Sign In to Follow Application
View All Documents & Correspondence

Context Aware System In A Smart Environment.

Abstract: The subject matter described herein is directed to a computing device implemented in a smart environment (100). The computing device comprises an identification module (112) and a context based services module (110). The identification module (112) is configured to identify a user of the smart environment (100) based at least on a user identification code corresponding to the user. The user identification code may be one of an international mobile subscriber identity (IMSI) number and an international mobile equipment identity (IMEI) number. The context based services module (110) is configured to provide at least one context based service selected from a plurality of context based services based on the identification.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
02 December 2010
Publication Number
26/2013
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2019-04-08
Renewal Date

Applicants

TATA CONSULTANCY SERVICES LIMITED
NIRMAL BUILDIN, 9th FLOOR, NARIMAN POINT, MUMBAI-400 021, MAHARASHTRA, INDIA

Inventors

1. BHATTACHARYYA, ABHIJAN
TATA CONSULTANCY SERVICES LTD, PLOT A2, M2 & N2, SECTOR, V, BLOCK GP, SALT LAKE ELECTRONICC COMPLEX, KOLKATA, WEST BENGAL-700 091, INDIA

Specification

FORM 2
THE PATENTS ACT, 1970 (39 of 1970) & THE PATENTS RULES, 2003
COMPLETE SPECIFICATION
(See section 10, rule 13)
1. Title of the invention:
CONTEXT AWARE SYSTEM IN A SMART ENVIRONMENT
2. Aplicant(S)
NAME 1 NATIONALITY | ADDRESS
TATA CONSULTANCY "Nirmal Building, 9th Floor, Nariman Point,
Indian
SERVICES LIMITED Mumbai, Maharashtra-400021, India
3. Preamble to the description
COMPLETE SPECIFICATION
The following specification particularly describes the invention and the manner in which it
is to be performed.

TECHNICAL FIELD
[00011 The present subject matter relates, in general, to smart environments and in
particular to implementation of a context aware system in a smart environment.
BACKGROUND
[0002] A smart environment can be considered as a location embedded with smart
objects, such as sensors, actuators, displays, and computational devices. Such smart objects interacts seamlessly with user appliances, such as air-conditioners, fans, refrigerators, microwave ovens, and televisions and causes the appliances to respond in a personalized or context-based manner. In order to interact, the entities in a smart environment are usually connected over a network.
[0003] Generally, the smart environment is configured to respond according to
personal preferences provided by an end user present within the smart environment. Hence, it is important to identify the arrival, presence, and departure of a user in the smart environment for components of the smart environment to function according to the preferences of the user.
[0004] The smart objects are generally responsible for either identifying or
implementing user preferences. Sometimes, the smart objects may be used to perform the dual function of identification and implementation of personal preferences. For example, the smart objects may cause a fan to rotate at a particular speed based on the personal preferences of the user provided to the smart environment.
[0005] Conventionally, the smart objects use various detection techniques, such as
radio frequency identification (RFID) and Bluetooth or Wi-Fi based identification techniques, to identify and connect with the users. However, the conventional detection techniques require a user to carry an identification device like an RFID tag, a Bluetooth device or a Wi-Fi enabled device. Further, owing to regular usage, conventional identification devices, such as RFID tags are usually prone to damage and therefore may require replacement. In addition, implementation of RFID based detection systems, being complex and costly system, may not be suitable for personalized environments like home.

[0006] The Bluetooth or Wi-Fi based identification techniques, on the other hand, may
be implemented in personalized environments like home. However, as the Bluetooth is a short distance communication protocol, the smart objects using the Bluetooth identification technique can detect Bluetooth enabled identification devices in a small range only, say 10 meters. Similarly, mobile phones acting as the Bluetooth enabled identification devices work for a range of about one meter to conserve battery life.
[0007] Further, the identification devices need to keep their Bluetooth or Wi-Fi
sensors and transmitters continuously ON, which may increase the consumption of power by the identification devices. Furthermore, a conventional system implementing a smart environment for providing services based on user requests provides a unique smart object associated with every user, thus decreasing the power consumption as well as improving the interaction capabilities. However, cost of implementing the conventional smart objects rises linearly with the number of users. Therefore, the conventional smart objects may have restricted application as they are expensive to be implemented on a large scale and need regular maintenance or upgradation,
SUMMARY
[0008] This summary is provided to introduce concepts related to identification of
users in a smart environment, which is further described below in the detailed description. This summary is not intended to identify essential features of the claimed subject matter nor is it intended for use in determining or limiting the scope of the claimed subject matter. This summary is provided to introduce a selection of concepts in a simplified form.
[0009] A computing device for providing context-based services is implemented for
the identification of users in the smart environment and providing context based services to the users. The computing device includes an identification module and a context-based services module. The identification module is configured to identify a user in the smart environment based, at least, on a user identification code corresponding to the user. The user identification code may be one of an international mobile subscriber identity (IMSI) number and an international mobile equipment identity (IMEI) number. The context based services module is configured to provide at least one context based service based on the identification.

[00010] These and other features, aspects, and advantages of the present subject matter
will be better understood with reference to the following description and appended claims.
BRIEF DESCRIPTION OF DRAWINGS
[00011] The above and other features, aspects and advantages of the subject matter will
be better understood with regard to the following description, appended claims, and accompanying drawings, where:
[00012] Fig. 1 illustrates a smart environment implementing a context aware system for
providing context based services to a user, according to an embodiment of the present subject matter.
[00013] Fig. 2 illustrates components of the context aware system for providing the
context based services to the user, according to an embodiment of the present subject matter.
[00014] Fig. 3 illustrates a method for identification of a user in a smart environment
and providing context based services to the user, according to an embodiment of the present subject matter.
DETAILED DESCRIPTION
[00015] The present subject matter relates to systems and methods for identification of
users within a smart environment. The smart environment can be implemented as a location having one or more smart objects, such as sensors, actuators, displays, and computational devices. The smart objects can be configured to interact seamlessly with user appliances, such as air-conditioners, fans, and televisions, present in the smart environment. Based on the interaction, the smart environment may respond, say by providing a requested service. In one implementation, the smart environment, with the help of the smart objects, performs actions such as providing a context based service to a user within the smart environment.
[00016] Context based services can be considered as the services provided by a smart
environment to the user. The context based services are generally specific to each smart environment, and may be configured based on either the preferences of the user, the preferences of an operator of the smart environment, or both. For example, the smart objects

