U.S. patent application number 11/687818 was filed with the patent office on 2007-09-20 for personal security system.
This patent application is currently assigned to Rave Wireless, Inc.. Invention is credited to Rodger Desai, Raju Rishi, Ghen Saito.
Application Number | 20070218895 11/687818 |
Document ID | / |
Family ID | 38523219 |
Filed Date | 2007-09-20 |
United States Patent
Application |
20070218895 |
Kind Code |
A1 |
Saito; Ghen ; et
al. |
September 20, 2007 |
PERSONAL SECURITY SYSTEM
Abstract
A personal security system takes advantage of location
determination capabilities of a mobile communication services to
provide personal security features to one or more communities of
users. One method includes a user initiating a security period from
a mobile device and specifying an end condition for that security
period. If the user does not terminate the security period, at the
end of the security period a notification is sent with information
characterizing the user and a location associated with the
user.
Inventors: |
Saito; Ghen; (Maplewood,
NJ) ; Desai; Rodger; (Piscataway, NJ) ; Rishi;
Raju; (Manalapan, NJ) |
Correspondence
Address: |
FISH & RICHARDSON PC
P.O. BOX 1022
MINNEAPOLIS
MN
55440-1022
US
|
Assignee: |
Rave Wireless, Inc.
New York
NY
|
Family ID: |
38523219 |
Appl. No.: |
11/687818 |
Filed: |
March 19, 2007 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
60784276 |
Mar 20, 2006 |
|
|
|
Current U.S.
Class: |
455/428 |
Current CPC
Class: |
H04W 4/02 20130101; H04W
12/63 20210101; G08B 25/009 20130101; H04W 12/02 20130101; G08B
25/10 20130101; H04W 8/10 20130101; H04L 63/107 20130101; H04M
1/72466 20210101; G08B 25/016 20130101; H04W 4/029 20180201; H04W
4/90 20180201; H04W 12/61 20210101; H04M 1/724 20210101; H04L 63/20
20130101 |
Class at
Publication: |
455/428 |
International
Class: |
H04Q 7/20 20060101
H04Q007/20 |
Claims
1. A method comprising: receiving communication indicative of
initiation of a security period associated with a user of a mobile
device; and if the user does not terminate the security period, at
the end of the security period sending a notification with
information characterizing the user and a location associated with
the user.
2. The method of claim 1 wherein receiving the communication
includes receiving a specification of an end condition for the
security period.
3. The method of claim 2 wherein the end condition includes an end
time for the security period.
4. The method of claim 2 further comprising timing the security
period to determine the end of the security period.
5. The method of claim 1 further comprising prompting the user to
terminate the security period at the end of the security
period.
6. The method of claim 1 wherein sending the notification includes
sending the notification to a security service associated with the
user.
7. The method of claim 1 further comprising obtaining information
characterizing a location associated with the user from a mobile
communication system servicing the mobile device.
8. The method of claim 7 wherein the mobile device comprises a
cellular telephone and the mobile communication system comprises a
cellular telephone system.
9. The method of claim 1 further comprising: enrolling the user,
including receiving personal information associated with the
user.
10. The method of claim 9 wherein sending the notification includes
sending the personal information associated with the user.
11. A method comprising: providing mobile devices to users in a
plurality of communities of users; monitoring communication at a
server from the users indicative of initiation and termination of
security periods associated with the users; and based on the
monitored communication, sending notifications with information
characterizing users and locations associated with said users,
recipients of the notifications being determined based on the
corresponding communities to which the users belong.
12. The method of claim 11 wherein the notifications are indicative
of possible security conditions associated with the users.
13. The method of claim 11 wherein the sending of the notifications
is based on expiration of security periods prior to receipt of
corresponding communication indicative of termination of the
security periods.
14. A system comprising: a communication server including a
communication link to a location based server for obtaining
location information associated with mobile devices for users in a
community; wherein the communication server is configured to
receive communication indicative of initiation of a security period
associated with a user of the mobile devices, and if the user does
not terminate the security period, at the end of the security
period send a notification with information characterizing the user
and a location associated with the user.
