Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD FOR MONITORING ELECTRONIC DEVICE ACTIVITY
Document Type and Number:
WIPO Patent Application WO/2020/237293
Kind Code:
A1
Abstract:
A method for monitoring electronic device activity. The method includes the steps of establishing a wireless connection between a user device and an administrator device, monitoring data of a user device, analysing the data for one or more substantial matches with one or more predefined criteria, and upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.

Inventors:
HAYES FIONA LEIGH
Application Number:
PCT/AU2020/050515
Publication Date:
December 03, 2020
Filing Date:
May 25, 2020
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
INTELLECTUAL PROPERTY HOLDINGS PTY LTD (AU)
International Classes:
G06Q10/10; G06F21/00; H04L29/02
Domestic Patent References:
WO2015095597A12015-06-25
Foreign References:
US10009480B22018-06-26
US8718633B22014-05-06
Attorney, Agent or Firm:
MICHAEL BUCK IP (AU)
Download PDF:
Claims:
CLAIMS

1. A method for monitoring electronic device activity, the method comprising the steps of:

establishing a wireless connection between a user device and an administrator device;

monitoring data of the user device;

analysing the data for one or more substantial matches with one or more predefined criteria; and

upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.

2. The method of claim 1 , wherein the data is associated with one or more applications of the user device.

3. The method of claim 1 or claim 2, wherein the data comprises communication data associated with a communication application and location data.

4. The method of claim 3, wherein the communication data comprises calling data and/or messaging data.

5. The method of claim 3 or claim 4, wherein the location data is associated with a location of the user device determined by a Global Positioning System (GPS) or cellular network.

6. The method of any one of claims 3-5, wherein the communication data comprises at least one text message, SMS message, image, MMS message, voice mail message, live voice communication, video or electronic message.

7. The method of any one of claims 1 -6, wherein the method comprises the further step of transmitting a description of the exact match or substantial match with the predefined criteria on the user device to the administrator device.

8. The method of any one of claims 1 -7, wherein the method comprises the further step of transmitting an image or video of the exact match or substantial match with the predefined criteria captured on the user device to the administrator device.

9. The method of any one of claims 1-8, wherein the data is associated with an interaction between the user device and a target device.

10. The method of any one of claims 1-9, wherein the data is associated with an incoming or outgoing communication.

11. The method of any one of claims 1 -10, the method comprising the further steps of:

transmitting an outgoing communication from the user device;

comparing the outgoing communication to a list of predefined text strings, images, audio clips, or video clips predetermined to the one or more predefined criteria; and

if an exact match or a substantial match is identified, transmitting the outgoing communication to the administrator device.

12. The method of any one of claims 1 -11 , the method comprising the further steps of:

receiving an incoming communication at the user device;

comparing the incoming communication to a list of predefined text strings, images, audio clips, or video clips predetermined to the one or more predefined criteria; and if an exact match or a substantial match is detected, transmitting the incoming communication to the administrator device.

13. The method of any one of claims 1 -12, wherein the one or more predefined criteria comprise one or more of a keyword, a combination of keywords, initiation of an application and detection of the user device within or outside of a predefined geographical area.

14. The method of any one of claims 1 -13, wherein the alert notification comprises a push message indicating a predefined criteria of the one or more predefined criteria has been detected on the user device.

15. The method of any one of claims 1 -14, wherein upon identification of the substantial match, the method comprises the further step of disabling or restricting one or more features of the user device.

16. The method of claim 15, wherein the administrator device remotely accesses the user device to disable or restrict the one or more features of the user device.

17. The method of any one of claims 1 -16, wherein upon identification of the at least one substantial match, the method comprises the further steps of remotely controlling the user device from the administrator device using the connection established between the administrator device and the user device.

18. A non-transitory computer-readable storage medium containing instructions executable by a processor, the non-transitory computer-readable storage medium storing instructions for:

establishing a wireless connection between a user device and an administrator device;

monitoring data of the user device; analysing the data for one or more substantial matches with one or more predefined criteria; and

upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.

19. A system for monitoring online communications, the system comprising:

an administrator device; and

a user device in wireless communication with the administrator device, wherein the user device is programmed to:

monitor data of the user device

analyse the data for one or more substantial matches with one or more predefined criteria; and

upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmit an alert notification to the

administrator device.

