US20200186381A1 - Tailoring the availability of network resources to on-demand, user proximity, and schedule time - Google Patents

Tailoring the availability of network resources to on-demand, user proximity, and schedule time Download PDF

Info

Publication number
US20200186381A1
US20200186381A1 US16/794,724 US202016794724A US2020186381A1 US 20200186381 A1 US20200186381 A1 US 20200186381A1 US 202016794724 A US202016794724 A US 202016794724A US 2020186381 A1 US2020186381 A1 US 2020186381A1
Authority
US
United States
Prior art keywords
home network
state
network device
user
switch
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/794,724
Inventor
Bernie Crump
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mobilem2m Inc
Original Assignee
Mobilem2m Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mobilem2m Inc filed Critical Mobilem2m Inc
Priority to US16/794,724 priority Critical patent/US20200186381A1/en
Assigned to MobileM2M Incorporated reassignment MobileM2M Incorporated ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CRUMP, BERNIE
Publication of US20200186381A1 publication Critical patent/US20200186381A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2816Controlling appliance services of a home automation network by calling their functionalities
    • H04L12/2818Controlling appliance services of a home automation network by calling their functionalities from a device located outside both the home and the home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information

Definitions

  • This disclosure relates to a home network security device, and more specifically, this disclosure relates to a nominally off smart-switch-controlled network device.
  • IP Internet Protocol
  • IOT internet of things
  • One of the best ways to secure a home network is to limit the time in which the network is on. By doing this, the threat vector service area of the network is narrowed and the time that the end users can have their activities monitored by 3 rd parties is limited. This reduces the window of ability for connected devices in the home to collect and report information, (i.e. spy), on the end user to only the time that the end user requires network services.
  • each device added to the home network requires the end user to accept the manufacturers' terms and conditions. These contractual requirements often include permission to monitor how the end user uses the equipment and to share that information with third parties. While the end user may user the device a few hours per week, the device “uses” the user twenty four hours per day.
  • a device for controlling a duration in which a home network device is on comprises of an AC input port for receiving AC power.
  • An AC output port is adapted to receive an AC power cord of the home network device.
  • a switch is provided for controlling the AC power to the home network device and switching the home network device between an on state and an off state.
  • a processor is in communication with the switch for controlling the on state and the off state of the home network device in response to one of three predetermined conditions.
  • the device can be configured responsive to three predetermined conditions comprising: (1) a geofencing area in which a user of the home network device resides wherein when the user is in the geofencing area the home network device is in the on state; (2) a scheduled time in which the home network device is in the on state; and (3) an on demand in which the home network device is in the on state.
  • the device can be in communication with a mobile device that is associated with the user over a communication network for determining a geolocation of the user for determining whether the user is in the geofencing area.
  • the device can be adapted to receive an on demand signal from the mobile device to switch the home network device to the on state.
  • the device can be provided with memory for storing scheduled time instructions for the home network device in the on state.
  • the switch for controlling the AC power to the home network device can be configured in a normally off state.
  • the device can include a geo-positioning sensor for determining a location of the device.
  • a communication network card for connecting the device to a communication network can also be provided.
  • the preferred communication network is a cellular network.
  • the device can also be provided with a network interface card for connecting the device to the home network device.
  • the device can be configured to communicate to the user (i) whether the home network device is in the on state, (ii) whether the home network device is connected to an internet service provider network, and (iii) whether the device is connected to the home network device over a home network provided by the home network device.
  • FIG. 1 is a detailed block diagram of a nominally off smart switch-controlled network with the telephony network connection.
  • FIG. 2 is a detailed block diagram of the smart switch of FIG. 1 .
  • FIG. 3 shows a connection between the mobile device with interactive touch screen control for the smart switch of FIG. 1 .
  • FIG. 4 shows an example of the network device control section on the interactive touch screen of the mobile device of FIG. 1 .
  • FIG. 5 shows another example of the network device control section on the interactive touch screen of the mobile device of FIG. 1 .
  • FIG. 6 shows yet another example of the network device control section on the interactive touch screen of the mobile device of FIG. 1 .
  • FIG. 7 shows a trust level matrix for the network device control section on the interactive touch screen of the mobile device of FIG. 1 .
  • FIG. 8 shows a flow chart for the logic flow of the system.
  • FIG. 1 shown is a detailed block diagram of a nominally off smart switch-controlled network with the telephony network connection.
  • the user may have one or more network devices connected to a home network 102 that connects to the internet 109 through a router 104 connected to a modem 106 .
  • the internet appliances can connect to router 104 in either a wired or wireless connection.
  • Router 104 and modem 106 can be any type of network gateway, which acts as an entrance to the internet 109 through ISP 110 , and may include devices such as a combination of a router and a high-speed modem, including a DSL modem and a cable modem, among others.
  • Router 104 may be a stand-alone device or integrated into the high-speed modem 106 .
  • Smart switch 100 is an electronic device configured with a network access system for connecting to internet 109 through router 104 .
  • Smart switch 100 is also configured with a cellular access system for connecting to a cellular network 113 .
  • smart switch 100 is connected between an AC power source 114 and an AC power cord for router 104 receiving AC power from AC power source 114 and providing AC power to router 104 .
  • smart switch 100 gives user-control over router 104 between an on state and an off state, which in turn disables home network 102 .
  • FIG. 2 shows smart switch 100 .
  • Smart switch 100 can comprise a chipset 200 comprising a processor 202 , a system memory 204 , network interface 206 , a cellular chip 208 and one or more software applications and drivers to enable the functions described below.
  • the hardware system includes a standard I/O bus with I/O Ports such as a GPS chip 210 a power switch controller 212 and mass storage 214 coupled thereto. GPS chip 210 could be used for determining and informing of the location of smart switch 100 . This could be used as an extra layer of security to inform the user if smart switch is moved (which could be especially useful if smart switch 100 is implemented in router 104 .
  • Network interfaces 206 are used to provide communication between a CPU 205 and the internet and cellular networks.
  • Mass storage 312 can be used to provide permanent storage for the data and programming instructions to perform the above described functions implementing, whereas system memory 204 (e.g., DRAM) can be used to provide temporary storage for the data and programming instructions when executed by processor 205 .
  • CPU 205 may include a variety of system architectures, and various components of CPU 104 may be rearranged. Furthermore, certain implementations of the claimed embodiments may not require nor include all of the above components.
