Sign In to Follow Application
View All Documents & Correspondence

"System And Method For Analysis In Behavioral Patterns Of Indoor Location Tracking Data"

Abstract: A method and a system for tracking and analyzing signals and patterns within a small communication range, said method comprising generating signals from a plurality of sending devices; receiving the generated signals on a receiving device; converting the signals into data; pushing the converted data to a server; analyzing the data on the server; and sending alerts to end user.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
11 December 2015
Publication Number
03/2018
Publication Type
INA
Invention Field
BIO-MEDICAL ENGINEERING
Status
Email
archana@anandandanand.com
Parent Application
Patent Number
Legal Status
Grant Date
2024-08-27
Renewal Date

Applicants

EVOXYZ TECHNOLOGIES PVT. LTD.
22 A, Ground Floor, Tower B2, Spaze i-Tech Park, Sector 49, Sohna Road, Gurgaon – 122001, India
BHATNAGAR SHILPA MAHNA
Evoxyz Technologies Pvt. Ltd., 22 A, Ground Floor, Tower B2, Spaze i-Tech Park, Sector 49, Sohna Road, Gurgaon – 122001, India
SINGH ABHISHEK KUMAR
Evoxyz Technologies Pvt. Ltd., 22 A, Ground Floor, Tower B2, Spaze i-Tech Park, Sector 49, Sohna Road, Gurgaon – 122001, India

Inventors

1. BHATNAGAR SHILPA MAHNA
Evoxyz Technologies Pvt. Ltd., 22 A, Ground Floor, Tower B2, Spaze i-Tech Park, Sector 49, Sohna Road, Gurgaon – 122001, India
2. SINGH ABHISHEK KUMAR
Evoxyz Technologies Pvt. Ltd., 22 A, Ground Floor, Tower B2, Spaze i-Tech Park, Sector 49, Sohna Road, Gurgaon – 122001, India

Specification

Technical Field
The present inventions discloses analysis of behavioural patterns of indoor location tracking data of
students in real time for security incident detection in school or any such premises.
Background
The solutions for location tracking are available in the prior art and also for use in schools. For
example
US Patent Pub No: US 2011/0314094 A1 – describes provision of detection of user location in a
school using geo-positioning system [Para 0039]
US Patent Pub No: US 2009/0197234 A1 – describes the provision of Parent/Student Portal for
sharing of information related to schools with the parents through a portal UI. [Para 0036]
US Patent Pub No: US20120258669 A1 – describes use of Bluetooth Low Energy as a base technology
for positioning related information
US Patent Pub No: CA2831534 A1 – describes a system of monitoring or locating a child using a
smart phone
However, there was a need to provide for behaviour analysis including outlier detection in a small
communication range for tracking individuals, performance evaluation, security lapse and efficiency
improvement within buildings, malls or similar organisations operating from a bounded area.
Summary
The following presents a simplified summary of one or more embodiments in order to
provide a basic understanding of such embodiments. This summary is not an extensive overview of
all contemplated embodiments, and is intended to neither identify key or critical elements of all
embodiments nor delineate the scope of any or all embodiments. Its sole purpose is to present some
concepts of one or more embodiments in a simplified form as a prelude to the more detailed
description that is presented later.
The present invention describes a method and a system for tracking and analyzing signals within a
small wireless communication range, identifying patterns and anomalies and taking context based
actions, the method comprising generating signals from a plurality of end devices; receiving the
generated signals on plurality of receiving devices; converting the signals into data on the receiving
devices; pushing the converted data to a server; analyzing the data on the server, deriving pattern
3
and outliers; making decisions based on detected pattern and outliers ; and taking actions on the
decision made .
The signals are transmitted from the end device in all directions comprises attaching wireless tags on
a user. The signals are generated on a receiving device comprise scanning the transmitted wireless
signal strength of the end device. The signals are converted into data comprising recording readings
of plurality of scanned signals transmitted from the end device to receiving device, to server using
wireless signal strength; storage of the signal strength readings in the server; and determining an
instantaneous averaged signal strength value. The data on the server is analysed using location
information followed by generating base behavioral pattern; and detection of anomalies or outliers.
The location information is analysed by determining the location of the end device within the indoor
map based on wireless signal strength values. The base behavioral pattern is generated by storing
the location of plurality of the end devices in fixed intervals of time by the server; determining the
stay time of each end device assigning a stay threshold criteria within the communication range
based on time or/and assigning a stay threshold criteria within the communication range based on a
particular location zone. The threshold criteria within the communication range is calculated based
on its historical data and the data of its peers. The stay time of the end device is compared to the
threshold criteria. The anomaly or outlier are detected by determining the deviation based on the
comparison of stay time of the end device and the threshold criteria. The decision making process
and implementing the decision is communicated to the interested entity.
The present invention , using location tracking data of children in a bounded area, and comparing
the data with a reference data set or data set of other children, unique patterns can be identified
which are useful for child behaviour analysis and especially, child security. For example, if a child is
spending significantly more time in the washroom than other children, there could be an issue
related to child security and this information can be used to generate alerts and prevent child abuse.
In one of the embodiments, the present invention specifically provides, a method for tracking and
analyzing signals and patterns within a small communication range, said method comprising
generating signals from a plurality of sending devices; receiving the generated signals on a receiving
device; converting the signals into data; pushing the converted data to a server; analyzing the data
on the server; and sending alerts to end user.
In another embodiment, the present invention, a system for tracking and analyzing signals and
patterns within a small communication range, said system comprising sending device configured to
4
generate signals; receiving device configured to receive the generated signals from the sending
device;
converter configured to convert the signals into data; transmitting unit configured to push the
converted data to a server; analyzer configured to analyze the data on the server; and notifier
configured to send alerts to the end use.
The invention includes but is not limited to be extended to adult individuals, including, but not
limited to staff of the organization, where their location tracking data can be used to find outliers to
provide inputs to management for staff performance, tracking for security incidents and
improvement in efficiency as well. The present invention deploys an innovative indoor positioning,
tracking and monitoring system for students in schools or similar premises.
Each student is provided a sending device, which keeps broadcasting its unique id periodically over a
short distance communication protocol such as Bluetooth Low Energy. There are receiving devices
installed all over the building, which scans the signal strength from the sending device of each
student and transfer it to the server using an HTTP Push request. For calculating the signal strength
which is to be sent to the server, the receiving device maintains a cache of last N signal strength
readings and does a running average on them to get an instantaneous averaged signal strength
value.
The server has pre-provisioned indoor maps for the area in which this system is deployed. It ingests
the RSSI (Received Signal Strength Indicator) from each receiving device for each sending device.
Based on triangulation algorithms, it attempts to determine the location of the sending device (and
hence the student) within the indoor map based on the RSSI values. The server records the location
every few seconds, it also runs an anomaly detection on the location of a child with the past
location data and the current data of their group. Typically, there should not be any anomaly found
and the students in a class should always be together during school hours. However, if an anomaly is
determined, and it lasts for more than a specified time, the server assumes this a security incident
and warns the school principal, caretaker and teacher over their mobile applications and SMS to look
into the situation.
The same invention can be used in different environments including play areas, and also for adult
individuals for staff tracking, performance evaluation and efficiency improvement within buildings,
malls or similar organizations operating from a bounded area.
5
For purposes of summarizing, certain aspects, advantages, and novel features of the disclosure have
been described herein. It is to be understood that not necessarily all such advantages may be
achieved in accordance with any one particular embodiment of the disclosure. Thus, the present
disclosure may be embodied or carried out in a manner that achieves or optimizes one advantage or
group of advantages as taught herein without necessarily achieving other advantages as may be
taught suggested herein.
The present invention with an objective to obviate above mentioned and many other disadvantages,
by providing a method for recording of indoor location data and its analysis including outlier
analysis.
All the embodiments as herein described with respect to the present invention are applicable to the
method and the corresponding system.
Thus, every embodiment and related feature of the instant invention is equally implementable via a
system as well as a corresponding method detailing the steps as described and claimed.
These and other embodiments of the present disclosure will also become readily apparent to those
skilled in the art from the following detailed description of the embodiments having reference to the
attached figures, the disclosure not being limited to any particular embodiments disclosed.
Brief Description of the Drawings
To facilitate this disclosure being understood and put into practice by persons of ordinary skill in the
art, reference is now made to exemplary embodiments as illustrated by reference to the
accompanying figures. Like reference numbers refer to identical or functionally similar elements
throughout the accompanying figures. The figures along with the detailed description are
incorporated and form pari of the specification and serve lo further illustrate exemplary
embodiments and explain various principles and advantages, in accordance with in this disclosure,
where:
6
Figure 1 illustrates the algorithm to perform the invention in a preferred manner depicting the basic
flow of usage of location information for use of behavioral analysis, outlier detection, generating
statistics and sending out alerts.
Figure 2 illustrates a block diagram of the system.
Figure 3 exemplifies a preferred embodiment of the invention and depicts the flow and processing
of location information for behavioral analysis and provision of the location information to stake
holders.
Detailed Description
Exemplary embodiments now will be described with reference to the accompanying drawings. The
disclosure may, however, be embodied in many different forms and should not be construed as
limited to the embodiments set forth herein; rather, these embodiments are provided so that this
disclosure will be thorough and complete, and will fully convey its scope to those skilled in the art.
The terminology used in the detailed description of the particular exemplary embodiments
illustrated in the accompanying drawings is not intended to be limiting. In the drawings, like
numbers refer to like elements.
The specification may refer to “an”, “one” or “some” embodiment(s) in several locations. This does
not necessarily imply that each such reference is to the same embodiment(s), or that the feature
only applies to a single embodiment. Single features of different embodiments may also be
combined to provide other embodiments.
As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as
well, unless expressly stated otherwise. It will be further understood that the terms “includes”,
“comprises”, “including” and/or “comprising” when used in this specification, specify the presence
of stated features, integers, steps, operations, elements, and/or components, but do not preclude
the presence or addition of one or more other features, integers, steps, operations, elements,
components, and/or groups thereof. It will be understood that when an element is referred to as
being “connected” or “coupled” to another element, it can be directly connected or coupled to the
other element or intervening elements may be present. Furthermore, “connected” or “coupled” as
used herein may include operatively connected or coupled. As used herein, the term “and/or”
includes any and all combinations and arrangements of one or more of the associated listed items.
7
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the
same meaning as commonly understood by one of ordinary skill in the art to which this disclosure
pertains. It will be further understood that terms, such as those defined in commonly used
dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the
context of the relevant art and will not be interpreted in an idealized or overly formal sense unless
expressly so defined herein.
The figures depict a simplified structure only showing some elements and functional entities, all
being logical units whose implementation may differ from what is shown. The connections shown
are logical connections; the actual physical connections may be different. It is apparent to a person
skilled in the art that the structure may also comprise other functions and structures. It should be
appreciated that the functions, structures, elements and the protocols used in communication are
irrelevant to the present disclosure. Therefore, they need not be discussed in more detail here.
For the most part, the operations described herein are operations performed by a network, device,
router device, computer or a machine, or in some embodiments in conjunction with a human
operator or user that interacts with the computer or the machine. The programs, modules,
processes, methods, data, and the like, described herein are but an exemplary implementation and
are not related, or limited, to any particular computer, apparatus, or computer language. Rather,
various types of general purpose computing machines or devices may be used with programs
constructed in accordance with the teachings described herein.
A non- limiting embodiment of the process of the present invention has been illustrated in Figure 1.
Figure 1 illustrates flow of usage of location information for use of behavioral analysis, outlier
detection, generating statistics and sending out alerts (100). The term sending device and end device
have been used interchangeably throughout the specification. Sending device has been used
interchangeably with tracking device and receiving device has been used interchangeably with
location readers. Location information of the wireless tags worn by the user are located on an entity
that needs to be tagged. In one of the preferred embodiment of the present invention, the tag is
inside the sending device. The sending device broadcasts signals in all directions in a given small
communications range (up to 100 m) using Bluetooth Low Energy (101). The receiver receives signals
(102). After the reception of signals, the signal strength of the transmitted signals are scanned (103)
and determine the location of the sending device . The receiving device maintains a cache of signal
strength readings in the storage unit and an average of signal strength values is determined by the
8
calculator. The scanned signals are converted into data on to the receiver (104) followed by
recording the readings of the transmitted signals (105). The signal strength is then stored in the
server (106). An average signal strength is calculated at any instant of time (107). Average signal
strength value is pushed to the server by the transmitting unit using HTTP push Request. The signal
strength value is analyzed by the analyzer and the average signal strength value is mapped to the
indoor map stored in the server. The analysis is accomplished using triangulation algorithm on the
indoor map values to find the location of the sending device.
The data on the server is analyzed (108) which includes but is not limited to analyzing location
information, generating base behavioral pattern and detection of anomalies or outliers. Analyzing
location information constitutes but is not limited to attempting to determine the location of the
end device within the indoor map based on wireless signal strength values (109). Generating base
behavioural pattern constitutes string the location of many devices in the fixed intervals by the
server, determining the stay time of each device, assigning a stay threshold criteria within the
communication range based on time and/or assigning a stay threshold criteria within the
communication range based on a particular location. The threshold criteria within the
communication range is calculated based on its historical data and the date of its peers. The stay
time of the end device is compared to the threshold criteria. The anomaly is then detected by
determining the deviation based on the comparison of stay time of the end device and the threshold
criteria. The decision making process and its implementation is communication to the interested
party or entity.
The location information of all tags is analyzed, which helps to generate base behavioral patterns
using the past location data, along with other static information. This information which is fed into
the system forms a baseline to be used during analysis of the subsequent location information.
Complete information, generated patterns and generated information for future use is stored in the
server. The average signal strength data is also mapped to base behavior patterns generated using
past location data of sending device. A threshold is determined by the anomaly detector for
permissible time of stay in the communication range). If an anomaly is detected i.e. if the user stays
in a particular area more than the threshold time the server assumes this as a security lapse and an
alert is notified.
9
Figure 2 illustrates a block diagram of the system (200) according to an embodiment of the present
disclosure. The terms receiving device and the receiver have been used interchangeably throughout
the specification As shown in the figure, the system consists of a end device (201) which transmits
the signals, receiver (208) which captures the signals transmitted by the sending device(201),
convertor (203) which converts the signals , the server (204)). The end device, the receiver and the
server are interconnected by communication path of link (202). The system also comprises a
converter (204), a transmitting unit (205), the analyzer( 206) and the notifier (207). the converter
scans the signals from the sending device (201), maintains a cache of signal strengths captured by
the receiving device (208) and determines the average of all the signal strength readings . A
transmitting unit (205) which pushes the calculated average of the signal strength values to the
server by HTTP push Request. The analyzer (206) analyses the signal strength values. The location
information of all tags is analyzed in location analyzer (206), which helps to generate base behavioral
patterns. A notifier (207) communicates information to the interested party or entity.
A preferred embodiment of the invention has been presented in Figure 3.Figure 3 illustrates the flow
and processing of location information for behavioral analysis and provision of the location
information to stake holders (300). It highlights the location information transmitted from tags
worn by students/individuals to wireless reader’s location inside the premises (1). The system uses
Bluetooth low energy to detect the user’s location from the readers. Further it illustrates, the
location information transmitted from readers to a server either locally or on the network (2). The
location information can be provided to parents and school authorities (3) and the location data
analysis, behavioral and outlier analysis can be transmitted to the authorized personnel for actions.
The outlier analysis are provided in different formats, including but not limiting to graphs, alerts with
notifications and SMS (4). The system provides outlier analysis in behavioral patterns of indoor
location tracking data of students in real time for security lapse detection in school.
This also depicts a generic system, which can be used to locate and monitor the position of any low
velocity article in confined spaces over any short distance communication protocol. The
implementation over Bluetooth Low Energy is just a sample implementation.To overcome the
problem of reliability of sending devices an approach of estimating the current location of these low
velocity articles over short distances in confined environment using a hybrid approach of ageing and
averaging of signal strength is used.
• Multiple readings are taken at the receiving device and a running average is done to smooth
out the readings.
10
• A reading from a reader is aged out every D duration in case new reading is not received in
that time.
Based on the insight provided by the system application can be built
• To detect anomalies in the behavior of the children
• To detect issues in the location of the children so that security incidents can be prevented or
proved
It should be understood that embodiments of the present disclosure may be included in various
types of communication networks intended to be within the scope of the present disclosure,
although not limited to, embodiments The terms “network” and “systems” are often used
interchangeably.
A person ordinary skilled in the art within the purview of the instant invention may note that a for
the sake of clarity and for effectively appreciating the technical contribution of the instant invention,
few existing proposed solutions are provided herewith that are briefly described with reference to
drawings.
It will be apparent to those having ordinary skill in this art that various modifications and variations
may be made to the embodiments disclosed herein, consistent with the present disclosure, without
departing from the spirit and scope of the present invention.
Other embodiments consistent with the present disclosure will become apparent from consideration
of the specification and the practice of the description disclosed herein.

We claim
1. A method for tracking and analyzing signals within a small wireless communication range, identifying
patterns and anomalies and taking context based actions, the method comprising
generating signals from a plurality of end devices;
receiving the generated signals on plurality of receiving devices;
converting the signals into data on the receiving devices;
pushing the converted data to a server;
analyzing the data on the server, deriving pattern and outliers;
making decisions based on detected pattern and outliers ; and
taking actions on the decision made .
2. The method as claimed in claim 1, wherein the step of generating signals comprise transmitting signals
from the end device in all directions comprises attaching wireless tags on a user.
3. The method as claimed in claim 1, wherein the step of receiving the generated signals on a receiving
device comprise scanning the transmitted wireless signal strength of the end device.
4. The method as claimed in claim 1, wherein converting the signals into data comprises
recording readings of plurality of scanned signals transmitted from the end device to receiving device, to
server using wireless signal strength;
storage of the signal strength readings in the server; and
determining an instantaneous averaged signal strength value.
5. The method as claimed in claim 1, wherein the step of analyzing the data on the server comprises
analyzing the location information;
generating base behavioral pattern; and
detection of anomalies or outliers.
6. The method as claimed in claim 5, wherein the step of analyzing the location information comprises
attempting to determine the location of the end device within the indoor map based on wireless signal
strength values.
7. The method as claimed in claim 6, wherein indoor map is contained in the server.
8. The method as claimed in claim 7, wherein the step of generating base behavioral pattern comprises
storing the location of plurality of the end devices in fixed intervals of time by the server;
determining the stay time of each end device
assigning a stay threshold criteria within the communication range based on time
or/and
assigning a stay threshold criteria within the communication range based on a particular location
12
zone
9. The method as claimed in claim 8, wherein the threshold criteria within the communication range is
calculated based on its historical data and the data of its peers.
10. The method as claimed in claim 9, wherein the stay time of the end device is compared to the threshold
criteria.
11. The method as claimed in claim 9, wherein the step of detection of anomaly or outlier comprises of
determining the deviation based on the comparison of stay time of the end device and the threshold
criteria
12. The method as claimed in claim 1, wherein the step of making decisions and taking actions to enable flow
of information to interested entity.
13. A system for tracking and analyzing signals within a small wireless communication range, identifying
patterns and anomalies and taking context based actions, the system comprising
end devices;
receiver;
the server;
the communication path between the end devices, receiver and the server;
14. A system as claimed in claim 13, comprising wherein the end device is configured to generate signals;
15. A system as claimed in claim 13, wherein the receiving device configured to receive the generated signals
from the end device;
16. A system as claimed in claim 13, comprising a converter configured to convert the signals into data;
17. A system as claimed in claim 13, comprising transmitting unit configured to push the converted data to a
server;
18. A system as claimed in claim 13, comprising an analyzer configured to analyze the data on the server; and
19. A system as claimed in claim 13, comprising a notifier configured to communicate information to
interested entity;

Documents

Application Documents

# Name Date
1 Form 3 [11-12-2015(online)].pdf 2015-12-11
2 Drawing [11-12-2015(online)].pdf 2015-12-11
3 Description(Provisional) [11-12-2015(online)].pdf 2015-12-11
4 OTHERS [08-12-2016(online)].pdf 2016-12-08
5 Drawing [08-12-2016(online)].pdf 2016-12-08
6 Description(Complete) [08-12-2016(online)].pdf_112.pdf 2016-12-08
7 Description(Complete) [08-12-2016(online)].pdf 2016-12-08
8 4068-DEL-2015-FORM 18 [09-12-2019(online)].pdf 2019-12-09
9 4068-DEL-2015-FER.pdf 2021-11-02
10 4068-DEL-2015-FORM 4(ii) [02-05-2022(online)].pdf 2022-05-02
11 4068-DEL-2015-OTHERS [02-08-2022(online)].pdf 2022-08-02
12 4068-DEL-2015-FER_SER_REPLY [02-08-2022(online)].pdf 2022-08-02
13 4068-DEL-2015-CLAIMS [02-08-2022(online)].pdf 2022-08-02
14 4068-DEL-2015-PatentCertificate27-08-2024.pdf 2024-08-27
15 4068-DEL-2015-IntimationOfGrant27-08-2024.pdf 2024-08-27

Search Strategy

1 SearchE_27-10-2021.pdf

ERegister / Renewals