US20160286348A1 - Ble rapid room entry system and method - Google Patents

Ble rapid room entry system and method Download PDF

Info

Publication number
US20160286348A1
US20160286348A1 US15/171,880 US201615171880A US2016286348A1 US 20160286348 A1 US20160286348 A1 US 20160286348A1 US 201615171880 A US201615171880 A US 201615171880A US 2016286348 A1 US2016286348 A1 US 2016286348A1
Authority
US
United States
Prior art keywords
ble
boundary
signal
enabled object
beacon
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/171,880
Inventor
Gary Jorgensen
Wei Geng
Matt Delmage
Brian Costabile
John Taylor
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Clinical Patents LLC
Original Assignee
Awarepoint Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Awarepoint Corp filed Critical Awarepoint Corp
Priority to US15/171,880 priority Critical patent/US20160286348A1/en
Assigned to AWAREPOINT CORPORATION reassignment AWAREPOINT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: COSTABILE, BRIAN, DELMAGE, MATT, GENG, WEI, JORGENSEN, GARY, TAYLOR, JOHN
Publication of US20160286348A1 publication Critical patent/US20160286348A1/en
Assigned to CLINICAL PATENTS, LLC reassignment CLINICAL PATENTS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AWAREPOINT CORPORATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • H04W4/008
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Definitions