  • Power switch 217 is a normally open switch controlled by processor 205 . Based on user-defined instructions, power switch 217 can be closed to permit the flow of AC power from AC source 114 to router 104 . The specifics of these user-defined instructions will be discussed in more detail below.
  • Smart switch 100 can be use its cellular chip 208 to communicate with the user through a mobile device 300 .
  • Mobile device 300 can be any suitable mobile device that may communicate with cellular chip 208 in smart switch 100 , such as a mobile phone, a tablet, or a laptop computer.
  • mobile device 300 can comprise a mobile application 302 that communicates with a webserver 112 ( FIG. 1 ) for providing instructions to smart switch 100 , such as one or more predetermined conditions for switching smart switch 100 to the on state to enable router 104 .
  • These predetermined conditions can include (i) a geofencing area in which a user of the home network device resides wherein when the user is in the geofencing area the home network device is in the on state; (ii) a scheduled time in which the home network device is in the on state; and (iii) an on demand in which the home network device is in the on state.
  • FIGS. 4-5 show a display of the geofencing interface, which can be displayed on mobile device 300 or on a web interface or both.
  • a geofence 304 is defined as a perimeter around the user's home 306 .
  • One or more mobile devices 300 a, 300 b associated with the user and family are associated with the network.
  • router 104 is off. This corresponds with a presumption that no one is at the home/office so the network is not needed.
  • router 104 is on.
  • the on/off trigger for this implementation can work in the following manner.
  • the location of smart switch 100 is roughly determined by one of three ways, by the cell tower it is connected to, the signal strength of the other cell towers it can “see”, and by the identifiable WiFi networks it can “see”.
  • Smart switch 100 can be located in the center of geofence 304 .
  • Mobile application 302 can be configured to send updates to webserver 112 when mobile device 302 enters or leaves geofence 304 .
  • Webserver 112 can also be set up such that if the location/address entered by the user is inconsistent with the radius location data provided by the cellular carrier for the tower, the address is not accepted and the user will be prompted to correct the address.
  • Webserver 112 can push the geofence data to mobile devices 300 a, 300 b when mobile application 302 registers with webserver 112 and if the geofence information changes (i.e. the appliance is moved).
  • Mobile devices 300 a, 300 b send updates of their location to webserver 112 so that webserver 112 will notify smart switch 100 to turn off when all of the associated mobile devices 300 a, 300 b leave the perimeter of geofence 304 , and, conversely, to turn on when one of the associated mobile devices 300 a, 300 b enters the perimeter of geofence 304 .
  • FIG. 6 shows a scheduler implementation which can be presented by webserver 112 for the user to schedule the time in which router 104 is in the on state.
  • the user can set the weekday hours and the weekend hours for router 104 to be in the on state and also set a warning notice to alert the user before router 104 switches states.
  • One of the functions of the schedule timer is to keep router 104 off in the hours that the end user is sleeping.
  • the appliance clock is set by the local cell tower via the same mechanism that sets the time on mobile device 300 . Smart switch 100 disconnects the AC power to router 104 on/off at the appropriate times.
  • smart switch 100 can alert the end user with an audible chime and blinking lights. Additionally, any associated mobile device 300 inside of geofence 304 will also chime.
  • the schedule switch to off can be suspended by the end user by pressing button 220 on smart switch 100 or on mobile application 302 . If the end user suspends the scheduled switch to off, the scheduled switch to off can be ignored. The remainder of the schedule is unchanged, and this process will repeat with the next scheduled off period.
  • These scheduling instructions can be stored in memory 204 of smart switch 100 or externally on webserver 112 .
  • the user can change the status of the network in one or more of the three ways: 1) by pressing button 220 on smart switch 100 , by (2) by selecting a virtual button on the web application, or (3) by selecting a virtual button on mobile device 300 running mobile application 302 .
  • the network can also be shut off through a digital assistant API (Google Home, Amazon Alexa, Apple Siri) or by audibly requesting “it's Off Hours”.
  • Smart switch 100 performs at least three authentication functions. First, smart switch 100 can communicate to mobile device 300 whether router 104 is in the on state. This informs the user that yes, AC power is applied to router 104 . Second, smart switch 100 can inform the user whether router 104 is connected to internet 109 . Third, smart switch 100 can inform the user whether smart switch 100 is connected to router 104 through home network 102 . This informs the user whether router 104 is broadcasting. All three authentication functions together provide valuable information to the user. Smart switch 100 effectively becomes a network sensor, tuned to the end user network (SSID & Network Credentials). Moreover, unlike other smart switches, smart switch 100 provides two-way communication over a communication network with both mobile device 300 and router 104 to provide the user with accurate information about the state of router 104 .
  • SSID & Network Credentials tuned to the end user network
  • FIG. 7 shows another implementation where the user can set a level of trust that limits ability of switch 100 to interact with home network 102 and with the outside world through out-of-band communications.
  • a level of trust that limits ability of switch 100 to interact with home network 102 and with the outside world through out-of-band communications.
  • Four levels of trust can be used. The lowest level prohibits all communications to and from switch 100 , to the highest level where the user provides all network credentials to allow switch 100 to connect to home network 102 .
  • Trust levels act as follows:
  • Trust 1: Enables out-of-band communications only; switch 100 does not connect to home network 102 , which limits switch 100 to only confirm whether the AC power is switched to power output 216 so that router 104 is receiving AC power.
  • Trust 2: Out-of-band communications plus enables switch 100 to listen for a specific wireless network SSID from router 104 without connecting to home network 102 , which tells the appliance the SSID to be monitored, but the system does not request the password, and switch 100 can notify the user when the SSID of router 104 begins broadcasting but cannot confirm that router 104 has successfully connected to the internet.
  • Trust 3: Out-of-band communications, plus permission to connect to home network 102 , which enables switch 100 to report when power is applied to router 104 , when the home network 102 becomes active, and when there is a connection to internet 109 .
  • FIG. 8 shows a flow chart for the logic flow of the system that implements smart switch 100 .
  • the method begins at 800 with a determination of whether the geofence is empty at step 802 . If the geofence is not empty meaning that there is a mobile device 300 in geofence 304 , the method proceeds to determine whether the schedule timer is on at 804 , then whether the schedule timer is off at 806 , and then whether button 220 is off at 808 . If the determination of all of these steps is a negative and button 220 is on at determination step 810 , router 104 is set to on at step 812 . The method continues with determining whether the Wi-Fi is detected at step 814 and whether the Wi-Fi is connected at step 816 .
  • step 814 If the answer is in the affirmative for both steps 814 and 816 , the method repeats. If the answer to either of these determinations is the negative, an alarm is sent in step 818 , and then the method repeats. Returning to steps 802 through 806 , if the answer to either of these determinations is these affirmative, the method continues with further determinations on whether to set router 104 to on at step 812 . If the geofence is empty at step 802 , the method progresses to determine whether button 220 is set to on at step 820 . If the schedule timer is on at step 804 , the method progresses to determine whether the geofence is empty at step 822 .
  • the method progresses to determine whether button 220 is on at step 824 . If button 220 is set to off at steps 820 or 824 or the geofence is determined empty at step 822 , the method progresses to determine whether the always on is set at step 826 , and, if so, the method progresses to set router 104 on at step 812 . On the other hand, if the answer is no, router 104 is set to off at step 828 .
  • the foregoing system and method offers significant advantages over the prior art.
  • the time that mobile devices can “spy” on the end user is reduced to only when the user is on the mobile device. This is because the threat vector service area of the network is narrowed and the time that the end users can have their activities monitored by 3 rd parties is limited. Accordingly, the window of ability for connected devices in the home to collect and report information, (i.e. spy), on the end user is narrowed to only the time that the end user requires network services. Also, the likelihood that connected devices in the home will be discovered and infected by worm/bot distributed viruses is also reduced.
  • the processing system switch 100 can include, for example, at least one processor and at least one memory device or subsystem.
  • the processing system can also include or be coupled to one or more databases for receiving and storing data.
  • the term “processor” as generally used herein refers to any logic processing unit, such as one or more central processing units (CPUs), digital signal processors (DSPs), application-specific integrated circuits (ASIC), etc.
  • the processor and memory can be monolithically integrated onto a single chip, distributed among a number of chips or components, and/or provided by some combination of algorithms.
  • the methods described herein can be implemented in one or more of software algorithm(s), programs, firmware, hardware, components, circuitry, in any combination.
  • Communication paths couple the components and include any medium for communicating or transferring files among the components.
  • the communication paths include wireless connections, wired connections, and hybrid wireless/wired connections.
  • the communication paths also include couplings or connections to networks including local area networks (LANs), metropolitan area networks (MANs), wide area networks (WANs), proprietary networks, interoffice or backend networks, and the Internet.
  • LANs local area networks
  • MANs metropolitan area networks
  • WANs wide area networks
  • proprietary networks interoffice or backend networks
  • the Internet and the Internet.
  • the communication paths include removable fixed mediums like floppy disks, hard disk drives, and CD-ROM disks, as well as flash RAM, Universal Serial Bus (USB) connections, RS-232 connections, telephone lines, buses, and electronic mail messages.
  • USB Universal Serial Bus
  • aspects of the systems and methods described herein may be implemented as functionality programmed into any of a variety of circuitry, including programmable logic devices (PLDs), such as field programmable gate arrays (FPGAs), programmable array logic (PAL) devices, electrically programmable logic and memory devices and standard cell-based devices, as well as application specific integrated circuits (ASICs).
  • PLDs programmable logic devices
  • FPGAs field programmable gate arrays
  • PAL programmable array logic
  • ASICs application specific integrated circuits
  • microcontrollers with memory such as electronically erasable programmable read only memory (EEPROM)
  • embedded microprocessors firmware, software, etc.
  • aspects of the systems and methods described herein may be embodied in microprocessors having software-based circuit emulation, discrete logic (sequential and combinatorial), custom devices, fuzzy (neural) logic, quantum devices, and hybrids of any of the above device types.
  • the underlying device technologies may be provided in a variety of component types, e.g., metal-oxide semiconductor field-effect transistor (MOSFET) technologies like complementary metal-oxide semiconductor (CMOS), bipolar technologies like emitter-coupled logic (ECL), polymer technologies (e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures), mixed analog and digital, etc.
  • MOSFET metal-oxide semiconductor field-effect transistor
  • CMOS complementary metal-oxide semiconductor
  • ECL emitter-coupled logic
  • polymer technologies e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures
  • mixed analog and digital etc.
  • any system, method, and/or other components disclosed herein may be described using computer aided design tools and expressed (or represented), as data and/or instructions embodied in various computer-readable media, in terms of their behavioral, register transfer, logic component, transistor, layout geometries, and/or other characteristics.
  • Computer-readable media in which such formatted data and/or instructions may be embodied include, but are not limited to, non-volatile storage media in various forms (e.g., optical, magnetic or semiconductor storage media) and carrier waves that may be used to transfer such formatted data and/or instructions through wireless, optical, or wired signaling media or any combination thereof.
  • Examples of transfers of such formatted data and/or instructions by carrier waves include, but are not limited to, transfers (uploads, downloads, e-mail, etc.) over the Internet and/or other computer networks via one or more data transfer protocols (e.g., HTTP, FTP, SMTP, etc.).
  • data transfer protocols e.g., HTTP, FTP, SMTP, etc.
  • a processing entity e.g., one or more processors
  • processors within the computer system in conjunction with execution of one or more other computer programs.
  • mobile device 300 can be any of a number and/or combination of devices selected from among personal computers, personal digital assistants, portable computing devices, and portable communication devices, but is not so limited.
  • the processing system can include components within a larger computer system.
  • Network interfaces 206 are used to provide communication between a CPU 205 and the internet and cellular networks.
  • Mass storage 312 can be used to provide permanent storage for the data and programming instructions to perform the above described functions implementing, whereas system memory 204 (e.g., DRAM) can be used to provide temporary storage for the data and programming instructions when executed by processor 205 .
  • CPU 205 may include a variety of system architectures, and various components of CPU 104 may be rearranged. Furthermore, certain implementations of the claimed embodiments may not require nor include all of the above components.
  • the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in a sense of “including, but not limited to.” Words using the singular or plural number also include the plural or singular number respectively. Additionally, the words “herein,” “hereunder,” “above,” “below,” and words of similar import, when used in this application, refer to this application as a whole and not to any particular portions of this application. When the word “or” is used in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list and any combination of the items in the list.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A device comprises of an AC input port for receiving AC power. An AC output port is adapted to receive an AC power cord of the home network device. A switch is provided for controlling the AC power to the home network device and switching the home network device between an on state and an off state. A processor is in communication with the switch for controlling the on state and the off state of the home network device in response to one of three predetermined conditions.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • The present application is a continuation of U.S. patent application Ser. No. 16/364,692 filed Mar. 26, 2019 which application claims the benefit of U.S. Provisional Application No. 62/654,612 filed Apr. 9, 2018, the contents of which are incorporated herein by reference.
  • TECHNICAL FIELD
  • This disclosure relates to a home network security device, and more specifically, this disclosure relates to a nominally off smart-switch-controlled network device.
  • BACKGROUND INFORMATION
