78.
[0162] FIG. 8 is a flow diagram illustrating a Method 90 for
enabling dynamic information interchange for mesh network devices.
At Step 92, a user profile template is activated on a first mesh
network device. At Step 94, plural profile information items are
received on the first network device for the profile template. At
Step 96, the profile information in the profile template is stored
in non-volatile storage on the first mesh network device. At Step
98, a wireless signal including the stored profile information is
periodically broadcast from the first mesh network device to plural
other mesh network devices on a mesh network. The stored profile
information allows the first mesh network device to exchange data
with one or more of the plural other mesh network devices on the
mesh network whose stored profile information that matches any of
stored profile information of the first mesh network device.
[0163] Method 90 is illustrated with one exemplary embodiment.
However, the present invention is not limited to such an embodiment
and other embodiments can also be used to practice the
invention.
[0164] In such an exemplary embodiment at Step 92, a user profile
template 91 is activated on a first mesh network device 26, 56. In
one embodiment the user profile template 91 is activated when a
user plugs the mesh network device 26, 56 in a USB port on a
computer or other device. In such an embodiment, flash 32 or EEPROM
34 includes a URL to allow the first mesh network device to obtain
a profile template. The URL is used to access the user profile
template 91 at another location on the mesh network 12. In such an
embodiment, a user is directed via the URL to a user login page or
web page from which the user is allowed to obtain, view and fill a
profile template 91.
[0165] In another embodiment, at Step 92 the user profile template
91 is stored directly in flash 32 or EEPROM 34 of the first mesh
network device 26, 56 and is activated as part of an initialization
sequence for the first mesh network device 26, 56. In such an
embodiment, the profile template can be re-activated at a later
time to change profile items.
[0166] In one embodiment, the profile template is securely stored
using a pre-determined security and/or encryption method.
[0167] In either embodiment, the profile items can be viewed via
display 65 or via host 54 (e.g., a user computer via a USB port,
etc).
[0168] At Step 94, plural profile information items are received on
the first network device 26, 56 for the user profile template
91.
[0169] At Step 96, the profile information in the user profile
template 91 is stored in non-volatile storage (e.g., flash 32,
etc.) on the first mesh network device 26, 56. The profile
information may also be stored in other devices (e.g., a mesh
network server) on other locations on the mesh network 12. For
example, if the profile template was activated via a URL, the
profile template items may also be stored on the device identified
by the URL.
[0170] At Step 98, a wireless signal including the stored profile
information is periodically broadcast from the first mesh network
device 26, 56 to plural other mesh network devices 56', 56'' on the
mesh network 12. The stored profile information allows the first
mesh network device to exchange data with one or more of the plural
other mesh network devices on the mesh network whose stored profile
information that matches any of stored profile information of the
first mesh network device using Method 78 and other methods.
Social Networking Mesh Network Device Dynamic Information
Exchange
[0171] FIGS. 9A and 9B are a flow diagram illustrating a Method 100
for dynamic information interchange for location aware mesh network
devices. In FIG. 9A at Step 102, a wireless message including a
first set of profile information is received from a first mesh
network device with one or more processors on a second network
device with one or more processors over a wireless mesh network.
The first mesh network device includes an ultra wideband wireless
transceiver and a mesh network protocol adapter with Complementary
Code Keying (CCK), Differential Quaternary Phase Shift Keying
(DQPSK) or Orthogonal Frequency Division Multiplexing (OFDM)
encoders. The second network device resides at a pre-determined
physical location. At Step 104, The second network device obtains
from the first set of profile information in the received wireless
message a list of electronic identifiers for plural designated
social contacts of an owner of the first mesh network device,
wherein each of the plural designated social contacts include one
or more electronic identifiers for one or more designated social
contact network devices or one more social networking web-sites. At
Step 106, a first set of plural different types of wireless or
wired communications messages are sent from the second network
device over the wireless mesh network or a wired mesh network to
selected ones of the one or more designed social contact network
devices indicating the first message network device is physically
located at a pre-determined distance from the pre-determined
physical location of the second network device. The first set of
the plurality of types of wireless and wired communications
messages include an invitation message to join the owner of the
first message network device at the pre-determined physical
location of the second network device. In FIG. 9B at Step 108, a
second set of a plural different types of wireless or wired
communications messages are sent from the second network device to
other selected ones of the one or more designed location contact
network devices and to one more social networking web-sites over
the non-mesh communications network indicating the first message
network device is physically located at the pre-determined distance
from pre-determined physical location of the second network device.
The second set of plural types of wireless and wired communications
messages include an invitation message to join the owner of the
first message network device at the pre-determined physical
location of the second network device.