may cause a fan to rotate at a particular speed based on a personal preference of a user of the smart environment.
[00017] Since each smart environment behaves according to personal preferences of a
user(s), it is important to identify factors such as arrival, presence, and/or departure of the user in/from the smart environment. Conventional methods of user identification include different detection techniques, such as radio frequency identification (RFID) and Bluetooth or Wi-Fi based identification techniques, to identify the users in the vicinity of the smart environment. These techniques, however, require the users to carry an RFID tag or Bluetooth enabled device or Wi-Fi enabled device for identification purpose.
[00018] However, the RFID tags are vulnerable to damages and therefore may not be
detected by an RFID reader once damaged. Damaged or unreadable RFID tags need regular replacement resulting in high cost of maintenance. Further, the RFID reader may not be able to detect the RFID tags when multiple RFID tags are in the range of the RFID reader. In addition, implementation of RFID based detection systems, being complex and costly, may not be suitable for personalized environments like home.
[00019] The Bluetooth based detection is also not efficient considering that Bluetooth
is a short distance communication protocol. As a result, the smart objects using Bluetooth identification technique can detect Bluetooth enabled identification devices in a small range only, say 10 meters. Similarly, mobile phones acting as the Bluetooth enabled identification devices work for a range of about one meter to conserve battery life.
[00020] In addition, for smart objects to interact with a user device, the user needs to
keep the Bluetooth and Wi-Fi of their identification devices, such as mobile phones in an active mode. Therefore, such conventional techniques are not energy efficient as they require Bluetooth or Wi-Fi transmitters and sensors of the identification device to be in a continuous active mode in order to be recognized by the smart environment,
[00021] The present subject matter discloses systems and methods for identification of
a user in a smart environment and providing context based services to the user based on the identification. In one embodiment, a context aware system is a computing device and may be

coupled to a network such as a local area network (LAN) or wide area network (WAN) in the smart environment. The context aware system interacts with the users present in the smart environment over a cellular communication network, for example, global system for mobile communications (GSM) to identify the users. The context aware system requires the user to carry a cellular mobile device, such as a mobile phone or a smart phone with a valid mobile subscription provided by a mobile network provider.
{00022] The context aware system, hereinafter referred to as the system, is
implemented in the smart environment and is configured to identify a user in the smart environment. Based on the identification, the system provides the context based services to the user. For example, when a user enters his home, the system identifies the user and starts providing the context based services, like switching on a music system to play a particular music file, adjusting lighting in a room, or performing other functions that the system may have been configured for.
[00023] In one embodiment, the system identifies the user by determining mobile
subscription details of the user. The system connects to the cellular mobile device of the user to acquire the required mobile subscription details. Based on the mobile subscription details, the system identifies the user and starts providing the context based services. In the above example, when the user enters his home, the system connects to the cellular mobile device to determine the mobile subscription details of the user. On identification of the mobile subscription details, the system disconnects from the cellular mobile device and starts providing the context based services.
[00024] The determination of the mobile subscription uses the basic mobile
communication technology, such as the GSM technology. Every cellular mobile device has a unique identity known as an international mobile equipment identity (IMEI) number. The mobile device can further include a subscriber identity module (SIM). The SIM stores an international mobile subscriber identity (IMSI) number, which is a unique identification number associated with every mobile subscription, so that every mobile subscription can be uniquely identified using the IMSI number. The SIM is generally used to store the I MS I number in GSM technology, whereas, in code division multiple access (CDMA) technology,

the IMSI number is programmed in the cellular mobile device. However, nowadays W-CDMA based cellular mobile devices that use a U-SIM having the IMSI number are also widely available in the market. The IMSI number or the IMEI number may thus be used as user identification codes for identifying a user of the cellular mobile device.
[00025] The system, according to an embodiment of the present subject matter, detects
and identifies a user within a smart environment on the basis of the user identification codes associated with the user. The user identification codes include, for example, IMEI number and IMSI number. In one embodiment, the identification is performed using the IMSI number associated with the user. Generally, a cellular mobile device always tries to communicate with a base transceiver station (BTS), which provides the greatest signal strength to the cellular mobile device and is not a barred cell as per GSM specification. Within a predefined distance of every BTS, a cell area is created within which the BTS connects to one or more cellular mobile devices and transmits signals using which the cellular mobile devices communicate with the BTS. Furthermore, every BTS is also associated with a Location Area Code (LAC) which indicates the geographical location of BTS and the corresponding cell area. The BTS continuously transmits a broadcast control channel (BCCH) message, which includes system information, such as the LAC, identity, configuration, and available features of the BTS. Based on the BCCH, the cellular mobile device can identify the LAC to determine the BTSs which are in the vicinity of the cellular mobile device. Once the BTSs are determined, the cellular mobile device connects to the BTS which has the strongest signal strength. The cellular mobile device may constantly check for signal strength, and may initiate a handover, i.e., switches to a new BTS, for example, as soon as the signal strength of the new BTS becomes stronger than the signal strength of its current BTS.
[00026] The system uses the above concept of handover for identifying the cellular
mobile device. A virtual BTS (hereinafter referred to as the VBTS) provided in the smart environment creates a virtual cell, which is associated with a unique LAC and a base station identity code (BSIC). The unique LAC and the BSIC are different from LACs and BSICs of all the existing BTS cells within the geographical area which may overlap with the smart environment. The VBTS broadcasts this information at a signal strength which, to the cellular