  • The home environment contains an increasing number of connected Internet Protocol (IP) enabled wired and wireless devices. These internet connected devices, include smart TVs, security cameras, smart locks, gaming consoles, smart thermostats. With the explosion of the internet of things (IOT) virtually every new home appliance has the ability to connect to the internet. While this can be especially useful and convenient, all of these connected devices can make one especially vulnerable to hackers and other threats.
  • One of the best ways to secure a home network is to limit the time in which the network is on. By doing this, the threat vector service area of the network is narrowed and the time that the end users can have their activities monitored by 3rd parties is limited. This reduces the window of ability for connected devices in the home to collect and report information, (i.e. spy), on the end user to only the time that the end user requires network services.
  • Typically, each device added to the home network requires the end user to accept the manufacturers' terms and conditions. These contractual requirements often include permission to monitor how the end user uses the equipment and to share that information with third parties. While the end user may user the device a few hours per week, the device “uses” the user twenty four hours per day.
  • By limiting the time the network is on also reduces the likelihood that connected devices in the home will be discovered and infected by worm/bot distributed viruses. It also decreases the threat vector service area of the end user network to malicious hacking attacks and reduces the opportunity for government agencies or any 3rd party to use network traffic, wired or wireless, to surveil end user activities to only the time that the end user requires network services, and limits the ability of non-authorized users to access the network to only the times that the end user desires network services.
  • Accordingly, there is a need for a device that provides user-control of the home network to keep the network nominally off except during user-defined conditions.
  • SUMMARY
  • In accordance with one aspect of the present invention, disclosed is a device for controlling a duration in which a home network device is on. The device comprises of an AC input port for receiving AC power. An AC output port is adapted to receive an AC power cord of the home network device. A switch is provided for controlling the AC power to the home network device and switching the home network device between an on state and an off state. A processor is in communication with the switch for controlling the on state and the off state of the home network device in response to one of three predetermined conditions.
  • The device can be configured responsive to three predetermined conditions comprising: (1) a geofencing area in which a user of the home network device resides wherein when the user is in the geofencing area the home network device is in the on state; (2) a scheduled time in which the home network device is in the on state; and (3) an on demand in which the home network device is in the on state. The device can be in communication with a mobile device that is associated with the user over a communication network for determining a geolocation of the user for determining whether the user is in the geofencing area. In such an instance, the device can be adapted to receive an on demand signal from the mobile device to switch the home network device to the on state. The device can be provided with memory for storing scheduled time instructions for the home network device in the on state. And, the switch for controlling the AC power to the home network device can be configured in a normally off state.
  • In one implementation, the device can include a geo-positioning sensor for determining a location of the device. A communication network card for connecting the device to a communication network can also be provided. In some implementations, the preferred communication network is a cellular network. The device can also be provided with a network interface card for connecting the device to the home network device.
  • The device can be configured to communicate to the user (i) whether the home network device is in the on state, (ii) whether the home network device is connected to an internet service provider network, and (iii) whether the device is connected to the home network device over a home network provided by the home network device.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other features and advantages of the present invention will be better understood by reading the following detailed description, taken together with the drawings wherein:
  • FIG. 1 is a detailed block diagram of a nominally off smart switch-controlled network with the telephony network connection.
  • FIG. 2 is a detailed block diagram of the smart switch of FIG. 1.
  • FIG. 3 shows a connection between the mobile device with interactive touch screen control for the smart switch of FIG. 1.
  • FIG. 4 shows an example of the network device control section on the interactive touch screen of the mobile device of FIG. 1.
  • FIG. 5 shows another example of the network device control section on the interactive touch screen of the mobile device of FIG. 1.
  • FIG. 6 shows yet another example of the network device control section on the interactive touch screen of the mobile device of FIG. 1.
  • FIG. 7 shows a trust level matrix for the network device control section on the interactive touch screen of the mobile device of FIG. 1.
  • FIG. 8 shows a flow chart for the logic flow of the system.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • Referring to FIG. 1, shown is a detailed block diagram of a nominally off smart switch-controlled network with the telephony network connection. In the home, the user may have one or more network devices connected to a home network 102 that connects to the internet 109 through a router 104 connected to a modem 106. The internet appliances can connect to router 104 in either a wired or wireless connection. Router 104 and modem 106 can be any type of network gateway, which acts as an entrance to the internet 109 through ISP 110, and may include devices such as a combination of a router and a high-speed modem, including a DSL modem and a cable modem, among others. Router 104 may be a stand-alone device or integrated into the high-speed modem 106.
  • One such appliance connected to home network 102 is a smart switch 100. Smart switch 100 is an electronic device configured with a network access system for connecting to internet 109 through router 104. Smart switch 100 is also configured with a cellular access system for connecting to a cellular network 113. In one implementation, smart switch 100 is connected between an AC power source 114 and an AC power cord for router 104 receiving AC power from AC power source 114 and providing AC power to router 104. In this configuration, smart switch 100 gives user-control over router 104 between an on state and an off state, which in turn disables home network 102.
  • FIG. 2 shows smart switch 100. Smart switch 100 can comprise a chipset 200 comprising a processor 202, a system memory 204, network interface 206, a cellular chip 208 and one or more software applications and drivers to enable the functions described below. The hardware system includes a standard I/O bus with I/O Ports such as a GPS chip 210 a power switch controller 212 and mass storage 214 coupled thereto. GPS chip 210 could be used for determining and informing of the location of smart switch 100. This could be used as an extra layer of security to inform the user if smart switch is moved (which could be especially useful if smart switch 100 is implemented in router 104.
  • Elements of computer hardware system perform their conventional functions known in the art. In particular, network interfaces 206 are used to provide communication between a CPU 205 and the internet and cellular networks. Mass storage 312 can be used to provide permanent storage for the data and programming instructions to perform the above described functions implementing, whereas system memory 204 (e.g., DRAM) can be used to provide temporary storage for the data and programming instructions when executed by processor 205. CPU 205, it should be noted, may include a variety of system architectures, and various components of CPU 104 may be rearranged. Furthermore, certain implementations of the claimed embodiments may not require nor include all of the above components.