[0172] Method 100 is illustrated with one exemplary embodiment.
However, the present invention is not limited to such an embodiment
and other embodiments can also be used to practice the
invention.
[0173] In such an exemplary embodiment in FIG. 9A at Step 102, a
wireless message including a first set of profile information 91 is
received from a first mesh network device (e.g., 14, 26, 56, etc.)
with one or more processors on a second network device 25 with one
or more processors over a wireless mesh network 12. The first mesh
network device 14, 26, 56 includes an ultra wideband wireless
transceiver 40 and a mesh network protocol adapter with
Complementary Code Keying (CCK), Differential Quaternary Phase
Shift Keying (DQPSK) or Orthogonal Frequency Division Multiplexing
(OFDM) encoders (Table 1 and 2, etc.).
[0174] The second network device resides at a pre-determined
physical location. For example, the second network device may be a
wireless access point at a coffee shop, retail store, bar,
restaurant, park, health club, recreational facility, etc.
[0175] In one embodiment, the ultra-wideband wireless transceiver
40 includes a (WiMAX) wireless transceiver. In another embodiment,
the first mesh network device 14, 26, 56 includes a baseband
wireless transceiver 40. However, the present invention is not
limited to the wireless transceivers described and other wireless
transceivers can also be used to practice the invention.
[0176] In one embodiment, first mesh network device 14 includes a
mobile telephone, personal digital/data assistant (PDA), smart
phone, Radio Frequency IDentification (RFID) tag, RFID sensor or
RFID biometric tag mesh network device or a the mesh network device
26, 56 is embedded into another non-mesh network device 16, 18, 22.
However, the present invention is not limited to the mesh network
devices described and other mesh network devices and other non-mesh
network devices can also be used to practice the invention.
[0177] In one embodiment, the second network device 25 includes a
mesh or non-mesh server network device, a gateway, router, switch,
wired access point, wireless access point or Radio Frequency
IDentification (RFID) sensor portal, RFID tag portal, or RFID
biometric tag portal network device. The second network device 25
also includes a mesh network device 14, 16, 18, 22, 26, 56, etc.
However, the present invention is not limited to the network
devices described and other network devices and/or mesh network
devices and/or non-mesh network devices can also be used to
practice the invention.
[0178] At Step 104, The second network device 25 obtains from the
first set of profile information 91 in the received wireless
message a list of electronic identifiers for plural designated
social contacts of an owner of the first mesh network device 14,
26, 56, wherein each of the plural designated social contacts
include one or more electronic identifiers for one or more
designated social contact network devices 16, 18, 22 or one more
social networking web-sites 19 (e.g., FACEBOOK, U-TUBE, TWITTER,
MY-SPACE, MATCH.COM, E-HARMONY, etc.), electronic couponing sites
(e.g., GROUPON, SOCIAL LIVING, etc.), etc. The social networking
web-sites include dating web-sites, blogs, RSS feeds, and other
types of information web-sites in which messages can be left or
posted for a variety of activities. However, the present invention
is not limited to the social networking sites described and other
public and private social networking sites can also be used to
practice the invention.
[0179] In one embodiment, the first set of profile information 91
includes an e-mail address, an Internet Protocol (IP) address, a
hardware address, a universal resource locator (URL), a name, a
street address, a telephone number, an instant message identifier,
a text message identifier, a encryption key, a digital signature, a
secure message digest, a security identifier, a mesh network
identifier, a physical location information, public or emergency
notices or location specific information including location-aware
information or a social networking web-site login identifier
However, the present invention is not limited to the first set of
profile information described and more fewer or other types of
profile information 91 can also be used to practice the
invention.
[0180] In one embodiment, the one or more electronic identifiers
for one or more designated location contact network devices include
a telephone number, an e-mail identifier, an instant message
identifier, a text message identifier, a multi-media identifier, a
mesh network identifier, a Radio Frequency Identifier (RFID)
identifier or a social networking web-site login identifier.
However, the present invention is not limited to the electronic
identifiers described and other electronic identifiers can also be
used to practice the invention.
[0181] At Step 106, a first set of plural different types of
wireless or wired communications messages are sent from the second
network device 25 over the wireless mesh network 3 or wired mesh
network 5 to selected ones of the one or more designed social
contact network devices 16, 18, 22 indicating the first message
network device 14 is physically located at a pre-determined
distance 21 from the pre-determined physical location of the second
network device 25. The first set of the plurality of types of
wireless and wired communications messages include an invitation
message to join the owner of the first message network device 14,
26, 56 at the pre-determined physical location of the second
network device 25.
