Improvements Relating to Communications
Field of the Invention
The present invention concerns improvements relating to communications and more particularly though not exclusively concerns a mobile restricted communications device which can be used as a child-locating device. The present invention is also directed at a central communications server and a method of using the same with such a device.
Background of the Invention Over 250,000 people are reported missing to the police each year across the UK, of these 100,000 are children. Thankfully, the vast majority of them will return safely to their homes, without major incident. The remainder of the people reported missing, are often vulnerable individuals, such as the elderly or mentally infirm or abused individuals. All missing persons cases especially those involving children create major anxiety and stress for the parents, guardians and carers, and also place a significant overhead on our rescue and police services.
With over 11.7 million minors in the UK and increasing numbers of missing person reports there is a distinct need to be able to track, locate and contact vulnerable people or minors. Fulfilling this need would will help to give peace of mind to both children and adults, in addition to helping the overstretched rescue services and police locate and return children in the shortest time possible.
The prior art devices, which attempt to address these problems, fall into three main categories that are described below.
The first category of known devices consists of devices that alert parents and guardians to the intentional or unintentional separation of the child from the parent and/or guardian within a predetermined distance, specifically defined place or from within the realms of a proprietary network. Usually, these kind of devices are implemented using a point-to- point communication area composed of a fixed central receiver/transmitter and one or
more mobile terminals or as a small radio network composed of a few base stations covering a small area and one or more mobile terminals. When a supervised mobile terminal leaves the area then an alert is generated.
While these devices serve a purpose in the retention of young children in crowded areas or in confining children in areas such as a play ground, leisure area, back garden or indeed any predetermined area for example, they do not afford protection for the child when he or she is away from home or any other area other than a predefined area. It is a known fact that many children become lost and/or abducted while returning from school, playing, out shopping, returning from a friend's house or while engaged in outdoor leisure activities such as camping and visiting unfamiliar places. The above-mentioned category of devices do not allow for protection of the child in such circumstances. In addition, each device works with a dedicated matched receiver that has a limited coverage area and therefore devices of this first category are not suitable for locating a child for example that has travelled any great distance, i.e. many children are abducted by car and travel away from the original abduction location.
The second category of prior art devices includes security devices in which a lost or abducted child can be located by using a radio receiver that monitors the signal transmitted by a matching transmitter in possession of the lost or abducted child. The communication range is significantly greater than in the case of the first category of devices.
While these second category devices allow for the alerting of parents and/or guardian, they require the use of a large and/or bulky transmitter. While such a transmitter may be acceptable for use by an adult, children are less likely to carry such a device on a regular basis. Additionally, these devices suffer from requiring a matched receiver, have a limited coverage range, have very limited communication features and can often be misplaced, lost, stolen or run out of battery life quickly.
The third category of prior art devices has tackled the issue of using cumbersome/large tracking devices by utilising the combination of a location technology like GPS (Global Positioning System) and a communication technology like a mobile phone's SMS (Short Messaging Service) service or a proprietary radio network to deliver a tracking service to owners and carriers of mobile phones or small gaming devices. These include services such as Quicktrack: based on deployment of proprietary network infrastructure and technology, MapAMobile: requires mobile phone, and creates significant overhead on network with volumes, as well as Woznet: Steve Wozniak's RF (Radio Frequency) and GPS with each user purchasing a base station and 1km radius and Geobangle: RF based technology only useful within very confined geography.
Whilst the latter two do not require the ownership of a mobile phone the others do. This in itself has a number of negative connotations including:
1. As per other solutions, the cost and size of a GPS/GSM combined service is often prohibitive in terms of cost per use and has a high entry cost for consumers with limited scalability potential;
2. A GPS system locator needs line of sight from up to five satellites to have an accurate location and is inaccurate in built up locations or where there are metal framed buildings;
3. The GPS specific systems have to have a bulky receiver and deplete the battery after very limited use;
4. Solutions using the location data delivered by the mobile network's Location Server (as a Gateway Mobile Location Centre) create a high level of signalling and radio network traffic because of the way they locate the mobile terminals. This network overload is unacceptable to mobile network operators and therefore the solutions are not available to the mass market;
5. Majority of the solutions involve the child carrying a mobile phone or a games based tracking device around which can often be turned off, stolen, can run out of battery power, be left at a friend's house, become lost etc;
6. Majority of the solutions offer only very limited inter-human communication features; and
7. Expensive to own and use to locate child on a regular basis.
It is therefore an objective of the present invention to overcome at least some of the above problems. It is also desired to provide an affordable, accurate, easy-to-use child communication, security and location solution that uses the current and planned mobile network (as GSM for example) infrastructure of MNOs (Mobile Network Operators) to deliver a security, and two-way communication, location tracking solution to children, parents and guardians whilst minimising network overhead.
Summary of the Invention
According to one aspect of the present invention there is provided a mobile restricted communications device for use as a personal accessory by a user of the device, the device comprising: a plurality of predetermined communications addresses stored within the device, wherein each address is specified by a party other than the user and the device is arranged to prevent the user from altering the plurality of stored addresses; loading means for loading the device with the plurality of predetermined communications addresses received over a wireless communications medium; navigation means responsive to user interaction for navigating between different ones of the plurality of predetermined communications addresses; selecting means responsive to user interaction for selecting a communications address from the plurality of predetermined communications addresses; and communications means for establishing a communications channel over a mobile telecommunications network with the selected communications address.
Such a remotely configurable restricted communications device is ideal for children in that the use of the device is simple to use and is fully supportive of security issues. As the device cannot be use in an uncontrolled manner (all communications are based on selection of predetermined data), the parents/guardians of the children using the device are reassured that their children are not communicating with undesirable people or in an undesirable manner. The reconfigurable nature of the device means that parents can
advantageously control modification of the contact list of people that the child is permitted to talk to using the device.
According to another aspect of the present invention there is provided a central communications server for controlling the operation of a user-specified remote mobile telecommunications device, the server comprising: mobile telecommunications means connectable to a mobile telecommunications network for enabling mobile communications to and from the remote mobile telecommunications device; data communications means connectable to a data network for enabling selection of configuration data regarding the operation of the remote mobile telecommunications device from a remote configuration data selecting input terminal; a data store for storing the configuration data selected by a user via the remote data configuration terminal; the configuration data including a database of event driven rules and rights pertaining to the operation of the remote mobile telecommunications device; wherein the database of rules is configurable by the user to enable communication under predetermined event circumstances with the remote telecommunications device.
