Sign In to Follow Application
View All Documents & Correspondence

System And Method For Locating An Electronic Key Device Within A Communication Mesh

Abstract: ABSTRACT SYSTEM AND METHOD FOR LOCATING AN ELECTRONIC KEY DEVICE WITHIN A COMMUNICATION MESH The present disclosure provides a system to locate an electronic key device within a communication mesh. The system comprises interconnected electronic devices forming a communication mesh, wherein the communication mesh enables wireless data exchange using a short-range communication protocol. The electronic key device receives vicinity check requests from a base control unit, wherein an absence of the vicinity check requests for a predefined duration is determined as a loss event. A wireless communication interface within the electronic key device is activated upon determination of the loss event, enabling transmission of a unique identification signal. At least one communication node within the communication mesh detects the unique identification signal and establishes a communication link with the electronic key device. A mapping database stores correlation data associating the unique identification signal with detected location data. A cloud-based data management system updates a remote server with positional coordinates of the electronic key device, wherein the remote server verifies authorization and transmits location updates. FIG. 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
27 March 2024
Publication Number
14/2025
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

Matter Motor Works Private Limited
301, PARISHRAM BUILDING, 5B RASHMI SOC., NR. MITHAKHALI SIX ROADS, NAVRANGPURA AHMEDABAD, GUJARAT, INDIA - 380010

Inventors

1. KUMAR PRASAD TELIKEPALLI
301, PARISHRAM BUILDING, 5B RASHMI SOC., NR. MITHAKHALI SIX ROADS, NAVRANGPURA AHMEDABAD, GUJARAT, INDIA - 380010
2. RAMACHANDRAN R
301, PARISHRAM BUILDING, 5B RASHMI SOC., NR. MITHAKHALI SIX ROADS, NAVRANGPURA AHMEDABAD, GUJARAT, INDIA - 380010
3. PANKAJ KUMAR BHARTI
301, PARISHRAM BUILDING, 5B RASHMI SOC., NR. MITHAKHALI SIX ROADS, NAVRANGPURA AHMEDABAD, GUJARAT, INDIA - 380010
4. Sughosh Manipushp Kunj
301, PARISHRAM BUILDING, 5B RASHMI SOC., NR. MITHAKHALI SIX ROADS, NAVRANGPURA AHMEDABAD, GUJARAT, INDIA - 380010
5. YASH PATEL
301, PARISHRAM BUILDING, 5B RASHMI SOC., NR. MITHAKHALI SIX ROADS, NAVRANGPURA AHMEDABAD, GUJARAT, INDIA - 380010

Specification

DESC:SYSTEM AND METHOD FOR LOCATING AN ELECTRONIC KEY DEVICE WITHIN A COMMUNICATION MESH
CROSS REFERENCE TO RELATED APPLICTIONS
The present application claims priority from Indian Provisional Patent Application No. 202421024543 filed on 27/03/2025, the entirety of which is incorporated herein by a reference.
TECHNICAL FIELD
The present disclosure generally relates to electronic key tracking systems. Further, the present disclosure particularly relates to a system and a method for locating an electronic key device within a communication mesh.
BACKGROUND
Electric vehicles have been widely adopted as an alternative to internal combustion engine-based vehicles due to advantages such as lower emissions, energy efficiency, and reduced dependence on fossil fuels. Such electric vehicles utilize rechargeable battery packs as an energy source to power propulsion systems. Charging of battery packs in electric vehicles is generally performed using an external power source. Charging infrastructures such as public charging stations, home charging units, and battery-swapping stations are utilized to replenish energy in battery packs. Various smart devices such as electric vehicles, chargers, swappable batteries, swapping stations, and mobile devices are incorporated within an electric vehicle ecosystem to enable charging, energy management, and user interaction functionalities.
Further, various security measures are employed to prevent unauthorized charging of stolen electric vehicles. Identification code verification is generally utilized at charging stations to determine authorization status before initiating a charging process. If identification code verification is unsuccessful, charging of an electric vehicle is prohibited to prevent further utilization. However, existing security measures are primarily focused on preventing unauthorized charging rather than enabling recovery of a stolen electric vehicle. Moreover, such security measures depend on communication between an electric vehicle and charging infrastructure to detect unauthorized access. If an electric vehicle remains disconnected from a charging network or operates on residual battery charge, detection and recovery of such a stolen electric vehicle become challenging.
Another approach involves tracking location data of electric vehicles using global positioning system (GPS)-based tracking mechanisms. GPS modules embedded within electric vehicles transmit real-time location data to a remote server. An authorized user accesses location information through a user interface to determine a real-time position of an electric vehicle. However, GPS-based tracking mechanisms are susceptible to signal interference, jamming, and spoofing attacks. Unauthorized users may disable GPS modules to evade detection. Further, GPS-based tracking relies on continuous power supply, rendering tracking ineffective if a power source is depleted or manually disconnected by an unauthorized user.
Additionally, radio frequency identification (RFID)-based authentication techniques are incorporated to restrict unauthorized access to electric vehicles. RFID tags embedded within key fobs or mobile devices of authorized users are authenticated before granting access to electric vehicle functionalities. An RFID reader within an electric vehicle validates a unique identification code associated with an RFID tag. If authentication fails, access to an electric vehicle remains restricted. However, RFID-based authentication techniques do not provide tracking or recovery functionalities in case of vehicle theft. Moreover, RFID signals are susceptible to relay attacks, wherein unauthorized users intercept and relay RFID signals to gain unauthorized access to an electric vehicle.
Vehicle immobilization techniques have been explored to prevent movement of stolen electric vehicles. A vehicle immobilization system disables propulsion functionality in an electric vehicle upon detection of unauthorized access. Such a system utilizes electronic control units (ECUs) to send immobilization signals to a motor controller. Upon receiving an immobilization signal, a motor controller restricts power delivery to electric motors, preventing movement of an electric vehicle. However, vehicle immobilization techniques require continuous connectivity with a control network. If communication with a control network is disrupted, an immobilization system remains ineffective. Moreover, unauthorized users may manipulate ECUs or disable immobilization components to bypass security mechanisms.
Cloud-based security frameworks have been implemented to monitor and control electric vehicles remotely. Such security frameworks integrate electric vehicles with cloud-based data management systems, enabling real-time monitoring and remote access functionalities. A cloud-based security framework collects data related to vehicle status, location, authentication events, and user interactions. An authorized user accesses a cloud-based interface to monitor security parameters and initiate control actions such as vehicle lockdown or alarm activation. However, cloud-based security frameworks rely on stable internet connectivity to function effectively. In areas with limited network coverage, remote monitoring and control functionalities may experience delays or failures, reducing the effectiveness of theft prevention measures.
Blockchain-based authentication systems have been introduced to enhance security in electric vehicle ecosystems. Such authentication systems utilize decentralized ledgers to store and verify authentication records. Each authentication attempt generates an encrypted transaction, recorded within a blockchain network. A distributed consensus mechanism validates transactions to enable authenticity. Blockchain-based authentication systems mitigate risks associated with unauthorized access, data manipulation, and credential forgery. However, such authentication systems require significant computational resources and network bandwidth for transaction validation. Moreover, blockchain-based authentication does not provide real-time tracking or recovery functionalities in case of electric vehicle theft.
Machine learning-based anomaly detection techniques have been explored to identify suspicious activities associated with electric vehicle usage. Machine learning models analyze historical driving patterns, charging behaviors, and access logs to detect deviations from normal usage patterns. Upon detecting an anomaly, an alert is generated to notify an authorized user or security entity. However, machine learning-based anomaly detection requires extensive training data and continuous system updates to maintain accuracy. Further, false positives and false negatives may occur, impacting reliability of anomaly detection mechanisms. Additionally, such techniques primarily focus on threat detection rather than vehicle recovery.
Biometric authentication mechanisms such as fingerprint recognition, facial recognition, and voice recognition have been implemented to enhance security in electric vehicle ecosystems. Biometric sensors integrated within electric vehicles capture biometric attributes of an authorized user. A biometric authentication system verifies captured attributes against stored reference data to determine authorization status. If authentication fails, access to an electric vehicle remains restricted. However, biometric authentication mechanisms require high-precision sensors and data encryption to prevent spoofing attacks. Moreover, biometric authentication does not provide tracking or recovery functionalities in case of vehicle theft.
In light of the above discussion, there exists an urgent need for solutions that overcome the problems associated with conventional systems and techniques for detecting, preventing, and recovering stolen electric vehicles.
SUMMARY
The aim of the present disclosure is to provide a system and a method to locate an electronic key device within a communication mesh, wherein the system enables real-time tracking, automated loss detection, secure communication, location-based recovery, and user notifications for locating an electronic key device 104 within the communication mesh.
The present disclosure relates to a system and a method to locate an electronic key device within a communication mesh, wherein said system and said method enable detection, tracking, and remote notification of location updates associated with the electronic key device. Further, an objective of the present disclosure aims to address issues related to loss or unauthorized displacement of the electronic key device by enabling real-time correlation of location data using a mapping database and a cloud-based data management system. Moreover, an objective of the present disclosure aims to provide an approach that operates independently of continuous user intervention while assuring secure and reliable localization of the electronic key device.
In an aspect, the present disclosure provides a system comprising a plurality of interconnected electronic devices forming a communication mesh, wherein the communication mesh enables wireless data exchange using a short-range communication method. Further, the electronic key device receives vicinity check requests from a base control unit, wherein an absence of the vicinity check requests for a predefined duration is determined as a loss event. Moreover, a wireless communication interface within the electronic key device is activated upon determination of the loss event, enabling transmission of a unique identification signal. Additionally, at least one communication node within the communication mesh detects the unique identification signal transmitted by the electronic key device and establishes a communication link with the electronic key device. Furthermore, a mapping database operatively linked to the communication mesh stores correlation data associating the unique identification signal of the electronic key device with detected location data of the communication node receiving the unique identification signal. Additionally, a cloud-based data management system communicatively coupled to the communication mesh receives the detected location data from the communication node and updates a remote server with positional coordinates of the electronic key device. Further, the remote server operatively linked to the cloud-based data management system processes the received location data, verifies an association between the electronic key device and an authorized user, and transmits location updates of the electronic key device to a user-accessible interface.
Moreover, the electronic key device comprises an acknowledgment-based activation unit, wherein the acknowledgment-based activation unit activates the wireless communication interface upon receiving an acknowledgment signal from at least one communication node in the communication mesh. Further, the electronic key device comprises a fallback communication mode, wherein the fallback communication mode enables temporary operation in an alternative frequency band upon detecting excessive interference within the short-range communication method. Additionally, the electronic key device periodically stores authentication challenge-response data, wherein the authentication challenge-response data is transmitted to the communication mesh upon reconnection to verify the integrity of the electronic key device.
Furthermore, the communication mesh comprises redundant data routing paths, wherein the redundant data routing paths enable multiple concurrent transmission channels. Additionally, the communication mesh comprises a geographic region-based segmentation, wherein the geographic region-based segmentation prioritizes localization of the electronic key device using predefined sub-networks. Moreover, the communication node comprises a low-power localization mode, wherein the low-power localization mode enables intermittent activation of communication circuits to conserve energy while maintaining periodic location tracking functionality.
Further, the mapping database comprises a confidence weighting mechanism, wherein the confidence weighting mechanism assigns reliability scores to location data received from multiple communication nodes based on signal strength, transmission latency, and historical accuracy. Additionally, the mapping database comprises a multi-tier storage hierarchy, wherein the multi-tier storage hierarchy allocates frequently accessed location data to a high-speed storage medium and archives historical location data to a long-term storage medium.
Moreover, the cloud-based data management system comprises a multi-user permission system, wherein the multi-user permission system enables role-based access to location updates based on pre-approved authorization levels.
In another aspect, the present disclosure provides a method for locating an electronic key device within a communication mesh. Further, a communication mesh is established using a plurality of interconnected electronic devices, wherein the communication mesh enables wireless data exchange using a short-range communication method. Moreover, the electronic key device receives vicinity check requests from a base control unit, wherein a loss event is determined upon detecting an absence of the vicinity check requests for a predefined duration. Additionally, a wireless communication interface within the electronic key device is activated upon determination of the loss event, enabling transmission of a unique identification signal. Furthermore, at least one communication node within the communication mesh detects the unique identification signal transmitted by the electronic key device and establishes a communication link with the electronic key device.
Further, correlation data associating the unique identification signal of the electronic key device with detected location data of the communication node receiving the unique identification signal is stored in a mapping database operatively linked to the communication mesh. Additionally, the detected location data of the electronic key device is transmitted from the communication node to a cloud-based data management system. Moreover, the cloud-based data management system updates a remote server with positional coordinates of the electronic key device. Furthermore, the remote server processes the received location data, verifies an association between the electronic key device and an authorized user, and transmits location updates of the electronic key device to a user-accessible interface.
Additionally, location data storage is distributed across multiple geographically separated servers using regional database clustering, wherein the regional database clustering optimizes data retrieval efficiency and fault tolerance. Further, the remote server records location updates when predefined conditions are met, wherein the predefined conditions include loss events, authentication failures, or tamper detection alerts, and stores recorded location updates in a secured audit log. Moreover, a probable future location of the electronic key device is predicted using machine learning-based trajectory forecasting, wherein the prediction is based on historical movement data and environmental factors. Furthermore, a preemptive alert is transmitted to an authorized user when the predicted location of the electronic key device deviates from an expected travel path beyond a predefined threshold.
BRIEF DESCRIPTION OF DRAWINGS
The summary above, as well as the following detailed description of illustrative embodiments, is better understood when read in conjunction with the appended drawings. For the purpose of illustrating the present disclosure, exemplary constructions of the disclosure are shown in the drawings. However, the present disclosure is not limited to specific methods and instrumentalities disclosed herein. Moreover, those in the art will understand that the drawings are not to scale. Wherever possible, like elements have been indicated by identical numbers.
Embodiments of the present disclosure will now be described, by way of example only, with reference to the following diagrams wherein:
FIG. 1 illustrates system 100 to locate an electronic key device within a communication mesh, in accordance with the embodiments of the present disclosure.
FIG. 2 illustrates a method 200 for locating an electronic key device 104 within a communication mesh, in accordance with the embodiments of the present disclosure.

FIG. 3 illustrates a data flow diagram for locating an electronic key device 104 within a communication mesh, in accordance with the embodiments of the present disclosure.
FIG. 4 illustrates a network topology diagram for locating an electronic key device 104 within a communication mesh, in accordance with the embodiments of the present disclosure.
In the accompanying drawings, an underlined number is employed to represent an item over which the underlined number is positioned or an item to which the underlined number is adjacent. A non-underlined number relates to an item identified by a line linking the non-underlined number to the item. When a number is non-underlined and accompanied by an associated arrow, the non-underlined number is used to identify a general item at which the arrow is pointing.
DETAILED DESCRIPTION
The following detailed description illustrates embodiments of the present disclosure and ways in which they can be implemented. Although some modes of carrying out the present disclosure have been disclosed, those skilled in the art would recognise that other embodiments for carrying out or practising the present disclosure are also possible.
The description set forth below in connection with the appended drawings is intended as a description of certain embodiments of a system 100 to locate an electronic key device within a communication mesh and is not intended to represent the only forms that may be developed or utilised. The description sets forth the various structures and/or functions in connection with the illustrated embodiments; however, it is to be understood that the disclosed embodiments are merely exemplary of the disclosure that may be embodied in various and alternative forms. The figures are not necessarily to scale; some features may be exaggerated or minimised to show details of particular components. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a representative basis for teaching one skilled in the art to variously employ the present invention.
While the disclosure is susceptible to various modifications and alternative forms, specific embodiment thereof has been shown by way of example in the drawings and will be described in detail below. It should be understood, however, that it is not intended to limit the disclosure to the particular forms disclosed, but on the contrary, the disclosure is to cover all modifications, equivalents, and alternatives falling within the scope of the disclosure.
In the following detailed description of the embodiments of the disclosure, reference is made to the accompanying drawings and which are shown by way of illustration specific embodiments in which the disclosure may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the disclosure, and it is to be understood that other embodiments may be utilized and that changes may be made without departing from the scope of the present disclosure. The following description is, therefore, not to be taken in a limiting sense.
The present disclosure will be described herein below with reference to the accompanying drawings. In the following description, well known functions or constructions are not described in detail since they would obscure the description with unnecessary detail.
As used herein, the term "electronic key device" refers to a portable electronic unit that interacts with a communication mesh to enable authentication, access control, or tracking functionalities. Such electronic key device transmits or receives signals based on predefined events. Various types of electronic key devices include key fobs, smart cards, RFID-based access tokens, and mobile devices running dedicated applications. Such electronic key device comprises a power source such as a rechargeable or non-rechargeable battery. Authentication mechanisms integrated within such electronic key device include cryptographic authentication, biometric verification, or challenge-response mechanisms. Communication interfaces embedded within such electronic key device support short-range wireless communication technologies such as Bluetooth, NFC, RFID, or ultra-wideband for secure data exchange with external systems.
As used herein, the term "communication mesh" refers to a network comprising multiple interconnected electronic devices that enable decentralized data exchange and signal transmission without reliance on a central hub. Such communication mesh supports dynamic node addition or removal while maintaining connectivity between active nodes. Wireless communication technologies such as Bluetooth mesh, Zigbee, LoRa, or Wi-Fi Direct are employed to establish such communication mesh across a defined area. Such communication mesh operates based on peer-to-peer or multi-hop communication principles, allowing data to be relayed through intermediate nodes to reach a specific endpoint. Each electronic device within such communication mesh functions as a relay node, forwarding signals to adjacent nodes within the network topology. Such communication mesh enhances network resilience by rerouting data paths in case of node failure or interference. Authentication and encryption techniques are integrated within such communication mesh to enable secure data exchange. Such communication mesh facilitates asset tracking, personnel monitoring, and infrastructure management applications where real-time localization and connectivity are required.
As used herein, the term "vicinity check request" refers to a data signal transmitted by a base control unit to determine the presence or status of an electronic key device within a predefined range. Such vicinity check request is periodically generated based on a predetermined time interval or event trigger. Communication technologies such as Bluetooth Low Energy, RFID, or NFC facilitate transmission of such vicinity check request between a base control unit and an electronic key device. Upon receiving such vicinity check request, such electronic key device responds with an acknowledgment signal containing identification credentials or operational status data. If such vicinity check request remains unanswered for a predefined duration, a loss event is detected. Configurable parameters associated with such vicinity check request include signal transmission frequency, response timeout period, and authentication protocols. Practical implementations of such vicinity check request include vehicle access validation, secure facility entry management, and smart lock authentication mechanisms.
As used herein, the term "loss event" refers to a predefined condition determined based on the absence of vicinity check request acknowledgments from an electronic key device within a specified duration. Such loss event is triggered when an electronic key device fails to respond to consecutive vicinity check requests within a defined threshold period. Such loss event is detected through time-based monitoring, location tracking, or abnormal signal behavior analysis. Upon occurrence of such loss event, an activation signal is generated to enable recovery mechanisms such as signal broadcasting, location tracking, or alert notification transmission. Security policies associated with such loss event define conditions under which automated countermeasures such as remote locking, deactivation, or alarm generation are initiated
As used herein, the term "wireless communication interface" refers to a hardware and software component within an electronic key device that enables transmission and reception of signals using wireless data exchange technologies. Such wireless communication interface supports short-range connectivity methods such as Bluetooth, NFC, RFID, and ultra-wideband communication for establishing secure communication links with external systems. Functional components within such wireless communication interface include a transceiver unit, signal processor, and embedded security module for encryption and authentication. Activation of such wireless communication interface occurs upon detection of specific triggers such as a loss event, authentication request, or user interaction. Data transmitted by such wireless communication interface includes unique identification signals, encrypted authentication credentials, or real-time status updates. Such wireless communication interface operates within predefined frequency bands while adhering to regulatory transmission power limits.
As used herein, the term "unique identification signal" refers to a data packet generated and transmitted by an electronic key device upon activation of a wireless communication interface. Such unique identification signal comprises encoded authentication data, device-specific credentials, or encrypted location information. Transmission of such unique identification signal occurs in response to predefined triggers such as a loss event, authentication challenge, or manual user initiation. Encoding techniques such as AES encryption, RSA cryptographic signatures, or rolling code generation are utilized to secure such unique identification signal against unauthorized interception. Signal transmission methods include frequency hopping spread spectrum, time-division multiplexing, or phase-shift keying for enhanced communication reliability. Reception of such unique identification signal by a communication node within a communication mesh facilitates device localization and security event logging.
As used herein, the term "communication node" refers to an electronic device within a communication mesh that detects and processes signals transmitted by an electronic key device. Such communication node functions as a relay point for signal forwarding, authentication processing, or location data aggregation. Hardware components of such communication node include a wireless transceiver, processing unit, and power management system. Such communication node establishes a communication link with an electronic key device upon detection of a unique identification signal within its operating range. Signal processing techniques such as frequency filtering, noise suppression, and signal strength analysis enhance the reliability of data reception at such communication node. Such communication node interacts with a mapping database to associate received signal data with corresponding location coordinates.
As used herein, the term "mapping database" refers to a structured data repository that stores correlation data linking unique identification signals with detected location information. Such mapping database maintains indexed records comprising device identifiers, timestamped location entries, and confidence weighting scores assigned to received signals. Data storage models within such mapping database include relational, NoSQL, or blockchain-based architectures to support scalability and real-time querying. Such mapping database enables retrieval of historical movement patterns and event logs associated with electronic key devices within a communication mesh. Data consistency measures within such mapping database include replication, checksum validation, and cryptographic integrity verification mechanisms. Such mapping database interacts with cloud-based data management systems to synchronize stored records with remote servers for centralized access.
As used herein, the term "remote server" refers to a cloud-based or dedicated computing entity that processes, verifies, and manages location data received from a cloud-based data management system. Such remote server receives positional coordinates, authentication records, and event logs transmitted by communication nodes within a communication mesh. Data processing tasks performed by such remote server include anomaly detection, user verification, and automated security policy enforcement. Secure access control mechanisms such as multi-factor authentication, role-based permissions, and encrypted data transmission channels are implemented within such remote server to prevent unauthorized access. Such remote server communicates with user-accessible interfaces to provide real-time location updates and security event notifications. Such remote server operates within a distributed cloud architecture or on-premises infrastructure depending on application requirements.
As used herein, the term "transmitting" refers to the process of sending data signals from one electronic device to another through wired or wireless communication channels. Transmission techniques include amplitude modulation, frequency modulation, and packet switching protocols depending on the communication technology employed. Data transmitted may comprise authentication credentials, location coordinates, or encrypted control signals. Transmission parameters such as signal strength, data rate, and error correction settings are configured to optimize reliability and security. Transmission of signals occurs over predefined frequency bands while adhering to regional communication regulations. Examples of transmitting methods include radio frequency communication, optical data transfer, and ultrasonic signal propagation.
FIG. 1 illustrates system 100 to locate an electronic key device within a communication mesh, in accordance with the embodiments of the present disclosure. The system 100 comprises a plurality of interconnected electronic devices 102 forming the communication mesh enable wireless data exchange using a short-range communication method. Such interconnected electronic devices 102 comprise computing units embedded with communication circuits, power sources, and data transmission interfaces supporting wireless connectivity. Such interconnected electronic devices 102 are deployed in predefined spatial configurations based on application-specific coverage requirements. Wireless data exchange between such interconnected electronic devices 102 utilizes signal transmission methods such as frequency modulation, phase modulation, or direct-sequence spread spectrum techniques. Transmission parameters such as channel bandwidth, transmission power, and data encoding formats are adjustable based on environmental interference levels and network congestion conditions. Such interconnected electronic devices 102 utilize unique device identifiers and address resolution techniques to establish communication sessions within the communication mesh. Routing protocols employed by such interconnected electronic devices 102 enable dynamic path selection for message forwarding while mitigating packet loss and transmission delays. Authentication and encryption techniques protect data exchange within such communication mesh from unauthorized access or interception. Power management mechanisms such as adaptive duty cycling, energy harvesting, and load balancing optimize energy consumption of such interconnected electronic devices 102 to extend operational lifespan. Such interconnected electronic devices 102 facilitate communication between an electronic key device 104 and at least one communication node 110 by relaying signals across network nodes, maintaining connectivity even in dynamic or obstructed environments. Optional implementations of such interconnected electronic devices 102 integrate signal amplification circuits to enhance transmission range and reliability. Data buffering techniques incorporated within such interconnected electronic devices 102 prevent message loss due to temporary disconnections. Communication reliability of such interconnected electronic devices 102 is maintained through error detection mechanisms such as cyclic redundancy checks, parity checks, and forward error correction techniques.
In an embodiment, the electronic key device 104 is operable to receive vicinity check requests from a base control unit 106, wherein an absence of such vicinity check requests for a predefined duration is determined as a loss event. Such electronic key device 104 comprises an embedded processing unit, a power source, and a communication interface capable of wireless signal reception and transmission. Vicinity check requests transmitted by such base control unit 106 are received by such electronic key device 104 through an integrated receiver operating on a predefined frequency band. A control logic within such electronic key device 104 analyzes received vicinity check requests and determines whether a response is required based on predefined authentication parameters. In response to an authenticated vicinity check request, such electronic key device 104 transmits an acknowledgment signal containing encrypted identification data. If no vicinity check request is detected within a predefined duration, such electronic key device 104 identifies a loss event and triggers an operational state change. Detection of a loss event initiates predefined countermeasures such as activation of a wireless communication interface 108 or generation of a distress signal. Such electronic key device 104 maintains a timestamped log of received vicinity check requests and corresponding acknowledgment responses for verification purposes. Configurable parameters within such electronic key device 104 include request timeout thresholds, authentication key updates, and response delay adjustments. Optional implementations of such electronic key device 104 integrate redundant signal reception channels to improve reliability in high-interference environments. Secure boot mechanisms embedded within such electronic key device 104 prevent unauthorized firmware modifications that could interfere with vicinity check request processing. Examples of such electronic key device 104 include wireless access cards, smart key fobs, security authentication tags, or portable identification transponders supporting automated verification processes.
In an embodiment, the system 100 comprises a wireless communication interface 108 within the electronic key device 104 is activated upon determination of a loss event, enabling transmission of a unique identification signal. Such wireless communication interface 108 comprises a transmission circuit, an antenna module, and an embedded control processor managing signal encoding and transmission timing. Activation of such wireless communication interface 108 occurs automatically upon detection of a loss event based on predefined operational parameters stored within a non-volatile memory. Once activated, such wireless communication interface 108 generates a unique identification signal containing encrypted authentication credentials, device-specific identifiers, and timestamped metadata. Such wireless communication interface 108 supports various transmission methods such as spread spectrum modulation, frequency hopping, or phase-shift keying to improve resilience against interference and signal jamming attempts. Power optimization techniques such as duty cycling and adaptive transmission power control regulate energy consumption of such wireless communication interface 108 during prolonged signal transmission periods. Such wireless communication interface 108 interacts with multiple communication nodes 110 within the communication mesh to establish a communication link for data forwarding. Error correction mechanisms embedded within such wireless communication interface 108 minimize data corruption during transmission, enabling accurate reception of such unique identification signal at a communication node 110. Configurable parameters associated with such wireless communication interface 108 include transmission power levels, broadcast intervals, and encryption key rotation schedules. Optional implementations of such wireless communication interface 108 integrate multiple transmission antennas to support beamforming techniques for enhanced signal directionality and reception accuracy. Examples of such wireless communication interface 108 include RFID transceivers, Bluetooth Low Energy transmitters, ultra-wideband beacons, or Wi-Fi-based broadcasting units facilitating wireless identification and tracking operations.
In an embodiment, the system 100 comprises at least one communication node 110 within the communication mesh is configured to detect the unique identification signal transmitted by the electronic key device 104 and establish a communication link with the electronic key device 104. Such communication node 110 comprises a signal receiver, a processing circuit, and a network interface enabling bidirectional data transmission with interconnected electronic devices 102 forming the communication mesh. Detection of such unique identification signal by such communication node 110 involves signal demodulation, frequency filtering, and authentication verification. Upon successful identification of such unique identification signal, such communication node 110 initiates a communication session with such electronic key device 104 to exchange status updates, location data, or security verification responses. Signal reception parameters of such communication node 110, including gain control and noise suppression settings, are dynamically adjusted to optimize detection performance. Such communication node 110 relays received data packets containing unique identification information of such electronic key device 104 to a mapping database 112 for storage and correlation analysis. Configurable parameters of such communication node 110 include network routing preferences, authentication challenge response intervals, and data transmission prioritization settings. Optional implementations of such communication node 110 incorporate multi-band reception capabilities to support multiple wireless transmission standards simultaneously. Examples of such communication node 110 include IoT gateway devices, mobile network relays, fixed-position tracking sensors, or smart infrastructure access points deployed within monitored environments.
In an embodiment, the system 100 comprises a mapping database 112 operatively linked to the communication mesh stores correlation data associating the unique identification signal of the electronic key device 104 with detected location data of the communication node 110 receiving such unique identification signal. Such mapping database 112 comprises a data repository configured to maintain indexed records of detected electronic key device 104 transmissions. Such mapping database 112 organizes received data entries based on timestamped identification sequences, signal strength indicators, and positional coordinates reported by such communication node 110. Data retrieval operations within such mapping database 112 involve query execution routines that filter stored records based on authentication parameters, geospatial criteria, or event timestamps. Such mapping database 112 interacts with a cloud-based data management system 114 to synchronize location records across distributed storage nodes. Configurable settings within such mapping database 112 include data retention policies, encryption key management procedures, and query optimization techniques for real-time data retrieval. Examples of such mapping database 112 include relational database management systems, NoSQL-based key-value stores, or blockchain-based distributed ledgers supporting secured data indexing operations.
In an embodiment, the system 100 comprises a cloud-based data management system 114 communicatively coupled to the communication mesh receives detected location data from the communication node 110 and updates a remote server 116 with the positional coordinates of the electronic key device 104. Such cloud-based data management system 114 comprises networked computing resources responsible for aggregating, processing, and distributing tracking data associated with such electronic key device 104. Data received by such cloud-based data management system 114 undergoes encryption, validation, and access control verification prior to storage or transmission. Such cloud-based data management system 114 interfaces with multiple communication nodes 110 to maintain real-time location awareness of such electronic key device 104. Examples of such cloud-based data management system 114 include distributed computing infrastructures, remote analytics platforms, or hybrid cloud deployment environments integrating secured access mechanisms.
In an embodiment, the remote server 116 operatively linked to the cloud-based data management system 114 processes received location data, verifies an association between the electronic key device 104 and an authorized user, and transmits location updates of the electronic key device 104 to a user-accessible interface. Such remote server 116 performs security validation tasks including user credential authentication, anomaly detection, and access logging for compliance monitoring. Examples of such remote server 116 include enterprise security gateways, centralized identity management platforms, or mobile-accessible tracking dashboards supporting remote data access functionalities.
In an exemplary use case scenario, an electric vehicle owner carrying an electronic key device 104 visits a shopping mall and unknowingly drops such electronic key device 104 in the parking lot. A base control unit 106 within the vehicle periodically transmits vicinity check requests to verify the presence of such electronic key device 104, and upon failing to receive an acknowledgment within a predefined duration, a loss event is detected. Upon such detection, a wireless communication interface 108 within such electronic key device 104 activates and transmits a unique identification signal, which is detected by at least one communication node 110 within a communication mesh comprising a plurality of interconnected electronic devices 102 distributed across the premises. Such communication node 110 establishes a communication link with such electronic key device 104 and forwards detected location data to a mapping database 112, where such data is correlated with a detected location. Such correlated location data is transmitted to a cloud-based data management system 114, which subsequently updates a remote server 116 with the positional coordinates of such electronic key device 104. Such remote server 116 processes received location data, verifies an association between such electronic key device 104 and an authorized vehicle owner, and transmits location updates to a user-accessible interface such as a mobile application installed on the smartphone of owner. Upon receiving such location update, the owner retrieves the positional coordinates of such electronic key device 104 through such mobile application, which provides navigation assistance to guide the owner to the detected location. If such electronic key device 104 remains within detection range, continuous location tracking is enabled until retrieval is confirmed, whereas if such electronic key device 104 is removed from the premises, historical location records stored within such mapping database 112 assist in determining movement patterns and possible recovery paths, thereby enabling real-time tracking, location updates, and user notifications through an interconnected network.
In an embodiment, the electronic key device 104 may comprise an acknowledgment-based activation unit, wherein the acknowledgment-based activation unit activates the wireless communication interface 108 upon receiving an acknowledgment signal from at least one communication node 110 in the communication mesh. Such acknowledgment-based activation unit comprises a signal detection circuit, a processing unit, and a memory unit storing predefined activation parameters. Upon detecting a unique identification signal from the electronic key device 104, such communication node 110 transmits an acknowledgment signal encoded with authentication data. The acknowledgment-based activation unit processes such acknowledgment signal using stored authentication keys and predefined validation rules. Upon successful validation, the acknowledgment-based activation unit generates a control signal to activate the wireless communication interface 108, allowing transmission of additional location and authentication data. Such acknowledgment-based activation unit operates using predefined signal reception intervals and dynamic acknowledgment response thresholds to optimize power consumption and response efficiency. Signal processing techniques such as error correction, signal filtering, and cryptographic verification are implemented within such acknowledgment-based activation unit to prevent unauthorized activations. Such acknowledgment-based activation unit interacts with internal timers and event monitoring circuits within the electronic key device 104 to track acknowledgment response patterns and dynamically adjust activation timing. Optional implementations of such acknowledgment-based activation unit include multi-channel acknowledgment verification mechanisms, wherein multiple communication nodes 110 transmit acknowledgment signals, and activation occurs only upon receipt of a predefined number of confirmations.
In an embodiment, the electronic key device 104 may comprise a fallback communication mode, wherein the fallback communication mode enables temporary operation in an alternative frequency band upon detecting excessive interference within the short-range communication method. Such fallback communication mode comprises a frequency scanning unit, an interference detection circuit, and a transmission adjustment unit within the electronic key device 104. Upon detecting a loss event, the electronic key device 104 initially transmits a unique identification signal using a primary communication frequency. If repeated transmission attempts fail due to detected interference, such fallback communication mode activates an alternative frequency band preconfigured within a stored frequency selection table. Interference levels are monitored using real-time signal quality analysis, noise threshold detection, and error rate measurements. The fallback communication mode operates using predefined conditions such as persistent transmission failure, excessive packet loss, or channel occupancy levels exceeding a predefined limit. Upon activation of such fallback communication mode, the electronic key device 104 transmits a status update indicating frequency switching to the communication node 110. Such fallback communication mode includes an adaptive transmission scheduling mechanism that periodically reevaluates the primary frequency for restoration upon detecting improved signal conditions. Optional implementations of such fallback communication mode include multi-band transmission capability, wherein multiple alternative frequencies are sequentially tested to establish the most stable connection.
In an embodiment, the electronic key device 104 may be configured to periodically store authentication challenge-response data, wherein the authentication challenge-response data is transmitted to the communication mesh upon reconnection to verify the integrity of the electronic key device 104. Such authentication challenge-response data comprises timestamped cryptographic challenge records, response validation logs, and historical authentication keys stored within a secured memory unit of the electronic key device 104. Periodic storage of such authentication challenge-response data occurs based on predefined time intervals, authentication request triggers, or transmission failure events. The processing unit within the electronic key device 104 generates cryptographic challenge data using stored authentication keys and predefined encryption techniques. Upon reconnection to the communication mesh, such authentication challenge-response data is transmitted to the communication node 110 for integrity validation. Verification of such authentication challenge-response data occurs using stored historical records, rolling authentication keys, or multi-factor identity confirmation mechanisms. Authentication failure conditions, such as mismatched challenge-response sequences or expired authentication records, trigger security actions such as device lockdown, re-authentication requests, or alert generation. Optional implementations of such authentication challenge-response data storage include distributed authentication verification, wherein multiple communication nodes 110 verify received authentication challenge-response data before granting full access to the communication mesh.
In an embodiment, the communication mesh may further comprise redundant data routing paths, wherein the redundant data routing paths enable multiple concurrent transmission channels. Such redundant data routing paths comprise dynamically assigned relay nodes, multipath transmission circuits, and congestion-aware routing protocols integrated within the interconnected electronic devices 102 forming the communication mesh. Data transmission across such redundant data routing paths occurs using predefined routing priority policies based on signal strength, latency estimation, and node availability. The communication node 110 evaluates transmission path conditions using real-time packet delivery analysis, network congestion monitoring, and path reliability scoring techniques. Upon detecting primary path degradation, such communication node 110 dynamically reassigns data routing to an alternative redundant data routing path. Such redundant data routing paths operate in either active or standby mode, wherein active paths continuously transmit data, while standby paths remain in a monitoring state until needed. Such redundant data routing paths mitigate packet loss due to interference, node failures, or unexpected signal obstructions. Optional implementations of such redundant data routing paths include decentralized routing decision mechanisms, wherein each interconnected electronic device 102 autonomously selects optimal transmission paths based on real-time network conditions.
In an embodiment, the communication mesh may further comprise a geographic region-based segmentation, wherein the geographic region-based segmentation prioritizes localization of the electronic key device 104 using predefined sub-networks. Such geographic region-based segmentation comprises zoned network identifiers, region-specific transmission power levels, and location-aware node selection mechanisms. Communication nodes 110 within such geographic region-based segmentation operate with predefined geographic coverage areas. Data packets transmitted within such geographic region-based segmentation are tagged with location identifiers that allow accurate tracking of the electronic key device 104 within defined geographic boundaries. Signal strength profiling and proximity-based node selection techniques optimize localization accuracy within such geographic region-based segmentation. Communication nodes 110 participating in such geographic region-based segmentation periodically broadcast zone-specific beacons to facilitate dynamic boundary recognition and automated handoff between adjacent zones. Such geographic region-based segmentation includes adaptive boundary adjustment mechanisms that modify network segmentation based on mobility patterns, environmental changes, or dynamic congestion conditions. Optional implementations of such geographic region-based segmentation include hierarchical zone-based access control, wherein device authentication and transmission privileges vary based on the defined geographic region.
In an embodiment, the communication node 110 may comprise a low-power localization mode, wherein such low-power localization mode enables intermittent activation of the communication circuits to conserve energy while maintaining periodic location tracking functionality. Such low-power localization mode operates by periodically deactivating non-essential communication components while allowing essential circuits to remain functional. Activation intervals for such low-power localization mode are determined based on pre-programmed time sequences, detected movement patterns, or environmental conditions affecting signal strength. Communication node 110 retains synchronization with the communication mesh while in such low-power localization mode by engaging in periodic beacon transmissions, which are spaced apart to reduce energy consumption. Upon detecting a unique identification signal from the electronic key device 104, communication node 110 exits such low-power localization mode and engages in standard communication. Signal reception thresholds are dynamically adjusted to account for environmental interference, enabling communication node 110 to process identification signals without requiring continuous active listening. Such low-power localization mode may also integrate adaptive duty cycling, where activation frequency is adjusted based on historical movement data of the electronic key device 104. Power-efficient signal processing techniques, including compressed data transmission and error correction encoding, allow communication node 110 to process received signals while minimizing power draw. When location tracking requirements are met, communication node 110 transitions back into such low-power localization mode.
In an embodiment, the mapping database 112 may comprise a confidence weighting mechanism, wherein such confidence weighting mechanism assigns reliability scores to location data received from multiple communication nodes 110 based on signal strength, transmission latency, and historical accuracy. Such confidence weighting mechanism processes received data by evaluating transmission parameters associated with each detected unique identification signal. Signal strength measurements determine the proximity of the electronic key device 104 to each communication node 110, wherein higher signal strength is assigned a greater confidence value. Transmission latency analysis accounts for potential delays in data relay, wherein increased latency values correspond to reduced confidence in location accuracy. Historical accuracy is determined based on previously recorded signal data, wherein consistency in received location reports results in higher reliability scores. A weighted aggregation method combines such signal strength, transmission latency, and historical accuracy values to compute an overall confidence score for each detected location entry. Such confidence weighting mechanism dynamically updates assigned scores as new data is received, enabling real-time adaptation to environmental variations affecting signal propagation. Outlier detection methods are incorporated to discard unreliable location estimates resulting from temporary interference or multipath signal reflections. Such confidence weighting mechanism interacts with filtering techniques to prioritize highly reliable location data for downstream processing within the cloud-based data management system 114. Configurable parameters of such confidence weighting mechanism include weight assignment ratios, data aging factors, and recalibration intervals.
In an embodiment, the mapping database 112 may comprise a multi-tier storage hierarchy, wherein such multi-tier storage hierarchy allocates frequently accessed location data to a high-speed storage medium and archives historical location data to a long-term storage medium. Such multi-tier storage hierarchy includes volatile and non-volatile memory elements optimized for different access speed and data retention requirements. Frequently accessed data, including recent location updates of the electronic key device 104, is stored in high-speed memory such as dynamic random-access memory (DRAM) or solid-state storage, allowing rapid retrieval for real-time processing. Archival data containing historical location logs and long-term movement patterns is stored in non-volatile memory such as hard disk drives or cloud-based distributed storage, reducing memory overhead in high-speed storage. Such multi-tier storage hierarchy utilizes caching mechanisms to predictively retain location data in high-speed memory based on access frequency patterns, improving retrieval latency for frequently queried data points. Data aging policies define conditions for transitioning location entries from high-speed storage to archival storage based on preconfigured time thresholds or query inactivity periods. Compression algorithms are applied to archived data within such multi-tier storage hierarchy to minimize storage requirements while preserving historical accuracy. Access control measures makes sure that only authenticated queries retrieve location records from high-speed or archival storage layers. Such multi-tier storage hierarchy enables query execution for retrieving recent or historical data based on predefined search criteria.
In an embodiment, the cloud-based data management system 114 may comprise a multi-user permission system, wherein such multi-user permission system enables role-based access to location updates based on pre-approved authorization levels. Such multi-user permission system includes authentication protocols that verify user credentials before granting access to location data. Role-based access control policies define different authorization levels, wherein administrative users access full location histories and standard users access only recent positional updates of the electronic key device 104. Such multi-user permission system supports hierarchical permission structures, enabling organizations to assign varying access levels to personnel based on security requirements. Time-based access restrictions control location data availability, wherein access to sensitive records is restricted to predefined operational hours or temporary authorization periods. Audit logging mechanisms record access attempts within such multi-user permission system, generating compliance reports that document retrieval activities and modification requests. Encryption techniques secure stored credentials and transmitted data to prevent unauthorized interception. Dynamic access revocation processes allow administrative users to modify or revoke permissions based on changing security policies. Such multi-user permission system integrates with identity verification frameworks, including biometric authentication or multi-factor authentication, to enforce stringent security measures. Configurable settings of such multi-user permission system include access expiration times, authentication retry limits, and data visibility restrictions based on user-defined attributes.