[0182] For example, a user of a mesh network device 14, 26, 56, may
be in close proximity to other mesh network devices 16, 18, 22,
etc. that form a mesh network 12 or a partial mesh network 20
because of their close proximity. Step 106 is used to send messages
directly on the mesh network 12 or partial mesh network 20 without
having to use a non-mesh network 25 (e.g., the Internet, etc.).
This allows for much faster message sending and receiving than can
be accomplished by accessing and using a non-mesh network 25. The
mesh network 12 and partial mesh network are ad hoc networks. Mesh
network devices join and leave the mesh network by moving in range
and out of range of other mesh network devices.
[0183] In one embodiment, the first set of plural different types
of wireless or wired communications messages include text messages,
instant messages, multi-media messages, voice messages, RFID
messages, social networking site messages (e.g., FACEBOOK post, a
TWITTER tweet, etc.)
[0184] For example, the first mesh network device 14, 26, 56 may be
located inside a coffee shop within 250 feet of the second network
device 25 which may include a wireless access point, etc.
[0185] In FIG. 9B at Step 108, a second set of a plural different
types of wireless or wired communications messages are sent from
the second network device 25 to other selected ones of the one or
more designed social contact network devices 16, 18, 22 and to one
more social networking web-sites 19 over the non-mesh
communications network 23 indicating the first message network
device 14 is physically located at the pre-determined distance 21
from pre-determined physical location of the second network device
25. The second set of plural types of wireless and wired
communications messages include an invitation message to join the
owner of the first message network device 14 at the pre-determined
physical location of the second network device 25.
[0186] For example, there are likely mesh network devices and
non-mesh network devices that are not on a mesh network 12 or
partial mesh network 20 that are included in the user profile
information 91 associated with the first mesh network device 14,
26, 56. Such devices are contacted using a non-mesh network 23 such
as the Internet, PSTN, an intranet, etc.
[0187] In one embodiment, if the second network device is
successful using Step 106 to contact a designated social contact
network device, then Step 108 is not executed. In another
embodiment, both step 106 and 108 are executed to ensure all
designate social contact network devices are contacted on mesh
networks and non-mesh networks.
[0188] In one embodiment, the first set and second set of the
plural different types of wireless communications messages include
an IEEE 802.15.4 (ZigBee), IEEE 802.11a, 802.11b, 802.11g, 802.11n,
802.16a, 802.16g, Bluetooth or Infrared wireless protocol
communications messages. However, the present invention is not
limited to the wireless communications messages described and more,
fewer or other types of wireless communications messages can also
be used to practice the invention.
Activity Event Mesh Network Device Dynamic Information Exchange
[0189] FIGS. 10A and 10B are a flow diagram illustrating a Method
110 for dynamic information interchange for location aware mesh
network devices. In FIG. 10A at Step 112, a selected type of
wireless communications message from a first set of plural wireless
activity messages is sent over a wireless mesh network or a
wireless non-mesh communications network from a first mesh network
device with one or more processors to a second network device with
one or more processors located at a pre-determined physical
location. The first mesh network device includes an ultra wideband
wireless transceiver and a mesh network protocol adapter with
Complementary Code Keying (CCK), Differential Quaternary Phase
Shift Keying (DQPSK) or Orthogonal Frequency Division Multiplexing
(OFDM) encoders. The first set of plural wireless activity messages
includes: a first type of wireless activity message including a
security identification authorization message to determine if the
first mesh network device is allowed access to a secure area within
a pre-determined distance of the pre-determined physical location
of the second network device, a second type of wireless activity
message including a building management message to dynamically and
automatically manage heating, ventilation or air conditioning
(HVAC) of an area with the pre-determined distance of the
pre-determined physical location of the second network device, or a
third type of wireless activity message including a emergency
location information message that includes physical location
information to dynamically and automatically locate the first mesh
network device at a three dimensional (3D) physical location in the
building at the pre-determined physical location of the second
network device in the event of an emergency situation. At Step 114,
the first mesh network device receives over the wireless mesh
network or the wireless non-mesh communications network from the
second network device a request for a first set of profile
information stored on the first mesh network device in response to
sending the selected type of wireless communications message. At
Step 116, the first set of profile information is sent from the
first mesh network device to the second network device over the
wireless mesh network or the wireless non-mesh communications
network. In FIG. 10B At Step 118, one or more wireless
acknowledgement messages are received on the first mesh network
device from the second network device over the wireless mesh
network or the wireless non-mesh communications network indicating
that the second network device has acknowledged the first mesh
network device being physically located within the pre-determined
distance of the physical location of the second network device.
[0190] FIG. 11A is a block diagram 120 illustrating a mesh activity
message 122 for entering a secure area 124.
[0191] FIG. 11B is a block diagram 126 illustrating a mesh activity
message 128 for automatically and dynamically managing HVAC
130.