Such a server enables a parent to configure and control how the system will work with a remote telecommunications device given to its child. Many different events can be defined and the responses which are suitable to these different events. The central communications server provides a flexible platform from which the functional capabilities of the remote mobile telecommunications device of the child can be specified completely and controlled by the parent.
The present invention also extends to a method of controlling the operation of a remote mobile telecommunications device from a central location, the method comprising: enabling at the central location mobile communications to and from the remote mobile telecommunications device via a mobile telecommunications network; enabling at the central location data communications with a remote configuration data selecting input terminal via a data network; selecting configuration data regarding the operation of the remote mobile telecommunications device via the input terminal; storing at the central
location the selected configuration data; the configuration data including a database of event driven rules and rights pertaining to the operation of the remote mobile telecommunications device; and wherein the selecting step comprises selecting configuration data to enable communication under predetermined event circumstances with a user-specified remote mobile telecommunications device
According to another aspect of the present invention there is provided a portable personal location determining device for use in establishing the location of the device's owner, the device comprising: a location determination means being arranged to detect mobile telecommunication network location identifying signals and to calculate a mobile network-related location of the device; a data store for storing the network-related location of the device over time; comparison means arranged to compare a calculated current location with a previous location stored in the data store; and communications means for establishing a communications channel over a mobile telecommunications network with a predetermined communications address; the communications means being arranged to transmit data specifying the current network location if there is a change of the device's network location indicated by the results of the comparison.
This device cuts down the amount of network traffic in that it is not constantly sending out its location and in that it only sends out this location data if there is a significant difference from its previously stored location. Preferably, the location data can also be provided on occurrence of a location requiring event such as a request for the location or an alarm event requiring sending of the current location.
According to. another aspect of the present invention there is provided a portable child- locating device for use as a personal accessory by a user of the device, the device comprising: securing means for securing the device to the body of the child; communications means for receiving a data instruction over a mobile telecommunications network from a remote predetermined communication address; and instruction processing means for reading the received data instruction and processing the same to cause the device to generate an attention seeking alarm.
This is clearly advantageous in that when a child is lost the parent can remotely activate an attention seeking alarm on their device which assists in locating the child.
An exemplary embodiment of the present invention provides a two-way voice, video or data communication path without the child having to carry a mobile phone or cumbersome receiver. The child can communicate with parents or other allowed persons without keeping their phone numbers or contact identities in his her memory. The parents also have the ability to specify the persons (or rather their mobile devices or terminal numbers) that the child is allowed to communicate with. The parents can even configure the communication traffic limits in order to restrain the cost of the communications performed by the child.
Brief Description of the Drawings Embodiments of the present invention are now described with reference to the accompanying drawings, in which:
Figure 1 is a schematic block diagram showing main elements of a system embodying the present invention including a Restricted Communications Device and a Central Unit; Figure 2 is a schematic block diagram showing the components of the Restricted
Communications Device of Figure 1;
Figure 3 is a schematic block diagram showing location data exchange between the
Restricted Communications Device of Figure and its local mobile network;
Figure 4 is a schematic block diagram showing the components of the Central Unit of Figure 1;
Figure 5 is a plan view of the Restricted Communications Device showing a first screen representation;
Figure 6a is a plan view of the Restricted Communications Device showing a Main screen representation; Figure 6b is a plan view of the Restricted Communications Device showing a Main Menu screen representation;
Figure 6c is a plan view of the Restricted Communications Device showing a Proximity screen representation;
Figure 6d is a plan view of the Restricted Communications Device showing a Call screen representation; Figure 6e is a plan view of the Restricted Communications Device showing a Guardian
Message screen representation;
Figure 6f is a plan view of the Restricted Communications Device showing a Child response screen representation;
Figure 6g is a plan view of the Restricted Communications Device showing a Guardian Authentication screen representation;
Figure 6h is a plan view of the Restricted Communications Device showing a Guardian
Menu screen representation; and
Figure 7 is a schematic block diagram showing data flows which occur with the system of
Figure 1.
Detailed Description of Presently Preferred Embodiments
Referring now to Figure 1, a system 10 according to an exemplary embodiment of the present invention is now described. The system 10 comprises of four main components operating together by the means of a wide area network 12 such as the Internet, and mobile telecommunications networks 14. The first component is a dedicated restricted communications device 16 attached to a child's body (not shown), which transmits and receives signals to and from the mobile telecommunications networks 14, such as the GSM networks in the UK or the GSM/CDMA networks used in different countries/regions worldwide. In particular, the mobile telecommunications network is standard and its components are well known. Figure 1 shows that it includes SMSCs (Short Message Service Centres) and MMSCs (Multimedia Message Service Centres) 32, an HLR (Home Location Register) and Presence Server 36, and various other sub systems 34 including an IVR (Interactive Voice Response) system. Where the term restricted device 16 is referenced to interact with the central unit 22, the restricted device 16 may be substituted with the mobile phone or a suitable portable
mobile communications terminal configured to act in the same manner as the restricted device. However any such alternative embodiment is less advantageous, because of the reduction in the control which can be exerted by the parents on the use of the device.
The second component is a configuration terminal 18 that allows authorised users (parents, guardians) to configure how the system 10 should behave for a given restricted communication device 16. The terminal 18 is used to set up the preferred way in which the system 10 will operate in use. The configuration terminal 18 can have a multitude of different forms: a web-browser on a PC connected to the Internet 12 (used in this embodiment and shown in Figure 1), a mobile phone WAP (Wireless Application Protocol) browser connected to the mobile telecommunication network 14 through which it can access the Internet 12, a mobile telecommunications device (not shown) with no access to the Internet 12 etc.
The parents (guardians) associated with a child are equipped with standard mobile phones 20 (used in this embodiment and shown in Figure 1) or landline telephones or any other suitable portable or fixed communications device that are the third communicating component of the present embodiment. These standard mobile telephones 20 enable the parents to use the system 10 in real time to achieve their desired goal, be it locating their child or contacting them remotely, for example.
The fourth component of the system 10 is a computer-based central unit 22 that is installed by a mobile network operator, service provider or other party offering the service, and with which all the communicating devices/terminals 16, 18, 20 interact via the Internet 12 or via mobile telecommunications networks 14. The central unit 22 stores the communications rules and rights defined by the configuration terminal 18 for a particular restricted communications device 16. These stored rights are used to control the way in which the restricted communication device can operate and the interaction between it and the standard terminal 20.
The central unit 22 may also comprise several other subsystems. In this embodiment: a CRM (Customer Relations Module) system 24 is provided for managing the systems interaction with the user via the configuration terminal 18; a billing system 26 is provided for controlling the way in which the user is billed for their use of the system 10; a Map/Geography Server 28 is provided to convert network locations sent to it into geographic locations for provision to the user: and other standard sub systems 30 are also provided but are not part of the present invention and so are not described herein.
The way in which the system is used is described in detail later. Once the user has registered and has supplied all of the necessary information, there are various different functions that can be performed by the system and these are also described in detail later with reference to Figure 8
Referring to Figure 2, the restricted communications device 16 is now described in greater detail. The device 16 is configured as a personal accessory in this embodiment as wrist watch and incorporates:
• A mobile telecommunications module 40 allowing voice, text and multi-media communications.
• Integrated radio antennae 42; • Integrated data memory and a microprocessor 44;
• An integrated SIM (Subscriber Identity Module) 46;
• A time keeping device (not shown);
• A temperature sensing device (not shown);
• Customisable display panel (such as an LCD (Liquid Crystal Display) panel) that can be 'branded' via the display of different messages, formats, colours and/or shapes to give the device a different overall cosmetic look and feel;
• Navigation command drivers 50 (which receive user inputs from actuators 84 provided on the device. These actuators can be button or roller button/ball which enable selection/activation of Navigation commands to provide fast and efficient input and selection of messages and functions either directly or via a selection of options presented on the display or incorporated in sent messages - described later);
• A fast communication command driver 52 (which receives user input from an actuator 88 (such as a panic alert button) provided on the device 16 - described later); that establishes a communication session with a predefined standard terminal 20 and/or the central unit 22; • A security clasp detector 54 that activates a transmission of an event signal on opening/closing of a security clasp 82 of the device 16 (see later);
• A security circuit 56 within the strap 80 of the accessory 16, which activates a transmission of an event signal when broken;
• A rechargeable power supply 58 as, for example, a closed-loop power supply with induction charging similar to inductive loop charging used in cordless electric toothbrushes;
• Removable interchangeable piece parts and/or covers that allow the device to be 'branded' and given a different overall cosmetic look and feel.
• Games and personal location, communication and computing applications provided on the device in a similar marrner to a conventional mobile phone; and
• The restricted communications device 16 is offered in a range of sizes and styles and can be constructed using a variety of metal, plastic, rubber, fabric and other materials.
The restricted communication device 16 also has no numeric or alphanumeric keypad, has no manual commands to separately select numeric or alphanumeric characters and is waterproof. The communications are established using predefined lists of communication recipients that can be selected by the child using only the navigation command actuators
84. The child is only allowed to communicate with a closed parent-defined group of mobile or landline telecommunications devices. Communications addresses (not shown) for the authorised communication recipients are stored, together with other configuration parameters, in a configuration database 70 of the central unit 22. However, in an alternative embodiment it is possible to store the communications addresses in the memory 44 of the restricted communication device 16. The configuration database 70 also stores a set of configuration parameters (not shown), which constitute the communication rules and rights definition for the restricted communication device 16.
The system 10 is designed to store a plurality of different sets of configuration rules for a
plurality of different restricted communication devices. The restrictions defined by these rules and rights cover the communication recipients but also the authorised communication periods, communication traffic limits etc.
Referring to Figure 3, it can be seen that the restricted communication device 16 can also detect (Event 1 shown in Figure 3) radio signals 60 from base stations 62 of one or more mobile telecommunications networks 14 and use this data to calculate a network-related location 64 of the device 16 based on the specific identities of the base stations 62 and/or their signal frequency and/or their signal strength. The network-related location 64 can be calculated by one of the commonly known triangulation algorithms or can be directly retrieved from the signals 60 emitted by the base stations 62. The restricted communication device 16 sends (Events 2 and 3 shown in Figure 3) the location information (data) to the central unit 22 via the base station 62 only if a significant change of the device's location has been detected. In this regard, once a current location has been determined, it is compared to a previously calculated and stored location or a predetermined fixed location and the difference if any is assessed. If the difference is greater than a threshold value, stored in the memory 44 of the restricted communications device 16, then the change in the device's location is considered to be significant. The central unit 22 sets the threshold value and downloads it to the restricted communications device 16. Clearly control of the threshold value can control the number of times the current location needs to be transmitted to the central unit 22 and can therefore have a significant affect on battery life. In fact, if a fixed location is used for the comparison, then movement within an allowable area results in no transmissions to the central unit until the device is outside the permitted area which in itself would be an alert event. In this latter situation, the geographic area could be determined by the parent and sent to the central unit 22 via the configuration terminal 18. This geographic area could be converted into a defined network-related area by the Map/geographic server 28 which could then be downloaded onto the restricted communications device 16 to define the permitted area. This has a significant effect of increasing battery life.
The restricted communication device 16 also comprises an application (not shown) running on the processor 44 responsive to an instruction for a remote activation of a function of the device received via the telecommunications module (by an SMS for example). The function activated can be playback of a selected configurable voice message, tune or alarm sound by the device repeatedly or during a configurable period of time. Even though the present embodiment does not provide warning lights, the playback may also be accompanied by flashing of such LEDs or lights from the restricted communication device 16 to draw attention to it. The activation is performed by the central unit 22 and/or by an authorised standard terminal 20 in conformity with the configuration parameters included in the communication rules and rights defined for this restricted communication device 16. This feature allows, for example, the parent (guardian) when he/she is in the supermarket with his/her child and loses him, to send via their standard terminal 20 an SMS to the child's device 16 which will make the device 16 play a tune or alarm for 30 seconds (configurable) so the parent can hear where the child is. Another application of this feature is to allow the parent (guardian) to send a SMS to activate a pre-recorded voice message informing passers by that the adult or person the child is with is not his/her parent, and that they should intervene and get the police, etc.
Another feature of the restricted communication device 16 is its ability to emit an audible alarm that is automatically activated if the device 16 is tampered with while playing a selected voice message, tune or activation another alarm signal. More specifically, the device realises that it has been tampered with when the security clasp (not shown) is opened or the security circuit within the strap of the device is broken.
When the restricted communication device 16 and the standard terminal 20 are in a local- range proximity (for example: the parent and the child shopping together) then their mutual communication is optimized as the telecommunications modules 44 of both devices 16, 20 are capable of supporting local -range communication protocols such as Bluetooth or Wi-Fi technology for example. In this case, the local-range connection is used instead of the mobile telecommunication network. The local-range connection between the devices can be established automatically or manually. This second
possibility can be preformed remotely via an activation message sent by the parent from its standard terminal 20 to the child's restricted communication device 16 or directly by using the appropriate commands on both devices 16, 20. Compared to the automatic activation, the manual activation allows the device's energy consumption to be minimised.