FIG. 2 illustrates a method 200 for locating an electronic key device 104 within a communication mesh, in accordance with the embodiments of the present disclosure. At step 202, a communication mesh is established using a plurality of interconnected electronic devices 102, wherein such communication mesh enables wireless data exchange using a short-range communication method. The interconnected electronic devices 102 communicate through predefined frequency bands, allowing dynamic node-to-node transmission. Communication paths are determined based on real-time signal strength, transmission latency, and congestion levels. The interconnected electronic devices 102 continuously adjust routing paths based on environmental factors affecting connectivity. Secure authentication mechanisms validate each electronic device 102 before integration into the communication mesh.
At step 204, vicinity check requests are transmitted from a base control unit 106 to an electronic key device 104 through the communication mesh. Such vicinity check requests include identification verification data and authentication challenge responses. The electronic key device 104 receives such vicinity check requests at predefined intervals and processes the authentication request. If the electronic key device 104 responds successfully, the base control unit 106 records the verification status and continues periodic transmission of such vicinity check requests.
At step 206, a loss event is determined upon detecting an absence of vicinity check request responses for a predefined duration. A loss event is detected when multiple consecutive vicinity check requests remain unacknowledged within the defined time threshold. The electronic key device 104 monitors response intervals and identifies communication disruptions. Upon exceeding the predefined threshold, the electronic key device 104 transitions into a lost state.
At step 208, a wireless communication interface 108 within the electronic key device 104 is activated in response to the loss event, initiating transmission of a unique identification signal. The wireless communication interface 108 operates using predefined frequency bands, optimizing signal propagation for detection by nearby communication nodes 110. The unique identification signal includes encoded authentication data, timestamped activation logs, and signal integrity markers.
At step 210, at least one communication node 110 within the communication mesh detects the unique identification signal transmitted by the electronic key device 104. The communication node 110 processes received signals by extracting identification data, verifying authentication credentials, and measuring signal strength. Upon successful identification, the communication node 110 establishes a communication link with the electronic key device 104 for further data exchange.
At step 212, correlation data associating the unique identification signal of the electronic key device 104 with detected location data is stored in a mapping database 112 operatively linked to the communication mesh. Such correlation data includes timestamped signal logs, received signal strength indicators, and computed proximity metrics relative to detected communication nodes 110. The mapping database 112 organizes data entries based on geospatial indexing parameters.
At step 214, detected location data is transmitted from the communication node 110 to a cloud-based data management system 114 for processing. The communication node 110 packages extracted data into encrypted packets and forwards such packets through secure transmission channels. The cloud-based data management system 114 verifies data integrity, processes location updates, and applies predefined filtering mechanisms.
At step 216, a remote server 116 is updated with the positional coordinates of the electronic key device 104 based on received location data. The cloud-based data management system 114 forwards processed location data to the remote server 116, wherein such remote server 116 maintains records of device location history. The remote server 116 updates tracking logs and synchronizes stored records with user-accessible interfaces.
At step 218, the remote server 116 processes received location data and verifies an association between the electronic key device 104 and an authorized user. Such verification involves analyzing historical access logs, comparing authentication records, and confirming device ownership credentials. If an authorized user is identified, the remote server 116 generates a location update event.
At step 220, the remote server 116 transmits location updates of the electronic key device 104 to a user-accessible interface. The location update includes current positional coordinates, timestamped tracking logs, and signal confidence metrics. The user-accessible interface retrieves transmitted data and presents location information for tracking and monitoring purposes.
In an embodiment, distributing location data storage across multiple geographically separated servers using regional database clustering may enable efficient data management and fault tolerance. Regional database clustering involves partitioning location data into multiple datasets based on geographic regions, user access patterns, or predefined system parameters. Each geographically separated server within the cloud-based data management system 114 stores a distinct subset of location data while maintaining synchronized replication with interconnected nodes. Data distribution methods include range-based partitioning, hash-based partitioning, or hybrid partitioning strategies. Geographic redundancy minimizes data loss risks due to localized failures, power outages, or network disruptions. Load balancing mechanisms within the cloud-based data management system 114 dynamically adjust data allocation policies to optimize query response times and resource utilization. Data consistency mechanisms such as eventual consistency, strong consistency, or quorum-based replication govern synchronization between multiple geographically separated servers. Data retrieval requests directed to the cloud-based data management system 114 are processed through routing mechanisms that select the most suitable server based on network latency, proximity, and data freshness. Security techniques such as encrypted data replication and access control policies protect sensitive location data stored within multiple geographically separated servers. Regional database clustering supports real-time analytics, location tracking, and historical movement pattern analysis by enabling distributed data aggregation across multiple storage nodes.
In an embodiment, recording, by the remote server 116, the location updates when the predefined conditions are met may enable systematic logging and retrieval of tracking records. The predefined conditions include loss events, authentication failures, or tamper detection alerts that trigger automated recording mechanisms within the remote server 116. The remote server 116 continuously monitors received location updates from the cloud-based data management system 114 and determines whether predefined conditions warrant archival within a secured audit log. Timestamped entries stored within such secured audit log include electronic key device 104 identifiers, detected positional coordinates, signal strength indicators, and associated event triggers. Such secured audit log employs cryptographic hash functions, access control restrictions, and redundancy mechanisms to prevent unauthorized modifications or data corruption. Data retention policies within the remote server 116 define log retention durations, archival intervals, and expiration schedules based on compliance requirements or user preferences. Indexed search capabilities integrated within the remote server 116 facilitate efficient retrieval of stored location updates based on predefined filtering criteria such as time range, geographic region, or specific authentication events. Such recorded location updates provide forensic analysis capabilities, aiding in incident investigations, security audits, and regulatory compliance verifications. Periodic integrity checks conducted by the remote server 116 validate consistency and authenticity of stored location updates within the secured audit log. Secure data transmission channels protect recorded location updates from unauthorized interception during storage or retrieval operations.
In an embodiment, predicting a probable future location of the electronic key device 104 using machine learning-based trajectory forecasting may enable anticipatory tracking and movement analysis. Historical movement data, environmental factors, and behavioral patterns serve as input parameters for generating predictive models within the remote server 116. The remote server 116 processes historical positional coordinates, motion vectors, and contextual metadata to identify recurring movement trends associated with the electronic key device 104. Such trajectory forecasting methods include time-series analysis, pattern recognition, and probabilistic state modeling techniques. Data preprocessing techniques applied within the remote server 116 involve noise filtering, outlier detection, and coordinate transformation to refine prediction accuracy. Dynamic weighting factors assign relevance scores to recent movement observations while preserving long-term behavioral patterns within predictive models. The remote server 116 refines predictions through iterative feedback loops that incorporate real-time location updates received from the cloud-based data management system 114. Forecasted movement paths generated within the remote server 116 are continuously compared against real-time tracking data to validate prediction reliability. If deviations exceed predefined thresholds, the remote server 116 triggers adaptive recalibration processes to adjust trajectory forecasts accordingly.
In an embodiment, transmitting a preemptive alert to an authorized user when the predicted location of the electronic key device 104 deviates from an expected travel path beyond a predefined threshold may enable early intervention and security notifications. The remote server 116 continuously evaluates forecasted movement paths of the electronic key device 104 against historical travel patterns, geospatial boundaries, and predefined route constraints. Deviation detection mechanisms within the remote server 116 utilize geofencing techniques, statistical deviation thresholds, and adaptive anomaly scoring to determine unauthorized or unexpected movement patterns. If predicted movement paths exceed predefined deviation thresholds, the remote server 116 generates an alert notification containing relevant location details, deviation magnitude, and event timestamps. Such preemptive alert is transmitted through encrypted communication channels to designated user-accessible interfaces such as mobile applications, email services, or dedicated security consoles. Alert escalation policies within the remote server 116 define priority levels, response protocols, and follow-up notification sequences based on detected movement anomalies. Configurable alert parameters allow customization of notification triggers based on movement sensitivity, geographical constraints, or operational security requirements. The cloud-based data management system 114 facilitates real-time alert distribution by synchronizing alert transmissions across multiple communication channels. Logged alert events within the remote server 116 provide a historical record of detected deviations, enabling post-event analysis and security audits.
FIG. 3 illustrates a data flow diagram for locating an electronic key device 104 within a communication mesh, in accordance with the embodiments of the present disclosure. The process begins with a vicinity check request being transmitted to the electronic key device 104. If the vicinity check request is received, normal operation continues without further action. If the vicinity check request is not received, a determination is made regarding whether a loss event has occurred. If a loss event is detected, the electronic key device 104 activates the wireless communication interface 108, initiating the transmission of a unique identification signal. Upon activation, at least one communication node 110 within the communication mesh attempts to detect such unique identification signal. If the communication node 110 successfully detects such unique identification signal, a communication link is established between the electronic key device 104 and such communication node 110. Once the communication link is established, the mapping database 112 determines whether location data associated with the electronic key device 104 has been mapped. If the location data is successfully mapped, the cloud-based data management system 114 updates a database with the positional coordinates of the electronic key device 104. Following database update, a verification process determines whether an authorized user is associated with such electronic key device 104. Upon successful verification of such authorized user, the remote server 116 transmits a location update to a user-accessible interface, enabling the authorized user to retrieve positional information of the electronic key device 104.
FIG. 4 illustrates a network topology diagram for locating an electronic key device 104 within a communication mesh, in accordance with the embodiments of the present disclosure. The communication mesh network comprises multiple electronic devices 102 that exchange data to establish a decentralized communication framework. Such electronic devices 102 relay data packets to maintain network connectivity, enabling dynamic routing and transmission across interconnected nodes. The electronic key device 104 transmits a signal upon detecting a loss event, which is received by at least one communication node 110 within the communication mesh. Such communication node 110 forwards the received signal to additional communication nodes 110. Such communication nodes 110 analyze received signals to extract identification and location data associated with the electronic key device 104. Upon successful signal processing, such communication nodes 110 transmit location data to the cloud-based system 114, where location records are updated, stored, and processed for further validation. The cloud-based system 114 continuously synchronizes received data with the remote server 116 to facilitate real-time location tracking and user access management. The remote server 116 processes received data, verifies user credentials, and transmits relevant location updates to a user-accessible interface.
In an embodiment, a plurality of interconnected electronic devices 102 forming the communication mesh enables continuous wireless data exchange using a short-range communication method. Such interconnected electronic devices 102 dynamically establish peer-to-peer communication pathways without requiring centralized infrastructure. Transmission of data between such interconnected electronic devices 102 utilizes adaptive routing mechanisms to maintain connectivity, even in environments where physical obstructions or interference impact signal propagation. Such interconnected electronic devices 102 autonomously optimize transmission paths based on real-time network conditions, thereby reducing latency and improving data integrity. Encryption mechanisms embedded within such interconnected electronic devices 102 prevent unauthorized access and protect transmitted data from interception. Such interconnected electronic devices 102 support multiple concurrent connections, enabling integration with additional network nodes without requiring extensive reconfiguration. Power management techniques applied to such interconnected electronic devices 102 regulate energy consumption through adaptive duty cycling and low-power standby states. Redundant communication links established between such interconnected electronic devices 102 mitigate single-point failures. The decentralized nature of such interconnected electronic devices 102 provides scalable network expansion without requiring dedicated infrastructure.
In an embodiment, the electronic key device 104 is operable to receive vicinity check requests from a base control unit 106, wherein an absence of the vicinity check requests for a predefined duration is determined as a loss event. Such electronic key device 104 continuously monitors received vicinity check requests to verify connectivity with such base control unit 106. Each vicinity check request transmitted by such base control unit 106 carries a unique identifier and a timestamp, allowing such electronic key device 104 to authenticate such vicinity check request and validate its origin. If a vicinity check request is not received within a predefined duration, such electronic key device 104 registers a loss event and transitions to an alert state. Loss event detection enables real-time identification of unauthorized removal or displacement of such electronic key device 104. Customizable timeout parameters within such electronic key device 104 allow dynamic adjustment of predefined durations based on security policies and environmental conditions. The continuous monitoring of vicinity check requests prevents prolonged undetected loss of such electronic key device 104, affirming immediate response to potential security threats.
In an embodiment, a wireless communication interface 108 within the electronic key device 104 is activated upon determination of the loss event, enabling transmission of a unique identification signal. Such wireless communication interface 108 supports multiple transmission frequencies to enable compatibility with communication nodes 110 within the communication mesh. Upon activation, such wireless communication interface 108 generates a unique identification signal containing encrypted device credentials and positional metadata. Such unique identification signal is broadcast periodically to maximize detection probability within such communication mesh. Adaptive transmission power control mechanisms within such wireless communication interface 108 adjust signal strength based on network density and environmental interference. Security measures integrated within such wireless communication interface 108 prevent signal spoofing by employing cryptographic authentication techniques. The transmission of such unique identification signal allows rapid localization of such electronic key device 104 without requiring continuous external intervention.
In an embodiment, at least one communication node 110 within the communication mesh is configured to detect the unique identification signal transmitted by the electronic key device 104 and establish a communication link with the electronic key device 104. Such communication node 110 continuously scans predefined frequency bands to identify incoming signals from such electronic key device 104. Upon detecting such unique identification signal, such communication node 110 initiates a secure authentication process to verify signal authenticity before establishing a communication link. Such communication node 110 transmits acknowledgment responses to confirm successful reception and synchronization with such electronic key device 104. Multiple communication nodes 110 within such communication mesh collaborate to refine location accuracy by triangulating received signal strength. Dynamic load balancing mechanisms within such communication node 110 optimize network bandwidth allocation, enabling reliable signal transmission without network congestion. Secure data transmission protocols applied within such communication node 110 prevent unauthorized interception of communication between such electronic key device 104 and subsequent processing systems.
In an embodiment, a mapping database 112 operatively linked to the communication mesh stores correlation data associating the unique identification signal of the electronic key device 104 with detected location data of the communication node 110 receiving the unique identification signal. Such mapping database 112 maintains an indexed repository of location records, allowing real-time correlation of received signal data with known geographic coordinates. Data organization techniques within such mapping database 112 include hierarchical indexing, geospatial clustering, and historical data layering. Such mapping database 112 supports fast query retrieval, enabling efficient lookup of stored location records upon request. Redundant storage replication within such mapping database 112 prevents data loss due to system failures or unauthorized modifications. Secure authentication controls regulate access permissions within such mapping database 112.
In an embodiment, a cloud-based data management system 114 communicatively coupled to the communication mesh receives the detected location data from the communication node 110 and updates a remote server 116 with the positional coordinates of the electronic key device 104. Such cloud-based data management system 114 processes incoming data streams and applies filtering techniques to remove inconsistencies caused by signal interference. Data normalization algorithms standardize received location records before transmitting such records to such remote server 116. Secure network protocols affirm encrypted data transmission between such cloud-based data management system 114 and interconnected systems. Scalable infrastructure within such cloud-based data management system 114 allows concurrent processing of multiple location tracking requests without performance degradation.
In an embodiment, the remote server 116 operatively linked to the cloud-based data management system 114 processes the received location data, verifies an association between the electronic key device 104 and an authorized user, and transmits the location updates of the electronic key device 104 to a user-accessible interface. Such remote server 116 cross-references received data with stored user authentication records to determine ownership validity before transmitting location updates. Automated verification processes within such remote server 116 evaluate transaction history and access logs to detect unauthorized usage patterns. Upon confirmation of an authorized user association, such remote server 116 transmits an encrypted location update to predefined user-accessible interfaces. Such location updates include timestamped geographic coordinates, signal confidence scores, and relevant security event logs. Secure access controls within such remote server 116 prevent unauthorized retrieval or modification of transmitted location updates.
In an embodiment, the electronic key device 104 comprises an acknowledgment-based activation unit, wherein the acknowledgment-based activation unit activates the wireless communication interface 108 upon receiving an acknowledgment signal from at least one communication node 110 in the communication mesh. Such acknowledgment-based activation unit verifies signal authenticity before triggering transmission activation. Such activation process reduces unnecessary signal broadcasting, conserving power within such electronic key device 104 while maintaining response readiness.
In an embodiment, the electronic key device 104 further comprises a fallback communication mode, wherein the fallback communication mode enables temporary operation in an alternative frequency band upon detecting excessive interference within the short-range communication method. Such fallback communication mode automatically transitions transmission frequencies to maintain connectivity within the communication mesh. Frequency adaptation mechanisms dynamically select alternative transmission channels, mitigating signal disruptions caused by environmental interference or congestion.
In an embodiment, the communication mesh further comprises redundant data routing paths, wherein the redundant data routing paths enable multiple concurrent transmission channels. Such redundant data routing paths dynamically adjust transmission pathways based on network congestion, device availability, and environmental conditions. Adaptive routing techniques optimize message delivery efficiency while assuring continuous connectivity.
In an embodiment, the mapping database 112 further comprises a confidence weighting mechanism, wherein the confidence weighting mechanism assigns reliability scores to location data, received from the multiple communication nodes 110 based on signal strength, transmission latency, and historical accuracy. Such confidence weighting mechanism prioritizes high-reliability data sources, reducing errors associated with inconsistent signal measurements. Weighting factors dynamically adjust based on real-time network performance metrics.
In an embodiment, the cloud-based data management system 114 comprises a multi-user permission system, wherein the multi-user permission system enables role-based access to the location updates based on the pre-approved authorization levels. Such multi-user permission system regulates data retrieval based on predefined user credentials, enabling access control enforcement. User role hierarchies define permission levels, restricting sensitive data access to authorized entities. Secure access logging records interactions with stored location updates, preventing unauthorized modifications.
In the description of the present invention, it is also to be noted that, unless otherwise explicitly specified or limited, the terms “disposed,” “mounted,” and “connected” are to be construed broadly, and may for example be fixedly connected, detachably connected, or integrally connected, either mechanically or electrically. They may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Modifications to embodiments and combination of different embodiments of the present disclosure described in the foregoing are possible without departing from the scope of the present disclosure as defined by the accompanying claims. Expressions such as “comprising”, “comprising”, “incorporating”, “have”, “is” used to describe and claim the present disclosure are intended to be construed in a non- exclusive manner, namely allowing for items, components or elements not explicitly described also to be present. Reference to the singular is also to be construed to relate to the plural where appropriate.
Although embodiments have been described with reference to a number of illustrative embodiments thereof, it should be understood that numerous other modifications and embodiments can be devised by those skilled in the art that will fall within the spirit and scope of the principles of this disclosure. More particularly, various variations and modifications are possible in the component parts and/or arrangements of the subject combination arrangement within the scope of the present disclosure, the drawings and the appended claims. In addition to variations and modifications in the component parts and/or arrangements, alternative uses will also be apparent to those skilled in the art.
,CLAIMS:WE CLAIM:
1. A system 100 to locate an electronic key device within a communication mesh, the system 100 comprising:
a plurality of interconnected electronic devices 102 forming the communication mesh, wherein the communication mesh enables wireless data exchange using a short-range communication protocol;
the electronic key device 104 operable to receive the vicinity check requests from a base control unit (BCU) 106, wherein an absence of the vicinity check requests for a predefined duration is determined as a loss event;
a wireless communication interface 108 within the electronic key device 104, wherein the wireless communication interface 108 is activated upon determination of the loss event, enabling transmission of a unique identification signal;
at least one communication node 110 within the communication mesh configured to detect the unique identification signal transmitted by the electronic key device 104 and establish a communication link with the electronic key device 104;
a mapping database 112 operatively linked to the communication mesh, wherein the mapping database 112 stores correlation data associating the unique identification signal of the electronic key device 104 with a detected location data of the communication node 110 receiving the unique identification signal;
a cloud-based data management system 114 communicatively coupled to the communication mesh, wherein the cloud-based data management system 114 receives the detected location data from the communication node 110 and updates a remote server 116 with the positional coordinates of the electronic key device 104;
the remote server 116 operatively linked to the cloud-based data management system 114, wherein the remote server 116 processes the received location data, verifies an association between the electronic key device 104 and an authorized user, and transmits the location updates of the electronic key device 104 to a user-accessible interface.
2. The system 100 of claim 1, wherein the electronic key device 104 comprises an acknowledgment-based activation unit, wherein the acknowledgment-based activation unit activates the wireless communication interface 108 upon receiving an acknowledgment signal from at least one communication node 110 in the communication mesh.
3. The system 100 of claim 1, wherein the electronic key device 104 further comprises a fallback communication mode, wherein the fallback communication mode enables temporary operation in an alternative frequency band upon detecting excessive interference within the short-range communication protocol.
4. The system 100 of claim 1, wherein the electronic key device 104 is configured to periodically store authentication challenge-response data, wherein the authentication challenge-response data is transmitted to the communication mesh upon reconnection to verify the integrity of the electronic key device 104.
5. The system 100 of claim 1, wherein the communication mesh further comprises the redundant data routing paths, wherein the redundant data routing paths enable the multiple concurrent transmission channels.
6. The system 100 of claim 1, wherein the communication mesh further comprises a geographic region-based segmentation, wherein the geographic region-based segmentation prioritizes localization of the electronic key device 104 using the predefined sub-networks.
7. The system 100 of claim 1, wherein the communication node 110 further comprises a low-power localization mode, wherein the low-power localization mode enables intermittent activation of the communication circuits to conserve energy while maintaining periodic location tracking functionality.
8. The system 100 of claim 1, wherein the mapping database 112 further comprises a confidence weighting mechanism, wherein the confidence weighting mechanism assigns the reliability scores to location data, received from the multiple communication nodes 110 based on signal strength, transmission latency, and historical accuracy.
9. The system 100 of claim 1, wherein the mapping database 112 comprises a multi-tier storage hierarchy, wherein the multi-tier storage hierarchy allocates frequently accessed location data to a high-speed storage medium and archives historical location data to a long-term storage medium.
10. The system 100 of claim 1, wherein the cloud-based data management system 114 comprises a multi-user permission system, wherein the multi-user permission system enables role-based access to the location updates based on the pre-approved authorization levels.
11. A method 200 for locating an electronic key device 104 within a communication mesh, the method 200 comprising:
establishing a communication mesh using a plurality of interconnected electronic devices 102, wherein the communication mesh enables wireless data exchange using a short-range communication protocol;
receiving, at the electronic key device 104, the vicinity check requests from a base control unit (BCU) 106;
determining a loss event upon detecting an absence of the vicinity check requests for a predefined duration;
activating a wireless communication interface 108 within the electronic key device 104 upon determination of the loss event, wherein the activation enables transmission of a unique identification signal;
detecting, by at least one communication node 110 within the communication mesh, the unique identification signal transmitted by the electronic key device 104 and establishing a communication link with the electronic key device 104;
storing, in a mapping database 112 operatively linked to the communication mesh, correlation data associating the unique identification signal of the electronic key device 104 with a detected location of the communication node 110 receiving the unique identification signal;
transmitting, from the communication node 110 to a cloud-based data management system 114, the detected location data of the electronic key device 104;
updating, by the cloud-based data management system 114, a remote server 116 with the positional coordinates of the electronic key device 104;
processing, by the remote server 116, the received location data and verifying an association between the electronic key device 104 and an authorized user; and
transmitting, by the remote server 116, the location updates of the electronic key device 104 to a user-accessible interface.
11. The method 200 of claim 11, further comprising distributing location data storage across multiple geographically separated servers using regional database clustering, wherein the regional database clustering optimizes data retrieval efficiency and fault tolerance.
12. The method 200 of claim 11, further comprising recording, by the remote server 116, the location updates when the predefined conditions are met, wherein the predefined conditions include the loss events, the authentication failures, or the tamper detection alerts, and storing the recorded location updates in a secured audit log.
13. The method 200 of claim 11, further comprising predicting a probable future location of the electronic key device 104 using machine learning-based trajectory forecasting, wherein the prediction is based on historical movement data and environmental factors.
14. The method 200 of claim 11, further comprising transmitting a preemptive alert to an authorized user when the predicted location of the electronic key device 104 deviates from an expected travel path beyond a predefined threshold.

Documents

Application Documents

# Name Date
1 202421024543-PROVISIONAL SPECIFICATION [27-03-2024(online)].pdf 2024-03-27
2 202421024543-POWER OF AUTHORITY [27-03-2024(online)].pdf 2024-03-27
3 202421024543-FORM FOR SMALL ENTITY(FORM-28) [27-03-2024(online)].pdf 2024-03-27
4 202421024543-FORM 1 [27-03-2024(online)].pdf 2024-03-27
5 202421024543-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [27-03-2024(online)].pdf 2024-03-27
6 202421024543-DRAWINGS [27-03-2024(online)].pdf 2024-03-27
7 202421024543-FORM-5 [18-03-2025(online)].pdf 2025-03-18
8 202421024543-DRAWING [18-03-2025(online)].pdf 2025-03-18
9 202421024543-COMPLETE SPECIFICATION [18-03-2025(online)].pdf 2025-03-18
10 202421024543-FORM-9 [24-03-2025(online)].pdf 2025-03-24
11 202421024543-STARTUP [26-03-2025(online)].pdf 2025-03-26
12 202421024543-FORM28 [26-03-2025(online)].pdf 2025-03-26
13 202421024543-FORM 18A [26-03-2025(online)].pdf 2025-03-26
14 Abstract.jpg 2025-04-01
15 202421024543-Proof of Right [15-09-2025(online)].pdf 2025-09-15