mobile devices in the smart environment, appears greater than the signal strength of all the existing BTSs.
[00027] When a user with a cellular mobile device in an idle mode, i.e., when the
cellular mobile device is not being used by the user, enters the smart environment and comes in the vicinity of the VBTS, the cellular mobile device detects the stronger signal having a different BSIC and a different LAC from its home network, i.e., the network provided by the BTS to which the cellular mobile device is currently connected. The cellular mobile device, as per CI criterion of GSM specification, tries to initiate a handover, i.e., switching from one BTS to another BTS. While authenticating the cellular mobile device for the handover, the VBTS acquires the IMSI number associated with the user of the cellular mobile device. The IMSI number is then provided to the system.
[00028] The system using the IMSI number identifies the user of the cellular mobile
device present in the smart environment and stops sending the signal so that the cellular mobile device connects back to its home network. Based on the identification, the system starts providing the context based services to the user. For example, a smart environment having the system may be set up in a superstore for providing the context based services to customers entering the superstore. When a customer enters the superstore, the system can sense his presence and provide him the context based services, such as texting some promotional offer to him or informing him about the shelf that contains his favorite item.
[00029] Further, the system, either periodically or based on a predefined condition,
checks for new users entering the smart environment and thus always has the information, such as which users are present in the smart environment, which users have left, and which users have arrived in the smart environment. The system communicates with the smart environment and co-ordinates with the same for providing context based services to the user.
[00030] Thus, the system provides context based services to the users of a smart
environment without the intervention of the user. The system automatically identifies the user when he or she enters the smart environment and based on the identification initiates the context based services for the user. The system identifies the user based on the IMSI number of the SIM in the cellular mobile device carried by the user. Owing to the ubiquitous character

of the cellular devices, every individual more often than not carries a cellular mobile device, therefore identification according to the present subject matter does not require a user to carry any additional identification device, such as the RFID tag or the Bluetooth device.
[00031] Although the context aware system has been described in reference to GSM
technology, it will be understood that the context aware system can also be implemented for other mobile technologies, such as CDMA, enhanced general packet radio service (EGPRS), enhanced data rates for GSM Evolution (EDGE), high-speed downlink packet access (HSPA)+, and 3GPP long term evolution (LTE). Further, although the user identification as described herein is performed using IMSI number; however, the context aware system may be configured to identify the user using IMEI number identification. Furthermore, the identification may also be performed using femtocell technology.
[00032] The manner in which the system for providing context based services in a
smart environment is implemented shall be explained in detail with respect to the figures. While aspects of systems and methods can be implemented in any number of different computing systems, environments, and/or configurations, the embodiments are described in the context of the following exemplary system architecture(s).
[00033] Figure 1 illustrates a smart environment implementing a system for providing
context based services to a user, according to an embodiment of the present subject matter. Jn one embodiment, a smart environment 100 includes a context aware system 102, hereinafter referred to as the system 102, for providing context based services to a user. The smart environment 100 is a technological concept where a location is embedded with smart objects, such as sensors, actuators, displays, and computational devices. Such smart objects interact seamlessly with user appliances, such as air-conditioners, fans, and televisions and cause them to respond in a personalized or context-based manner. The smart environment 100, with the help of the smart objects, for example, the system 102, provides a context based service to a user in the vicinity of the smart environment 100. The context based services are generally specific to a smart environment and may be configured based on the preferences provided by the user or on preferences of an operator of the smart environment or even both. Since a smart

environment behaves according to users present in the smart environment, it is important to identify the arrival, presence, and departure of the users in the smart environment 100.
[00034] The system 102 is configured to identify users in the smart environment 100
and providing context based services to the identified users. The system 102 communicates with one or more cellular mobile device(s) 104-1, 104-2,.,,, 104-n, hereinafter referred to as mobile device(s) 104, over a cellular communication network 106 through a virtual BTS unit 108, hereinafter referred to as the VBTS unit 108. The cellular communication network 106 may be, for example, a GSM network, a CDMA network, a W-CDMA network, an EGPRS network, a EDGE network, a HSPA+ network, and a LTE network. For the purpose of explanation, the cellular communication network 106 is considered as a GSM network; however, it will be understood that the system 100 can also be implemented for other mobile technologies,
[00035] The system 102 identifies the user of the smart environment 100 on the basis
of user identification codes, such as IMSI number of the user's mobile subscription and IMEI number of the mobile devices 104 and requires the user to carry the mobile device 104 such as a mobile phone with a valid mobile subscription. In one embodiment, the system 102 identifies the user of the smart environment 100 on the basis of the IMSI number of his mobile subscription. In another embodiment, the system 102 may identify the user of the smart environment 100 on the basis of the IMEI number of the mobile device 104. Although, the present system 102 has been described in context of identifying IMSI number; however, the same system 102 may be configured to identify the IMEI number.
[00036] The system 102 may be any computing device connected to the network 106
through the VBTS unit 108. For instance, the system 102 may be implemented as mainframe computers, workstations, personal computers, desktop computers, multiprocessor systems, laptops, network computers, minicomputers, servers, and the like. The system 102 employs various modules for identifying users in the smart environment 100 and providing context based services to the identified users. In one implementation, the system 102 includes a context based service (CBS) module 110 and an identification module 112, Further, in one embodiment, the system 102 interacts with the VBTS unit 108 to identify the users of the

smart environment 100. In another embodiment, the VBTS unit 108 may be integrated with the system 102. The VBTS unit 108 is configured to detect the presence of the users in a predefined area, for example, in the vicinity of the smart environment 100. The system 102 indentifies the user and provides the context based services to the user.
[00037] The VBTS unit 108, in one embodiment, includes one or more processor(s)
(not shown in the figure), input-output (1/O) interfaces (not shown in the figure), and memory (not shown in the figure). The 1/O interfaces and the processor(s) enable the VBTS unit 108 to connect to the network 106 and the system 102. The VBTS unit 108 detects the user by implementing the concept of handover for connecting to the mobile device 104 of the user present in the vicinity of the smart environment 100. Since, a cellular mobile device always tries to communicate with a BTS, which is closest to the cellular mobile device and has the greatest signal strength. Every BTS creates a cell area within which the BTS connects to other cellular mobile devices and transmits signals to those cellular mobile devices.
[00038] Every BTS has a LAC, which marks its geographical location and corresponds
to the cell area of the BTS, The BTS transmits a BCCH, which carries a repeating pattern of system information messages that describe available features, such as the LAC, identity, and configuration of the BTS. The cellular mobile device receives the BCCH and connects to the BTS that has the strongest signal strength. The cellular mobile device constantly checks for signal strengths and initiates the handover, i.e., switches to a new BTS as soon as the signal strength of the new BTS becomes stronger than the signal strength of its current BTS. However, the cellular mobile device exchanges its credentials only when it finds a change of LAC corresponding to the BTS the cellular mobile device is presently connected to.
[00039] The VBTS unit 108 acts as a base transceiver station and creates a virtual cell
having attributes, such as the LAC and the BS1C, different from all the existing cells for the geographical area in which the smart environment 100 is situated. In order to identify the LAC of all the existing cells, the VBTS unit 108 undergoes an initialization phase and acts as a mobile phone initially. The VBTS unit 108 identifies all the BTSs in a predefined area, for example, in the vicinity of the smart environment 100 and interacts with the BTSs to create a BCCH allocation list of all the BTSs. The VBTS unit 108 then obtains attributes of each of