  • Power switch 217 is a normally open switch controlled by processor 205. Based on user-defined instructions, power switch 217 can be closed to permit the flow of AC power from AC source 114 to router 104. The specifics of these user-defined instructions will be discussed in more detail below.
  • Smart switch 100 can be use its cellular chip 208 to communicate with the user through a mobile device 300. Mobile device 300 can be any suitable mobile device that may communicate with cellular chip 208 in smart switch 100, such as a mobile phone, a tablet, or a laptop computer. As such, mobile device 300 can comprise a mobile application 302 that communicates with a webserver 112 (FIG. 1) for providing instructions to smart switch 100, such as one or more predetermined conditions for switching smart switch 100 to the on state to enable router 104. These predetermined conditions can include (i) a geofencing area in which a user of the home network device resides wherein when the user is in the geofencing area the home network device is in the on state; (ii) a scheduled time in which the home network device is in the on state; and (iii) an on demand in which the home network device is in the on state.
  • FIGS. 4-5 show a display of the geofencing interface, which can be displayed on mobile device 300 or on a web interface or both. In this implementation, a geofence 304 is defined as a perimeter around the user's home 306. One or more mobile devices 300 a, 300 b associated with the user and family are associated with the network. When geofence 304 is empty, i.e. both mobile devices 300 a, 300 b are outside the perimeter as shown in FIG. 5, router 104 is off. This corresponds with a presumption that no one is at the home/office so the network is not needed. Conversely, when one or more of the associated mobile devices 300 a, 300 b are inside the perimeter, router 104 is on. The on/off trigger for this implementation can work in the following manner.
  • The location of smart switch 100 is roughly determined by one of three ways, by the cell tower it is connected to, the signal strength of the other cell towers it can “see”, and by the identifiable WiFi networks it can “see”. Smart switch 100 can be located in the center of geofence 304. Mobile application 302 can be configured to send updates to webserver 112 when mobile device 302 enters or leaves geofence 304. Webserver 112 can also be set up such that if the location/address entered by the user is inconsistent with the radius location data provided by the cellular carrier for the tower, the address is not accepted and the user will be prompted to correct the address. Webserver 112 can push the geofence data to mobile devices 300 a, 300 b when mobile application 302 registers with webserver 112 and if the geofence information changes (i.e. the appliance is moved). Mobile devices 300 a, 300 b send updates of their location to webserver 112 so that webserver 112 will notify smart switch 100 to turn off when all of the associated mobile devices 300 a, 300 b leave the perimeter of geofence 304, and, conversely, to turn on when one of the associated mobile devices 300 a, 300 b enters the perimeter of geofence 304.
  • FIG. 6 shows a scheduler implementation which can be presented by webserver 112 for the user to schedule the time in which router 104 is in the on state. In this implementation, the user can set the weekday hours and the weekend hours for router 104 to be in the on state and also set a warning notice to alert the user before router 104 switches states. One of the functions of the schedule timer is to keep router 104 off in the hours that the end user is sleeping. The appliance clock is set by the local cell tower via the same mechanism that sets the time on mobile device 300. Smart switch 100 disconnects the AC power to router 104 on/off at the appropriate times.
  • A short period prior to a scheduled switch of the power to router 104 to off, smart switch 100 can alert the end user with an audible chime and blinking lights. Additionally, any associated mobile device 300 inside of geofence 304 will also chime. The schedule switch to off can be suspended by the end user by pressing button 220 on smart switch 100 or on mobile application 302. If the end user suspends the scheduled switch to off, the scheduled switch to off can be ignored. The remainder of the schedule is unchanged, and this process will repeat with the next scheduled off period. These scheduling instructions can be stored in memory 204 of smart switch 100 or externally on webserver 112.
  • In another implementation, the user can change the status of the network in one or more of the three ways: 1) by pressing button 220 on smart switch 100, by (2) by selecting a virtual button on the web application, or (3) by selecting a virtual button on mobile device 300 running mobile application 302. The network can also be shut off through a digital assistant API (Google Home, Amazon Alexa, Apple Siri) or by audibly requesting “it's Off Hours”.
  • Smart switch 100 performs at least three authentication functions. First, smart switch 100 can communicate to mobile device 300 whether router 104 is in the on state. This informs the user that yes, AC power is applied to router 104. Second, smart switch 100 can inform the user whether router 104 is connected to internet 109. Third, smart switch 100 can inform the user whether smart switch 100 is connected to router 104 through home network 102. This informs the user whether router 104 is broadcasting. All three authentication functions together provide valuable information to the user. Smart switch 100 effectively becomes a network sensor, tuned to the end user network (SSID & Network Credentials). Moreover, unlike other smart switches, smart switch 100 provides two-way communication over a communication network with both mobile device 300 and router 104 to provide the user with accurate information about the state of router 104.
  • FIG. 7 shows another implementation where the user can set a level of trust that limits ability of switch 100 to interact with home network 102 and with the outside world through out-of-band communications. Four levels of trust can be used. The lowest level prohibits all communications to and from switch 100, to the highest level where the user provides all network credentials to allow switch 100 to connect to home network 102. Trust levels act as follows:
  • Trust=0: Disables all communications from switch 100.
  • Trust=1: Enables out-of-band communications only; switch 100 does not connect to home network 102, which limits switch 100 to only confirm whether the AC power is switched to power output 216 so that router 104 is receiving AC power.
  • Trust=2: Out-of-band communications plus enables switch 100 to listen for a specific wireless network SSID from router 104 without connecting to home network 102, which tells the appliance the SSID to be monitored, but the system does not request the password, and switch 100 can notify the user when the SSID of router 104 begins broadcasting but cannot confirm that router 104 has successfully connected to the internet.
  • Trust=3: Out-of-band communications, plus permission to connect to home network 102, which enables switch 100 to report when power is applied to router 104, when the home network 102 becomes active, and when there is a connection to internet 109.
  • FIG. 8 shows a flow chart for the logic flow of the system that implements smart switch 100. The method begins at 800 with a determination of whether the geofence is empty at step 802. If the geofence is not empty meaning that there is a mobile device 300 in geofence 304, the method proceeds to determine whether the schedule timer is on at 804, then whether the schedule timer is off at 806, and then whether button 220 is off at 808. If the determination of all of these steps is a negative and button 220 is on at determination step 810, router 104 is set to on at step 812. The method continues with determining whether the Wi-Fi is detected at step 814 and whether the Wi-Fi is connected at step 816. If the answer is in the affirmative for both steps 814 and 816, the method repeats. If the answer to either of these determinations is the negative, an alarm is sent in step 818, and then the method repeats. Returning to steps 802 through 806, if the answer to either of these determinations is these affirmative, the method continues with further determinations on whether to set router 104 to on at step 812. If the geofence is empty at step 802, the method progresses to determine whether button 220 is set to on at step 820. If the schedule timer is on at step 804, the method progresses to determine whether the geofence is empty at step 822. If the schedule timer is off at step 806, the method progresses to determine whether button 220 is on at step 824. If button 220 is set to off at steps 820 or 824 or the geofence is determined empty at step 822, the method progresses to determine whether the always on is set at step 826, and, if so, the method progresses to set router 104 on at step 812. On the other hand, if the answer is no, router 104 is set to off at step 828.