  • the disclosure relates generally to Bluetooth Low Energy (BLE) devices and in particular to a system and method for determining the crossing of a boundary in a real-time location system using BLE.
  • BLE Bluetooth Low Energy
  • BlueTooth Low Energy is a low energy variant of the BlueTooth short range wireless standard that was introduced as part of the BlueTooth 4.0 specification. Further details about BLE and the Bluetooth 4.0 specification may be found at https://www.bluetooth.org/en-us/specification/adopted-specifications and https://developer.bluetooth.org/TechnologyOverview/Pages/BLE.aspx which are incorporated herein by reference.
  • the purpose of BLE is to provide an extremely low power wireless system similar in power consumption to Zigbee. Zigbee is an older wireless low power communication standard.
  • iBeacon provides a BLE beacon (transmit only) that devices (e.g. cell phones) may receive and use to determine a rough location.
  • the location technology is simple proximity based on the RSSI (received signal strength indication) of the beacon as seen by the receiving device.
  • a differential location service based on BLE broadcast messages, exists in which a location algorithm is used in conjunction with RSSI and other information to determine an RTLS (real time location system)-level accurate location.
  • RTLS real time location system
  • FIG. 1 illustrates an example of a real time location system that may include a rapid room entry component
  • FIG. 2 illustrates another example of an implementation of a real time location system that may include a rapid room entry component
  • FIG. 3A illustrates an example of the data flow within the real time location system
  • FIG. 3B illustrates a method for determining rapid room entry
  • FIG. 3C illustrates more details of the raid room entry location method carried out by the location engine
  • FIG. 4 illustrates an example of a building with one or more boundaries and BLE beacons
  • FIG. 5 illustrates an example of a boundary in a building with BLE beacons
  • FIG. 6 illustrates a simplified view of two adjacent doors in a building and the positioning of the BLE beacons for the doors
  • FIG. 7 illustrates an example of the radiation pattern for the BLE beacons shown in FIG. 6 ;
  • FIG. 8 illustrates an example of the raw and smoothed RSSI values for two BLE beacons that can be used to determine when a user crossed a boundary
  • FIG. 9 illustrates another implementation of the system using angled radiation patterns for the beacons.
  • the disclosure is particularly applicable to a BLE beacon based rapid room entry system and method and it is in this context that the disclosure will be described.
  • the BLE beacon based rapid room entry system and method may be used as a standalone system as shown in the diagrams below, it may be combined with various known real time location system (RTLS) that may use different technologies or it may be combined with an RTLS system that uses BLE for both the RTLS and the rapid room entry.
  • the rapid room entry system and method may provide a location of a BLE enabled object (and whether the BLE enabled object has crossed a boundary) in less than 3 seconds and within less than one meter of accuracy in a three dimensional space.
  • the three dimensional space may be a building and the rapid room entry system and method permits accurate location at a room, bay, and bed level in the three dimensional space to be determined.
  • the boundary may be, for example, a boundary to a room, such as a door, a boundary to a space, such as a hallway or meeting area, or a boundary to a particular location identified by set of coordinates (X,Y or X,Y,Z for example).
  • the determination of the rapid room entry of the BLE enabled object may be used for staff and patient locating and their associated workflows as well as high accuracy asset tracking in a hospital embodiment.
  • the BLE enabled object described below may be any object (including a human being) that has a BLE receiver device (or has a BLE receiver associated with the human being) that is able to sense BLE messages.
  • each BLE enabled object may be a smartphone device with a BLE receiver (or an attached BLE receiver), a BLE tag, a medical device including various medical equipment with a BLE receiver (or an attached BLE receiver), other computing devices, such as laptop or tablet computers, that have a BLE receiver (or an attached BLE receiver), other communication devices, such as cellular phones, that have a BLE receiver (or an attached BLE receiver) and/or physical assets in the three dimensional space, such as a bed, medical personnel, such as a doctor or a nurse, etc. that have a BLE receiver (or an attached BLE receiver).
  • the rapid room entry system and method may be used for a set of areas in the three dimensional space (with well-defined boundaries) in which quick and high accuracy determining of a BLE enabled object entry or exit into/from the area is required.
  • the system may have BLE beacons with directional antenna mounted on either side of each boundary, with a weaker side of the radiated energy pattern due to the directional antenna pointed into the boundary area and the strong side of the radiated energy pattern due to the directional antenna pointed away from the boundary.
  • the difference between the strong signal and the weak signal may be 20 dB that can be identified by the system.
  • the system may, optionally, also have other directional and omnidirectional beacons mounted in the three dimensional space as needed to provide complete BLE coverage.
  • the system may include one or more BLE enabled objects as described above which receive broadcasts from the BLE beacons on a periodic or continuous basis and relay one or more characteristics of the signal, such as for example, received signal strength and other information in one embodiment, to a location engine that may use a location method to determine if the BLE enabled object has crossed the boundary in the three dimensional space.
  • the location engine may be on a remote computer system from the BLE enabled object and the BLE enabled object may communicate via Wi-Fi or other wireless technology with the location engine.
  • the location engine (and its location method) may be resident on the BLE enabled object that has the memory and processing power to perform the location method.
  • the BLE enabled object is a smartphone device, such as an Apple® iPhone® or Android® OS based device
  • the location engine may be executed by the processor of the BLE enabled object.
  • the location engine executes the location method and uses the received one or more characteristics of the signal from one or more BLE beacons to determine a highly accurate location including whether the BLE enabled object crossed a boundary in the three dimensional space.
  • the location method may receive signals from at least two BLE beacons and then determine the boundary crossing as described below.
  • the location method may receive signals from only one BLE beacon and also be able to determine the presence in an area of the BLE enabled object based on the proximity of the BLE beacon and the BLE enabled object.
  • FIG. 1 illustrates an example of a real time location system 100 that may include a rapid room entry component.
  • the system 100 has one or more wireless access points 102 , such as AP 102 A, . . . , 102 N as shown in FIG. 1 , that may be coupled over a network 109 to a location engine 106 .
  • each wireless access point may communicate using a known Wi-Fi protocol, but the wireless access point may also use other wireless communication protocols.
  • the system may also have one or more Bluetooth Low Energy (BLE) beacons 104 , such as beacon 104 A, . . . , 104 N as shown in FIG.
  • BLE Bluetooth Low Energy
  • each BLE beacon may be at a fixed location in the three dimensional space and that location is known by the location engine 106 .
  • the system may have at least one BLE beacon at each side of a boundary (as described below) and then be able to perform a rapid room entry determination based on the signals from the at least two BLE beacons.
  • the BLE beacons 104 may include BLE beacons with directional antennas (at each boundary), BLE beacons with omnidirectional antennas and BLE beacons that transmit an Awareware Corporation protocol signal.
  • some beacons 104 N may be physically located adjacent an access point 102 N.
  • the system may also have one or more BLE enabled objects 108 whose accurate location and boundary crossing may be determined by location engine 106 .
  • Each BLE beacon 104 may periodically or continuously transmit a BLE messages that may be sensed by a BLE enabled object 108 .
  • the BLE enabled object 108 may generate one or more characteristics of the one or more BLE beacon signal(s) and then communicate the one or more characteristics of the BLE beacon signal(s) to the location engine 106 over the network 109 using the AP 102 N.
  • the location engine may generate a determination, based on the one or more characteristics of the BLE beacon signal(s), whether the BLE enabled object that received the BLE beacon signals has crossed a boundary in the three dimensional space in less than 3 seconds in part due to the fast “blink” rate (a rate at which the BLE beacon generates its beacon signal).
  • FIG. 2 illustrates another example of an implementation of a real time location system 200 that may include a rapid room entry component.
  • the system has the one or more BLE beacons 104 , one or more BLE enabled objects 108 (shown as a smartphone and a BLE tag) and the network 109 that has one or more access points 102 .
  • the location engine 106 may be remotely located from some of the one or more BLE enabled objects 108 and may be resident on at least one of the BLE enabled objects 108 .
  • the remote location engine 108 may be resident and operating on a hardware appliance 202 that may also be coupled to the network 109 and able to communicate over that network.
  • the location engine on the hardware appliance may receive BLE beacon data reports from the one or more BLE enabled objects 108 over the network 109 that may be a Wi-Fi network or other network.
  • the location engines 106 operate in a similar manner as described above in FIG. 1 and also as described in more detail below.
  • the location engine 106 on the appliance 202 may communicate data about BLE enabled object location (or boundary crossing), coordinates of the one or more BLE enabled objects 108 on a map and/or a room/region of the one or more BLE enabled objects 108 in the three dimensional space to other locations applications and a graphical user interface 204 .
  • the system 100 , 200 may be installed in a three dimensional space in which two BLE beacons may be installed near each boundary (for example, one each side of the boundary) in the three dimensional space (to determine the crossing of a boundary).
  • the three dimensional space may be a building (single floor or multiple floors) in which the occupant of the building wants to track BLE enabled objects within the three dimensional space.
  • the above described system may be used for a hospital, a manufacturing facility or other building in which it would be desirable to track BLE enabled objects within the building and determine boundary crossings of the BLE enabled objects within the building.
  • FIG. 3A illustrates an example of the data flow within the real time location system using a BLE wireless protocol and a Wi-Fi protocol.
  • Each beacon 104 (that is in a fixed position) may generate and transmit an iBeacon protocol message or an Awarepoint Corporation protocol message (either one being known as a blink) via the BLE communication protocol to the one or more BLE enabled objects 108 .
  • Each BLE enabled object 108 (that may be a BLE tag on an asset, a smartphone device or mobile phone, a tag on a person, etc) may receive blinks from one or more BLE beacons 104 (a signal from each BLE beacon) (shown at process 302 in the method 300 in FIG. 3B ).
  • the proximity of the BLE enabled object 108 may be determined (on a BLE enabled smartphone that has the location engine 106 ) to one of the BLE beacons 104 using a known iBeacon approach.
  • the BLE enabled object 108 may be determined to have crossed a boundary into an area since the BLE enabled object 108 is closest to a BLE beacon 104 that is located in the area, such as a room.
  • Each BLE enabled object 108 may also or alternatively determine one or more characteristics of each signal from each BLE beacon (such as for example received signal strength and other metrics) and generate a beacon report for each BLE beacon 104 (shown at process 304 in the method 300 in FIG. 3B ) that includes the one or more characteristics of the signal and an identifier of a particular BLE enabled object 108 that received the blink from the BLE beacon.
  • Each beacon report may be sent to the location engine 106 (remote on an appliance or resident on the BLE enabled object 108 that is smartphone device). If the location engine is remote, each beacon report may be communicated to the location engine over the Wi-Fi network.
  • the location engine 106 may process the beacon reports for a particular BLE enabled object 108 and may determine an X-Y coordinate location on a map of the particular BLE enabled object 108 and may then convert the coordinates to a location in the three dimensional area (building, floor, area, room, etc.) of the particular BLE enabled object 108 .
  • the location engine may also determine, for the particular BLE enabled object 108 , whether the particular BLE enabled object 108 crossed a boundary in the three dimensional area based on the beacon reports as described below in more detail.