the detected BTSs. The BSIC is a truncated form of cell identity used in GSM cellular networks. The VBTS unit 108 then determines the LAC, the BSIC, and the signal strength of each of the detected BTSs.
[00040] The VBTS unit 108 chooses the attributes that are different from the attributes
of the detected BTSs and starts broadcasting this information at signal strength greater than the signal strength of all the detected BTSs. When a user with the mobile device 104 in an idle mode, i.e., when not being used by the user, comes in the vicinity of the smart environment 100; the mobile device 104 detects the stronger signal having a different BSIC and a different LAC from its home network, i.e., the network provided by the BTS to which the mobile device 104 is currently connected. The mobile device 104, as per CI criterion of the GSM networks as is known in the art, tries to initiate a handover, i.e., switching from one BTS to another BTS.
[00041] Generally, for allowing a handover in a GSM network, the network has to
authenticate a mobile device 104 and not vice-versa. Hence, the mobile device 104 sends a temporary mobile subscriber identity (TMSI) number to the network 106 for performing the handover. As will be known to a person skilled in the art, the TMSI number is generally sent instead of the 1MSI number for security reasons. The BTS receiving the TMSI number verifies a user's authenticity by confirming with a mobile switching centre (MSC). If the MSC does not authenticate a user based on the TMSI number, then the BTS requests the mobile device 104 for its IMS1 number. However, in order to get user details, the VBTS unit 108 purposefully rejects the TMSI number and sends a special signal to the mobile device 104 requesting the IMSI number in plain text. The IMSI number so obtained by the VBTS unit 108 is provided to the system 102 which stores the IMSI number.
[00042] In one implementation, the VBTS unit 108 after obtaining the IMSI number
stops transmitting the signal so that the mobile device 104 can connect back to its home network. The IMSI number is then used by the identification module 112 to identify the user of the mobile device 104. Although the identification module 112 has been described herein to identify the user based on the IMSI number, it will be understood that the identification module 112 may be configured to identify the user using other user identification codes such

as the IMEI number. The identification will be explained in greater details while describing the figure 2.
[00043] On identification, the CBS module 110 starts providing the context based
services to the user. The system 102 may communicate with one or more components (not shown in the figure), such as air-conditioners, fans, refrigerators, microwave ovens, and televisions present in the smart environment 100 over a network (not shown in the figure). The network may be a wireless network, wired network, or a combination thereof. The network can also be an individual network or a collection of many such individual networks, interconnected with each other and functioning as a single large network, e.g., the Internet or an intranet. The network can be implemented as one of the different types of networks, such as intranet, local area network (LAN), wide area network (WAN), the Internet, and such. The system 102 may interact with the components of the smart environment 100 to provide the context based services to the user.
[00044] In one implementation, the CBS module 110 may be configured to perform
various actions based on the identification of the user and preferences set by the user of the smart environment 100. For example, the smart environment 100 is set up in a home for providing the context based services to residents of the home. When a resident, say the owner of the house, returns to the home from somewhere, the system 102 senses his presence and instructs an appliance, say the television, to and automatically switch to a favorite channel of the resident.
[00045] In another implementation, the CBS module 110 may be configured to perform
various actions based on the identification of the user and preferences set by the operator of the smart environment 100. For example, the smart environment 100 is set up in a superstore for providing the context based services to users coming in the vicinity, say to a nearby petrol station or a restaurant. When the user goes to the petrol station, the system 102 identifies the user and may then instruct an outdoor electronic billboard to display a promotional offer that may attract the user to the superstore.
[00046] In yet another implementation, the CBS module 110 may further be configured
to perform various actions based on the identification of the user and preferences set by the

operator as well as the user of the smart environment 100. For example, the smart environment 100 is set up in a superstore for providing the context based services to customers entering the superstore. When a customer enters the superstore, the VBTS unit 108 senses his or her presence, and the CBS module 110 provides him or her the context based services, which may include information about a shelf that contains items that the customer may prefer. The system 102 may also text some promotional offers currently active to all the users present in the smart environment 100.
[00047] Although a virtual BTS unit 108 has been described for performing the user
identification in the smart environment 100, it will be understood that other similar devices or units can also be implemented for identifying the users in the smart environment 100. For example, a femtocell, which is a small cellular base station typically designed for use in a home or small business, can be used.
[00048] The femtocell connects to a mobile service provider's network via a broadband
connection. The femtocell thus allows the mobile service providers to extend service coverage indoors, especially where access would otherwise be limited or unavailable. The femtocell generally acts in a way similar to a BTS and creates a cell area within which the femtocell connects to one or more mobile devices 104 and transmits signals using which the mobile devices 104 communicate with the BTS. The femtocell generally has a list of user identification codes of the users authorized to connect to the femtocell and thus when an authenticated user comes in the vicinity of the femtocell, the user is identified using one of the user identification codes. Based on the identification the system 102 may then provide the context based services to the user.
[00049] Figure 2 illustrates exemplary components of the system 102 for providing
context based services to a user in the smart environment 100, according to an embodiment of the present subject matter. The system 102 includes one or more processor(s) 202, I/O interface(s) 204, and a memory 206. The processor(s) 202 can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, or any devices that manipulate signals based on operational instructions. Among other capabilities, the processor(s) 202 are