[0192] FIG. 11C is a block diagram illustrating a mesh activity
message 132 for providing 3D emergency location information
134.
[0193] Method 110 is illustrated with one exemplary embodiment.
However, the present invention is not limited to such an embodiment
and other embodiments can also be used to practice the
invention.
[0194] In such an exemplary embodiment in FIG. 10A at Step 112,
selected type of wireless communications message from a first set
of plural wireless activity messages is sent over a wireless 3 mesh
network 12 or a wireless non-mesh communications network 23 from a
first mesh network device (e.g., 14, 26, 56, etc.) with one or more
processors to a second network device 25 with one or more
processors located at a pre-determined physical location. The first
mesh network device 14, 26, 56 includes an ultra wideband wireless
transceiver 40 and a mesh network protocol adapter with
Complementary Code Keying (CCK), Differential Quaternary Phase
Shift Keying (DQPSK) or Orthogonal Frequency Division Multiplexing
(OFDM) encoders.
[0195] The first set of plural wireless activity messages includes
the first type of wireless activity message 122 (FIG. 11A)
including a security identification authorization message to
determine if the first mesh network device 14, 26, 56, is allowed
access to a secure area 124 (e.g., room, laboratory, building,
etc.) within a pre-determined distance 21 of the pre-determined
physical location of the second network device 25.
[0196] The first set of plural wireless activity messages further
includes the second type of wireless activity message 128 (FIG.
11B) including a building management message to dynamically and
automatically manage heating, ventilation or air conditioning
(HVAC) 130 of an area with the pre-determined distance 21 of the
pre-determined physical location of the second network device
25.
[0197] The first set of plural wireless activity messages further
includes the third type of wireless activity message 134 (FIG. 11C)
including a emergency location information message that includes
physical location information to dynamically and automatically
locate the first mesh network device 14, 26, 56 at a three
dimensional (3D) physical location 136 in the building at the
pre-determined physical location of the second network device 25 in
the event of an emergency situation.
[0198] Returning to FIG. 10A at Step 114, the first mesh network
device 14, 26, 56 receives over the wireless 3 mesh network 12 or
the wireless non-mesh communications network 23 from the second
network device 25 a request for a first set of profile information
stored on the first mesh network device 14, 26, 56 in response to
sending the selected type of wireless communications message.
[0199] At Step 116, the first set of profile information is sent
from the first mesh network device 14, 26, 56 to the second network
device 25 over the wireless 3 mesh network 12 or the wireless
non-mesh communications network 23.
[0200] In FIG. 10B at Step 118, one or more wireless
acknowledgement messages are received on the first mesh network
device 14, 26, 56 from the second network device 25 over the
wireless 3 mesh network 12 or the wireless non-mesh communications
network 23 indicating that the second network device 25 has
acknowledged the first mesh network device 14, 26, 56 being
physically located within the pre-determined distance of the
physical location of the second network device 25.
[0201] In one embodiment, Method 110 further includes the
additional steps of: the selected type of wireless communications
message is received over the wireless 3 mesh network 12 or a
wireless non-mesh communications network 23 on the second network
device 25. The second network device 25 sends the first mesh
network device 14, 26, 56 over the wireless 3 mesh network 12 or
the wireless non-mesh communications network 23 a request for a
first set of profile information 91 stored on the first mesh
network device 14, 26, 56 in response to receiving the selected
type of wireless communications message. The first set of profile
information 91 from the first mesh network device 14, 26, 56 is
received on the second network device 25 over the wireless 3 mesh
network 12 or the wireless non-mesh communications network 23. The
one or more wireless acknowledgement messages are sent to the first
mesh network device 14, 26, 56 from the second network device 25
over the wireless 3 mesh network 12 or the wireless non-mesh
communications network 23 indicating that the second network device
25 has acknowledged the first mesh network device 14, 26, 26 being
physically located within the pre-determined distance 21 of the
physical location of the second network device 25. The first set of
profile information 91 is stored in a non-transitory computer
readable medium (e.g., database, etc.) on the second network device
25 to indicate the first mesh network device being physically
located within the pre-determined distance 21 of the physical
location of the second network device 25. However, the present
invention is not limited the additional steps described and more,
fewer or other steps can also be used to practice the
invention.
[0202] The dynamic information exchange includes allowing a mesh
network device to communicate location information with a network
device at pre-determined physical location and invite social
contacts of the mesh network device to come to the pre-determined
physical location. The network device sends various types of
electronic messages (e.g., text message, e-mail, etc.) on a mesh
network and/or a non-mesh communications network (e.g., the
Internet, etc.) and to social networking sites. The dynamic
information exchange also includes exchanging plural activity
messages including a security identification authorization message
for allowing access to a secure area, a building management message
for automatically and dynamically managing heating, ventilation
and/or air conditioning (HVAC) and/or an emergency location message
for providing three-dimensional (3D) emergency location
information.