The restricted communication device 16 is also equipped with a body temperature detector (not shown). It can transfer the temperature signals to the central unit 22 that stores and processes them in a similar way as other event signals and location information.
The central unit 22 is now described in detail with reference to Figure 4. The central unit 22 is a computer-based system that is connected to the mobile telecommunications network 14, to the Internet wide-area network 12 and to other possible systems such as the IVR system 34. The central unit 22 comprises the following components:
• the previously mentioned configuration database 70, which stores the communication rules and rights for every restricted communication device 16;
• configuration exchange modules 72 are connected between the configuration database 70 and the configuration interfaces (such as the parent's configuration terminal 18) to enable configuration data to be received and edited by the parent;
• a state database 74 for storing the current state of each restricted communications device 16;
• data and events exchange modules 76 are connected between the state database 74 and the data and events interfaces such as the restricted communications device 16 to enable two-way data flow between the central unit 22 and the restricted communications device 16; and
• a plurality of data and events processing modules 78 which call upon the rules defined in the configuration database 70 for a particular restricted communications device 16 to implement a parent-defined strategy for that device 16.
Turning more specifically now to the content of the configuration database 70 which can be received and edited by the parent, these rules and rights (not shown) in this embodiment comprise at least: • list of restricted communication devices 16 that a given restricted communication device 16 is allowed to communicate with. • ordered list of standard terminals 20 that a given restricted communication device 16 is allowed to communicate with, • list of time periods when a given restricted communication device 16 is allowed to communicate, • list of predefined questions and messages for different types of communications and for different recipients, • list of predefined responses for different types of communications and for different communication originators, • communication traffic limits (daily, monthly etc.) allowed for different communication types for a given restricted communication device.
The configuration database 70 is populated by the data coming from a service activation system (a part of the Customer Relationship Management system 24) and then the communication rules and rights are set and/or modified by the CRM system 24 under the control of instructions received from the configuration terminals 18 or directly by the parents/guardians using their configuration terminals 18.
The data and events processing modules 78 also receive and process, taking into account the communication rules and rights stored in the configuration database 70, the event and/or temperature signals received from the restricted communication devices 16 via the data and events exchange modules 76 and then can send, via the data and events exchange modules 76, alert messages of a selected type to one or more standard mobile or land-line terminals specified in the communication rules and rights of the concerned restricted communication device 16.
The central unit 22 can also process and store in the state database 74 the location information sent by the restricted communication devices 16. This information can then be used by the data and events processing modules 78 in the processing of the event signals. The location information processing can be realized in cooperation with the external map/geographic server 28. This cooperation is necessary in the case when the • location information received by the central unit 22 has to be converted from a network- related format (as a cell-identification data) to a standard geographic location format (as the GPS format) or when the location data should be enriched by additional data. If necessary, the different signals, events and other data types can be stored (and later retrieved for further processing) in the state database 74 of the central unit 22. In a different embodiment, the configuration database 70 and the state database 74 can be implemented as a same common database with a partitioning of their respective data. The central unit 22 can be connected to various components of the mobile or fixed voice, video or data communications network 14 depending on the actual parameters of the service delivered and current infrastructure of the network 14. In this embodiment, the central unit 22 is connected to: • SMSC (Short Messaging Service Centre)/MMSC (Multimedia Messaging Service Centre) for sending and receiving text and multimedia data messages to/from any of the restricted communications devices and the standard terminals 20 (if they are mobile); • An IVR system 34 for automated voice communication; • A presence server 36 in order to receive the information whether a given restricted communication device 16 is connected or unconnected to the mobile telecommunications network 14.
The central unit 22 as mentioned previously, is also connected to other systems associated with the operational management of a mobile or fixed voice, video or data telecommunications network 14, for example:
• The Customer Relationship Management system 24: their cooperation enables the central unit 22 to be integrated with the Network Operator's, Service Provider's or other servicing party's existing customer management system; • The geographic map server 28 which is used to convert network-related location information to standard format geographic location information (as GPS coordinates for example); and • The billing system 26 that can receive service usage records from the central unit.
The communication rules and rights can also contain a description of authorised areas where the child is allowed to stay and move. If he/she leaves such an area then the central unit 22 can send an alert message to standard terminal 20 of the parent (guardian). This feature can also be extended by the notion of unauthorised areas - an alert message is sent if the child enters such an area which has been defined by the parent using their configuration terminal 18.
The use of these components features an intelligent active tracking system and programmable logic within the mobile restricted communication device 16 allowing authorised parents, guardians or carers to locate a wearer's movement on a real-time basis using a combination of GSM, the internet 12, via a voice call or text message.
The system comprising the restricted communications device 16 and the central unit 22 benefits both parents, children as follows:
1. It provides peace of mind 24 hours a day 7 days a week, and has an always on (in the limits of power supply and network coverage) personal device that is not likely to be lost, stolen, turned off etc.
2. It has limited total cost of ownership and does not require the child to own or carry a mobile phone or a bulky GPS receiver.
3. Parents know where their child is in a event of a crisis and can trace steps in the last six to twelve hours. 4. It provides both a visible or discreet deterrent, which is lightweight, easy to use and configure via the Internet or call centre through a SMS signal etc.
5. It provides a communication location device provided as a wearable accessory, which is not likely to be lost or forgotten or deliberately removed by an abductor, for example.
6. It features a closed-loop security system that activates if the device is turned off, taken off or broken.
7. It has the ability to manually or intelligently create authorised/unauthorised zones (home, path to and from school, play, off-limits, etc.)
8. It can deliver SMS/MMS to child, groups of predetermined individuals including picture messages. 9. It can operate my circle (friend group) communication via SMS/MMS/Voice Packets.
10. It provides simple two-way communication with parent or my circle friends group via communication via SMS/MMS/Voice Packets.
11. It provides a feeling of greater comfort and security and therefore freedom.
Figure 5 shows an example of the restricted communication device 16 of this embodiment. As can be seen from Figure 5, the device has several features, which are:
1. A closed-loop security band 80 featuring a wire circuit 54 that generates a message event when broken or cut. The message event in turn causes a message to be sent to the network operator and is relayed to authorised recipients with last position and time and date of activation.