configured to fetch and execute computer-readable instructions and data stored in the memory 206.
[00050] The I/O interfaces 204 may include a variety of software and hardware
interfaces, for example, interfaces for peripheral device(s) such as a keyboard, a mouse, an external memory, a printer, etc. and a web interface allowing the system 102 to interact with other objects present in the smart environment 100. The I/O interfaces 204 may enable the system 102 to communicate with the VBTS unit 108 and other computing devices, such as web servers and external databases. The I/O interfaces 204 may facilitate multiple communications within a wide variety of protocols and networks, such as the cellular communication network 106, including GSM and CDMA networks. For the purpose, the I/O interfaces 204 may include one or more ports for connecting to a number of devices such as the VBTS unit 108 required for establishing connection with the cellular communication network 106. The I/O interfaces 204 may further facilitate multiple communication within a wide variety of protocols and networks, such as the wired networks, e.g., LAN or cable; and wireless networks, e.g., WLAN, cellular, or satellite. For the purpose, the I/O interfaces 204 may include one or more ports for connecting to a number of computing devices or to another server.
[00051] The memory 206 may be implemented as any computer-readable medium
known in the art including, for example, volatile memory (e.g., RAM) and/or non-volatile memory (e.g., flash, etc.). In one implementation, the memory 206 includes module(s) 208 and data 210. In an embodiment, the module(s) 208 include the CBS module 110, the identification module 112, a registration module 212, and other modules 214. The other module(s) 214 include programs that supplement applications implemented by the system 102. The data 210 serves as a repository for storing data processed, received, and generated by the module(s) 208. In one implementation, the data 210 includes IMS! register 216, context based services data 218, and other data 220.
[00052] As described previously, the VBTS unit 108 is configured to detect the
presence of users in the vicinity of the smart environment 100, whereas the system 102 indentifies the user and provides the context based services to the user. Although, the VBTS

unit 108 has been shown external to the system 102, the VBTS unit 108 may be integrated within the system 102 to provide a single system for detection of user and providing the context based services to the user. The VBTS unit 108 can act in dual mode: an initialization mode and a detection mode. In the initialization mode, the VBTS unit 108 acts as a as a mobile phone, whereas in the detection mode the VBTS unit 108 acts base transceiver station. The complete process of detecting a user in the smart environment may be divided into three phases: an initialization phase, an identification phase, and a service providing phase.
INITIALIZATION PHASE
[00053] The VBTS unit 108 enters the initialization phase either periodically or based
on a predetermined condition, say, when the system 102 instructs the VBTS unit 108 to start detecting the users in the vicinity of the smart environment 100. In the initialization phase, the VBTS unit 108 acts as a mobile phone and interacts with a)} the BTSs present in the same geographical area as that of the smart environment 100, over the cellular communication network 106. The VBTS unit 108 identifies all the BTSs to which a mobile device present in the vicinity of the smart environment 100 may connect for using a mobile network.
[00054] The VBTS unit 108, as explained previously, creates a BCCH allocation list of
all the BTSs and obtains BSIC of each of the detected BTS. The BCCH allocation list and BSIC of each of the detected BTSs are stored in a database (not shown in the figure) provided in the VBTS unit 108. The VBTS unit 108 then determines the LAC, the BSIC, and the signal strength of each of the detected BTSs and save them in the database. Based on the determination, the VBTS unit 108 chooses the LAC and the BSIC different from the LACs and BSICs of the detected BTSs. The VBTS unit 108 may further identify the BTS that is serving the mobile devices 104 present in the smart environment 100. Subsequent to detection of the users, the VBTS exits initialization phase and enters the identification phase.
IDENTIFICATION PHASE
[00055] Upon initiation of the identification phase, the VBTS unit 108 creates a virtual
cell for the cellular communication network 106 having the LAC and BSIC, different from the LACs and BSICs of the detected BTSs. The VBTS unit 108, through a transmitter (not shown in the figure), starts transmitting attributes, i.e., a BCCH containing the LAC and the BSIC of

the virtual cell at signal strength greater than the signal strength of the BTS currently serving the mobile devices 104. As explained previously, when a user with the mobile device 104 in an idle mode comes in the vicinity of the smart environment 100, the mobile device 104 detects the stronger signal having a different BSIC arid a different LAC from its home network and tries to initiate a handover with the VBTS unit 108 assuming it to be a BTS. The mobile device 104, to initiate the handover, exchanges its identity with the VBTS unit 108 and sends its TMS1 number to the network 106 for performing the handover. However, the VBTS unit 108 purposefully rejects the TMS1 number and sends a request to the mobile device 304 for providing the IMSI number in plain text. The IMSI number so obtained by the VBTS unit 108 is provided to the system 102, which stores the IMSI number in the other data 220.
[00056] Once the IMSI number is identified, the VBTS unit 108 stops transmitting the
signal so that the mobile device 104 can connect back to its original network, (n one embodiment, the system 102 may be configured to periodically activate and deactivate the VBTS unit 108 based on a preset timer for performing the user identification. The system 102 may thus be configured to timely update the record of the users present in the smart environment 100. Periodically activating and deactivating the VBTS unit 108 further ensures that the mobile devices 104 are not connected to the virtual cells indefinitely. The VBTS unit 108 may thus be configured to transmit the signal along with the attributes for a predetermined time interval.
[00057] Further, the identification module 112 compares the IMSI number so obtained
with a plurality of IMS! numbers listed in the IMSI register 216. The IMSI register 216 contains a list of the IMSI numbers of all the users registered with the smart environment 100. The IMSI register 216 also includes user data corresponding to the IMSI numbers. The user data may include user name, address, mobile number, a list of favorites, for example, favorite clothing brand, favorite restaurant, favorite news channel, etc. If the JMSI number so obtained is registered with the system 102, the identification module 112 tags the IMSI number as present and subsequently invokes the CBS module 130 for providing context based services to the user of the identified IMSI number. However, if the IMSI number is not registered, the registration module 212 may enter a registration mode and initiate a registration process.

[00058] The registration module 212 may enter the registration mode to initiate the
registration process based on configuration of the system 102. In one embodiment, the system 102 may be configured based on an application area where the smart environment 102 is implemented. For example, an administrator of a smart environment implemented in a home may not want to register every guest who comes to the home and would thus configure the system 102 not to automatically register every unregistered IMS I number detected in the smart environment. The registration module 212 in such a case does not enter the registration mode automatically and may do so only when instructed by the administrator. Similarly, an administrator of a smart environment implemented in a shopping complex may want to register every unregistered IMSI number as it would help the administer to provide a better service and would thus configure the system 102 to automatically register every unregistered IMSI number detected. The registration module 212 in such a case may enter the registration mode automatically.
[00059] The registration module 212 in the registration mode may request the user,
through the mobile device 104, to provide details such as the name, address, mobile number, and other details of the user essential for identifying and providing the context based service to the user. The registration module 212 may further request the user to fill an online form requesting the user to provide user data, such as a list of favorites. The mobile device 104 may also be provided with a plurality of context based services from which the user, through the mobile device 104, may select the context based services desired by the user.
[00060] For example, the smart environment 100 implemented in an office
environment may provide specific context based services to the employees working in the office. In this case, once an employee gets registered with the smart environment, the registration module 212 may access the CBS data 218 to provide the employee with a list of plurality of context based services, such as connecting to favorite news website, setting room air conditioner temperature, display of items such as calendar and day's schedule, and switching on favorite music etc. The employee may select one or more of these context based services. The CBS module 110 may be accordingly configured to provide the context based services.