  • The foregoing system and method offers significant advantages over the prior art. By limiting the time that the network 102 is on, the time that mobile devices can “spy” on the end user is reduced to only when the user is on the mobile device. This is because the threat vector service area of the network is narrowed and the time that the end users can have their activities monitored by 3rd parties is limited. Accordingly, the window of ability for connected devices in the home to collect and report information, (i.e. spy), on the end user is narrowed to only the time that the end user requires network services. Also, the likelihood that connected devices in the home will be discovered and infected by worm/bot distributed viruses is also reduced.
  • Those skilled in the art will recognize that one or more components of the systems and methods for switch 100 can comprise any collection of processor-based devices or computing devices operating together, or components of processing systems or devices, as is known in the art. The processing system switch 100 can include, for example, at least one processor and at least one memory device or subsystem. The processing system can also include or be coupled to one or more databases for receiving and storing data. The term “processor” as generally used herein refers to any logic processing unit, such as one or more central processing units (CPUs), digital signal processors (DSPs), application-specific integrated circuits (ASIC), etc. The processor and memory can be monolithically integrated onto a single chip, distributed among a number of chips or components, and/or provided by some combination of algorithms. The methods described herein can be implemented in one or more of software algorithm(s), programs, firmware, hardware, components, circuitry, in any combination.
  • The components of any system that include the systems and methods herein described can be located together or in separate locations. Communication paths couple the components and include any medium for communicating or transferring files among the components. The communication paths include wireless connections, wired connections, and hybrid wireless/wired connections. The communication paths also include couplings or connections to networks including local area networks (LANs), metropolitan area networks (MANs), wide area networks (WANs), proprietary networks, interoffice or backend networks, and the Internet. Furthermore, the communication paths include removable fixed mediums like floppy disks, hard disk drives, and CD-ROM disks, as well as flash RAM, Universal Serial Bus (USB) connections, RS-232 connections, telephone lines, buses, and electronic mail messages.
  • Aspects of the systems and methods described herein may be implemented as functionality programmed into any of a variety of circuitry, including programmable logic devices (PLDs), such as field programmable gate arrays (FPGAs), programmable array logic (PAL) devices, electrically programmable logic and memory devices and standard cell-based devices, as well as application specific integrated circuits (ASICs). Some other possibilities for implementing aspects of the systems and methods of monitoring a subject in a premises and corresponding systems and methods include: microcontrollers with memory (such as electronically erasable programmable read only memory (EEPROM)), embedded microprocessors, firmware, software, etc. Furthermore, aspects of the systems and methods described herein may be embodied in microprocessors having software-based circuit emulation, discrete logic (sequential and combinatorial), custom devices, fuzzy (neural) logic, quantum devices, and hybrids of any of the above device types. Of course the underlying device technologies may be provided in a variety of component types, e.g., metal-oxide semiconductor field-effect transistor (MOSFET) technologies like complementary metal-oxide semiconductor (CMOS), bipolar technologies like emitter-coupled logic (ECL), polymer technologies (e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures), mixed analog and digital, etc.
  • It should be noted that any system, method, and/or other components disclosed herein may be described using computer aided design tools and expressed (or represented), as data and/or instructions embodied in various computer-readable media, in terms of their behavioral, register transfer, logic component, transistor, layout geometries, and/or other characteristics. Computer-readable media in which such formatted data and/or instructions may be embodied include, but are not limited to, non-volatile storage media in various forms (e.g., optical, magnetic or semiconductor storage media) and carrier waves that may be used to transfer such formatted data and/or instructions through wireless, optical, or wired signaling media or any combination thereof. Examples of transfers of such formatted data and/or instructions by carrier waves include, but are not limited to, transfers (uploads, downloads, e-mail, etc.) over the Internet and/or other computer networks via one or more data transfer protocols (e.g., HTTP, FTP, SMTP, etc.). When received within a computer system via one or more computer-readable media, such data and/or instruction-based expressions of the above described components may be processed by a processing entity (e.g., one or more processors) within the computer system in conjunction with execution of one or more other computer programs.
  • It should also be noted that mobile device 300 can be any of a number and/or combination of devices selected from among personal computers, personal digital assistants, portable computing devices, and portable communication devices, but is not so limited. The processing system can include components within a larger computer system.
  • Elements of computer hardware system perform their conventional functions known in the art. In particular, network interfaces 206 are used to provide communication between a CPU 205 and the internet and cellular networks. Mass storage 312 can be used to provide permanent storage for the data and programming instructions to perform the above described functions implementing, whereas system memory 204 (e.g., DRAM) can be used to provide temporary storage for the data and programming instructions when executed by processor 205. CPU 205, it should be noted, may include a variety of system architectures, and various components of CPU 104 may be rearranged. Furthermore, certain implementations of the claimed embodiments may not require nor include all of the above components.
  • Unless the context clearly requires otherwise, throughout the description and the claims, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in a sense of “including, but not limited to.” Words using the singular or plural number also include the plural or singular number respectively. Additionally, the words “herein,” “hereunder,” “above,” “below,” and words of similar import, when used in this application, refer to this application as a whole and not to any particular portions of this application. When the word “or” is used in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list and any combination of the items in the list.
  • While the principles of the invention have been described herein, it is to be understood by those skilled in the art that this description is made only by way of example and not as a limitation as to the scope of the invention. Other embodiments are contemplated within the scope of the present invention in addition to the exemplary embodiments shown and described herein. Modifications and substitutions by one of ordinary skill in the art are considered to be within the scope of the present invention, which is not to be limited except by the following claims.