[0203] The dynamic information exchange includes allowing a mesh
network device to communicate location information with a network
device at pre-determined physical location and invite social
contacts of the mesh network device to come to the pre-determined
physical location. The network device sends various types of
electronic messages (e.g., voice, text message, e-mail, etc.) on a
mesh network and/or a non-mesh communications network (e.g., the
Internet, etc.) and to social networking sites. The dynamic
information exchange also includes exchanging plural activity
messages including a security identification authorization message,
a building management message and/or an emergency location
message.
Bar Codes
[0204] A "barcode" is an optical machine-readable representation of
data, which shows data about the object to which it attaches.
Originally, barcodes represented data by varying the widths and
spacings of parallel lines, and may be referred to as linear or 1
dimensional (1D). Later they evolved into rectangles, dots,
hexagons and other geometric patterns in 2 dimensions (2D).
Although 2D systems use a variety of symbols, they are generally
referred to as barcodes as well. Barcodes originally were scanned
by special-optical scanners called barcode readers, scanners and
interpretive software are available on devices including desktop
printers (not illustrated) and smart phones 16 and tablet computers
22.
[0205] Table 3 illustrates exemplary linear barcodes, the standards
of all of which are incorporated by reference. However, the present
invention is not limited to the exemplary linear barcodes listed in
Table 3, and more fewer and other linear barcodes can also be used
to practice the invention.
TABLE-US-00003 TABLE 3 Linear Bar Codes U.P.C. Codabar Code 25 -
Non-interleaved 2 of 5 Code 25 - Interleaved 2 of 5 Code 39 Code 93
Code 128 Code 128A Code 128B Code 128C Code 11 CPC Binary DUN 14
EAN 2 EAN 5 EAN 8, EAN 13 Facing Identification Mark GS1-128
(formerly known as UCC/EAN-128), incorrectly referenced as EAN 128
and UCC 128 GS1 DataBar, formerly Reduced Space Symbology (RSS)
HIBC (HIBCC Health Industry Bar Code) ITF-14 Latent image barcode
Pharmacode Plessey PLANET POSTNET Intelligent Mail barcode MSI
PostBar RM4SCC/KIX JAN Telepen
[0206] Table 4 illustrates exemplary matrix (2D) barcodes, the
standards of all of which are incorporated by reference. However,
the present invention is not limited to the exemplary matrix
barcodes listed in Table 4, and more fewer and other matrix
barcodes can also be used to practice the invention.
TABLE-US-00004 TABLE 4 Matrix Bar Codes 3-DI ArrayTag Aztec Code
Small Aztec Code Chromatic Alphabet Codablock Code 1 Code 16K Code
49 ColorCode Compact Matrix Code CP Code CyberCode d-touch
DataGlyphs Datamatrix Datastrip Code Dot Code A EZcode Grid Matrix
Code High Capacity Color Barcode HueCode INTACTA.CODE InterCode
JAGTAG Lorem ipsum MaxiCode mCode MiniCode MicroPDF417 MMCC
Nintendo e-Reader#Dot code Optar PaperDisk PDF417 PDMark QR Code
QuickMark Code SmartCode Snowflake Code ShotCode SPARQCode SuperCod
Trillcode UltraCode UnisCode VeriCode, VSCode WaterCode
[0207] In one specific embodiment, application 61 interacts with a
bar code reader application. However, the present invention is not
limited to a bar code reader application and other applications can
also be used to practice the invention.
[0208] In one specific exemplary embodiment, a QR bar code is used.
However, the present invention is not limited to QR codes and other
types of bar codes can also be used to practice the invention
[0209] A "QR Code" is a specific matrix barcode (or two-dimensional
code), readable by dedicated QR barcode readers and camera phones.
The code consists of black modules arranged in a square pattern on
a white background. The information encoded can be text, URL or
other data. QR codes are defined in ISO/IEC 18004:2006 Information
technology--Automatic identification and data capture
techniques--QR Code 2005 bar code symbology specification, 1 Sep.
2006, the contents of which are incorporated by reference.
[0210] Users with a camera equipped smart phone 16 (or tablet
computer 22, etc.) with a the camera component, a bar code reader
application appropriate for the bar code processes the digital
image of the QR Code can include a QR Code 166 (FIG. 14). The
camera component is used to capture existing QR codes from print
and electronic documents and other sources (e.g., from other
network devices, etc.)