2. A security clasp 82. Unauthorised release is detected by the security clasp detector 54 and an alarm event is generated which again can be relayed to authorised recipients. This alarm event can also be disarmed by use of a time-coded deactivation through a SIM update or the input of a parental pass code etc. 3. Navigation buttons 84 are provided on the side of the device 16. These together with the navigation command drivers 50 are used to adjust functions and send a preprogrammed text message to an authorised recipient, for example. 4. Luminescent low-power usage backlight display 48 featuring: • A digital/analogue clock face; • A date/time displayed element; • A power indicator indicating remaining battery life 86;
• An on-line indicator 92; • An event alarm and icon display; • A stop watch; • A scrolling SMS text message display; 5. A panic alert button 88 which when actuated, causes a panic signal to be generated and sent to authorised recipient(s) or call cut and relayed to authorised recipients with last position and time and date of activation; 6. A child-proof casing 90 which is water resistant to 20 metres, and is shock resistant with a designer cloth/ rubber/plastic/metal extruded wrist band 80; and 7. Integral radio antennae 42 which are integral to the band 80 and housed within it.
A few examples of how the device 16 and the system work in a real-life situation are now described with reference to Figures 6a to 6h.
Figure 6a presents the main provided on the display 48 of the device 16 as it appears to the child when the device is switched on and is in 'stand-by' mode. If the child presses the "Select" navigation-button 84a then the Main Menu screen 94 is displayed as shown in Figure 6b. This screen 94 shows all principal services available on the restricted communication device 16 (proximity, messaging, voice communication, games etc.). The child can scroll the selection cursor (that highlights the current item) using the "Scroll Up" and/or "Scroll Down" navigation-buttons 84b, 84c and then select the required service by pressing the "Select" navigation-button 84a.
If the child selects the Proximity service then a Proximity screen 96 appears in the way shown in Figure 6c. It displays the list 98 of child's parents/guardians and friends and the distance 100 that separates the child from them. Figure 6d shows the Call screen 102 that is displayed when the child selects the voice communication service. This screen 102 displays the list 98 of all parents/guardians and friends that the child is authorised to communicate with. The child can scroll up and down this list 98 and when he/she selects one of the names, then a voice call is automatically launched over the mobile telecommunications network 14 to the selected person.
Figure 6e shows what the restricted communication device 16 can look like when the parent/guardian sends a message 104 to the child. The message 104 is displayed together with an indication 106 as to whom the message was sent from in a message from screen 108. Now, if the child presses the "Select" navigation-button 84a then a Response screen 110 will appear as shown in Figure 6f. The Response screen 110 offers a list 112 of preconfigured responses that the child can scroll up and down and select one of them. When selected, an appropriate message is automatically created and sent as a response to the parent/guardian.
The Main Menu 94 of the restricted communication device 16 also provides access to the services that are exclusively reserved for the parents/guardians. This access is restricted by an authentication procedure that requires the introduction of the guardian password 114 in an authentication screen 116 as shown in Figure 6g. The password 114 is numeric in this example and the value of a given character can be equal to the number of pressings performed on the "Select" navigation-button 84a when the cursor highlights the password character. If the password is correct, then a Guardian Menu screen 118 appears as shown in Figure 6h. Then, the guardian can select a required service using the navigation buttons 84.
The main data flows of the system are presented in Figure 7 and are described below. Each flow of information shown in Figure 7 has been labelled with a unique reference letter (A to S) which is referred to in the following description. 1. Standard operation - the configuration data updates.
An authorised user (parent/guardian or child) can be allowed to read, set or modify communications rules and rights (and in some cases the state database's data) of the restricted communication device 16 with which he/she is associated. The rights the user has depend on his/her type (parent guardian or child). The user's actions are performed by an intermediary (not shown) of a configuration terminal 18 (such as a PC-based or mobile-phone-based web-browser for example):
• (E,P) - the configuration terminal 18 connects to the central unit 22 via the Internet 12. The configuration terminal's user is authenticated (login and password are required for example). • (N,F) - the data relative to the associated restricted communication device 16 is retrieved (depending on the user's rights) from the configuration database 70 and possibly from the state database 74 and displayed to the user. • Then the user can set or modify some data if he/she is authorised to. If such a modification/setting is performed then: i. (E,P) - the modified/set data is sent to the central unit 22 via the Internet 12, ii. the central unit's databases 70, 74 are updated when necessary, iii. (J,B) - if necessary, the modified configuration data item is sent by the central unit 22, via the mobile network 14 to the restricted communication device 16 that memorizes it in its persistent memory 44. The data transfer is performed by the means of an SMS message, for example.
2. Standard operation - the restricted communication device's location update. When the restricted communication device 16 is switched on, active and on stand-by, then the following data flow can be observed every time when the device detects a significant change in its location (from comparison of triangulation calculations, say): • (A) - the device 16 sends a message (SMS) to the mobile network 14. The message contains data describing the device's location. • (K) - the network 14, by the intermediary of a SMSC (SMS Centre) 32 delivers the message to the central unit 22. • The central unit 22 stores the location data in its state database 74. The format of the stored location data can be native (as it was sent by the restricted communication device 16) or converted (and possibly enriched) to a standard format (not shown). If such a conversion is required then this task is normally performed in the following way: i. (L) - the central unit 22 sends the original location data to the map/geographic-server 28 ; ii. the geographic-server 28 converts the location data to the requested format;
iii. (M) - the geographic-server 28 sends back the converted location data to the central unit 22; and iv. the central unit 22 stores the converted location data in its state database 70.
3. Panic alarm activation.
If the panic alarm button 88 is activated on the restricted communication device 16, then: • (A) - the device 16 sends a data message (SMS) to the mobile network 14. The message contains data specifying "panic alert" and possibly the device's current location. • (K) - the network 14, by the intermediary of a SMSC (SMS Centre) 32 delivers the message to the central unit 22. • The central unit 22 retrieves (from its configuration database 70) the communication rules and rights associated with the restricted communication device 16. Then, conforming to these rules and rights, it performs the required actions. In particular, the following actions can be executed: i. (L) - the central unit 22 sends the device's location data to the map/geographic server 28; ii. the map/geographic server 28 converts the network location data to a humanly-readable location format (as a mail address for example); iii. (M) - the map/geographic server 28 sends back the converted location data to the central unit 22; iv. (R) - the central unit 22 sends an alarm request (together with the converted location data and parent's/guardian's phone number associated with the restricted communication device 16 in its communication rules and rights record) to the IVR (or customer service representative) system 34; and v. (D) - the IVR system 34 establishes a voice communication with the parent's (guardian's) phone number associated with the restricted communication device 16 in its communication rules and rights record (not shown). The automatic voice message explains to the parent that the child has pressed the panic button 88 and gives the child's location.
Another possible "panic alarm" scenario can be to send a SMS message to the parent instead of a voice message.
4. Unauthorised security clasp opening. If the security clasp 82 is open during an activity time period defined for the restricted communication device 16, then: • (A) - the device sends a data message (SMS) to the mobile network 14. The message contains data specifying "security clasp opening alert" and possibly the device's current location. • (K) - the network, by the intermediary of a SMSC (SMS Centre) 32 delivers the message to the central unit 22. • The central unit 22 retrieves (from its configuration database 70) the communication rules and rights associated with the restricted communication device 16. Then, conforming to these rules and rights, it performs the required actions. In particular, the following actions can be executed: i. (L) - the central unit sends the device's location data to the map/geographic- server 28; ii. the map/geographic-server 28 converts the location data to a humanly- readable location format (as a mail address for example); iii. (M) - the map/geographic-server 28 sends back the converted location data to the central unit 22; iv. (J) - the central unit 22 sends an alarm SMS message (together with the location) to the SMSC 32; and v. (D) - the SMSC 32 delivers the message to the parent's (guardian's) phone 20 associated with the restricted communication device 16 in its communication rules and rights record. The message explains that the security clasp has been opened and gives the child's location. Another possible "security clasp opening" scenario can be to establish a voice communication with the parent's/guardian's mobile phone 20 and readlhe data message to the parent by the IVR system 34.
5. "Out of area" alert.
When the central unit 22 receives a location update from the restricted communication device 16 (see: "Standard work - the restricted communication device's location update"), it checks whether the device 16 must remain in a restricted geographic area. This area is described in the device's communication rules and rights record. If this feature is required then the central unit 22 checks whether the currently received (and possibly converted) location is within the confines of the specified area. If the result is positive then no action is taken. If not then, conforming to the communication rules and rights, it performs the required actions. In particular, the following actions can be executed: • (J) - the central unit 22 sends an alarm SMS message (together with the location) to the SMSC 32. • (D) - the SMSC 32 delivers the data message to the parent's (guardian's) phone 20 associated with the restricted communication device 16 in its communication rules and rights record. The data message explains that the child left the authorised area and gives the child's location.
Another possible scenario can be to establish a voice communication with the parent's/guardian's mobile phone 20 and to read the message to the parent by the IVR system 34. It must be noted that the authorised area can be defined by specifying a list of authorised zones or a list of forbidden zones or as a combination of both.
6. "Out of network" alert.
The situation when the restricted communication device 16 loses connection with the mobile network 14 (during a time when it should be active) has a great importance to the security features of the device 16. The device's disconnection is detected by the existing standard mechanisms of the mobile network 14. The connected/disconnected status of the device is stored in the network's HLR (Home Location Register) 36 and/or VLR (Visitor Location Register) 36 and is made available to external systems via the presence server 36 or by another known methods. The data flow corresponding to the network disconnection of the restricted communication device 16 is as follows: • (H) - The "disconnection" status is transferred from the presence server 36 to the central unit 22. • The central unit 22 retrieves (from its configuration database 70) the communication rules and rights associated with the restricted communication device 16. Then, conforming to these rules and rights, it performs the required actions. In particular, the following actions can be executed: i. (L) - the central unit 22 sends the device's last known location to the map/geographic-server 28, ii. the map/geographic-server 28 converts the location data to a humanly- readable location format (as a mail address for example), iii. (M) - the map/geographic-server 28 sends back the converted location data to the central unit 22; iv. (R) - the central unit 22 sends an alarm request (together with the location) to the IVR system 34; and v. (D) - the IVR system 34 establishes a voice communication with the parent's (guardian's) phone number associated with the restricted communication device 16 in its communication rules and rights record. The automatic voice message explains to the parent that the child is out of network coverage and gives the child's last known location. Another possible way of communicating this message would be to send a SMS message to the parent's standard terminal 20 instead of a voice message.
7. Message exchange between parents and children.
The parent (guardian) uses a standard mobile phone 20 and can send a standard SMS message to the child. The text of the data message is freeform. The parent must specify the child device's phone number (MSISDN - Mobile Subscriber ISDN) as the recipient of the message. The data flow is as follows: • (C) - the parent's mobile phone 20 sends the message (SMS) to the mobile network 14; • (B) - the network, by the intermediary of a SMSC (SMS Centre) 32, delivers the message to the restricted communication device 16; • depending on the restricted communication device's configuration, the SMS message is displayed on the device screen 48 without any checking or the device 16 checks whether it comes from an authorised user (against a list of stored authorised users) and displays it only if this test is positive; • then the child can send a response to the parent - he/she is asked by the restricted communication device 16 to choose a response among the stored list of predefined/configured responses. The child selects a response using the navigation command buttons 84 of the device 16. No response recipient is asked - the response will be sent to the originator of the received message; • (A) - the device sends the response (SMS) to the mobile network; and • (D) - the network, by the intermediary of a SMSC (SMS Centre) 32, delivers the message to the parent's mobile phone 20.
8. Outbound messages from child to parents and friends.
The child selects, using the navigation command buttons 84 of the restricted communication device 16, the message sending service. Then he/she selects the recipient's name from the list 98 of authorised recipients (this list makes part of the communication rules and rights). After having selected the recipient, the child is requested to select a message from the list 112 of predefined/configured messages (this list makes part of the communication rules and rights). When the message is selected then: • (A) - the device 16 sends the (SMS) message to the mobile network 14; and
• (D or B) - the network 14, by the intermediary of a SMSC (SMS Centre) 32, delivers the data message to the mobile phone 20 (D) or to the restricted communication device 16 (B) corresponding to the chosen recipient.
9. Voice communications from parents to children.
The parent (guardian) uses a standard mobile 20 or fixed-line telephone and can call the child's restricted telecommunications device 16. The parent must specify the child's device telephone number (MSISDN) as the recipient of the call. The data flow is as follows: • (C,B) - the parent's phone 20 initiates a voice call connection with the child's restricted communication device 16 via the mobile network 14; • the child accepts the incoming voice communication by pressing the "select" navigation command button 84a; and • (A,B,C,D) - the voice communication works in exactly the same way as between two standard mobile phones.
10. Voice communications from child to friends and parents.
The child selects, using the navigation command buttons 84 of the restricted communication device 16, the voice call service as displayed on the voice call screen 102. Then he/she is requested to choose the recipient's name from the list 98 of authorised recipients (this list makes part of the communication rules and rights). Then: • (A,D) or (A,B) - the child's restricted communication device 16 initiates a voice call connection with the parent's phone 20 (A,D) or the friend's restricted communication device 16 via the mobile network 14; • the parent or friend accepts the incoming voice communication (by pressing the "select" navigation command 84a if it concerns the restricted communication device); and • (A,B,C,D) - the voice communication works in exactly the same way as between two standard mobile phones.
