17453929. CONTROLLER DEVICE BASED VARYING VIRTUAL FENCING simplified abstract (International Business Machines Corporation)

From WikiPatents
Jump to navigation Jump to search

CONTROLLER DEVICE BASED VARYING VIRTUAL FENCING

Organization Name

International Business Machines Corporation

Inventor(s)

Lowell Thomason of Byron MN (US)

Jessica Wandrey of Kasson MN (US)

Mark E. Maresh of Oro Valley AZ (US)

Richard Burton Finch of New Paltz NY (US)

Bradley Smoley of Rochester MN (US)

CONTROLLER DEVICE BASED VARYING VIRTUAL FENCING - A simplified explanation of the abstract

This abstract first appeared for US patent application 17453929 titled 'CONTROLLER DEVICE BASED VARYING VIRTUAL FENCING

Simplified Explanation

The abstract describes a method for managing a virtual fence for a secondary device with respect to a controller device. Here are the key points:

  • The method involves activating a controller device associated with a first object and a secondary device associated with a second object.
  • A virtual fence is established for the controller device and the secondary device, where the first virtual fence surrounds the secondary device and the controller device is positioned within it.
  • The controller device sends a ping with location information for both the controller device and the secondary device.
  • If it is determined that an adjustment to the virtual fence is needed, the first virtual fence is adjusted based on the movement of the secondary device from one location to another.

Potential applications of this technology:

  • Asset tracking: The method can be used to track the location of valuable assets, such as vehicles or equipment, within a defined area.
  • Pet containment: The virtual fence can be used to keep pets within a specific area, ensuring their safety and preventing them from wandering off.
  • Child safety: Parents can use this method to set up virtual boundaries for their children, receiving alerts if they move outside of the designated area.

Problems solved by this technology:

  • Ensuring device proximity: The method ensures that the controller device and the secondary device are within a certain distance of each other, providing a reliable connection.
  • Real-time adjustments: The virtual fence can be adjusted in real-time based on the movement of the secondary device, allowing for accurate tracking and monitoring.
  • Flexibility and customization: The method allows for the creation of virtual fences tailored to specific needs and requirements.

Benefits of this technology:

  • Enhanced security: The virtual fence helps prevent unauthorized access or movement of devices, increasing overall security.
  • Improved efficiency: The method enables efficient monitoring and tracking of devices, reducing the time and effort required for manual supervision.
  • Peace of mind: Users can have peace of mind knowing that they will be alerted if a device moves outside the designated area, ensuring the safety and security of their assets or loved ones.


Original Abstract Submitted

A method for managing a virtual fence for a secondary device with respect to a controller device includes activating the controller device associated with a first object and a secondary device associated with a second object. The method includes establishing the virtual fence for the controller device and the secondary device, where the first virtual fence surrounds the secondary device and the controller device is positioned within the first virtual fence. The method includes receiving, from the controller device, a ping with location information for the controller device and the secondary device. The method includes, responsive to determining an adjustment to the first virtual fence is required, adjusting the first virtual fence based on a movement of the secondary device from a first location to a second location.