Claims (19)

We claim:
1. A device for controlling a duration in which a home network device is on, the device comprising:
an AC input port for receiving AC power;
an AC output port adapted to receive an AC power cord of the home network device;
a switch for controlling the AC power to the home network device and switching the home network device between an on state and an off state; and
a processor in communication with the switch for controlling the on state and the off state of the home network device in response to one of three predetermined conditions.
2. The device of claim 1, wherein the three predetermined conditions comprise:
a geofencing area in which a user of the home network device resides wherein when the user is in the geofencing area the home network device is in the on state;
a scheduled time in which the home network device is in the on state; and
an on demand in which the home network device is in the on state.
3. The device of claim 2, wherein the device is in communication with a mobile device that is associated with the user over a communication network for determining a geolocation of the user for determining whether the user is in the geofencing area.
4. The device of claim 3, wherein the device is adapted to receive an on demand signal from the mobile device to switch the home network device to the on state.
5. The device of claim 4, and further comprising memory for storing scheduled time instructions for the home network device in the on state.
6. The device of claim 5, wherein the switch for controlling the AC power to the home network device is in a normally off state.
7. The device of claim 6, and further comprising a geo-positioning sensor for determining a location of the device.
8. The device of claim 7, and further comprising a communication network card for connecting the device to a communication network.
9. The device of claim 8, wherein the communication network is a cellular network.
10. The device of claim 7, and further comprising a network interface card for connecting the device to the home network device.
11. The device of claim 1, wherein the device communicates to a user (i) whether the home network device is in the on state, (ii) whether the home network device is connected to an internet service provider network, and (iii) whether the device is connected to the home network device over a home network provided by the home network device.
12. A method for controlling a duration in which a home network device is on, the method comprising:
receiving AC power from an AC input port;
providing an AC output port for an AC power cord of a home network device;
switching the home network device between an on state and an off state in response to one of three predetermined conditions.
13. The method of claim 12, wherein one of three predetermined conditions comprises of determining whether a geofence area has a preconfigured mobile device therein, and, if so, switching the home network device to an on state.
14. The method of claim 12, wherein one of three predetermined conditions comprises determining whether a schedule timer is on, and, if so, switching the home network device to an on state.
15. The method of claim 12, wherein one of three predetermined conditions comprises determining whether a button is set to on, and, if so, switching the home network device to an on state.
16. The method of claim 12, and further comprising providing a device for switching the home network device between the on state and the off state.
17. The method of claim 16, and further comprising communicating with the device to a mobile device that is associated with a user over a communication network for determining a geolocation of the user for determining whether the user is in a geofencing area; and wherein, receiving with the device an on demand signal from the mobile device to switch the home network device to the on state; and wherein, storing scheduled time instructions for the home network device in the on state.
18. The method of claim 16, and further comprising determining a location of the device with a geo-positioning sensor and connecting the device to a communication network.
19. The method of claim 16, and further comprising communicating to a user (i) whether the home network device is in the on state, (ii) whether the home network device is connected to an internet service provider network, and (iii) whether the device is connected to the home network device over a home network provided by the home network device.
US16/794,724 2018-04-09 2020-02-19 Tailoring the availability of network resources to on-demand, user proximity, and schedule time Abandoned US20200186381A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/794,724 US20200186381A1 (en) 2018-04-09 2020-02-19 Tailoring the availability of network resources to on-demand, user proximity, and schedule time