11. Friend proximity.
The child selects, using the navigation command buttons 84 of the restricted communication device 16, the proximity service. When the service is selected then: • (A) - the device 16 sends a proximity request message (SMS) to the mobile network 14; • (K) - the network 14, by the intermediary of a SMSC (SMS Centre) 32, delivers the message to the central unit 22; • the central unit 22 retrieves (from the configuration database 70) the communication rules and rights record of the requesting restricted communication device 16. This record contains, amongst other things, the list 98 of friends concerned by the proximity service. Then, for every friend on the list 98, it checks whether the friend authorises this particular device 16 to be located. If the authorisation is given, then the central unit 22 retrieves from the state database 74 the current location of the friend's restricted communication device 16. Then depending on the system's configuration the distance and/or direction to the friend is calculated. This calculation can be performed by the central unit 22 and/or by the map/geographic-server 28 and/or another specialised system; • (J) - the central unit sends one or more SMS messages (depending on the amount of data) to the SMSC system 32; • (D) - the SMSC system 32 delivers the messages to the requesting restricted communication devicelό; and • the device 16 displays the results of the proximity request on its proximity screen 96.
12. Battery low.
When the amount of energy stored in the device's battery becomes lower than a configured level then: • (A) - the device 16 sends a data message (SMS) to the mobile network 14. The message contains data specifying "low battery alert" and possibly the device's current location;
• (K) - the network, by the intermediary of a SMSC (SMS Centre) 32, delivers the message to the central unit 22; • the central unit 22 retrieves (from its configuration database 70) the communication rules and rights associated with the restricted communication device 16. Then, conforming to these rules and rights, it performs the required actions. In particular, the following actions can be executed: i. (L) - the central unit 22 sends the device's location data to the map/geographic-server 28; ii. the map/geographic-server 28 converts the location data to a humanly- readable location format (as a mail address for example); iii. (M) - the map/geographic-server 28 sends back the converted location data to the central unit 22; iv. (R) - the central unit 22 sends an alarm request (together with the location) to the IVR (or customer service representative) system 34; and v. (D) - the IVR system 34 established a voice communication with the parent's (guardian's) phone number associated with the restricted communication device 16 in its communication rules and rights record. The automatic voice message explains to the parent that the battery in the child's device 16 is running low and gives the child's current location. Another possible "low-battery alert" scenario can be to send an SMS data message to the parent's standard terminal 20 instead of a voice message.
As a result of receiving this remote instruction, the device 16 switches-off automatically so no location update nor any other activity is performed by the restricted communication device 16. However, enough energy remains stored in the device's battery 58 so that the device 16 is still able to react if the panic button 88 is activated by the child - then it acts in the standard way (see: "Panic alarm activation" above).
13. General. • Each alert type received by the parent can be preconfigured to require the parent to make a response to the central unit 22 to confirm receipt of the alert. In the
event that the central unit 22 does not receive such a response within defined parameters, the central unit 22 may have a preconfigured escalation process which automatically initiates the sending of an alert to the next responsible parent/guardian nominated on the child's profile. Such escalation may continue until such time as cancelled by either a human intervention, of other preconfigured event. • Where the IVR system 34 is referred to, this should be interpreted to include the possibility of another automated system or a customer service representative. • Where the restricted device 16 is referenced to interact with the central unit 22, the restricted device 16 may be substituted with a mobile phone configured to act in the same manner as the restricted device. This clearly loses some of the benefits associated with a dedicated device but does provide some of the advantages associated with further features of the present invention.
The embodiment herein described can be considered to be a system and a method for simplified and restricted mobile communications of various types (including voice, text and multi-media communications) among restricted and/or standard users. Whilst a single restricted communications device 16 and a single configuration terminal 18 and a single standard terminal 20 have been described, pluralities of these elements can be accommodated. More specifically a further embodiment of the system comprises four elements: the computer-based central unit 22, a plurality of restricted communications devices 16, a plurality of configuration terminals 18 and a plurality of standard terminals 20. This further embodiment which is very similar to the above described embodiment is now described in further detail.
More specifically, this further embodiment is comprised of the computer-based central unit 22 connected to the mobile telecommunications network 14. to the Internet network 12 and to other possible systems. The central unit 22 comprises, among other elements, the configuration database 70 defining the communication rules and rights for every restricted communication device 16, wherein these rules and rights describe at least some of the following, preferably all of them:
• a list of restricted communication devices 16 that a given restricted communication device 12 is allowed to communicate with,
• an ordered list of standard terminals 20 that a given restricted communication device 16 is allowed to communicate with,
• a list of time periods when a given restricted communication device is allowed to communicate,
• a list of predefined questions and messages for different types of communications and for different recipients, • a list of predefined responses for different types of communications and for different communication originators,
• a set of communication traffic limits (daily, monthly etc.) allowed for different communication types for a given restricted communication device.
The central unit 22 can also receive, store and process, taking into account the communication rules and rights, the event signals sent by the restricted communication devices 16 and then can send alert messages of a selected type to one or more standard terminals 20 specified in the communication rules and rights of the concerned restricted communication device 16.
The plurality of restricted communication devices 16 of the further embodiment, are used by restricted users and connected to the mobile telecommunications network 14. Each of the plurality of restricted communication devices 16 preferably:
• has no numeric or alphanumeric keypad and
• has no manual commands to separately select numeric or alphanumeric characters and
• is waterproof, and preferably comprises: o voice, text and multi-media telecommunications modules, o a data display,
o actuators 84 for data display navigation, including scrolling and selection commands, allowing the user to navigate through hierarchical menus 94, 96, 102. 108, 1 10, 116 , 118 and to launch the action associated with the selected menu item. The possible actions include: ■ opening a voice communication with the selected standard terminal 20 or restricted communication device 16, ■ sending a text message to the selected standard terminal 20 or restricted communication device 16, ■ opening a multi-media communication with the selected standard terminal or restricted communication device, Preferably only the communication possibilities allowed by the current communication rules and rights (defined for a given restricted communication device) are available in the menus, o a panic actuator 88 for activation and fast opening of a communication with a predefined standard terminal 20 and/or the central unit 22, o a display driver 48 for displaying received data communications on the display 48, o a telecommunications module means for data exchange with the central unit, o a persistent memory 44, o a volatile memory 44. o a data processor 44, o persistent data storage with a copy of the current communication rules and rights defined for this restricted communication device in the central unit database 70, o a rechargeable power supply 58, o a persistent timer, o a strap 80 attaching the restricted communication device to human body, o a security circuit within the strap 80 which, when broken, activates a transmission of an event signal to the central unit 22, o security clasp 82 which, on opening/closing, activates a transmission of an event signal to the central unit 22, The restricted communication device can preferably communicate only with the closed group composed of the restricted devices 16 and/or standard terminals 20 that are allowed
to by the communication rules and rights defined for this restricted communication device 16 in the central unit database 70.
The plurality of standard terminals 20 (like mobile or landline phones) of the further embodiment, is used by standard users and is operatively connected to the mobile telecommunications network 14 (possibly via another telecommunication network) and allowed to communicate using this network.
The plurality of configuration terminals 18 of the further embodiment are connected to the mobile telecommunications network 14 and/or to the Internet network 12 allowing authorised users to configure the communication rules and rights, stored in configuration database 70 of the central unit 22, for a given supervised communication device 16.
Some of the standard terminals 20 of the further embodiment also have the features of the configuration terminal 18. In this case, a configuration terminal 18 and a standard terminal 20 can both be provided by a single terminal.
The restricted communications devices 16 also comprise a speaker and a microphone in order to facilitate the above-described actions.
The restricted communication devices can also be configured for remote activation of a selected configurable voice message, tune or alarm sound that can be played by the device 16 repeatedly or during a configurable period of time. The activation can be performed by the central unit 22 and/or by a configurable authorised standard terminal 20 in conformity with the configuration parameters included in the stored communication rules and rights defined for this restricted communication device 16.
A selected voice message, tune or alarm sound that is played by a restricted communication device 16 can be stopped by entering a pass code into the restricted communication device. The pass code is simply entered by selection of options provided by the device rather than by any keypad. Furthermore a noise alarm can be automatically
activated on any restricted communication device 16 if the device is tampered with while playing a selected voice message, tune or alarm sound.
It is also possible for some ones of the restricted communication devices 16 to comprise a body temperature detector, and be configured to read the temperature and to transfer this temperature data value to the central unit 22. The central unit 22 can receive, store and process the temperature data value, taking into account the communication rules and rights and other event signals, and then can send alert messages of a selected type to one or more standard terminals specified in the stored communication rules and rights of the concerned restricted communication device 16.
Preferably each of the restricted communication devices 16 can switch off automatically when the power level of the power supply 58 falls below a defined threshold, but can still allow the user to activate urgently a communication with a predefined standard terminal 20 and/or the central unit 22.
The power supply 58 of each of the restricted communication devices 16 can be rechargeable via an induction loop.
The restricted communication devices 16 can each comprise a switch on/off command that activates a transmission of an event signal to the central unit 22 and switches on/off the device 16.
The restricted communication devices 16 and the standard terminals 20 of the further embodiment can comprise local-range point-to-point communication capability, such that when local-range interconnection is possible, then the different types of communication and data exchanges between a restricted communication device 16 and its standard terminal 20 preferably use the local-range communication capability instead of the mobile telecommunication network 14.
The local-range point-to-point connection between a standard terminal 20 and its restricted communication device 16 can be activated automatically. Alternatively it can be activated manually and either remotely, by the standard terminal 20 sending an activation message to the restricted communication device 16 via the mobile telecommunication network 14, or locally on both devices using the appropriate commands.
The voice, text and multi-media telecommunications module 40 of the restricted communication devices 16 can comprise a Subscriber Identity Module (SIM) 46 integrated in the main telecommunications chip. During the chip manufacturing stage, the SIM 46 can be preconfigured with a set of temporary parameter values (not shown) allowing it to communicate with a given mobile telecommunications network 14, and during a service activation stage of the restricted communication device 16, a subset of these SIM parameters can be reconfigured by a received text or multimedia message.
The subset of SIM parameters can also be reconfigured by receipt of an encrypted data message.
The restricted communication devices 16 can detect the signals from base stations 60 of one or more mobile telecommunications networks 14 and use this data to calculate a network-related location of the device 16 based on the specific identities of the base stations 62 and/or their signal frequency and/or their signal strength, and the restricted communication devices 16 can each send their location information to the central unit 22.
Some of the restricted communication devices 16 can also comprise a positioning device and these restricted communication devices 16 can send their location information to the central unit 22.
The restricted communication device 16 can be arranged to send the location information (to the central unit 22) only if a significant change of the device's location has been detected.
The central unit 22 can receive, store and process, taking into account the communication rules and rights, the event signals from the mobile telecommunication network elements (as presence server 36 for example) concerning the connection and/or disconnection to/from the network 14 of the restricted communication devices 16 and can send alert messages in a similar way as for other event signals.
The central unit 22 can receive, process and store the location information of the restricted communication devices 16 and then can use it in the processing of the event signals received from the restricted communication devices 16, from the mobile telecommunications networks 14 or generated by the central unit 22 itself. The location information processing, carried out by the data and events processing modules 78, can be realised in co-operation with external map/geographic systems 28 that are able to convert network-related location information to standard format geographic location information (such as GPS coordinates for example).
The communication rules and rights for a given restricted communication device in the central unit database 70 can contain the description of geographical constraints (allowable and/or non allowable geographical areas) to be applied to the restricted communication devices 16.
The central unit 22 can detect whether the current location of a given restricted communication device 16 respects its geographical constraints and if not then an event signal can be generated and sent to the central unit 22.
The restricted communication device 16 can offer in one of its menus 96 an action launching the proximity service. If the proximity service action is activated by the user then a proximity service request can be sent by the restricted communication device 16 to
the central unit 22. When the central unit 22 receives a proximity service request then it can restore and process the memorised locations of the restricted communication devices 16 and the standard terminals 20 associated, in the configuration database 70, with the requesting restricted communication device 16 and then send back the proximity response data 98, 100 to the requesting device 16. The requesting device Is can then display the received proximity response data 98, 100.
Each of the restricted communication devices 16 can be built in a similar way as a watch. The watch-like restricted communication device 16 can be made from metal, plastic, wood, rubber, other synthetic material or from a combination of these.
Having described particular preferred embodiments of the present invention, it is to be appreciated that the embodiments in question are exemplary only and that variations and modifications such as will occur to those possessed of the appropriate knowledge and skills may be made without departure from the spirit and scope of the invention as set forth in the appended claims. For example, whist the present embodiments have been described in relation to the Internet 12, other wide-area networks, such as an intranet for example, can also be utilised as the communication network between the parent configuration terminal 18 and the central unit 22.