  • the location of the particular BLE enabled object 108 may be sent to other systems via various networks for different uses.
  • the location or boundary crossing of the particular BLE enabled object 108 may be communicated back to the particular BLE enabled object 108 .
  • FIG. 3B illustrates a method 300 for determining rapid room entry.
  • the method being executed by the location engine, may determine crossing a boundary (for example, entering or exiting a room through a door) based on the one or more characteristics of the one or more BLE beacons received by the particular BLE enabled object ( 306 ).
  • This process may be implemented using the method set forth in FIG. 3C or it may be implemented by comparing the RSSI of each beacon (when the BLE enabled object receives signals from at least two BLE beacons) and determining the intersection of the two RSSI signals as shown in FIG. 8 .
  • FIG. 3C illustrates more details of the rapid room entry location method 306 carried out by the location engine.
  • the Fast Room Entry method is designed to detect staff and patient location and their associated workflow as well as high accuracy asset tracking.
  • the method may first determine how probable a particular BLE enabled object is near a boundary and is attempting a boundary crossing/transition (enter/exit) as opposed to the particular BLE enabled object being somewhere far away for the boundary based on the received beacon reports ( 310 ). If the criteria are met, the room entry determination is performed.
  • a “loudest” beacon (the BLE beacon with the strongest signal) may be detected ( 312 ). However, the location transition only occurs when the confidence threshold is exceeded ( 314 ).
  • the confidence level calculation includes many factors and these factors include, but are not limited to, differential signal strength of the loudest BLE beacon with regard to the remaining BLE beacons, is the BLE beacon signal strength support the boundary transition event, where the BLE enabled object was and if the transition is logical based on previous location and the current estimate with regard to the room/hallway layout etc.
  • the method may then determine, based on the confidence level, if the threshold has been exceeded and the BLE enabled object has crossed a boundary, such as through a door into or out of a room.
  • FIG. 4 illustrates an example of a building with one or more boundaries and one or more BLE beacons (the numbered or lettered circles in the diagram) adjacent each boundary.
  • FIG. 5 illustrates an example of a boundary in a building with BLE beacons.
  • the boundary in the three dimensional space is a door into a room has a first BLE beacon 402 inside of the room and a second BLE beacon 404 outside of the room in a hallway.
  • each BLE beacon has a directional antenna and has the stronger signal directed away from the door.
  • the system is able to determine when a BLE enabled object, such as a person carrying a BLE tag or a BLE smartphone or a physical asset, crosses into or out of the room.
  • FIG. 6 illustrates a simplified view of two adjacent doors in a building and the positioning of the BLE beacons with directional antennas 104 6 , 104 7 , 104 8 and 104 9 for the doors.
  • the BLE beacons may be in a fixed location on either side of the door to allow the system to perform the rapid room entry method for a BLE enabled object entering or exiting the door (crossing the boundary).
  • the single BLE beacon inside the room may be used by the system, based on proximity of the BLE beacon to the BLE enabled object, to determine whether or not the BLE enabled object is in the room.
  • FIG. 7 illustrates an example of the radiation pattern for the BLE beacons shown in FIG. 6 .
  • BLE beacon 104 6 has two lobes of the radiation pattern 700 6 that, due to the directional antenna of the BLE beacon, have a strong portion of the signal directed away from the boundary and a weak portion of the signal directed towards the boundary.
  • beacons 104 7 , 104 8 , 104 9 have two lobes of the radiation pattern 700 7 , 700 8 , and 700 9 that, due to the directional antenna of the BLE beacon, have a strong portion of the signal directed away from the boundary and a weak portion of the signal is towards the boundary.
  • FIG. 8 illustrates an example of the raw and smoothed RSSI values for two BLE beacons that can be used to determine when a user crossed a boundary and helps further illustrate the principle of operation of the system.
  • BLE beacons with a rapid beacon rate are use that have highly directional antennas.
  • the boundary shown in FIG. 7 is a doorway, and in this case, two adjacent doorways are used.
  • the directional antennas are aligned so that the strong lobes of energy are radiating away from the boundary (doorway), with the weak lobes radiating into the doorway.
  • the RSSI profile over the boundary that is, the RSSI versus the distance from the beacon while crossing the boundary—has a very steep curve, creating a large differentiation between the two sides.
  • the RSSI of the beacons will rapidly increase and decrease over a small distance and intersect which indicates a crossing of the boundary for the particular BLE enabled object that received the signals shown in FIG. 8 .
  • the samples can be processed by a location engine using a differential, triangulation, or trilateration algorithm to determine distance from the various beacons and/or in which room the device now resides.
  • FIG. 9 illustrates another implementation of the system using angled radiation patterns for the beacons 104 6 , 104 7 , 104 8 and 104 9 . It should be understood that the precise location and angular orientation of each BLE beacon in the three dimensional space is adjustable depending on the needs for a particular boundary. For example, the layout shown in FIG. 9 improves side-to-side differentiation. Thus, the system and method described herein is not limited to any particular location and/or orientation of the BLE beacons
  • system and method disclosed herein may be implemented via one or more components, systems, servers, appliances, other subcomponents, or distributed between such elements.
  • systems may include an/or involve, inter alia, components such as software modules, general-purpose CPU, RAM, etc. found in general-purpose computers.
  • components such as software modules, general-purpose CPU, RAM, etc. found in general-purpose computers.
  • a server may include or involve components such as CPU, RAM, etc., such as those found in general-purpose computers.
  • system and method herein may be achieved via implementations with disparate or entirely different software, hardware and/or firmware components, beyond that set forth above.
  • components e.g., software, processing components, etc.
  • computer-readable media associated with or embodying the present inventions
  • aspects of the innovations herein may be implemented consistent with numerous general purpose or special purpose computing systems or configurations.
  • exemplary computing systems, environments, and/or configurations may include, but are not limited to: software or other components within or embodied on personal computers, servers or server computing devices such as routing/connectivity components, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, consumer electronic devices, network PCs, other existing computer platforms, distributed computing environments that include one or more of the above systems or devices, etc.
  • aspects of the system and method may be achieved via or performed by logic and/or logic instructions including program modules, executed in association with such components or circuitry, for example.
  • program modules may include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular instructions herein.
  • the inventions may also be practiced in the context of distributed software, computer, or circuit settings where circuitry is connected via communication buses, circuitry or links. In distributed settings, control/instructions may occur from both local and remote computer storage media including memory storage devices.
  • Computer readable media can be any available media that is resident on, associable with, or can be accessed by such circuits and/or computing components.
  • Computer readable media may comprise computer storage media and communication media.
  • Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and can accessed by computing component.
  • Communication media may comprise computer readable instructions, data structures, program modules and/or other components. Further, communication media may include wired media such as a wired network or direct-wired connection, however no media of any such type herein includes transitory media. Combinations of the any of the above are also included within the scope of computer readable media.
  • the terms component, module, device, etc. may refer to any type of logical or functional software elements, circuits, blocks and/or processes that may be implemented in a variety of ways.
  • the functions of various circuits and/or blocks can be combined with one another into any other number of modules.
  • Each module may even be implemented as a software program stored on a tangible memory (e.g., random access memory, read only memory, CD-ROM memory, hard disk drive, etc.) to be read by a central processing unit to implement the functions of the innovations herein.
  • the modules can comprise programming instructions transmitted to a general purpose computer or to processing/graphics hardware via a transmission carrier wave.
  • the modules can be implemented as hardware logic circuitry implementing the functions encompassed by the innovations herein.
  • the modules can be implemented using special purpose instructions (SIMD instructions), field programmable logic arrays or any mix thereof which provides the desired level performance and cost.
  • SIMD instructions special purpose instructions
  • features consistent with the disclosure may be implemented via computer-hardware, software and/or firmware.
  • the systems and methods disclosed herein may be embodied in various forms including, for example, a data processor, such as a computer that also includes a database, digital electronic circuitry, firmware, software, or in combinations of them.
  • a data processor such as a computer that also includes a database
  • digital electronic circuitry such as a computer
  • firmware such as a firmware
  • software such as a computer
  • the systems and methods disclosed herein may be implemented with any combination of hardware, software and/or firmware.
  • the above-noted features and other aspects and principles of the innovations herein may be implemented in various environments.
  • Such environments and related applications may be specially constructed for performing the various routines, processes and/or operations according to the invention or they may include a general-purpose computer or computing platform selectively activated or reconfigured by code to provide the necessary functionality.
  • the processes disclosed herein are not inherently related to any particular computer, network, architecture, environment, or other apparatus, and may be implemented by a suitable combination of hardware, software, and/or firmware.
  • various general-purpose machines may be used with programs written in accordance with teachings of the invention, or it may be more convenient to construct a specialized apparatus or system to perform the required methods and techniques.
  • aspects of the method and system described herein, such as the logic may also be implemented as functionality programmed into any of a variety of circuitry, including programmable logic devices (“PLDs”), such as field programmable gate arrays (“FPGAs”), programmable array logic (“PAL”) devices, electrically programmable logic and memory devices and standard cell-based devices, as well as application specific integrated circuits.
  • PLDs programmable logic devices
  • FPGAs field programmable gate arrays
  • PAL programmable array logic
  • Some other possibilities for implementing aspects include: memory devices, microcontrollers with memory (such as EEPROM), embedded microprocessors, firmware, software, etc.
  • aspects may be embodied in microprocessors having software-based circuit emulation, discrete logic (sequential and combinatorial), custom devices, fuzzy (neural) logic, quantum devices, and hybrids of any of the above device types.
  • the underlying device technologies may be provided in a variety of component types, e.g., metal-oxide semiconductor field-effect transistor (“MOSFET”) technologies like complementary metal-oxide semiconductor (“CMOS”), bipolar technologies like emitter-coupled logic (“ECL”), polymer technologies (e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures), mixed analog and digital, and so on.
  • MOSFET metal-oxide semiconductor field-effect transistor
  • CMOS complementary metal-oxide semiconductor
  • ECL emitter-coupled logic
  • polymer technologies e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures
  • mixed analog and digital and so on.
  • the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in a sense of “including, but not limited to.” Words using the singular or plural number also include the plural or singular number respectively. Additionally, the words “herein,” “hereunder,” “above,” “below,” and words of similar import refer to this application as a whole and not to any particular portions of this application. When the word “or” is used in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list and any combination of the items in the list.