[00061] In another embodiment, the user of the mobile device 104 may manually
register with the system 102 when the user enters the smart environment 100 for the first time and wants to receive the context based services. In the above example, a new employee when joining the office may, while completing his joining formalities, get registered with the registration module 212, thereby configuring the system 102 to provide the context based services as desired. Once the user of the mobile device 104 is identified by the system 102, the system 102 enters the service providing phase.
SERVICE PROVIDING PHASE
[00062] The CBS module 110 starts providing the context based services to the user
once the user of the mobile device 104 is identified. The system 102 may communicate with the one or more components in the smart environment 100 for providing the context based services. As explained in the figure 1, the CBS module 110 may be configured to provide various context based services after the identification of the user and based on preferences set by the operator or by the user of the smart environment 100 or both.
[00063] The CBS module 110 accesses the CBS data 218 to provide the context based
services corresponding to the identified 1MSI number. For example, in the example of the environment 100 implemented in an office mentioned earlier, the CBS module 110 may be configured by an employee to switch on the music system in his cubicle. The CBS module 110 may also be configured to provide the employee with a to-do list on the screen of his desktop as soon as the employee enters his cubicle. In this way, the CBS module 110 provides context based services based on the preferences of the users as well as the operator of the smart environment 100.
[00064] The CBS module 110 may further be configured to automatically update the
context based services that may be preferred by the user. In one example, the CBS module 110 may monitor the user to identify likes, dislikes, or preferences of the user, for example, preferred shopping counters and clothing brands. In case the smart environment 100 is implemented in a superstore, the VBTS unit 108 senses the presence of the user when the user enters the superstore. In addition, the user is updated every time the user goes to a billing counter to make payments for his or her purchases. The CBS module 110 stores this

information in the IMSI register 212 to analyze the preferences of the user. Next time when the user visits the store, the CBS module 110, based on the analysis, may provide the user with relevant information such as promotional offers or information about counters housing the favorite items of the user. The CBS module 1 JO may thus be configured to provide the context based services to the user without asking for the user preferences.
[00065] Fig. 3 illustrates an exemplary method 300 for identification of a user in a
smart environment and providing context based services to the user based on the identification, according to an embodiment of the present subject matter. The exemplary method 300 may be described in the general context of computer executable instructions. Generally, computer executable instructions can include routines, programs, objects, components, data structures, procedures, modules, functions, and the like that perform particular functions or implement particular abstract data types. The method may also be practiced in a distributed computing environment where functions are performed by remote processing devices that are linked through a communication network. In a distributed computing environment, computer executable instructions may be located in both local and remote computer storage media, including memory storage devices.
[00066] The order in which the method is described is not intended to be construed as a
limitation, and any number of the described method blocks can be combined in any order to implement the method, or an alternate method. Additionally, individual blocks may be deleted from the method without departing from the spirit and scope of the subject matter described herein. Furthermore, the method is not restricted to the present system 102 and can be implemented in any suitable hardware, software, firmware, or combination thereof.
[00067] The method as described in here describes a one time process that is performed
each time the VBTS unit 108 is instructed to determine the users in the smart environment 100. The method 300 is performed either periodically or based on a predetermined condition, such as each time the system 102 instructs the VBTS unit 108 to start detecting the users in the smart environment 100.
[00068] At block 302, attributes of a plurality of base transceiver stations serving in
vicinity of a smart environment are determined. In one implementation, the VBTS unit 108,

when instructed by the system 102, goes through an initialization phase and acts as a mobile phone initially. The VBTS unit 108 identifies all the BTSs in the vicinity of the smart environment 100 and interacts with the BTSs to create a BCCH allocation list of all the BTSs. The VBTS unit 108 then obtains attributes, such as the LAC and the BS1C of each of the detected BTSs.
[00069] At block 304, a virtual cell is created around a virtual base transceiver station
having attributes different from the determined attributes. In one implementation, on determining the attributes of the plurality of base transceiver stations, the virtual base transceiver station, for example, the VBTS unit 108 creates a virtual cell having attributes, such as the LAC and the BSIC, different from the attributes of the plurality of base transceiver stations. In one implementation, the VBTS unit 108, through a transmitter starts transmitting a BCCH containing the LAC and the BSIC of the virtual ceJ] at signal strength greater than the signal strength of the BTS currently serving mobile devices, for example, the mobile devices 104 in the smart environment 100.
[00070] At block 306, an IMS1 number of a mobile device, for example, the mobile
device 104-1 requesting a handover with the virtual base transceiver station is identified. In one implementation, when a user with the mobile device 104-1 in an idle mode comes in the vicinity of the smart environment 100, the mobile device 104-1 detects the stronger signal transmitted by the VBTS unit 108 and requests a handover with the VBTS unit 308. The mobile device 104-1, to initiate the handover, exchanges its identity with the VBTS unit 108 and sends a TMSI number for performing the handover. However, the VBTS unit 108 purposefully rejects the TMSI number and sends a special signal to the mobile device 104-1 requesting the IMSI number in plain text. The IMSI number so obtained by the VBTS unit 108 is provided to the system 102 which stores the IMSI umber in the other data 220.
[00071] At block 308, the identified IMSI number is compared with a plurality of IMSI
numbers saved in an IMSI register. In one implementation, the identification module 112 of the system 102 compares the identified IMSI number with a list of the IMSI numbers corresponding to the users registered with the smart environment 100 and saved in the IMSI register, for example, the IMSI register 216.

[00072] At block 3 1O, a determination is made to ascertain whether a user of the
identified IMSI number is registered with the smart environment or not. For example, the identification module 112 compares the identified IMSI number with a list of IMSI numbers saved in the IMSI register 216. If the identification module 112 determines that the user is already registered with the smart environment 100, that is the 'Yes' path from the block 310, it proceeds to block 312.
[00073] In case it is determined that the user of the identified IMSI number is not a
registered user, that is the 'No' path from the block 310, a determination is made at block 314 to ascertain whether the system 102 is in a registration mode or not, i.e., whether the system 102 is configured to register the user. For example, the registration module 212 determines whether the system 102 has been configured to register any unregistered user or not. If the registration module 212 determines that the system 102 is not in the registration mode, that is the "No' path from the block 314, it proceeds to block 316 and ends the process.
[00074] In case it is determined that the system 102 is in the registration mode, that is
the 'Yes' path from the block 314, the user may be registered at block 318. For example, the registration module 212 initiates a registration process. In one embodiment, the registration module 212 may request the mobile device 104-1 to provide details such as user's name, address, mobile number, and other details essential for identifying and providing context based services to the user of the mobile device 104.
[00075] At the block 312, context based services are provided to the user of the
identified IMSI number. For example, the CBS module 110 included in the system 102 provides the context based services to the user of the identified IMSI number. The system 102 may communicate with the one or more components in the smart environment 100 for providing the context based services. In one implementation, the CBS module 110 may be configured to provide various context based services after the identification of the user, based on the preferences set by an operator or by the user of the smart environment 100 or by both.
[00076] The system 102 then proceeds to block 316 to end the method 300. The
method may be performed either periodically or based on a predetermined condition, such as

each time the system 102 instructs the VBTS unit 108 to start detecting the users in the smart environment 100.
100077) Although embodiments of a context aware system have been described in
language specific to structural features and/or methods, it is to be understood that the invention is not necessarily limited to the specific features or methods described. Rather, the specific features and methods are disclosed as exemplary implementations for the context aware system.

I We Claim:
l.A method for providing context based services in a smart environment, the method comprising:
obtaining a user identification code corresponding to a user of a cellular mobile device present in the smart environment, wherein the user identification code is one of an international mobile subscriber identity (IMSI) number and an international mobile equipment identity (IMEI) number; and
providing the at least one context based service to the user based on the obtaining.
2. The method as claimed in claim 1 further comprising:
determining attributes of a plurality of base transceiver stations serving in a predefined area;
creating a virtual cell around a virtual base transceiver station associated with the smart environment, wherein the virtual base transceiver station has attributes different from the attributes of the plurality of base transceiver stations: and
transmitting the attributes corresponding to the virtual base transceiver station for a predetermined time interval.
3. The method as claimed in claim 1, wherein the obtaining comprises:
requesting for the user identification code from the cellular mobile device; and receiving the user identification code from the cellular mobile device.
4. The method as claimed in claim 1, wherein the obtaining comprises:
receiving a temporary mobile subscriber identity (TMS1) number from the cellular mobile device present in the smart environment, wherein the cellular mobile device requests for a handover with a virtual base transceiver station associated with the smart environment; and
requesting for the IMSI number from the cellular mobile device for authenticating the handover.

5. The method as claimed in claim 4 further comprising comparing the IMSI number with a
plurality of IMSI numbers.
6. The method as claimed in claim 1 further comprising:
determining whether the user is a registered user; and registering the user based on the determining.
7. A computing device for providing context based services, the computing device
comprising:
a processor (202); and
a memory (206) coupled to the processor (202), the memory (206) comprising,
an identification module (112) configured to identify a user present in a smart environment (100) based at least on a user identification code corresponding to the user, wherein the user identification code is one of an international mobile subscriber identity (IMSI) number and an international mobile equipment identity (1ME1) number; and
a context based services module (110) configured to provide at least one context based service selected from a plurality of context based services based on the identification.
8. The computing device as claimed in claim 7 further comprising a registration module (212)
configured to:
determine whether the user is a registered user; and registering the user based on the determining.
9. The computing device as claimed in claim 7, wherein the identification module (112) is
configured to compare the IMSI number with a plurality of IMSI numbers listed in an IMS! register (216), to identify the user.

10. A system comprising:
a virtual base transceiver station unit (108) configured to determine a user identification code corresponding to a user present in a smart environment (100); and
a context based services module (110) configured to provide at least one context based service from among a plurality of context based services based on the determination.
11. The system as claimed in claim 10, wherein the virtual base transceiver station unit (108)
is configured to:
determine attributes of a plurality of base transceiver stations serving in vicinity of the smart environment (100); and
create a virtual cell around the system, v/herein the virtual cell has attributes different from the determined attributes.
12. The system as claimed in claim 10 further comprising an identification module (112)
configured to identify the user based at least on the user identification code corresponding
to the user.

Documents

Orders

Section Controller Decision Date

Application Documents

# Name Date
1 3289-MUM-2010-FORM 26(16-12-2010).pdf 2010-12-16
1 3289-MUM-2010-RELEVANT DOCUMENTS [26-09-2023(online)].pdf 2023-09-26
2 3289-MUM-2010-FORM 1(16-12-2010).pdf 2010-12-16
2 3289-MUM-2010-RELEVANT DOCUMENTS [27-09-2022(online)].pdf 2022-09-27
3 3289-MUM-2010-RELEVANT DOCUMENTS [28-09-2021(online)].pdf 2021-09-28
3 3289-MUM-2010-CORRESPONDENCE(16-12-2010).pdf 2010-12-16
4 3289-MUM-2010-RELEVANT DOCUMENTS [29-03-2020(online)].pdf 2020-03-29
4 3289-MUM-2010-RELEVANT DOCUMENTS [19-02-2018(online)]_164.pdf 2018-02-19
5 3289-MUM-2010-RELEVANT DOCUMENTS [19-02-2018(online)].pdf 2018-02-19
5 3289-MUM-2010-IntimationOfGrant08-04-2019.pdf 2019-04-08
6 3289-MUM-2010-PETITION UNDER RULE 137 [19-02-2018(online)]_163.pdf 2018-02-19
6 3289-MUM-2010-PatentCertificate08-04-2019.pdf 2019-04-08
7 3289-MUM-2010-Written submissions and relevant documents (MANDATORY) [19-03-2019(online)].pdf 2019-03-19
7 3289-MUM-2010-PETITION UNDER RULE 137 [19-02-2018(online)].pdf 2018-02-19
8 3289-MUM-2010-OTHERS [22-02-2018(online)].pdf 2018-02-22
8 3289-MUM-2010-Correspondence to notify the Controller (Mandatory) [13-02-2019(online)].pdf 2019-02-13
9 3289-MUM-2010-FER_SER_REPLY [22-02-2018(online)].pdf 2018-02-22
9 3289-MUM-2010-HearingNoticeLetter.pdf 2019-01-29
10 3289-mum-2010-abstract.pdf 2018-08-10
10 3289-MUM-2010-CORRESPONDENCE [22-02-2018(online)].pdf 2018-02-22
11 3289-mum-2010-claims.pdf 2018-08-10
11 3289-MUM-2010-COMPLETE SPECIFICATION [22-02-2018(online)].pdf 2018-02-22
12 3289-MUM-2010-CLAIMS [22-02-2018(online)].pdf 2018-02-22
12 3289-MUM-2010-CORRESPONDENCE(18-8-2011).pdf 2018-08-10
13 3289-mum-2010-correspondence.pdf 2018-08-10
13 abstract1.jpg 2018-08-10
14 3289-mum-2010-description(complete).pdf 2018-08-10
14 3289-MUM-2010-ORIGINAL UNDER RULE 6 (1A)-FORM 1-270218.pdf 2018-08-10
15 3289-mum-2010-drawing.pdf 2018-08-10
15 3289-mum-2010-form 5.pdf 2018-08-10
16 3289-MUM-2010-FER.pdf 2018-08-10
16 3289-mum-2010-form 3.pdf 2018-08-10
17 3289-mum-2010-form 2.pdf 2018-08-10
17 3289-mum-2010-form 1.pdf 2018-08-10
18 3289-MUM-2010-FORM 18(18-8-2011).pdf 2018-08-10
18 3289-mum-2010-form 2(title page).pdf 2018-08-10
19 3289-MUM-2010-FORM 18(18-8-2011).pdf 2018-08-10
19 3289-mum-2010-form 2(title page).pdf 2018-08-10
20 3289-mum-2010-form 1.pdf 2018-08-10
20 3289-mum-2010-form 2.pdf 2018-08-10
21 3289-MUM-2010-FER.pdf 2018-08-10
21 3289-mum-2010-form 3.pdf 2018-08-10
22 3289-mum-2010-drawing.pdf 2018-08-10
22 3289-mum-2010-form 5.pdf 2018-08-10
23 3289-MUM-2010-ORIGINAL UNDER RULE 6 (1A)-FORM 1-270218.pdf 2018-08-10
23 3289-mum-2010-description(complete).pdf 2018-08-10
24 3289-mum-2010-correspondence.pdf 2018-08-10
24 abstract1.jpg 2018-08-10
25 3289-MUM-2010-CLAIMS [22-02-2018(online)].pdf 2018-02-22
25 3289-MUM-2010-CORRESPONDENCE(18-8-2011).pdf 2018-08-10
26 3289-mum-2010-claims.pdf 2018-08-10
26 3289-MUM-2010-COMPLETE SPECIFICATION [22-02-2018(online)].pdf 2018-02-22
27 3289-mum-2010-abstract.pdf 2018-08-10
27 3289-MUM-2010-CORRESPONDENCE [22-02-2018(online)].pdf 2018-02-22
28 3289-MUM-2010-FER_SER_REPLY [22-02-2018(online)].pdf 2018-02-22
28 3289-MUM-2010-HearingNoticeLetter.pdf 2019-01-29
29 3289-MUM-2010-Correspondence to notify the Controller (Mandatory) [13-02-2019(online)].pdf 2019-02-13
29 3289-MUM-2010-OTHERS [22-02-2018(online)].pdf 2018-02-22
30 3289-MUM-2010-Written submissions and relevant documents (MANDATORY) [19-03-2019(online)].pdf 2019-03-19
30 3289-MUM-2010-PETITION UNDER RULE 137 [19-02-2018(online)].pdf 2018-02-19
31 3289-MUM-2010-PETITION UNDER RULE 137 [19-02-2018(online)]_163.pdf 2018-02-19
31 3289-MUM-2010-PatentCertificate08-04-2019.pdf 2019-04-08
32 3289-MUM-2010-RELEVANT DOCUMENTS [19-02-2018(online)].pdf 2018-02-19
32 3289-MUM-2010-IntimationOfGrant08-04-2019.pdf 2019-04-08
33 3289-MUM-2010-RELEVANT DOCUMENTS [29-03-2020(online)].pdf 2020-03-29
33 3289-MUM-2010-RELEVANT DOCUMENTS [19-02-2018(online)]_164.pdf 2018-02-19
34 3289-MUM-2010-RELEVANT DOCUMENTS [28-09-2021(online)].pdf 2021-09-28
34 3289-MUM-2010-CORRESPONDENCE(16-12-2010).pdf 2010-12-16
35 3289-MUM-2010-RELEVANT DOCUMENTS [27-09-2022(online)].pdf 2022-09-27
35 3289-MUM-2010-FORM 1(16-12-2010).pdf 2010-12-16
36 3289-MUM-2010-FORM 26(16-12-2010).pdf 2010-12-16
36 3289-MUM-2010-RELEVANT DOCUMENTS [26-09-2023(online)].pdf 2023-09-26

Search Strategy

1 3289mum2010searchstrategy_11-08-2017.pdf

ERegister / Renewals

3rd: 08 Jun 2019

From 02/12/2012 - To 02/12/2013

4th: 08 Jun 2019

From 02/12/2013 - To 02/12/2014

5th: 08 Jun 2019

From 02/12/2014 - To 02/12/2015

6th: 08 Jun 2019

From 02/12/2015 - To 02/12/2016

7th: 08 Jun 2019

From 02/12/2016 - To 02/12/2017

8th: 08 Jun 2019

From 02/12/2017 - To 02/12/2018

9th: 08 Jun 2019

From 02/12/2018 - To 02/12/2019

10th: 08 Jun 2019

From 02/12/2019 - To 02/12/2020

11th: 11 Nov 2020

From 02/12/2020 - To 02/12/2021

12th: 15 Nov 2021

From 02/12/2021 - To 02/12/2022

13th: 01 Dec 2022

From 02/12/2022 - To 02/12/2023

14th: 27 Nov 2023

From 02/12/2023 - To 02/12/2024

15th: 29 Nov 2024

From 02/12/2024 - To 02/12/2025