[0211] QR codes 166 are also used to display text, contact
information, connect to a wireless network, open a web page in the
phone's browser, download music, communicate a social event or
electronic coupon, or initiate a communications event over the
communications networks 12, 20, 23 (e.g., voice call, data call,
etc.) This act of linking from physical world objects is known as a
"hardlink" or "physical world hyperlinks."
[0212] For example, Google's smart phone Android operating system
supports the use of QR codes by natively including the barcode
scanner (e.g., Zxing, etc.) on some models, and the browser
supports Uniform Resource Identifier (URI) redirection, which
allows QR Codes to send metadata to existing applications on the
device. Nokia's Symbian operating system is also provided with a
barcode scanner, which is able to read QR codes, while mbarcode is
a QR code reader for the Maemo operating system. In the Apple iOS,
a QR code reader is not natively included, but hundreds of free
applications available with reader and metadata browser URI
redirection capability. However, the present invention is not
limited to these network device operating systems and other bar
code readers and device operating systems can also be used to
practice the invention.
[0213] In one embodiment, a user may scan a number of QR bar codes
166 from non-electronic information such as magazines, business
cards, billboards, other non-electronic advertising, etc. A user
may also scan a number of QR bar codes 166 from electronic
advertising such from web-sites, other target network devices 14,
16, 18, 22, from e-mails, text messages, instant messages, etc.
Location Event Mesh Network Device Dynamic Information Exchange
[0214] Mobile location aware devices automatically exchange
information with other mobile location aware devices that are
located at a pre-determined distance of each other at a desired
physical location. A server network device compares electronic
profiles that include stated interests of the mobile location aware
devices. The server network device also provides additional
information based on stated interests in the electronic
profiles.
[0215] FIGS. 12A and 12B are a flow diagram illustrating a Method
138 for dynamic information exchange for location aware network
devices.
[0216] FIG. 13 is a block diagram 154 illustrating a data flow 156
for Method 148 of FIG. 12.
[0217] FIG. 14 is a block diagram 164 illustrating display of an
exemplary QR bar code 166. The QR bar code 166 in FIG. 14 is an
actual valid, QR bar code generated and including the encoded text
"This QR code generated by Ray Wang."
[0218] At FIG. 12A at Step 140, a first wireless message is
received including a first set of profile information from a first
mesh network device with one or more processors on a server network
device with one or more processors over a wireless communications
network. The first wireless message includes a request to track a
physical location of the first mesh network device. The first
wireless message includes comparison information that is used to
connect the first mesh network device with one or more other mesh
network devices that have similar comparison information. The first
mesh network device includes an ultra-wideband wireless transceiver
and a mesh network protocol adapter with Complementary Code Keying
(CCK), Differential Quaternary Phase Shift Keying (DQPSK) or
Orthogonal Frequency Division Multiplexing (OFDM) encoders. At Step
142, the first set of profile information is stored in a database
associated with the server network device. At Step 144, a current
physical location of the first mesh network device is tracked from
the server network device via the wireless communications network.
At Step 146, a second wireless message is received on the server
network device via the wireless communications network indicating
the first mesh network device is located at a new physical
location. In FIG. 12B at Step 148, the server network device
compares the stored first set of profile information from the first
mesh network device to a plural other stored sets of profile
information from plural other mesh network devices that have
comparison information similar to the first mesh network device. At
Step 150, one or more third wireless messages are received from the
server network device via the wireless communications network to
the first mesh network device and one or more of the plural other
mesh network devices that are located within a pre-determined
distance of the new physical location of the first mesh network
device and have comparison information similar to the first mesh
network device. At Step 152, one or more fourth wireless messages
are automatically exchanged between the first mesh network device,
the one or more of the plural other mesh network devices and the
server network device via the wireless communications network.
Selected ones one or more fourth wireless messages including a
first set of additional information generated by the server network
device as a result of the match in the comparison information.
Other selected ones include a second set of additional information
generated by the first mesh network device and the one or more of
the plural other mesh network devices as the result of the match in
comparison information and the pre-determined distance of the new
physical location.
[0219] Method 138 is illustrated with one exemplary embodiment.
However, the present invention is not limited to such an embodiment
and other embodiments can also be used to practice the
invention.
[0220] In such an exemplary embodiment in FIG. 12A at Step 140, a
first wireless message is received including a first set of profile
information 91, 160 from a first mesh network device (e.g., smart
phone 16, 26, etc.) with one or more processors on a server network
device (e.g., 25) with one or more processors over a wireless
communications network 12, 20, 23. The wireless communications
includes a mesh network 12, 20 or a non-mesh network 23. However,
the present invention is not limited to such an embodiment and
more, fewer and other types of wireless networks can be used to
practice the invention
[0221] The first wireless message includes a request to track a
physical location of the first mesh network device 16. In one
embodiment, the profile gives the server network device 25 an
indication to track the first mesh network device through GPS,
through cell tower reference locations or using other types of
physical location information. The first message can also restrict
the location tracking frequency to specific geographic areas and/or
specific days and/or specific time periods during a day.
[0222] The first wireless message includes comparison information
that is used to connect the first mesh network device 16 with one
or more other mesh network devices 14, 18, 22 that have similar
comparison information. The first mesh network device 16 includes
an ultra-wideband wireless transceiver and a mesh network protocol
adapter with Complementary Code Keying (CCK), Differential
Quaternary Phase Shift Keying (DQPSK) or Orthogonal Frequency
Division Multiplexing (OFDM) encoders.
[0223] In one embodiment, first mesh network device 16 includes a
software application 61 as was described above and uses wireless
hardware interfaces included on first mesh network device 16 to
practice the invention. The software application 61 includes
software for ultra-wideband wireless transceiver and a mesh network
protocol adapter with Complementary Code Keying (CCK), Differential
Quaternary Phase Shift Keying (DQPSK) or Orthogonal Frequency
Division Multiplexing (OFDM) encoders. In a specific embodiment,
the software application 61 functions as a virtual machine on the
first mesh network 16. However, the present invention is not
limited to such embodiment and more, fewer and other types of
wireless transceivers and mesh network protocol adapters can be
used to practice the invention. (e.g. FIG. 9, etc.). The invention
may also be practiced with or without software application 61.
[0224] In one embodiment, the profile includes text, voice,
electronic text, QR barcode information, etc. is created according
to templates offered by an information provider. Templates can also
be downloaded through 3rd parties over wired or wireless network
connections. Users can also create their own templates according to
specified syntax and rules. However, the present invention is not
limited to such embodiment and more, fewer and other types profiles
can be used to practice the invention.
[0225] At Step 142, the first set of profile information 91, 160 is
stored in a database 25' associated with the server network device
25 (e.g., FIG. 7, etc.).
[0226] At Step 144, a current physical location of the first mesh
network device 16 is tracked from the server network device 25 via
the wireless communications network 12, 20, 23 (e.g., FIG. 4, FIG.
10, FIG. 11, etc.). The current physical location information,
includes, but is not limited to, Global Positioning Satellite
(GPS), cellular telephone tower information, street address
information, two-dimensional (2D) (e.g., X,Y) (e.g., building,
floor), three-dimensional (3D) (X, Y, Z) (e.g., building, floor,
floor location) or other types of physical location
information.
[0227] At Step 146, a second wireless message is received on the
server network device 25 via the wireless communications network
12, 20, 23 indicating the first mesh network device 16 is located
at a new physical location.
[0228] In FIG. 12B at Step 148, the server network device 25
compares the stored first set of profile information 91, 160 from
the first mesh network device 16 to a plural other stored sets of
profile information (e.g., 91', 160', etc.) from plural other mesh
network devices 14, 18, 22 that have comparison information similar
to the first mesh network device 16 (e.g., FIGS. 4, 6, 8, 9, 10,
11, etc.)
[0229] At Step 150, one or more third wireless messages are
received from the server network device 25 via the wireless
communications network 18 to the first mesh network device 16, 26
and one or more of the plural other mesh network devices 14, 18, 22
that are located within a pre-determined distance 21 of the new
physical location of the first mesh network device 16, 26 and have
comparison information (e.g., 91, 91', 160, 160') similar to the
first mesh network device 16, 26 (e.g., FIGS. 4, 6, 9, 10, 11,
etc.).
[0230] At Step 152, one or more fourth wireless messages are
exchanged automatically between the first mesh network device 16,
26, the one or more of the plural other mesh network devices 14,
18, 22 and the server network device 25 via the wireless
communications network 12, 20, 23. Selected ones or more fourth
wireless messages including a first set of additional information
158 generated by the server network device 25 as a result of the
match in the comparison information (e.g., 91, 91', 160, 160',
etc.). Other selected ones include a second set of additional
information 162 generated by the first mesh network device 16, 26
and the one or more of the plural other mesh network devices 14,
18, 22 as the result of the match in comparison information (e.g.,
91, 91', 160, 160' etc.) and the pre-determined distance 21 of the
new physical location (e.g., FIGS. 4-11, etc.).
[0231] Selected ones or more fourth wireless messages including a
first set of additional information 158 generated by the server
network device 25 as a result of the match in the comparison
information (e.g., 91, 91', 160, 160', etc.) include electronic
information with electronic links (e.g., Hyper Text Markup Language
(HTML) links, Universal Resource Locator (URLs) links, etc.) to
other web-sites or other sites on the communications network 12,
20, 23. However, the present invention is not limited to such
embodiment and more, fewer and other types of electronic links can
be used to practice the invention.
[0232] In one embodiment, the other selected ones of the one or
more fourth wireless messages including the first set of additional
information 158 includes preferences for mobile commerce
information, advertising information, electronic coupon information
(e.g., from GROUPON, SOCIAL LIVING, etc.), social networking
information (e.g., FACEBOOK, TWITTER, etc.), dating information
(e.g., MATCH.COM, EHARMONY.COM, etc.), lost and found information,
and/or physical presence information. However, the present
invention is not limited to such embodiment and more, fewer and
other types of additional information can be used to practice the
invention.
[0233] In another embodiment, the other selected ones of the one or
more fourth wireless messages including the second set of
additional information 162 includes exchange of an e-mail address,
a name, a street address, a telephone number, an instant message
identifier, a text message identifier, an encryption key, a mesh
network identifier, a physical location information, a QR barcode
166, a dating web-site identifier, and/or a social networking
web-site login identifier. However, the present invention is not
limited to such embodiment and more, fewer and other types of
additional information can be used to practice the invention.
[0234] The mobile commerce information includes when a profile
matches desired mobile commerce preferences, a product offering and
with a merchant's product (e.g., price and picture of the product,
etc.) and location (e.g., map and contact information, etc.) is
sent to the mesh network device.
[0235] The advertising information includes when a profile matches
desired advertising preferences and the mesh network device is
within the pre-determined distance of a physical location, product
advertising (e.g., price and picture of the product, etc.) is sent
to the mesh network device.
[0236] The electronic coupon information includes when a profile
matches desired electronic coupon preferences and the mesh network
device is within the pre-determined distance of a physical
location, an electronic coupon along with the description (e.g.,
item type, color, price, location, etc.) is sent to the mesh
network device.
[0237] The social networking information includes when a profile
matches desired social networking preferences and the mesh network
device is within the pre-determined distance of a physical
location, social networking information and location information is
sent to the mesh network device.
[0238] The dating information includes when dating profiles match,
and the mesh network devices are within the pre-determined distance
of a physical location, interested parties sent dating information
and location information is sent to mesh network devices.
[0239] The lost and found information includes when lost and found
profile information matches for a lost item, a lost pet, a lost
person, and the mesh network device is within the pre-determined
distance of a physical location, lost and found information
including the item's description (e.g., item type, model, brand,
color, height, weight, sex, type of pet, lost location, found
location, etc.), E911/911 information, weather information, AMBER
alert/missing child information, etc. is sent to the mesh network
device.
[0240] However, the present invention is not limited to such
embodiments and more, fewer and other types of information can be
used to practice the invention.
[0241] In one embodiment, the one or more fourth wireless messages
include a voice message, an e-mail message, a text message and/or
an instant message.
[0242] However, the present invention is not limited to such
embodiment sand more, fewer and other types of wireless and/or
wired messages can be used to practice the invention.
[0243] In another embodiment, the invention is practiced on a wired
network, or various combinations thereof of wireless and wired
devices and/or networks.
[0244] The method and system described herein includes mobile
location aware devices that automatically exchange information with
other mobile location aware devices located at a pre-determined
distance of each other at a desired physical location. A server
network device compares electronic profiles that include stated
interests of the mobile location aware devices. The server network
device provides additional information to the mobile location aware
devices based on stated interests in the electronic profiles.
[0245] It should be understood that the architecture, programs,
processes, methods and It should be understood that the
architecture, programs, processes, methods and systems described
herein are not related or limited to any particular type of
computer or network system (hardware or software), unless indicated
otherwise. Various types of general purpose or specialized computer
systems may be used with or perform operations in accordance with
the teachings described herein.
[0246] In view of the wide variety of embodiments to which the
principles of the present invention can be applied, it should be
understood that the illustrated embodiments are exemplary only, and
should not be taken as limiting the scope of the present invention.
For example, the steps of the flow diagrams may be taken in
sequences other than those described, and more or fewer elements
may be used in the block diagrams.
[0247] While various elements of the preferred embodiments have
been described as being implemented in software, in other
embodiments hardware or firmware implementations may alternatively
be used, and vice-versa.
[0248] The claims should not be read as limited to the described
order or elements unless stated to that effect. In addition, use of
the term "means" in any claim is intended to invoke 35 U.S.C.
.sctn.112, paragraph 6, and any claim without the word "means" is
not so intended.
[0249] Therefore, all embodiments that come within the scope and
spirit of the following claims and equivalents thereto are claimed
as the invention.
* * * * *