Description:
METHOD FOR MONITORING ELECTRONIC DEVICE ACTIVITY

FIELD OF THE INVENTION

[0001 ] The invention relates to a method for monitoring electronic device activity. In particular, the invention relates, but is not limited, to a method for monitoring electronic communications and activities to detect and prevent online bullying, anxiety, depression, online grooming, suicide and sexual explicit language.

BACKGROUND TO THE INVENTION

[0002] Reference to background art herein is not to be construed as an admission that such art constitutes common general knowledge.

[0003] Due to the multiple rapid advances in computer and telecommunications technologies in recent decades, the effects of bullying on individuals and in particular young children and teenagers, has been greatly intensified due to the “always connected” effect of such advances.

[0004] Before the proliferation of always on computer and mobile communications systems, bullying from others at school or in the workplace was often restricted to those areas. However, developments such as emails, SMS and social media websites (e.g. Facebook) expose individuals to potential bullying at all times. It is well known that this online bullying or“cyber bullying” can have considerable impact on an individual’s mental health and in some cases inducing or contributing to depression and suicidal reactions.

[0005] While efforts to curtail cyber bullying have been significant, such efforts can often be frustrated by a reluctance of victims to report such incidents. In addition, without evidence, it can be difficult to prove the bullying behaviour and the extent of the bullying behaviour.

OBJECT OF THE INVENTION

[0006] It is an aim of this invention to provide a method for monitoring online communications and electronic device activities which overcomes or ameliorates one or more of the disadvantages or problems described above, or which at least provides a useful commercial alternative.

[0007] Other preferred objects of the present invention will become apparent from the following description.

SUMMARY OF THE INVENTION

[0008] In one form, although it need not be the only or indeed the broadest form, there is provided a method for monitoring electronic device activity, the method comprising the steps of:

establishing communication between a user device and an administrator device;

monitoring data of a user device;

analysing the data for one or more substantial matches with one or more predefined criteria; and

upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.

[0009] Preferably, the method further comprises detecting at least one substantial match with one or more predefined criteria. [0010] Preferably, the data is associated with one or more applications of the user device. Preferably, the data comprises communication data associated with a communication application and/or location data. Preferably, the communication data comprises calling data and/or messaging data. Preferably, the location data is associated with a location of the user device determined by a GPS or cellular network.

[0011 ] Preferably, the communication data comprises at least one text message, SMS message, image, MMS message, voice mail message, live voice communication, video or electronic message.

[0012] Preferably, the data comprises activity data associated with an application installed on the user device.

[0013] Preferably, the method comprises the further step of transmitting a description of the exact match or substantial match with the predefined criteria on the user device to the administrator device.

[0014] Preferably, the method comprises the further step of transmitting an image or video of the exact match or substantial match with the predefined criteria captured on the user device to the administrator device.

[0015] Preferably, the data is associated with an interaction between a source device (the user device) and a target device. Preferably, the data is associated with an incoming or outgoing communication.

[0016] Preferably, communication between the administrator device and the user device is established by an application server.

[0017] Preferably, the data of the user device is transmitted to the application server, wherein the application server analyses the data for the one or more substantial matches with the one or more predefined criteria. [0018] Preferably, upon detection of at least one substantial match with at least one of the one or more predefined criteria on the user device, transmitting an alert notification from the application server to the administrator device

[0019] Preferably, the method comprises the further steps of:

transmitting an outgoing communication from the user device;

comparing the outgoing communication to a list of predefined text strings, images, audio clips, or video clips predetermined to be predefined criteria; and

if an exact match or a substantial match is identified, transmitting the outgoing communication to the administrator device.

[0020] Preferably, the method comprises the further steps of:

receiving an incoming communication at the user device;

comparing the incoming communication to a list of predefined text strings, images, audio clips, or video clips predetermined to be predefined criteria; and

if an exact match or a substantial match is detected, transmitting the incoming communication to the administrator device.

[0021 ] Preferably, the predefined criteria comprise one or more of a keyword, a combination of keywords, initiation of an application and detection of the user device within or outside of a predefined geographical area.

[0022] Preferably, the alert notification comprises a push message indicating a predefined criteria has been detected on the user device.

[0023] Preferably, upon identification of a substantial match, the method comprises the further step of disabling or restricting one or more features of the user device. Preferably, the administrator device remotely accesses the user device to disable or restrict the one or more features of the user device. In some embodiments, the application server communicates directly with an application installed on the user device and thereby effects operation and/or control of the user device. In some alternative embodiments, an updated device profile is pushed to the user device via a mobile device management (MDM) profile.

[0024] Preferably, upon identification of a substantial match, the method comprises the further steps of remotely controlling the user device from the administrator device using the link established between the administrator device and the user device.

[0025] Preferably, the connection comprises a wireless, data exchanging connection.

[0026] Preferably, the step of monitoring data of a user device further comprises monitoring data received by and/or sent from the user device.

[0027] In another form, the invention resides in a non-transitory computer- readable storage medium containing instructions executable by a processor, the non-transitory computer-readable storage medium storing instructions for: establishing a wireless connection between a user device and an administrator device;

monitoring data of a user device;

analysing the data for one or more substantial matches with one or more predefined criteria; and

upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device.

[0028] Preferably, the user device comprises a smartphone. Preferably, the administrator device comprises a smartphone. [0029] Preferably, the administrator device is in wireless communication or connection with a plurality of user devices.

[0030] In another form, the invention resides in a system for monitoring online communications, the system comprising: an administrator device; and a user device in wireless communication (or a wireless connection) with the administrator device, wherein the user device is programmed to: monitor data of the user device analysing the data for one or more substantial matches with one or more predefined criteria; and upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmit an alert notification to the

administrator device.

[0031 ] In another form, the invention provides a method for monitoring electronic device activity, the method comprising the steps of: establishing a wireless connection between a user device and an administrator device; monitoring data of a user device; analysing the data for one or more substantial matches with one or more predefined criteria; and upon detection of at least one substantial match with at least one of the one or more predefined criteria, transmitting an alert notification to the administrator device. BRIEF DESCRIPTION OF THE DRAWINGS

[0032] By way of example only, preferred embodiments of the invention will be described more fully hereinafter with reference to the accompanying figures, wherein:

[0033] FIG. 1 illustrates a schematic diagram of a system for monitoring electronic communications of user devices according to an embodiment of the invention;

[0034] FIG. 2 illustrates a block diagram of a method for monitoring electronic communications of user devices according to an embodiment of the invention; and

[0035] FIG. 3 illustrates a diagram of two electronic devices that can be used to implement the embodiments of the invention shown in FIG. 1 and FIG. 2.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0036] FIG. 1 shows a schematic diagram of a system 100 adapted to provide a service for monitoring electronic communications and activities conducted through smartphone applications and limit or prevent online bullying.

[0037] The illustrated system 100 includes an administrator device in the form of a parent device 105 having an administrator application 106, in the form of monitoring software, installed thereon, and user child devices 110a, 110b each having a monitoring application 111a, 111 b, also in the form of software installed thereon. The monitoring applications 111 a, 111 b installed on each user device 110a, 110b can be installed by downloading from an appropriate location (such as an application store or mirror), pushed from the administrator device 105 to each user device 110a, 110b over a network (such as a cellular network or WAN, for example) or can be integrated into the firmware or operating system of each user device 110a, 11 Ob.

[0038] In the illustrated embodiment, user device 110a, 110b is also in communication with an unmonitored device 115. Each of the devices described above are in communication with each relevant device over a network 120

[0039] In use, the parent device 105 establishes a connection with each of the user devices 110a, 110b having an instance of the monitoring application 111 a, 111 b installed which are to be monitored. The connection can be established by an application server 120 which stores and verifies user profiles 121 associated with specific devices (such as parent device 105 and user devices 110a, 1110b), wherein the user of parent device 105 logs into an account or profile stored on the application server 120 and adds the user devices 110a, 110b to the account to link the three devices 105, 110a, 110b together.

[0040] Once the link has been established between the parent device 105 and the user devices 110a, 110b via application server 120, data transmitted to and from each user device 110a, 110b is pushed to the application server 120 where the data may be monitored and analysed by the monitoring application 111 a, 111 b installed on each respective user device 110a, 110b and the application server 120 and application software 122 (see FIG. 3).

[0041 ] The analysis comprises finding exact matches and substantial matches of the data being transmitted to and/or from the device 110a, 110b (including from unmonitored device 115 and elsewhere) with one or more predefined criteria. Examples of predefined criteria can include predefined text strings included in SMS, emails, MMS or other electronic messages, images, audio clips, or video clips. However, it will be appreciated that the predefined criteria is not limited to text strings and can include a number of indicators or user configured filters. For example, in some embodiments, the monitoring application is configured to allow a user to define a dictionary of words, phrases (including slang terms and phrases, references to bullying, anxiety, depression, online grooming, suicide and sexual terms, for example) and elements (which can include location data, images, emojis, certain phone numbers/emails/accounts, etc.) which the user of the administrator device has predetermined to be potentially indicative of undesired conduct (i.e. bullying). As a result, the monitoring application is thereby configured to capture any communication data that is received or transmitted from the user device at any time for monitoring purposes. This can be particularly useful for identifying bullying that has not been reported or bullying occurring from new or unidentified sources.

[0042] Upon detection of an exact or substantial match to at least one of the one or more predefined criteria on the user device 110a, 110b (or the application server 120 in some embodiments), an alert notification is created by the application server 120 and transmitted to the parent device 105 to alert the user of the parent device 105 that bullying may be taking place. In the embodiments where the user device 110a, 110b detects the match, the user device 110a, 110b will communicate the detection to the application server 120 which then alerts the parent device 105.

[0043] The alert notifications are typically transmitted directly to the parent device 105 and thereby an administrator (such as a parent) is not required to access an intermediary database or service to access data that has been identified as a match to the predefined criteria. In this regard, in some embodiments, the hardware and software required to run the monitoring system resides on the administrator and user devices 105, 110a, 110b.

[0044] In some embodiments, upon identification of a match, one or more features of the user device 110a, 110b are automatically disabled or restricted. Alternatively, a prompt may be sent to the administrator device 105 requesting a confirmation instruction to disable or restrict one or more features of the user device at the discretion of the user of the administrator device.

[0045] In some further embodiments, upon identification of a substantial match, the administrator device 105 is granted remote access and control of the user device 110a, 110b at the discretion of the user of the administrator device 105.

[0046] Some examples of control of the user device that the administrator device may have include blocking access to certain installed applications on the user device, timed access control, activity monitoring, remote formatting and clearing of the device, remote locking of the device, disabling or restricting the ability to install applications on the user device, preventing access to specific websites and disabling specific features of the device such as the camera, for example.

[0047] In some additional embodiments, application server 120 collects and organises communication data in a database. As described above, the communication data can include electronic data that is sent to or sent by a user or user device by accessing applications installed on the user devices 110a, 110b.

[0048] In some embodiments, wherein the user device 110a comprises a smart device having the Android operating system installed thereon, the application server 120 communicates directly with the monitoring application 111 a installed on the user device 110a and thereby effects operation and/or control of the user device 110a.

[0049] In some alternative embodiments, wherein the user device 110b comprises a smart device having the iOS operating system installed thereon, an updated device profile is pushed to the user device 110b via a mobile device management (MDM) profile.

[0050] In one exemplary embodiment, the user devices 110a, 110b belong to one or more bullies who are sending intimidating/threatening/bullying communications and/or one or more victims of bullying who are receiving the intimidating/threatening/bullying communications. For example, the application may be installed on any known device associated with a bully or a victim. Preferably, the application is installed on a victim’s device to monitor and collect data received from one or more bullies through various sources (such phone calls, messages and social networks, for example).

[0051 ] In some embodiments, the monitoring application can be remotely pushed to a user device from an administrator device.

[0052] In some additional embodiments, the monitoring application may be integrated into a user device’s firmware. As a result, the application will not be detectable from a task manager or application control panel, and thus may be hidden from users to prevent the monitoring application from being disabled or uninstalled.

[0053] In some embodiments, the monitoring application installed on a user device runs in as a background task or program, allowing the application actively monitor incoming and outgoing communications without being present or“on top” on a display of the user device. [0054] In some embodiments, the user devices include mobile phones and/or another other computing device capable of receiving, accessing, sending, and/or storing data.

[0055] In one embodiment, the service platform 120 determines data to collect based on the user applications and devices related to a source of harassment as well as a target. By way of example and not limitation, communication and activity data can include words and phrases, names, images, sounds, videos, metadata and other data related context information or other components of the data that can be parsed. The data may also be analysed by a natural language processor in order to determine context of words and phrases used in the interaction data (in order to reduce false positives such as profanities used among friends).

[0056] In one example, the user device can be configured to monitor location data obtained from a GPS device of the user device and generate an alert to the administrator device if the location data indicates that the user device has left or entered a specific geographical location defined by the administrator device.

[0057] FIG. 2 illustrates an embodiment of a process 200 for monitoring and analysing communication and activity data of an electronic device.

[0058] In step 205, the administrator device and any user devices to be monitored by the administrator device establish a connection.

[0059] In step 210, each user device, by way of an application or service installed thereupon, monitors incoming and/or outgoing data received at the respective device. [0060] In step 215, the data that is received and/or sent from a respective user device is analysed by the application or service installed thereupon searching for at least a substantial match to one or more predefined criteria, which may be system defined or user defined.

[0061 ] In step 220, if a substantial match or exact match to at least one predefined criterion is identified, an alert notification is created and transmitted to a relevant administrator device for the attention of a user of the administrator device.

[0062] In some embodiments, the monitoring application enables a third-party (such as a school administrator or parent, for example) to remotely access and/or control the electronic device having the monitoring application installed thereon using an administrator device. In one particular example, the monitoring application grants remote access and remote control privileges (i.e. administrator access) to an administrator device. The monitoring application allows the parent device to access the user device to collect information about potential instances of bullying experienced by the user of the user device and also control access to various services (such as disabling access to a particular application, for example). In some embodiments, the monitoring application installed on the user device is programmed to monitor applications and services on the user device for certain keywords or phrases, which may be indicative of bullying behaviour being sent or received. If one or more of the keywords or phrases are detected by the monitoring application a notification can be sent to the parent device to alert the user of the parent device to a potential instance of bullying and to allow the user of the parent device to take appropriate action. [0063] FIG. 3 is a diagram of two identical electronic devices 310 (which can each act as a monitored user device or administrator device) that can be used to implement various exemplary embodiments of the invention, and an exemplary embodiment of the application server 120. Each electronic device 310 includes a bus 315 coupling a memory 320 (storing firmware and/or software 321 ), a display 325, a communication device in the form of a radio transceiver unit 330 and a processor 335. The display 325, such as a liquid crystal display adapted for touchscreen interface, displays information to a user of the user device and may also operate as an input device. The display 325 communicates inputs and command requests to the processor 335.

[0064] Application server 120 includes application software 122 having the user profiles 121 stored thereon.

[0065] The application server 120 includes a bus 350 coupling a memory 355 (storing firmware or software including the application software 122), a communication device in the form of data transceiver unit 331 (which includes a wired connection to the Internet via Network 340) and a processor 365.

[0066] The application server may also comprise a web server running web server software, such as Apache, Ngix or IIS, for example.

[0067] The application server also includes a scripting language (such as HTML, JS or PHP, for example) installed thereon to form the running software.

[0068] According to some embodiments of the invention, the processes and methods described herein are performed by the electronic device 310 and application server 120, in response to the processor 335 executing an instruction contained in memory 320 (which may be volatile memory, non volatile memory or a combination of the two). Execution of the instructions contained in memory 320 cause the processor 335 to perform one or more of the process or method steps (such as those described above in relation to FIG. 1 and 2) described herein above.

[0069] One or more processors in a multiprocessing arrangement may also be employed to execute the instructions contained in memory 320. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement embodiments of the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.

[0070] As mentioned, the electronic devices 310 also includes a communication device in the form of a radio transceiver unit 330 coupled to bus 315. The radio transceiver unit 330 provides a two-way data communication coupling to a network 340 using wireless radio signals. It will be appreciated that the communication device could also take the form of a digital subscriber line (DSL) card or modem, an integrated services digital network (ISDN) card, a cable modem, a telephone modem, or any other communication interface to provide a data communication connection to a corresponding type of communication line. As another example, communication device may be a local area network (LAN) card (e.g. for Ethernet™ or an Asynchronous Transfer Model (ATM) network) to provide a data communication connection to a compatible LAN. Wireless links can also be implemented. In any such implementation, the communication device sends and receives electrical, electromagnetic, or optical signals that carry digital data streams representing various types of information. Further, the communication device can include peripheral interface devices, such as a Universal Serial Bus (USB) interface, a PCMCIA (Personal Computer Memory Card International Association) interface, etc. Although a single communication interface is depicted in FIG. 3, multiple communication interfaces can also be employed.

[0071 ] The network link 345 typically provides data communication through one or more networks to other electronic devices. For example, the network link 345 may provide a connection through cellular network 340 to a second electronic device 310, which has connectivity to a network (e.g. a wide area network (WAN) or the Internet) or to data equipment operated by a service provider. The local network and the network both use electrical, electromagnetic, or optical signals to convey information and instructions. The signals through the various networks and the signals on the network link and through the communication device, which communicate digital data with the electronic devices, are exemplary forms of carrier waves bearing the information and instructions.

[0072] As noted above, with greater accessibility to content and information over modern communications networks, users may also be more susceptible to bullying conduct (e.g., cyber bullying) or interactions facilitated over such communication devices and networks. By way of example, cyber bullying includes, for instance, a person’s (e.g., a source’s) tormenting, threatening, harassing, and/or embarrassing another person (e.g., a target) using communication applications such as voice calls, voice mails, text messages, multimedia messages, E-mails, browsers, social network applications, media sharing applications, navigation applications, etc. In some cases, if bullying conduct is not dealt with properly, cyber bullying potentially may result in grave consequences including substance abuse, suicide, and the like. In milder or less volatile cases, cyber bullying damages the self-esteem of the target (e.g., a targeted child or adolescent), causing potentially lifelong psychological and/or emotional issues. In many cases, responsible authorities (e.g., parents, teachers, law enforcement, etc.) are completely unaware of cyber bullying conduct being perpetrated on targeted individuals, and wish for a mechanism to provide earlier warning and/or intervention to prevent or stop such conduct.

[0073] Advantageously in some embodiments, the system provides for automated monitoring, processing, and/or reporting of the conduct. In this way, to initiate the anti-bullying service, a user need only install or activate the service on his or her device(s). In one use case, potential victims or targets can proactively install or initiate the service. In another use case, parents of potential targets may latently install or initiate the service on behalf of the target.

[0074] Although the various embodiments described herein are discussed with respect to providing an anti-bullying service (anti-cyber bullying, in particular), it is contemplated that the embodiments are also applicable to services for monitoring any form of conduct (i.e. , monitored conduct) involving a source and a target. By way of example and not limitation, in addition to bullying-related conduct, such monitored conduct includes harassing conduct, offensive conduct, illegal conduct, conduct in violation of public and/or private rules or regulations, and the like. In yet other embodiments, the monitored conduct need not be negative conduct, but instead may include positive conduct such as conduct in compliance with rules and regulations, conduct that assists other users, altruistic conduct, etc.

[0075] While various embodiments and examples of the data have been described above, it will be appreciated that the definition of data is not limited to those embodiments and examples. Some further examples of data comprise voice calls, voice mails, text messages, SMS/MMS, emails, social networks, web pages, news feeds (e.g. news feeds, ticker blocks, blog feeds, forum feeds), images, videos, sound, interaction data related context information (e.g., device related GPS coordinates, distance data between two devices, accelerometer readings, time/date, etc.), recordings, links to games and applications and music.

[0076] In this specification, adjectives such as first and second, left and right, top and bottom, and the like may be used solely to distinguish one element or action from another element or action without necessarily requiring or implying any actual such relationship or order. Where the context permits, reference to an integer or a component or step (or the like) is not to be interpreted as being limited to only one of that integer, component, or step, but rather could be one or more of that integer, component, or step etc.

[0077] The above description of various embodiments of the present invention is provided for purposes of description to one of ordinary skill in the related art. It is not intended to be exhaustive or to limit the invention to a single disclosed embodiment. As mentioned above, numerous alternatives and variations to the present invention will be apparent to those skilled in the art of the above teaching. Accordingly, while some alternative embodiments have been discussed specifically, other embodiments will be apparent or relatively easily developed by those of ordinary skill in the art. The invention is intended to embrace all alternatives, modifications, and variations of the present invention that have been discussed herein, and other embodiments that fall within the spirit and scope of the above described invention. [0078] In this specification, the terms ‘comprises’, ‘comprising’, ‘includes’, ‘including’, or similar terms are intended to mean a non-exclusive inclusion, such that a method, system or apparatus that comprises a list of elements does not include those elements solely, but may well include other elements not listed.