15. The system of claim 14 further comprising the plurality of
mobile devices configured for communication with communication
server.
16. The system of claim 14 further wherein the communication server
is further configured to receive a communication initiated by the
user during the security period and in response to send a
notification with information characterizing the user and a
location associated with the user.
17. Software comprising instructions embodied on a machine-readable
medium for causing a processing system to: receive communication
indicative of initiation of a security period associated with a
user of a mobile device; and if the user does not terminate the
security period, at the end of the security period send a
notification with information characterizing the user and a
location associated with the user.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. Provisional
Application No. 60/784,276 filed Mar. 20, 2006, which is
incorporated herein by reference.
BACKGROUND
[0002] This invention relates to a system for personal
security.
[0003] Cellular telephone systems today typically provide some sort
of location tracking of users, for example, to determine the
location of a user that dials an emergency number (e.g., using
E911). In some communities of users, such as students on a
university campus, use of cellular telephones has become
ubiquitous, with users using text messaging and other applications
to stay "connected."
SUMMARY
[0004] In one aspect, in general, a personal security system takes
advantage of location determination capabilities of a mobile
communication services to provide personal security features to one
or more communities of users.
[0005] In another aspect, in general, a method includes a user
initiating a security period from a mobile device and specifying an
end condition for that security period. If the user does not
terminate the security period, at the end of the security period a
notification is sent with information characterizing the user and a
location associated with the user.
[0006] In another aspect, in general, a method includes receiving
communication indicative of initiation of a security period
associated with a user of a mobile device. If the user does not
terminate the security period, at the end of the security period
sending a notification with information characterizing the user and
a location associated with the user.
[0007] In another aspect, in general, a system includes a
communication server that includes a communication link to a
location based server for obtaining location information associated
with mobile devices for users in a community. The communication
server is configured to receive communication indicative of
initiation by a user of the mobile devices of a security period,
and if the user does not terminate the security period, at the end
of the security period send a notification with information
characterizing the user and a location associated with the
user.
[0008] Aspects can include one or more of the following
features.
[0009] Receiving the communication includes receiving a
specification of an end condition for the security period. The end
condition may include an end time for the security period. The
method may include timing the security period to determine the end
of the security period.
[0010] The user is prompted at the end of the security period to
terminate the security period.
[0011] Sending the notification includes sending the notification
to a security service associated with the user.
[0012] Information characterizing a location associated with the
user is obtained from a mobile communication system servicing the
mobile device. For example, the mobile device is a cellular
telephone and the mobile communication system is a cellular
telephone system.
[0013] The user was previously enrolled, for example, by receiving
personal information associated with the user.
[0014] Sending the notification includes sending personal
information associated with the user.
[0015] The security period can have a user-specified duration, and
the end condition for the period corresponds to expiration of a
timer for the period.
[0016] The user initiates the security period using a mobile
device, and optionally terminates the security period using the
mobile device. The mobile device can be a mobile telephone.
[0017] The location associated with the user can include a
GPS-based location, for example, determined by a communication
system to which the mobile device is coupled
[0018] In another aspect, in general, mobile devices are provided
to users in a set of communities of users. Communication is
monitored at a server from the users indicative of initiation and
termination of security periods associated with the users. Based on
the monitored communication, notifications are sent with
information characterizing users and locations associated with said
users. The recipients of the notifications are determined based on
the corresponding communities to which the users belong. The
notifications may be indicative of possible security conditions
associated with the users. Sending of the notifications may be
based on expiration of security periods prior to receipt of
corresponding communication indicative of termination of the
security periods.
[0019] Aspects can have advantages that include one or more of the
following:
[0020] Faster and more effective intervention is possible. Campus
safety can be immediately notified on an incident, the location and
critical information such as the student's description and any
medical issues. Students are also provided with a one button "panic
call" option prompting an immediate response.
[0021] The system can eliminate "consensual" arguments in
acquaintance assault because activation of the system is a clear
sign that the student was uncomfortable in a situation.
[0022] Crimes in progress may be interrupted when the system timer
expires campus safety immediately calls the student's phone,
interrupting any assault
[0023] Clery Act Timely Warnings are made possible so that
universities are able to instantly broadcast warnings via TXT
messages.
[0024] Areas of concern on campus may be highlighted. Historical
reporting on areas where the system was initiated provides
universities with a clear picture of areas where students feel
uncomfortable and at what times of day, enabling proactive measures
such as increased patrols or enhanced lighting.
[0025] Other features and advantages of the invention are apparent
from the following description, and from the claims.
DESCRIPTION OF DRAWINGS
[0026] FIG. 1 is a block diagram of a personal security system
[0027] FIG. 2 is a graphical display for security personnel.
DESCRIPTION
[0028] Referring to FIG. 1, a personal security system makes use of
personal mobile handsets 128 coupled to a mobile communication
system 120. Each handset 128 is associated with a corresponding
user of the system. In some examples, the handsets are cellular
telephones that are coupled by a mobile telephone system, such as a
GSM, CDMA or and iDen based system.
[0029] Very generally, the system makes use of a communication
server 110, one function of which is to determine when a security
situation may exist for one of the users, and to then alert an
appropriate security service 134. The security service then
determines if there is truly a security situation, for example, by
communicating with the user over the handset or investigating in
person.
[0030] In order to aid the security service, examples of the system
make use of various types of location based services. For example,
the mobile communication system includes or has associated with it
a location based server (LBS) 124, which is able to determine the
location of a particular handset 128. The communication server 110
can query the LBS 124 (e.g., as a software based request over the
Internet) to determine the location of a particular handset.
Different examples of the security system make use of one or more
types of location determination approaches. One type of location
determination approach uses Global Positioning System (GPS)
functionality that is built into the handset, optionally assisted
by fixed elements of the mobile communication system 120 in an
Assisted GPS (AGPS) approach. Other location determination
approaches use signal strength and/or direction information in
triangulation approaches based on transmitted or received radio
signals from the mobile communication system. Yet other approaches
are based on cell identification in a cellular telephone
network.
[0031] Some examples of the system provide services to multiple
different communities 130 of users. Communities can be various
associations of users, which may each be served by their own
security service 134. An example of a community is a university,
with the security service being the campus police service for that
university. In such an example, different universities typically
have separate campus police services.
[0032] Note that in some examples, the communities may not be
geographically separated. For example, urban universities may have
student communities that are very close to one another (e.g.,
students of New York University and Columbia University), and the
users is such communities may operate in overlapping geographic
regions. The system supports configurations in which the users are
serviced by the security service for their community, regardless of
their actual geographic location.
[0033] In some examples, the personal security system supports a
personal security button on the handset. Various approaches to
configuring the handset to provide such a button are possible,
including through provisioning by the operator of the mobile
communication system and by downloading software to a configurable
device. For example, the "home" or "dashboard" screen of a mobile
telephone can provide direct "one touch" access to security
services.
[0034] When a user activates the personal security button, the
handset 128 sends a message to the communication server 110.
Various approaches to sending the message are used in different
examples of the system. Some examples use a Short Message Service
(SMS) provided through the mobile communication system. When the
communication server 110 receives the message, it queries the LBS
124 to determine the location of the sending handset. In some
examples the LBS already has access to location information for the
handset that is maintained by the communication system, while in
other examples, it in turn queries the communication system which
determines the handset's location. The LBS returns the handset's
location to the communication server 110, which then contacts the
appropriate security service 134 for the user's community.
[0035] Different examples of the system use various approaches to
enrollment of users. In some approaches, a web-based approach is
used in which a user provides enrollment information to the
communication server. Such information includes an identification
of the user's community 130, and optionally personal information
that might be useful to the security service in an emergency. In
other examples, the users enroll through a system operated by the
community, and personal information is maintained privately within
the community. The community provides the communication server with
identifications of the handsets within its community. Example of
personal information that may be useful to a security service is a
photograph of the user and physical data (e.g., gender, height,
weight, hair color, etc.)
[0036] Some mobile communication systems 120 require that a user
authorize particular parties so that they can access their location
information, for example, through the LBS 124. In such systems, as
part of the enrollment process the users provide the necessary
authorization, which is communicated to the LBS and/or the mobile
communication system.
[0037] In some examples, the personal security system supports a
mode that can be used when a user expects to be at some risk for an
upcoming interval of time. For example, a university student may
need to cross a campus late at night and feel at risk walking along
isolated paths.
[0038] Some examples of such a mode use a timer-based approach.
Generally, when the user is about to initiate an interval of time
during which they may feel at risk, they initiate the timing of an
interval by the security system. If the user "checks in" before the
expiry of the interval, or alternatively in response to a prompt by
the system at the end of the interval, the user is deemed to be
safe. On the other hand, if the user does not check in or does not
respond to a prompt, or optionally if the handset is not accessible
from the communication system 120 during the interval, the security
service for that user's community is notified along with the last
known location of the handset.
[0039] Referring to FIG. 1, a sequence of steps for a previously
registered user of the system are described in such an example:
[0040] Step 1: The user notifies the communication server 110 that
they are about to start an at-risk interval. In different examples,
this step is carried out in a variety of ways. For example, the
handset may have a browser (e.g., a Wireless Application Protocol,
WAP, browser) that accesses an application at the communication
server that provides a graphical interface for display on the
handset. The graphical interface permits the user to enter the
duration of the interval (or alternatively the end time of the
interval). In some examples, the user has provided a Personal
Identification Number (PIN) to be used to check in--in other
examples the user provides a check-in PIN at the start of the
interval. In some examples, a software application has already been
loaded on the handset, and the application sends data messages to
the communication server 110 to initiate the interval. In other
examples, communication techniques such as SMS, or voice based
(e.g., using speech recognition) or touch-tone (DTMF) based
interfaces are user by the user to inform the communication server
that the interval is about to start. In some examples, the
communication between the handset and the communication server is
direct, while in other examples, the communication is mediated by a
system operated by the user's community. When the communication
server determines that the user has started an interval, it begins
a count-down timer that will expire at the end of the interval.
[0041] Step 2a: Prior to the end of the interval, the user can
communicate with the communication server to check in and terminate
the interval. With PIN-based approaches, the user enters their
secret PIN, which was recorded as part of a registration procedure,
or was provided at the start of the interval. In some examples, the
user has the option of entering a special PIN that indicates that
they are in danger. For example, suppose an attacker forces a user
to terminate the interval, the user can enter a special PIN, such a
pre-arranged PIN or the normal PIN with a special suffix (e.g.,
adding a 1 at the end of the PIN). This can signal the
communication server that the user is in danger without alerting
the attacker.
[0042] Step 2b: If at the end of the interval the user has not yet
check in, the communication server can act on the possibility that
the user is in danger. In some examples, the server first
communicates automatically with the user. For example, the server
may interact with an application executing on the handset, send a
SMS-based message that needs to be responded to, or may a telephone
call requiring voice or text entry of the PIN.
[0043] Step 3: If the user has not checked in prior to the expiry
of the planned interval, or has not responded to the prompt from
the system at the end of the interval in examples that are
configured to provide such a prompt, the communication server 110
requests location information for the user's handset.
[0044] Step 4: The LBS 124 determines the last known location of
the user, optionally with the time the location determination was
made. The LBS then send this location information to the
communication server 110. The location information may take various
forms, such as latitude and longitude.
[0045] Step 5: The communication server 110 notifies the security
service 134 for the user. In examples in which the communication
server 110 serves many communities, the server has been configured
with at least information identifying the particular security
service to notify (or alternatively, multiple security services may
be notified and only the one responsible for that handset acts on
the notification). In examples in which the communication server
has additional personal information related to the user (e.g.,
name, photo, etc.) it sends this information along with the
notification. In examples in which the security service has access
to personal information for that user, it accesses that information
in response to the notification.
[0046] In some examples, security personnel, for example at a
command station or at a mobile device for personnel on patrol, are
provided with a display associated with the user and the current
risk. For example, referring to FIG. 2, a graphical display with a
map showing the user's location (or last known location), a
photograph of the user, as well as text-based personal information
are displayed to the security personnel.
[0047] Step 6: The security personnel attempt to interact with the
user, for example, by calling their handset to establish
person-to-person communication, and/or by dispatching personnel to
the user's location to provide assistance. When appropriate, the
security service may notify other security organizations, such as a
local police department, to help handle the incident.
[0048] In some examples, when a user initiates an at-risk interval,
the communication server may initially inform the security service
and provide location information obtained from the LBS on an
ongoing basis. The security service can maintain a display, for
example showing their locations on a map, of users as they travel.
In some examples, users may have the option of permitting or
denying such tracking, for example, for privacy reasons. A
concentration of users in a particular area may be addressed by
dispatching preventive patrols into the area. Also, historical
information may be logged, for example, to identify areas and time
in which users feel at risk or in which incidents actually occur.
Such historical information may used, for example, to improve
users' sense of security in those areas, for example though
physical improvements (e.g., lighting) or increased patrols.
[0049] In some examples, the security period may be defined using
other and/or additional criteria than time duration or end time.
For example, a user may identify a route (e.g., using a destination
building number) and the security period is defined as the time
until the user reaches the destination. In such an example, the end
of the security period may be defined by the server as a reasonable
time needed to reach the destination. In some examples, the
communication server may determine that there may be a possible
security condition if the user deviates significantly from a path
to the declared destination.
[0050] In some examples, security periods may be initiated or
defined by entities other than the user. For example, a parent may
require that a child check in at a particular time (e.g., at
midnight) or at a set of prespecified times (e.g., every two
hours). In addition or instead of notifying a security service, the
parent may be notified if the child fails to check in. That is, the
parent may serve the role of the security service. Similarly, an
elderly parent may need to check in periodically or else their
adult child or other caregiver is notified with information about
their location. In some examples, a child may initiate the security
period with the parent being notified if they fail to terminate the
period or check in when prompted.
[0051] In some examples, a security period may be initiated by a
passive activity of the user. For example, a system may detect that
a user has entered a predefined geographic area (e.g., going off
campus, leaving a nursing home) and may have to check in within a
certain period of time (e.g., within one hour).
[0052] In some examples, the user's community security service is
notified regardless of the user's geographic location. For example,
a user from a university in California may be visiting New York
City yet their security-related notifications are sent back to
California. This approach can permit their university security
service to provide additional information to local New York police.
In other examples, the security service that is notified may depend
on the user's geographic location. For example, universities may
cooperate and a student visiting another university's campus may
result in a notification to the security service of the visited
university in addition or instead of the user's home
university.
[0053] In some examples, one communication server 110 may interact
with multiple mobile communication systems. For example, users in a
single community 130 or in different communities 130 may be served
by different mobile telephone carriers.
[0054] In some version of the system, additional community services
136 may take advantage of the capabilities of the communication
server. For example in a university situation, a community service
may include an academic group that provides class-related
notifications (e.g., class cancellation, in-class surveys, etc.).
Another community service may include access to transportation
information, such a campus bus routes, schedules, and expected
arrival time information. Other examples include broadcasting of
campus-wide alerts, which may be security related.
[0055] In the description above, in some examples of the system a
university student community is provided as an example of users
served by the system. Other examples of communities may be served
by examples of the system. For example, personnel on a military
base, a special interest group, a church group, residents of a
housing development, inhabitants of cities, towns, hotel guests,
etc. can each form a community served by an example of a personal
security system.
[0056] In some examples, capabilities described are implemented in
software, which may be stored on computer readable media or
embodied on signals propagating through communication media (e.g.,
over wired or wireless networks). The software may include
instructions, such as machine instructions, programming language or
interpreter statements, instructions for virtual machines (e.g.,
Java), or other forms of instructions. The software may be
distributed, for example, with some components execution on the
handsets and other components executing at fixed servers.
[0057] It is to be understood that the foregoing description is
intended to illustrate and not to limit the scope of the invention,
which is defined by the scope of the appended claims. Other
embodiments are within the scope of the following claims.
* * * * *