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201862654612P 2018-04-09 2018-04-09
US16/364,692 US10608836B2 (en) 2018-04-09 2019-03-26 Tailoring the availability of network resources to on-demand, user proximity, and schedule time
US16/794,724 US20200186381A1 (en) 2018-04-09 2020-02-19 Tailoring the availability of network resources to on-demand, user proximity, and schedule time

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US16/364,692 Continuation US10608836B2 (en) 2018-04-09 2019-03-26 Tailoring the availability of network resources to on-demand, user proximity, and schedule time

Publications (1)

Publication Number Publication Date
US20200186381A1 true US20200186381A1 (en) 2020-06-11

Family

ID=68099123

Family Applications (2)

Application Number Title Priority Date Filing Date
US16/364,692 Expired - Fee Related US10608836B2 (en) 2018-04-09 2019-03-26 Tailoring the availability of network resources to on-demand, user proximity, and schedule time
US16/794,724 Abandoned US20200186381A1 (en) 2018-04-09 2020-02-19 Tailoring the availability of network resources to on-demand, user proximity, and schedule time

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US16/364,692 Expired - Fee Related US10608836B2 (en) 2018-04-09 2019-03-26 Tailoring the availability of network resources to on-demand, user proximity, and schedule time

Country Status (1)

Country Link
US (2) US10608836B2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10608836B2 (en) * 2018-04-09 2020-03-31 MobileM2M Incorporated Tailoring the availability of network resources to on-demand, user proximity, and schedule time

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160321325A1 (en) * 2015-04-29 2016-11-03 Xiaomi Inc. Method, device, and storage medium for adaptive information
US20180191517A1 (en) * 2017-01-03 2018-07-05 Brilliant Home Technology, Inc. Home device controller with touch control grooves
US20190004486A1 (en) * 2017-06-29 2019-01-03 David R. Hall Power Drop Assembly with Processor and Memory
US10608836B2 (en) * 2018-04-09 2020-03-31 MobileM2M Incorporated Tailoring the availability of network resources to on-demand, user proximity, and schedule time

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140098247A1 (en) 1999-06-04 2014-04-10 Ip Holdings, Inc. Home Automation And Smart Home Control Using Mobile Devices And Wireless Enabled Electrical Switches
US20040103153A1 (en) 2002-11-21 2004-05-27 Chang Tsung-Yen Dean Apparatus and method for providing smart network appliances

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160321325A1 (en) * 2015-04-29 2016-11-03 Xiaomi Inc. Method, device, and storage medium for adaptive information
US20180191517A1 (en) * 2017-01-03 2018-07-05 Brilliant Home Technology, Inc. Home device controller with touch control grooves
US20190004486A1 (en) * 2017-06-29 2019-01-03 David R. Hall Power Drop Assembly with Processor and Memory
US10608836B2 (en) * 2018-04-09 2020-03-31 MobileM2M Incorporated Tailoring the availability of network resources to on-demand, user proximity, and schedule time

Also Published As

Publication number Publication date
US20190312748A1 (en) 2019-10-10
US10608836B2 (en) 2020-03-31

Similar Documents

Publication Publication Date Title
US11765585B2 (en) Techniques for enabling computing devices to identify when they are in proximity to one another
US9882912B2 (en) System and method for providing authentication service for internet of things security
RU2651800C1 (en) Method and device connection status checking
US7769394B1 (en) System and method for location-based device control
US8432267B2 (en) Method and apparatus to remotely set alarms on a mobile device
US10045327B2 (en) Mobile communication device monitoring systems and methods
JP5611338B2 (en) Providing security for virtual mobile devices
AU2018337982B2 (en) Contraband detection through smart power components
US9730075B1 (en) Systems and methods for detecting illegitimate devices on wireless networks
US20160261606A1 (en) Location-based network security
TW201717088A (en) Dynamic honeypot system
CN105205388B (en) A kind of right management method and system of application program
WO2019237813A1 (en) Method and device for scheduling service resource
US11711395B2 (en) User-determined network traffic filtering
CN110622539A (en) Detecting a fake cell tower
CN109743294A (en) Interface access control method, device, computer equipment and storage medium
US9622081B1 (en) Systems and methods for evaluating reputations of wireless networks
US20230098097A1 (en) Cross platform credential sharing
US20200186381A1 (en) Tailoring the availability of network resources to on-demand, user proximity, and schedule time
CN105488678A (en) Payment behavior information acquisition method and system
Jansen et al. A location-based mechanism for mobile device security
US11811817B2 (en) SSL proxy whitelisting
US11838399B2 (en) Anonymous aggregation service for sensitive data
CN115186254A (en) Data access control method and device and terminal equipment
CN113365272A (en) Method and system for preventing network from being rubbed

Legal Events

Date Code Title Description
AS Assignment

Owner name: MOBILEM2M INCORPORATED, IOWA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CRUMP, BERNIE;REEL/FRAME:051859/0173

Effective date: 20190315

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION