Geo-fence
Geo-fencing is the practice of using global positioning (GPS) or radio frequency identification (RFID) to define a geographic boundary. Then, once this “virtual barrier” is established, the administrator can set up triggers that send a text message, email alert, or app notification when a mobile device enters (or exits) the specified area.[1]
A geo-fence is a virtual perimeter for a real-world geographic area. A geo-fence could be dynamically generated—as in a radius around a store or point location, or a geo-fence can be a predefined set of boundaries, like school attendance zones or neighborhood boundaries.
The use of a geo-fence is called geo-fencing, and one example of usage involves a location-aware device of a location-based service (LBS) user entering or exiting a geo-fence. This activity could trigger an alert to the device's user as well as messaging to the geo-fence operator. This info, which could contain the location of the device, could be sent to a mobile telephone or an email account.
Measurement
Geofencing normally relies on a standard circular signal that radiates from the business using it in all directions to a set distance (usually around 100 meters).[2]
History
Custom-digitized geofences have been in use since at least 2002 for multiple online mapping applications since their first appearance in research literature by Munson and Gupta. The term geofence itself is even older.[3]
Applications
Geofencing, used with child location services, can notify parents if a child leaves a designated area.[4]
Geofencing used with locationized firearms can allow those firearms to fire only in locations where their firing is permitted, thereby making them useless for crimes.
Geofencing is critical to telematics. It allows users of the system to draw zones around places of work, customer's sites and secure areas. These geo-fences when crossed by an equipped vehicle or person can trigger a warning to the user or operator via SMS or Email.
In some companies, geofencing is used by the human resource department to monitor employees working in special locations especially those doing field works. Using a geofencing tool, an employee is allowed to log his attendance using a GPS-enabled device when within a designated perimeter.
Other applications include sending an alert if a vehicle is stolen[5] and notifying rangers when wildlife stray into farmland.[6]
Geofencing, in a security strategy model, provides security to wireless local area networks. This is done by using predefined borders, e.g., an office space with borders established by positioning technology attached to a specially programmed server. The office space becomes an authorized location for designated users and wireless mobile devices.[7][8]
One expert in global positioning system security, and a politician, have suggested that government regulators should encourage drone manufacturers to build geofencing constraints into unmanned aerial vehicle navigation systems that would override the commands of the unsophisticated operator, preventing the device from flying into protected airspace.[9]
With an increasing popularity of mobile advertising, geofencing has been employed to distribute location specific ads to customers on their mobile devices.
A store could erect a simple geo-fence in an area surrounding its physical location. When users pass through, receiving a location-triggered alert can encourage them to stop in and shop.[1]
Alternatively, an auto dealer, for example, could set up a geo-fence aimed at individuals who are leaving a rival dealership after browsing for a vehicle. A favorable offer on a comparable car model at that moment can encourage them to compare alternative options.[1]
See also
- Global Positioning System
- Assisted GPS (A-GPS)
- Automotive navigation system
- Geocaching
- Geotagging
- GPS drawing
- GPS tracking
- Point of interest
- Point in polygon
Further reading
- De Lara, Eyal; Anthony LaMarca, Mahadev Satyanarayanan (2008). Location Systems: An Introduction to the Technology Behind Location Awareness. Morgan & Claypool Publishers. p. 88. ISBN 978-1-59829-581-8.
- Anthony .C. Ijeh, Allan .J. Brimicombe, David .S. Preston, Chris .O. Imafidon (2009) Geofencing in a Security Strategy Model: Global Safety and Sustainability. Jahankhani, H. Hessami, A.G. Hsu, F. (Eds.) p.104-111 © Springer-Verlag Berlin Heidelberg 2009. ISBN 978-3-642-04061-0
References
- 1 2 3 "GeoMarketing 101: What Is Geofencing? |". GeoMarketing. Retrieved 2016-03-07.
- ↑ "Roximity’s Verified Locations Goes Beyond The Beacon |". GeoMarketing. Retrieved 2016-02-26.
- ↑ Munson, Jonathan; Gupta, Vineet (2002). Location-based notification as a general-purpose service. Proceedings of the 2nd international workshop on Mobile commerce (ACM). pp. 40–44.
- ↑ De Lara, Eyal; Anthony LaMarca; Mahadev Satyanarayanan (2008). Location Systems: An Introduction to the Technology Behind Location Awareness. Morgan & Claypool Publishers. p. 88. ISBN 978-1-59829-581-8.
- ↑ "Motorcycle Tracker Updates Every 15 Seconds". Motorcycle USA. 23 January 2009. Retrieved 2009-01-26.
- ↑ "Kenya's elephants send text messages to rangers". CBS News. 11 February 2009.
- ↑ Hamid Jahankhani, A G Hessami, Feng Hsu: Global security, safety, and sustainability : 5th international conference, ICGS3 2009, London, UK, September 1-2, 2009 : proceedings. ISBN 978-3-642-04061-0
- ↑ Schumer, Charles (2015-8). "Schumer proposes law". Retrieved 15 December 2015. Check date values in:
|date=
(help) - ↑ "Todd Humphreys: Don't Overregulate Drones". Alcalde. 18 March 2015. Retrieved 2015-04-05.