Abstract

A system and method for rapid room entry are provided in which at least two Bluetooth low energy (BLE) beacons may be used to determine when a BLE enabled object has crossed a boundary. The BLE enabled object may sense the signals from BLE beacon and a location engine may determine the crossing of the boundary based on the sensed signals from each BLE beacon. Each BLE beacon may have a directional antenna so that a portion of the signal having a strong strength is directed towards the boundary and a portion of the signal having a weaker strength is directed away from the boundary.

Description

    PRIORITY CLAIMS/RELATED APPLICATIONS
  • This application is a continuation of and claims priority under 35 USC 120 to U.S. patent application Ser. No. 14/667,021, filed on Mar. 24, 2015 and entitled “Bluetooth Low Energy Rapid Room Entry System and Method,” the entirety of which is incorporated herein by reference.
  • FIELD
  • The disclosure relates generally to Bluetooth Low Energy (BLE) devices and in particular to a system and method for determining the crossing of a boundary in a real-time location system using BLE.
  • BACKGROUND
  • BlueTooth Low Energy (aka BLE) is a low energy variant of the BlueTooth short range wireless standard that was introduced as part of the BlueTooth 4.0 specification. Further details about BLE and the Bluetooth 4.0 specification may be found at https://www.bluetooth.org/en-us/specification/adopted-specifications and https://developer.bluetooth.org/TechnologyOverview/Pages/BLE.aspx which are incorporated herein by reference. The purpose of BLE is to provide an extremely low power wireless system similar in power consumption to Zigbee. Zigbee is an older wireless low power communication standard.
  • Shortly after the introduction of BLE chipsets, Apple® introduced a product called iBeacon along with a simple protocol specification, all based on BLE. Further details of the iBeacon product and its protocol specification may be found at https://developer.apple.com/ibeacon/ which is incorporated herein by reference. iBeacon provides a BLE beacon (transmit only) that devices (e.g. cell phones) may receive and use to determine a rough location. The location technology is simple proximity based on the RSSI (received signal strength indication) of the beacon as seen by the receiving device.
  • In addition, a differential location service, based on BLE broadcast messages, exists in which a location algorithm is used in conjunction with RSSI and other information to determine an RTLS (real time location system)-level accurate location. In these known systems, the service operates with only a single beacon and the beacon uses a omnidirectional antenna. However, these known system do not provide rapid room entry.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates an example of a real time location system that may include a rapid room entry component;
  • FIG. 2 illustrates another example of an implementation of a real time location system that may include a rapid room entry component;
  • FIG. 3A illustrates an example of the data flow within the real time location system;
  • FIG. 3B illustrates a method for determining rapid room entry;
  • FIG. 3C illustrates more details of the raid room entry location method carried out by the location engine;
  • FIG. 4 illustrates an example of a building with one or more boundaries and BLE beacons;
  • FIG. 5 illustrates an example of a boundary in a building with BLE beacons;
  • FIG. 6 illustrates a simplified view of two adjacent doors in a building and the positioning of the BLE beacons for the doors;
  • FIG. 7 illustrates an example of the radiation pattern for the BLE beacons shown in FIG. 6;
  • FIG. 8 illustrates an example of the raw and smoothed RSSI values for two BLE beacons that can be used to determine when a user crossed a boundary; and
  • FIG. 9 illustrates another implementation of the system using angled radiation patterns for the beacons.
  • DETAILED DESCRIPTION OF ONE OR MORE EMBODIMENTS
  • The disclosure is particularly applicable to a BLE beacon based rapid room entry system and method and it is in this context that the disclosure will be described. It should be appreciated that the BLE beacon based rapid room entry system and method may be used as a standalone system as shown in the diagrams below, it may be combined with various known real time location system (RTLS) that may use different technologies or it may be combined with an RTLS system that uses BLE for both the RTLS and the rapid room entry. The rapid room entry system and method may provide a location of a BLE enabled object (and whether the BLE enabled object has crossed a boundary) in less than 3 seconds and within less than one meter of accuracy in a three dimensional space. The three dimensional space may be a building and the rapid room entry system and method permits accurate location at a room, bay, and bed level in the three dimensional space to be determined. The boundary may be, for example, a boundary to a room, such as a door, a boundary to a space, such as a hallway or meeting area, or a boundary to a particular location identified by set of coordinates (X,Y or X,Y,Z for example). The determination of the rapid room entry of the BLE enabled object may be used for staff and patient locating and their associated workflows as well as high accuracy asset tracking in a hospital embodiment.
  • The BLE enabled object described below may be any object (including a human being) that has a BLE receiver device (or has a BLE receiver associated with the human being) that is able to sense BLE messages. For example, each BLE enabled object may be a smartphone device with a BLE receiver (or an attached BLE receiver), a BLE tag, a medical device including various medical equipment with a BLE receiver (or an attached BLE receiver), other computing devices, such as laptop or tablet computers, that have a BLE receiver (or an attached BLE receiver), other communication devices, such as cellular phones, that have a BLE receiver (or an attached BLE receiver) and/or physical assets in the three dimensional space, such as a bed, medical personnel, such as a doctor or a nurse, etc. that have a BLE receiver (or an attached BLE receiver).
  • The rapid room entry system and method may be used for a set of areas in the three dimensional space (with well-defined boundaries) in which quick and high accuracy determining of a BLE enabled object entry or exit into/from the area is required. To determine a crossing of a boundary by the BLE enabled object in the three dimensional area, the system may have BLE beacons with directional antenna mounted on either side of each boundary, with a weaker side of the radiated energy pattern due to the directional antenna pointed into the boundary area and the strong side of the radiated energy pattern due to the directional antenna pointed away from the boundary. The difference between the strong signal and the weak signal may be 20 dB that can be identified by the system. The system may, optionally, also have other directional and omnidirectional beacons mounted in the three dimensional space as needed to provide complete BLE coverage. The system may include one or more BLE enabled objects as described above which receive broadcasts from the BLE beacons on a periodic or continuous basis and relay one or more characteristics of the signal, such as for example, received signal strength and other information in one embodiment, to a location engine that may use a location method to determine if the BLE enabled object has crossed the boundary in the three dimensional space.
  • The location engine may be on a remote computer system from the BLE enabled object and the BLE enabled object may communicate via Wi-Fi or other wireless technology with the location engine. Alternatively, the location engine (and its location method) may be resident on the BLE enabled object that has the memory and processing power to perform the location method. For example, if the BLE enabled object is a smartphone device, such as an Apple® iPhone® or Android® OS based device, the location engine may be executed by the processor of the BLE enabled object. Regardless of the location of the location engine, the location engine executes the location method and uses the received one or more characteristics of the signal from one or more BLE beacons to determine a highly accurate location including whether the BLE enabled object crossed a boundary in the three dimensional space. The location method may receive signals from at least two BLE beacons and then determine the boundary crossing as described below. In addition, the location method may receive signals from only one BLE beacon and also be able to determine the presence in an area of the BLE enabled object based on the proximity of the BLE beacon and the BLE enabled object.
  • FIG. 1 illustrates an example of a real time location system 100 that may include a rapid room entry component. The system 100 has one or more wireless access points 102, such as AP 102A, . . . , 102N as shown in FIG. 1, that may be coupled over a network 109 to a location engine 106. In one embodiment, each wireless access point may communicate using a known Wi-Fi protocol, but the wireless access point may also use other wireless communication protocols. The system may also have one or more Bluetooth Low Energy (BLE) beacons 104, such as beacon 104A, . . . , 104N as shown in FIG. 1, and each BLE beacon may be at a fixed location in the three dimensional space and that location is known by the location engine 106. For example, the system may have at least one BLE beacon at each side of a boundary (as described below) and then be able to perform a rapid room entry determination based on the signals from the at least two BLE beacons. The BLE beacons 104 may include BLE beacons with directional antennas (at each boundary), BLE beacons with omnidirectional antennas and BLE beacons that transmit an Awareware Corporation protocol signal.
  • As shown in FIG. 1, some beacons 104N may be physically located adjacent an access point 102N. The system may also have one or more BLE enabled objects 108 whose accurate location and boundary crossing may be determined by location engine 106. Each BLE beacon 104 may periodically or continuously transmit a BLE messages that may be sensed by a BLE enabled object 108. The BLE enabled object 108 may generate one or more characteristics of the one or more BLE beacon signal(s) and then communicate the one or more characteristics of the BLE beacon signal(s) to the location engine 106 over the network 109 using the AP 102N. The location engine may generate a determination, based on the one or more characteristics of the BLE beacon signal(s), whether the BLE enabled object that received the BLE beacon signals has crossed a boundary in the three dimensional space in less than 3 seconds in part due to the fast “blink” rate (a rate at which the BLE beacon generates its beacon signal).
  • FIG. 2 illustrates another example of an implementation of a real time location system 200 that may include a rapid room entry component. As with the implementation shown in FIG. 1, the system has the one or more BLE beacons 104, one or more BLE enabled objects 108 (shown as a smartphone and a BLE tag) and the network 109 that has one or more access points 102. In this implementation as shown in FIG. 2, the location engine 106 may be remotely located from some of the one or more BLE enabled objects 108 and may be resident on at least one of the BLE enabled objects 108. In this implementation, the remote location engine 108 may be resident and operating on a hardware appliance 202 that may also be coupled to the network 109 and able to communicate over that network. For example, the location engine on the hardware appliance may receive BLE beacon data reports from the one or more BLE enabled objects 108 over the network 109 that may be a Wi-Fi network or other network. The location engines 106 operate in a similar manner as described above in FIG. 1 and also as described in more detail below. In this implementation, the location engine 106 on the appliance 202 may communicate data about BLE enabled object location (or boundary crossing), coordinates of the one or more BLE enabled objects 108 on a map and/or a room/region of the one or more BLE enabled objects 108 in the three dimensional space to other locations applications and a graphical user interface 204.
  • In both of the implementations in FIGS. 1 and 2, the system 100, 200 may be installed in a three dimensional space in which two BLE beacons may be installed near each boundary (for example, one each side of the boundary) in the three dimensional space (to determine the crossing of a boundary). The three dimensional space may be a building (single floor or multiple floors) in which the occupant of the building wants to track BLE enabled objects within the three dimensional space. For example, the above described system may be used for a hospital, a manufacturing facility or other building in which it would be desirable to track BLE enabled objects within the building and determine boundary crossings of the BLE enabled objects within the building.
  • FIG. 3A illustrates an example of the data flow within the real time location system using a BLE wireless protocol and a Wi-Fi protocol. Each beacon 104 (that is in a fixed position) may generate and transmit an iBeacon protocol message or an Awarepoint Corporation protocol message (either one being known as a blink) via the BLE communication protocol to the one or more BLE enabled objects 108. Each BLE enabled object 108 (that may be a BLE tag on an asset, a smartphone device or mobile phone, a tag on a person, etc) may receive blinks from one or more BLE beacons 104 (a signal from each BLE beacon) (shown at process 302 in the method 300 in FIG. 3B). The proximity of the BLE enabled object 108 may be determined (on a BLE enabled smartphone that has the location engine 106) to one of the BLE beacons 104 using a known iBeacon approach. Thus, for example, the BLE enabled object 108 may be determined to have crossed a boundary into an area since the BLE enabled object 108 is closest to a BLE beacon 104 that is located in the area, such as a room. Each BLE enabled object 108 may also or alternatively determine one or more characteristics of each signal from each BLE beacon (such as for example received signal strength and other metrics) and generate a beacon report for each BLE beacon 104 (shown at process 304 in the method 300 in FIG. 3B) that includes the one or more characteristics of the signal and an identifier of a particular BLE enabled object 108 that received the blink from the BLE beacon.
  • Each beacon report may be sent to the location engine 106 (remote on an appliance or resident on the BLE enabled object 108 that is smartphone device). If the location engine is remote, each beacon report may be communicated to the location engine over the Wi-Fi network. The location engine 106 may process the beacon reports for a particular BLE enabled object 108 and may determine an X-Y coordinate location on a map of the particular BLE enabled object 108 and may then convert the coordinates to a location in the three dimensional area (building, floor, area, room, etc.) of the particular BLE enabled object 108. The location engine may also determine, for the particular BLE enabled object 108, whether the particular BLE enabled object 108 crossed a boundary in the three dimensional area based on the beacon reports as described below in more detail. Once the location of the particular BLE enabled object 108 is determined (or a boundary crossing of the particular BLE enabled object 108 is determined), it may be sent to other systems via various networks for different uses. Optionally, the location or boundary crossing of the particular BLE enabled object 108 may be communicated back to the particular BLE enabled object 108.
  • FIG. 3B illustrates a method 300 for determining rapid room entry. In addition to the process 302 and 304 already described above, the method, being executed by the location engine, may determine crossing a boundary (for example, entering or exiting a room through a door) based on the one or more characteristics of the one or more BLE beacons received by the particular BLE enabled object (306). This process may be implemented using the method set forth in FIG. 3C or it may be implemented by comparing the RSSI of each beacon (when the BLE enabled object receives signals from at least two BLE beacons) and determining the intersection of the two RSSI signals as shown in FIG. 8.
  • FIG. 3C illustrates more details of the rapid room entry location method 306 carried out by the location engine. In a hospital example, the Fast Room Entry method is designed to detect staff and patient location and their associated workflow as well as high accuracy asset tracking. The room entry and exit detection latency is typically sub 3 seconds with high accuracy (>=99%). The method may first determine how probable a particular BLE enabled object is near a boundary and is attempting a boundary crossing/transition (enter/exit) as opposed to the particular BLE enabled object being somewhere far away for the boundary based on the received beacon reports (310). If the criteria are met, the room entry determination is performed. Since the directional BLE beacons are deployed along the boundaries, a “loudest” beacon (the BLE beacon with the strongest signal) may be detected (312). However, the location transition only occurs when the confidence threshold is exceeded (314). The confidence level calculation includes many factors and these factors include, but are not limited to, differential signal strength of the loudest BLE beacon with regard to the remaining BLE beacons, is the BLE beacon signal strength support the boundary transition event, where the BLE enabled object was and if the transition is logical based on previous location and the current estimate with regard to the room/hallway layout etc. The method may then determine, based on the confidence level, if the threshold has been exceeded and the BLE enabled object has crossed a boundary, such as through a door into or out of a room.
  • FIG. 4 illustrates an example of a building with one or more boundaries and one or more BLE beacons (the numbered or lettered circles in the diagram) adjacent each boundary. FIG. 5 illustrates an example of a boundary in a building with BLE beacons. In this example, the boundary in the three dimensional space is a door into a room has a first BLE beacon 402 inside of the room and a second BLE beacon 404 outside of the room in a hallway. As described above, each BLE beacon has a directional antenna and has the stronger signal directed away from the door. Thus, using the method for rapid room entry described above and below, the system is able to determine when a BLE enabled object, such as a person carrying a BLE tag or a BLE smartphone or a physical asset, crosses into or out of the room.
  • FIG. 6 illustrates a simplified view of two adjacent doors in a building and the positioning of the BLE beacons with directional antennas 104 6, 104 7, 104 8 and 104 9 for the doors. Similar to FIG. 5 above, the BLE beacons may be in a fixed location on either side of the door to allow the system to perform the rapid room entry method for a BLE enabled object entering or exiting the door (crossing the boundary). Also, the single BLE beacon inside the room may be used by the system, based on proximity of the BLE beacon to the BLE enabled object, to determine whether or not the BLE enabled object is in the room.
  • FIG. 7 illustrates an example of the radiation pattern for the BLE beacons shown in FIG. 6. BLE beacon 104 6 has two lobes of the radiation pattern 700 6 that, due to the directional antenna of the BLE beacon, have a strong portion of the signal directed away from the boundary and a weak portion of the signal directed towards the boundary. Similarly, beacons 104 7, 104 8, 104 9 have two lobes of the radiation pattern 700 7, 700 8, and 700 9 that, due to the directional antenna of the BLE beacon, have a strong portion of the signal directed away from the boundary and a weak portion of the signal is towards the boundary.
  • FIG. 8 illustrates an example of the raw and smoothed RSSI values for two BLE beacons that can be used to determine when a user crossed a boundary and helps further illustrate the principle of operation of the system. For the system, BLE beacons with a rapid beacon rate, depending on the desired latency, are use that have highly directional antennas. The boundary shown in FIG. 7 is a doorway, and in this case, two adjacent doorways are used. The directional antennas are aligned so that the strong lobes of energy are radiating away from the boundary (doorway), with the weak lobes radiating into the doorway. By doing this, the RSSI profile over the boundary—that is, the RSSI versus the distance from the beacon while crossing the boundary—has a very steep curve, creating a large differentiation between the two sides. As shown in FIG. 8, as a BLE enabled object crosses the boundary, the RSSI of the beacons will rapidly increase and decrease over a small distance and intersect which indicates a crossing of the boundary for the particular BLE enabled object that received the signals shown in FIG. 8. As the RSSI varies, the samples can be processed by a location engine using a differential, triangulation, or trilateration algorithm to determine distance from the various beacons and/or in which room the device now resides.
  • FIG. 9 illustrates another implementation of the system using angled radiation patterns for the beacons 104 6, 104 7, 104 8 and 104 9. It should be understood that the precise location and angular orientation of each BLE beacon in the three dimensional space is adjustable depending on the needs for a particular boundary. For example, the layout shown in FIG. 9 improves side-to-side differentiation. Thus, the system and method described herein is not limited to any particular location and/or orientation of the BLE beacons
  • The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the disclosure to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the disclosure and its practical applications, to thereby enable others skilled in the art to best utilize the disclosure and various embodiments with various modifications as are suited to the particular use contemplated.
  • The system and method disclosed herein may be implemented via one or more components, systems, servers, appliances, other subcomponents, or distributed between such elements. When implemented as a system, such systems may include an/or involve, inter alia, components such as software modules, general-purpose CPU, RAM, etc. found in general-purpose computers. In implementations where the innovations reside on a server, such a server may include or involve components such as CPU, RAM, etc., such as those found in general-purpose computers.
  • Additionally, the system and method herein may be achieved via implementations with disparate or entirely different software, hardware and/or firmware components, beyond that set forth above. With regard to such other components (e.g., software, processing components, etc.) and/or computer-readable media associated with or embodying the present inventions, for example, aspects of the innovations herein may be implemented consistent with numerous general purpose or special purpose computing systems or configurations. Various exemplary computing systems, environments, and/or configurations that may be suitable for use with the innovations herein may include, but are not limited to: software or other components within or embodied on personal computers, servers or server computing devices such as routing/connectivity components, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, consumer electronic devices, network PCs, other existing computer platforms, distributed computing environments that include one or more of the above systems or devices, etc.
  • In some instances, aspects of the system and method may be achieved via or performed by logic and/or logic instructions including program modules, executed in association with such components or circuitry, for example. In general, program modules may include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular instructions herein. The inventions may also be practiced in the context of distributed software, computer, or circuit settings where circuitry is connected via communication buses, circuitry or links. In distributed settings, control/instructions may occur from both local and remote computer storage media including memory storage devices.
  • The software, circuitry and components herein may also include and/or utilize one or more type of computer readable media. Computer readable media can be any available media that is resident on, associable with, or can be accessed by such circuits and/or computing components. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and can accessed by computing component. Communication media may comprise computer readable instructions, data structures, program modules and/or other components. Further, communication media may include wired media such as a wired network or direct-wired connection, however no media of any such type herein includes transitory media. Combinations of the any of the above are also included within the scope of computer readable media.
  • In the present description, the terms component, module, device, etc. may refer to any type of logical or functional software elements, circuits, blocks and/or processes that may be implemented in a variety of ways. For example, the functions of various circuits and/or blocks can be combined with one another into any other number of modules. Each module may even be implemented as a software program stored on a tangible memory (e.g., random access memory, read only memory, CD-ROM memory, hard disk drive, etc.) to be read by a central processing unit to implement the functions of the innovations herein. Or, the modules can comprise programming instructions transmitted to a general purpose computer or to processing/graphics hardware via a transmission carrier wave. Also, the modules can be implemented as hardware logic circuitry implementing the functions encompassed by the innovations herein. Finally, the modules can be implemented using special purpose instructions (SIMD instructions), field programmable logic arrays or any mix thereof which provides the desired level performance and cost.
  • As disclosed herein, features consistent with the disclosure may be implemented via computer-hardware, software and/or firmware. For example, the systems and methods disclosed herein may be embodied in various forms including, for example, a data processor, such as a computer that also includes a database, digital electronic circuitry, firmware, software, or in combinations of them. Further, while some of the disclosed implementations describe specific hardware components, systems and methods consistent with the innovations herein may be implemented with any combination of hardware, software and/or firmware. Moreover, the above-noted features and other aspects and principles of the innovations herein may be implemented in various environments. Such environments and related applications may be specially constructed for performing the various routines, processes and/or operations according to the invention or they may include a general-purpose computer or computing platform selectively activated or reconfigured by code to provide the necessary functionality. The processes disclosed herein are not inherently related to any particular computer, network, architecture, environment, or other apparatus, and may be implemented by a suitable combination of hardware, software, and/or firmware. For example, various general-purpose machines may be used with programs written in accordance with teachings of the invention, or it may be more convenient to construct a specialized apparatus or system to perform the required methods and techniques.
  • Aspects of the method and system described herein, such as the logic, may also be implemented as functionality programmed into any of a variety of circuitry, including programmable logic devices (“PLDs”), such as field programmable gate arrays (“FPGAs”), programmable array logic (“PAL”) devices, electrically programmable logic and memory devices and standard cell-based devices, as well as application specific integrated circuits. Some other possibilities for implementing aspects include: memory devices, microcontrollers with memory (such as EEPROM), embedded microprocessors, firmware, software, etc. Furthermore, aspects may be embodied in microprocessors having software-based circuit emulation, discrete logic (sequential and combinatorial), custom devices, fuzzy (neural) logic, quantum devices, and hybrids of any of the above device types. The underlying device technologies may be provided in a variety of component types, e.g., metal-oxide semiconductor field-effect transistor (“MOSFET”) technologies like complementary metal-oxide semiconductor (“CMOS”), bipolar technologies like emitter-coupled logic (“ECL”), polymer technologies (e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures), mixed analog and digital, and so on.
  • It should also be noted that the various logic and/or functions disclosed herein may be enabled using any number of combinations of hardware, firmware, and/or as data and/or instructions embodied in various machine-readable or computer-readable media, in terms of their behavioral, register transfer, logic component, and/or other characteristics. Computer-readable media in which such formatted data and/or instructions may be embodied include, but are not limited to, non-volatile storage media in various forms (e.g., optical, magnetic or semiconductor storage media) though again does not include transitory media. Unless the context clearly requires otherwise, throughout the description, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in a sense of “including, but not limited to.” Words using the singular or plural number also include the plural or singular number respectively. Additionally, the words “herein,” “hereunder,” “above,” “below,” and words of similar import refer to this application as a whole and not to any particular portions of this application. When the word “or” is used in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list and any combination of the items in the list.
  • Although certain presently preferred implementations of the invention have been specifically described herein, it will be apparent to those skilled in the art to which the invention pertains that variations and modifications of the various implementations shown and described herein may be made without departing from the spirit and scope of the invention. Accordingly, it is intended that the invention be limited only to the extent required by the applicable rules of law.
  • While the foregoing has been with reference to a particular embodiment of the disclosure, it will be appreciated by those skilled in the art that changes in this embodiment may be made without departing from the principles and spirit of the disclosure, the scope of which is defined by the appended claims.

Claims (17)

1. A system, comprising:
two Bluetooth low energy (BLE) beacons adjacent a boundary in an area with a first BLE beacon mounted on a first side of the boundary in the area and a second BLE beacon mounted on a second side of the boundary in the area;
a BLE enabled object that senses a signal from the two BLE beacons adjacent the boundary in the area and captures one or more characteristics of the signal for the two BLE beacons adjacent the boundary in the area; and
a location engine that determines when the one or more gathered characteristics of the signal for the two BLE beacons adjacent the boundary intersect each other and determines, based on the intersection of the one or more gathered characteristics of the signal for the two BLE beacons adjacent the boundary, a crossing of the boundary by the BLE enabled object.
2. The system of claim 1, wherein the one or more characteristics of the signal for each BLE beacon further comprises a received signal strength indication for each BLE beacon.
3. The system of claim 1, wherein the BLE enabled object senses one of a periodic signal from each BLE beacon and a continuous signal from each BLE beacon.
4. The system of claim 1, wherein the location engine is resident in the BLE enabled object.
5. The system of claim 1, wherein the location engine is remote from the BLE enabled object and the BLE enabled object communicates the one or more gathered characteristics of the signal for the two BLE beacons to the remote location engine and wherein the remote location engine communicates the determination of the crossing of the boundary by the BLE enabled object back to the BLE enabled object.
6. The system of claim 1, wherein determining the crossing of the boundary by the BLE enabled object further comprises determining a movement of the BLE enabled object through a door.
7. A method, comprising:
providing a location determining system having two Bluetooth low energy (BLE) beacons adjacent a boundary in an area with a first BLE beacon mounted on a first side of the boundary in the area and a second BLE beacon mounted on a second side of the boundary in the area;
sensing, by a BLE enabled object, a signal from each of the two BLE beacons adjacent the boundary in the area, the sensing further comprising capturing one or more characteristics of the signal for the two BLE beacons adjacent the boundary in the area;
comparing the one or more gathered characteristics of the signal for the two BLE beacons adjacent the boundary in the area;
determining when the one or more gathered characteristics of the signal for the two BLE beacons adjacent the boundary intersect each other; and
determining, based on the intersection of the one or more gathered characteristics of the signal for the two BLE beacons adjacent the boundary in the area, a crossing of the boundary by the BLE enabled object.
8. The method of claim 7, wherein the one or more characteristics of the signal for each BLE beacon further comprises a received signal strength indication for each BLE beacon.
9. The method of claim 7, wherein sensing the signal from the BLE beacons further comprises sensing a periodic signal from each BLE beacon or continuously sensing a signal from each BLE beacon.
10. The method of claim 7 further comprising communicating the one or more gathered characteristics of the signal for the two BLE beacons from the BLE enabled object to a remote location engine.
11. The method of claim 7, wherein determining the crossing of the boundary by the BLE enabled object further comprises determining, at the remote location engine, the crossing of the boundary by the BLE enabled object.
12. The method of claim 11 further comprising communicating the determination of the crossing of the boundary by the BLE enabled object back to the BLE enabled object.
13. The method of claim 7, wherein determining the crossing of the boundary by the BLE enabled object further comprises determining a movement of the BLE enabled object through a door.
14. An apparatus, comprising:
a device having a processor, a memory and a Bluetooth low energy (BLE) receiver;
wherein the Bluetooth low energy receiver senses a signal from two Bluetooth low energy (BLE) beacons adjacent a boundary in an area with a first BLE beacon mounted on a first side of the boundary in the area and a second BLE beacon mounted on a second side of the boundary in the area and captures one or more characteristics of the signal for the two BLE beacons; and
wherein the processor of the device determines when the one or more gathered characteristics of the signal for the two BLE beacons adjacent the boundary intersect each other and determines, based on the intersection of the one or more gathered characteristics of the signal for each of the two BLE beacons adjacent the boundary in the area, a crossing of the boundary by the device.
15. The apparatus of claim 14, wherein the one or more characteristics of the signal for each BLE beacon further comprises a received signal strength indication for each BLE beacon.
16. The apparatus of claim 14, wherein the Bluetooth low energy receiver one of senses a periodic signal from each BLE beacon and continuously senses a signal from each BLE beacon.
17. The apparatus of claim 14, wherein the processor determines a movement of the device through a door.
US15/171,880 2015-03-24 2016-06-02 Ble rapid room entry system and method Abandoned US20160286348A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/171,880 US20160286348A1 (en) 2015-03-24 2016-06-02 Ble rapid room entry system and method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/667,021 US9374667B1 (en) 2015-03-24 2015-03-24 Bluetooth low energy rapid room entry system and method
US15/171,880 US20160286348A1 (en) 2015-03-24 2016-06-02 Ble rapid room entry system and method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/667,021 Continuation US9374667B1 (en) 2015-03-24 2015-03-24 Bluetooth low energy rapid room entry system and method

Publications (1)

Publication Number Publication Date
US20160286348A1 true US20160286348A1 (en) 2016-09-29

Family

ID=56118421

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/667,021 Active US9374667B1 (en) 2015-03-24 2015-03-24 Bluetooth low energy rapid room entry system and method
US15/171,880 Abandoned US20160286348A1 (en) 2015-03-24 2016-06-02 Ble rapid room entry system and method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/667,021 Active US9374667B1 (en) 2015-03-24 2015-03-24 Bluetooth low energy rapid room entry system and method

Country Status (4)

Country Link
US (2) US9374667B1 (en)
EP (1) EP3275220B1 (en)
JP (1) JP6765414B2 (en)
WO (1) WO2016154486A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018213253A1 (en) * 2017-05-16 2018-11-22 Carrier Corporation Access control system with wireless communication
US20190069152A1 (en) * 2017-08-29 2019-02-28 Tata Consultancy Services Limited Method and system for entry and exit monitoring using bluetooth low energy (ble) beacons
CN110999332A (en) * 2017-06-27 2020-04-10 通用电气公司 Automatic band selection using infrastructure-supported beacons

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9785744B2 (en) 2010-09-14 2017-10-10 General Electric Company System and method for protocol adherence
US9584965B2 (en) 2014-07-25 2017-02-28 General Electric Company Methods and apparatus to facilitate proximity detection and location tracking
US9734682B2 (en) 2015-03-02 2017-08-15 Enovate Medical, Llc Asset management using an asset tag device
US9374667B1 (en) * 2015-03-24 2016-06-21 Awarepoint Corporation Bluetooth low energy rapid room entry system and method
US20190230472A1 (en) * 2017-01-16 2019-07-25 Reza Raji Cloud platform for real-time presence and position tracking in facilities
US10311352B2 (en) 2017-04-06 2019-06-04 General Electric Company Healthcare beacon device configuration systems and methods
US10244377B2 (en) 2017-06-17 2019-03-26 Link Labs, Inc. BLE networking systems and methods providing central and peripheral role reversal according to network provisioned timing therefor
US10506498B1 (en) 2018-11-01 2019-12-10 Link Labs, Inc. BLE networking systems and methods providing central and peripheral role reversal with enhanced peripheral location determination using ultrasonic waveform and correlation therefor
US10708970B2 (en) 2017-06-17 2020-07-07 Link Labs, Inc. BLE networking systems and methods providing central and peripheral role reversal with enhanced peripheral location determination using constant tone extension analysis for a same channel
US10499196B2 (en) 2017-06-17 2019-12-03 Link Labs, Inc. BLE networking systems and methods providing central and peripheral role reversal with enhanced peripheral location determination
US10237913B2 (en) 2017-06-17 2019-03-19 Link Labs, Inc. BLE networking systems and methods providing central and peripheral role reversal thereof while movable between locations
US10244373B2 (en) 2017-06-17 2019-03-26 Link Labs, Inc. BLE networking systems and methods providing central and peripheral role reversal
US10484932B2 (en) 2017-06-17 2019-11-19 Link Labs, Inc. BLE networking systems and methods providing central and peripheral role reversal with enhanced peripheral location determination using ultrasonic waveform
US10264436B1 (en) 2018-05-29 2019-04-16 Link Labs, Inc. BLE networking systems and methods providing central and peripheral role reversal with independent peripheral network connectivity
SE543807C2 (en) * 2019-05-17 2021-07-27 Shortcut Labs Ab A sensor device, a communication node, a system and methods for determining which mobile communication device is closest to a sensor device
US10645536B1 (en) * 2019-05-29 2020-05-05 Royal Caribbean Cruises Ltd. Object location and tracking
US20220398886A1 (en) * 2021-06-11 2022-12-15 Vendor Credentialing Service Llc Credentialing method and apparatus for facility access
US11778540B1 (en) 2022-10-12 2023-10-03 Link Labs, Inc. BLE networking systems and methods including filtering for selectively collecting and processing advertisement data

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090043504A1 (en) * 2007-05-31 2009-02-12 Amrit Bandyopadhyay System and method for locating, tracking, and/or monitoring the status of personnel and/or assets both indoors and outdoors

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5250955A (en) * 1992-06-05 1993-10-05 Lockheed Information Services Company State entry beacon system
JP3201154B2 (en) * 1994-07-20 2001-08-20 株式会社デンソー Moving object identification device
US6529164B1 (en) * 2000-03-31 2003-03-04 Ge Medical Systems Information Technologies, Inc. Object location monitoring within buildings
JP2002334382A (en) * 2001-05-08 2002-11-22 Hitachi Kiden Kogyo Ltd System for managing entering/leaving persons
JP2003021679A (en) * 2001-07-06 2003-01-24 Hitachi Kiden Kogyo Ltd Management system for entering/leaving person
JP2003331329A (en) * 2002-05-10 2003-11-21 Life Gijutsu Kenkyusho:Kk Mobile wireless telephone/toll road toll collection system and mobile wireless telephone terminal device
US20030232598A1 (en) * 2002-06-13 2003-12-18 Daniel Aljadeff Method and apparatus for intrusion management in a wireless network using physical location determination
US7751829B2 (en) * 2003-09-22 2010-07-06 Fujitsu Limited Method and apparatus for location determination using mini-beacons
JP2009055383A (en) * 2007-08-28 2009-03-12 Taisei Corp Installation structure for antenna
JP5661987B2 (en) * 2008-02-19 2015-01-28 ヤマハ株式会社 Location notification system
JP5084611B2 (en) * 2008-05-27 2012-11-28 セコム株式会社 Mobile object management system and responder
US20140195256A1 (en) * 2009-04-05 2014-07-10 Awarepoint Corporation Workflow Context Aware Location Tracking System And Method
JP5403355B2 (en) * 2009-11-20 2014-01-29 清水建設株式会社 Position detection and behavior recognition system in the building
JP5514562B2 (en) * 2010-01-14 2014-06-04 東京エレクトロニツクシステムズ株式会社 Location management method and portable terminal
US8396485B2 (en) * 2010-11-09 2013-03-12 Apple Inc. Beacon-based geofencing
US9057210B2 (en) * 2011-03-17 2015-06-16 Unikey Technologies, Inc. Wireless access control system and related methods
US9519812B2 (en) * 2012-11-25 2016-12-13 Pixie Technology Inc. Managing a sphere of wireless tags
JP5889214B2 (en) * 2013-01-08 2016-03-22 三菱電機株式会社 Position detection system
US20140237076A1 (en) * 2013-02-21 2014-08-21 On Location Engagements, Inc. Content Management And Delivery of On Location Engagements
US9113300B2 (en) * 2013-03-15 2015-08-18 Apple Inc. Proximity fence
US20150071274A1 (en) * 2013-09-11 2015-03-12 Emanate Wireless, Inc. Cable assembly with integrated wireless proximity sensors
JP5639727B1 (en) * 2014-05-30 2014-12-10 株式会社日立パワーソリューションズ Entrance / exit management system
JP2016050861A (en) * 2014-08-29 2016-04-11 株式会社アプライド・ビジョン・システムズ Mobile communication terminal, region estimation system, region estimation method, and program
US9374667B1 (en) * 2015-03-24 2016-06-21 Awarepoint Corporation Bluetooth low energy rapid room entry system and method
JP6470647B2 (en) * 2015-06-30 2019-02-13 株式会社野村総合研究所 Location judgment method
US9955303B2 (en) * 2015-07-21 2018-04-24 IP Funding Group, LLC Determining relative position with a BLE beacon

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090043504A1 (en) * 2007-05-31 2009-02-12 Amrit Bandyopadhyay System and method for locating, tracking, and/or monitoring the status of personnel and/or assets both indoors and outdoors
US20160216117A9 (en) * 2007-05-31 2016-07-28 Amrit Bandyopadhyay System and method for locating, tracking, and/or monitoring the status of personnel and/or assets both indoors and outdoors

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018213253A1 (en) * 2017-05-16 2018-11-22 Carrier Corporation Access control system with wireless communication
CN110612556A (en) * 2017-05-16 2019-12-24 开利公司 Access control system with wireless communication
US11361605B2 (en) 2017-05-16 2022-06-14 Carrier Corporation Access control system with wireless communication
CN110999332A (en) * 2017-06-27 2020-04-10 通用电气公司 Automatic band selection using infrastructure-supported beacons
EP3646624A4 (en) * 2017-06-27 2021-03-31 General Electric Company Automatic frequency band selection using infrastructure-enabled beaconing
US20190069152A1 (en) * 2017-08-29 2019-02-28 Tata Consultancy Services Limited Method and system for entry and exit monitoring using bluetooth low energy (ble) beacons
EP3451013A1 (en) * 2017-08-29 2019-03-06 Tata Consultancy Services Limited Method and system for entry and exit monitoring using bluetooth low energy (ble) beacons
US10667107B2 (en) * 2017-08-29 2020-05-26 Tata Consultancy Services Limited Method and system for entry and exit monitoring using bluetooth low energy (BLE) beacons
AU2018222950B2 (en) * 2017-08-29 2020-07-09 Tata Consultancy Services Limited Method and system for entry and exit monitoring using bluetooth low energy (ble) beacons

Also Published As

Publication number Publication date
EP3275220B1 (en) 2023-08-30
WO2016154486A1 (en) 2016-09-29
EP3275220A1 (en) 2018-01-31
EP3275220A4 (en) 2018-05-30
JP6765414B2 (en) 2020-10-07
US9374667B1 (en) 2016-06-21
JP2018515789A (en) 2018-06-14

Similar Documents

Publication Publication Date Title
US9374667B1 (en) Bluetooth low energy rapid room entry system and method
US20180288585A1 (en) Bluetooth low energy location system and method
EP3603125B1 (en) Supporting a tracking of mobile devices
US9699618B2 (en) Determining location based on both a detected location and a predicted location
US8618932B2 (en) Device location detection
US8805413B2 (en) Methods and apparatuses for use in determining a location of a mobile device within a multi-level physical structure
US10009733B2 (en) Method and system for determining a position of a mobile device by an access point
US8983490B2 (en) Locating a mobile device
Yu et al. Design and implementation of a real-time object location system based on passive RFID tags
Talampas et al. An enhanced geometric filter algorithm with channel diversity for device-free localization
Reza et al. Tracking via square grid of RFID reader positioning and diffusion algorithm
D'Aloia et al. Improving energy efficiency in building system using a novel people localization system
Szyc et al. Bluetooth low energy indoor localization for large industrial areas and limited infrastructure
Tsang et al. A bluetooth-based indoor positioning system: a simple and rapid approach
KR102612792B1 (en) Electronic device and method for determining entry in region of interest thereof
Munadhil et al. Distance estimation-based PSO between patient with Alzheimer’s disease and beacon node in wireless sensor networks
Chawla et al. An accurate real-time RFID-based location system
Yu et al. An intelligent space location identification system based on passive RFID tags
US20160174147A1 (en) Access point selection for mobile device positioning
Maneerat et al. Robust floor determination algorithm for indoor wireless localization systems under reference node failure
Firdaus et al. Fingerprint indoor positioning based on user orientations and minimum computation time
Chang et al. Optimisation‐based deployment of beacons for indoor positioning using wireless communications and signal power ranking
Xiao et al. Sequential geometric approach for device-free localization with outlier link rejection
KR20180122120A (en) Localization apparatus and method for controlling thereof
KR102559770B1 (en) The Method and System to derive a two-dimensional position of User Device

Legal Events

Date Code Title Description
AS Assignment

Owner name: AWAREPOINT CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JORGENSEN, GARY;GENG, WEI;DELMAGE, MATT;AND OTHERS;SIGNING DATES FROM 20150825 TO 20151001;REEL/FRAME:038870/0192

AS Assignment

Owner name: CLINICAL PATENTS, LLC, PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AWAREPOINT CORPORATION;REEL/FRAME:046521/0391

Effective date: 20180620

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION