U.S. patent application number 13/784791 was filed with the patent office on 2013-09-05 for personal security system.
This patent application is currently assigned to Clandestine Development LLC. The applicant listed for this patent is Peter Cahill. Invention is credited to Peter Cahill.
Application Number | 20130231077 13/784791 |
Document ID | / |
Family ID | 49043113 |
Filed Date | 2013-09-05 |
United States Patent
Application |
20130231077 |
Kind Code |
A1 |
Cahill; Peter |
September 5, 2013 |
PERSONAL SECURITY SYSTEM
Abstract
A personal security system includes: a mobile electronic device
including a processor and a user input mechanism, wherein the
processor is adapted to provide an alarm trigger, wherein the
processor is further adapted to: receive a command from a user to
provide an armed alarm condition; initiate the armed alarm
condition by receiving a continuous user command through the user
input mechanism, wherein the continuous user command requires an
active physical touch from the user; and when the user ceases to
provide the active physical touch required to maintain the
continuous user command, trigger an alarm condition. In some
embodiments, in response to triggering the alarm condition, the
processor communicates geo-location information to a remote server,
wherein the geo-location information identifies the geo-location of
the mobile electronic device at the time the alarm condition is
triggered.
Inventors: |
Cahill; Peter; (Arlington
Heights, IL) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
Cahill; Peter |
Arlington Heights |
IL |
US |
|
|
Assignee: |
Clandestine Development LLC
Wilmington
DE
|
Family ID: |
49043113 |
Appl. No.: |
13/784791 |
Filed: |
March 4, 2013 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
61606328 |
Mar 2, 2012 |
|
|
|
Current U.S.
Class: |
455/404.2 |
Current CPC
Class: |
G08B 25/008 20130101;
H04W 4/90 20180201; G06F 3/0488 20130101; G08B 25/016 20130101 |
Class at
Publication: |
455/404.2 |
International
Class: |
H04W 4/22 20060101
H04W004/22 |
Claims
1. A personal security system comprising: a system server adapted
to receive communications from a mobile electronic device and
provide communications to at least a selected one of a plurality of
911 command centers; wherein the system server is adapted to
receive a triggered alarm condition from a mobile electronic
device, the triggered alarm condition including a geo-location of
the mobile electronic device at the time the alarm condition is
triggered, wherein the mobile electronic device includes a
processor and a user input mechanism, wherein the processor is
adapted to provide geo-location services and communication services
adapted for communicating with the system server, wherein the
processor is further adapted to: receive a command from a user to
provide an armed alarm condition; initiate the armed alarm
condition by receiving a continuous user command through the user
input mechanism, wherein the continuous user command requires an
active physical touch from the user; when the user ceases to
provide the active physical touch required to maintain the
continuous user command, trigger an alarm condition; and in
response to the triggered alarm condition, communicate the
geo-location of the mobile electronic device at the time the alarm
condition is triggered to the remote server; wherein the system
server is further adapted to, subsequent to receiving the triggered
alarm condition, either receive a user command to disarm the
triggered alarm condition or verify the triggered alarm condition;
and if the triggered alarm condition is verified, the system server
is adapted to communicate the geo-location of the mobile electronic
device at the time the alarm condition is triggered to the at least
a selected one of the plurality of 911 command centers and further
to a plurality of additional contacts.
2. The personal security system of claim 1 wherein the user input
mechanism is provided through a capacitive touch screen.
3. The personal security system of claim 1 wherein the user input
mechanism is provided through a physical button.
4. The personal security system of claim 1 wherein the user input
mechanism is provided through a virtual button.
5. The personal security system of claim 1 wherein the additional
contacts are emergency contacts that are defined by the user prior
to the triggering of the alarm condition.
6. The personal security system of claim 1 wherein the at least a
selected one of a plurality of 911 command centers is selected
using the geo-location of the mobile electronic device at the time
the alarm condition is triggered in combination with a database of
geo-fenced location data for a plurality of 911 command
centers.
7. The personal security system of claim 6 wherein the at least a
selected one of a plurality of 911 command centers includes the
three 911 command centers located nearest the geo-location of the
mobile electronic device at the time the alarm condition is
triggered.
8. The personal security system of claim 1 wherein the user command
to disarm the triggered alarm condition is a disarm code.
9. The personal security system of claim 1 wherein the user command
to disarm the triggered alarm condition is the correct answer to a
question answer challenge presented to the user.
10. The personal security system of claim 1 wherein the triggered
alarm condition is verified if the user command to disarm the
triggered alarm condition is not received within twenty seconds
from the triggering of the alarm condition.
11. A personal security system comprising: a mobile electronic
device including a processor and a user input mechanism, wherein
the processor is adapted to provide an alarm trigger, wherein the
processor is further adapted to: receive a command from a user to
provide an armed alarm condition; initiate the armed alarm
condition by receiving a continuous user command through the user
input mechanism, wherein the continuous user command requires an
active physical touch from the user; and when the user ceases to
provide the active physical touch required to maintain the
continuous user command, trigger an alarm condition.
12. The personal security system of claim 11 wherein, in response
to triggering the alarm condition, the processor communicates
geo-location information to a remote server, wherein the
geo-location information identifies the geo-location of the mobile
electronic device at the time the alarm condition is triggered.
13. The personal safety device of claim 12 wherein direct contact
information for one or more 911 command centers is determined based
on the geo-location information.
14. The personal safety device of claim 11 wherein the continuous
user command that requires an active physical touch from the user
is contact with a capacitive touch screen.
15. The personal safety device of claim 14 wherein the continuous
user command that requires an active physical touch from the user
is contact with a specific position located on a capacitive touch
screen.
16. The personal safety device of claim 11 wherein the continuous
user command that requires an active physical touch from the user
is activation of a physical switch.
17. A method of triggering an alarm condition under duress
comprising providing a mobile electronic device including a touch
responsive user control for which, when placed in active mode, the
mobile electronic device is prevented from triggering an alarm
condition by an active user input received through the user control
and, when the active user input is no longer received through the
user control, the alarm condition is triggered, such that, when the
alarm condition is triggered geo-location information is
communicated to a remote server, wherein the geo-location
information identifies the geo-location of the mobile electronic
device at the time the alarm condition is triggered.
18. The method of claim 17 wherein direct contact information for
one or more 911 command centers is determined based on the
geo-location information communicated to the remote server.
19. The method of claim 17 wherein the active user input is contact
with a capacitive touch screen.
20. The method of claim 17 wherein the active user input is
activation of a physical switch.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. Provisional
Application No. 61/606,328 filed on Mar. 2, 2012, the entirety of
which is incorporated herein by reference.
BACKGROUND OF THE INVENTION
[0002] The present subject matter relates generally to a personal
security system. More specifically, the present invention relates
to a personal security system embodied in a mobile application. The
primary embodiments described herein relate to a personal security
system embodied in a mobile application in which a user may arm the
system by making contact with a touch screen of a mobile device and
the system may be triggered by breaking contact with the touch
screen. However, additional embodiments are provided in which the
personal security system embodied in a mobile application that is
activated by a timer mode. In each of the embodiments, a verified
alarm condition triggers communication to emergency first
responders and additional predefined contacts, wherein the
communication includes a live map location of the mobile device and
direct dial phone number access information for the 911 command
centers closest to the location of the mobile device.
[0003] Personal safety is an important consideration for everyone.
Classic personal safety options include devices such as whistles,
pepper spray, electroshock weapons, etc. As the use of mobile
applications continues to increase, personal safety applications
have made their way to market. Many have focused on tracking the
mobile device. Other versions of personal security systems, focus
on turning the mobile device into a communication command center
during an emergency. While these applications may be useful and
helpful, they do not necessarily address all of the needs of a
user. For example, some of the most important requirements of a
personal safety system are: (1) the ease of triggering an alarm
condition; (2) the speed in communicating the alarm condition; (3)
the redundancy in the communication to the emergency contacts; and
(4) the ability to quickly contact the most appropriate 911 Command
Centers; etc.
[0004] Accordingly, a need exists for a personal security system
that meets these requirements and others, as described and claimed
herein.
BRIEF SUMMARY OF THE INVENTION
[0005] The personal security system provided herein addresses the
needs of users and provides an improvement over previously existing
personal security systems. In particular, in one embodiment, the
personal security system provided herein provides a mobile
application in which the system may be armed by making physical
contact with a touch screen on a mobile device and may be triggered
by breaking physical contact with the touch screen, as described
further herein. Additional embodiments are provided in which the
personal security system embodied in a mobile application that is
activated by a timer mode. In each of the various embodiments, a
verified alarm condition triggers communication to emergency first
responders and additional predefined contacts, wherein the
communication includes a live map location of the mobile device and
access information for the 911 Command Centers closest to the
location of the mobile device. As will be recognized by those
skilled in the art, the personal safety system may be embodied in
components resident in a personal mobile device that are in
communication with a central system server.
[0006] In a primary example, when a user first accesses the
personal security system, the system must be set up (i.e.,
registered) for use. The first step in the setup process is for the
user to provide the user demographic and personal information. For
example, the user may provide a photograph and personal description
(e.g., age, height, weight, hair color, eye color, etc.). This
information may be used to identify the user in the case of an
emergency event. The information may be collected by the system and
stored at a central system server to be matched up with a triggered
alarm, should the alarm be triggered in use.
[0007] The user may then input contact information for a number of
emergency contacts, referred to herein as "lifelines." Lifelines
are the contacts that will be automatically contacted when an alarm
is triggered. The system may require a minimum number of lifelines
(in one example, the minimum number of lifelines may be five) to
ensure that the user does not bypass this important step in the
setup process. As will be understood based on the descriptions
provided herein, the greater number of lifelines provided, the
greater redundancy in the system. Greater redundancy is critical to
ensuring a triggered alarm is acted upon appropriately. In some
embodiments, the personal security system may enable the lifeline
contact information to be imported from the user's contacts stored
on the mobile device or from a social media or other communication
platform (e.g., Facebook, Gmail, etc.).
[0008] The lifelines may be confirmed by the personal safety system
by sending a test message to each of the lifelines. The test
message may, for example, require a response to confirm receipt. In
some embodiments, the confirmation of the lifeline may require
additional registration by the lifeline in the personal safety
system.
[0009] The next step in the setup process may include providing the
arm/disarm code(s) and/or panic code(s). In some embodiments, the
personal safety system includes only a single arm/disarm code.
Minimizing the number of codes/passwords required for operation of
the personal safety system may make the system easier for a user to
operate. However, certain embodiments of the personal safety system
may include a greater number of codes and/or passwords for
increased functionality. For example, dedicated codes may be used
to: (1) arm/disarm the system; and (2) trigger a panic code and/or
silent alarm. For example, the user may have a code that, when
entered into the mobile device during a triggered alarm condition,
appears to disable the alarm condition, but in fact is a "silent
alarm" that inconspicuously confirms the alarm condition.
[0010] At the end of the registration/setup process, the personal
safety system may require confirmation of the setup by sending a
test alarm signal to the system server. Such test signal would not
trigger the system alarm (and further actions associated with the
alarm), but it would confirm that the mobile device is
communicating the information necessary to trigger an actual
alarm.
[0011] In addition to the steps described above, the setup process
may include setting separate home and travel settings. For example,
different lifelines may be used for different situations.
Additionally, specific contact information may be provided for 911
or other emergency authorities for various locations in which the
user knows the personal safety application will be used. In
preferred embodiments, the central server of the system may have
access to a database (or other data storage mechanism) in which 911
Command Centers are associated with defined geo-fences such that
when provided a given GPS location, the system may identify the one
or more 911 Command Center direct dial phone numbers that are
geographically closest to the GPS location so the system can
provide the most appropriate 911 number to the user, the lifelines,
and to a response verification call center (described further
herein).
[0012] After the registration steps above and, optionally,
confirmation, the personal safety system is ready for use. As
described, the personal safety system may be embodied in a mobile
application resident on a mobile device. A user may activate the
personal safety system for use by initiating the mobile application
on the mobile device.
[0013] Upon opening the mobile application, the user may arm the
system by entering the arming code established in the registration
process. After the arming code is entered, the mobile device's
screen may change color from green (unarmed) to red (armed). In an
alternative embodiment, the mobile device may cycle between
unarmed, ready, and armed conditions. Variations in modes provided
will be recognized by those skilled in the art based on the
disclosures provided herein.
[0014] After the screen changes color, the user may be prompted to
make contact with the mobile device, for example, by making contact
with a touch screen or by pressing a button on the mobile device.
As long as the user maintains contact with the mobile device, the
personal safety system will be active and armed. In certain
embodiments, the user may be required to contact a specific point
on the touch screen to activate the alarm system. For example, a
circular icon may appear on the screen to be contacted to activate
the alarm. In a further example, the icon may move around the
screen such that the user must be very deliberate in making contact
with the screen in order to activate the alarm.
[0015] The alarm triggering process is initiated when the user
discontinues contact with the mobile device in the manner required
to activate the alarm. For example, if making contact with the
mobile device's touch screen arms the alarm, the alarm triggering
process is initiated when the user breaks contact with the touch
screen. Similarly, if depressing one of the mobile device's volume
buttons arms the alarm, the alarm triggering process is initiated
when the user stops depressing the volume button.
[0016] After initiating the alarm triggering process, a packet of
information is sent to the system server. In some embodiments of
the personal safety system, the packet of information may be the
smallest packet of information required to communicate the alarm to
the system server. For example, the packet may include the trigger
and the user's geo-location. By minimizing the size of the
information packet being sent, it is less likely that the
communication will be interrupted, intentionally or
unintentionally. For example, it may be possible for a small
information packet to be communicated from the device in between
the time the user loses contact with the device and the time device
hits the ground. Similarly, the information should be communicated
before an attacker has an opportunity to identify the alarm and
destroy the mobile device.
[0017] When the system server receives the packet of information,
the system server may hold the packet of information in a queue for
a limited time before releasing the alarm and contacting the
lifelines and authorities. During this period of time, the user may
provide the disarm code to halt the alarm process. For example, a
user may have a 20 second window within which the disarm code may
be entered before the alarm conditions are fully met. Of course,
various durations may be used and, in one contemplated embodiment,
the user may select a specific duration during the setup
process.
[0018] In addition, an audible alarm may be presented through the
mobile device. The audible alarm may be activated a short duration
of time after the alarm condition is triggered (e.g., contact with
the mobile device is lost). For example, the audible alarm may
sound seven seconds after contact is broken. The audible alarm may
be any sound, including traditional alarm sounds, as well as
recorded messages, such as, "the police have been contacted."
[0019] If the duration of time within which the disarm code may be
received passes without receipt of the disarm code, the system
server notifies the public safety authorities or other
intermediaries (e.g., local 911 based on the user's geo-location)
and contacts the user's lifelines. Accordingly, from triggering of
the alarm condition (e.g., the breaking of contact with the mobile
device) to the contacting of the authorities and lifelines may be a
matter of seconds.
[0020] In a preferred embodiment, the triggering of an alarm
condition sends the packet of information to a system server that
is associated with a designated response verification call center.
The response verification call center may receive the information
sent, confirm the alarm condition, and coordinate the
communications to the authorities and to the lifelines. It is
understood that such functionality may be provided by automated
response verification call centers, as well as those that include
live human operators/representatives.
[0021] In a preferred embodiment, the system server provides an
event portal accessible to the user, the lifelines, any relevant
emergency response personnel, and any response verification call
center operators/representatives. In a preferred embodiment, the
portal provides an event panel through which the various parties
can access information related to the verified alarm condition. For
example, the event panel may provide an event ID and a user name
for quickly identifying the user in question and providing a
convenient manner to track the data related to the alarm condition.
The event panel may further provide an approximate event address
that identifies the current location of the mobile device and/or
the location at which the mobile device was located when the alarm
condition was triggered. The event panel may further provide a map
that identifies the relevant locations (e.g., current/initial event
locations, location of emergency response personnel, etc.) and
updates in real-time.
[0022] Additional information provided by the event panel may
include: user identification information, such as, gender, height,
weight, hair color, eye color, ethnicity, etc.; a personal question
and answer used to verify the user to disable the alarm condition
(e.g., Q: What street did you grow up on? A: Flintwood Drive); and
the one or more direct dial phone numbers for the 911 Command
Centers in closest proximity to the event location. The event panel
may provide functionality through which the system server may clear
the alarm condition, confirm appropriate action has been taken,
perform various reporting functionality (e.g., reporting to
authorities and emergency response personnel, reporting to
lifelines, reporting the resolution of the event, etc.), initiate
the identification process (e.g., automatically prompt the response
verification call center operator/representative to identify the
user to confirm or clear an alarm condition), amongst any other
functionality that will be apparent to those skilled in the art
based on the description provided herein.
[0023] In a preferred embodiment, the information provided to the
lifelines may include a set of instructions and location-based
information. In one example, the instructions may include clear and
succinct instructions adapted to most clearly help the lifelines
respond appropriately. For example, a set of instructions may
include a numbered list of instructions, such as: [0024] 1. Do not
call the user. [0025] 2. Write this address down. This is the
closest address to where the Distress Alert was activated. [Address
provided.] [0026] 3. Click on the LOCATION tab (referencing a
location tab on the lifeline's screen). [0027] 4. Refer to the map
of the user's location. Use the zoom feature to better access the
area.
[0028] The location tab may include the one or more direct dial
phone numbers for the 911 Command Centers in closest proximity to
the event location and a real-time updating map identifying the
event location. Of course many variations of the information
provided to the lifelines may be implemented.
[0029] In addition to the features and functions described above,
the personal safety system may further provide various recording
and/or streaming audio and/or video functions. For example, once a
user breaks contact with the armed mobile device, the mobile device
may immediately start recording and/or streaming audio and/or
video. Any recording may be captured within the mobile device. Any
streaming may be provided to the system server. These functions may
be helpful in identifying an assailant or otherwise understanding
what occurred immediately following the breaking of contact with
the mobile device. It is contemplated that in certain versions, the
mobile device may record and/or stream audio and/or video anytime
the alarm is activated, such that the audio and/or video may be
used to identify the events preceding and/or succeeding the time
the user breaks contact with the armed mobile device.
[0030] It is contemplated that the examples provided above are
merely preferred examples of the personal security system under
certain conditions. It is contemplated that there may be other
versions of the personal security system for other conditions. For
example, while the embodiments described above may be preferred for
personal security systems used by an individual walking from one
secured area to another (e.g., from an office to a car), it is
believed that a similar system may be adapted for different
situations. In one example, a babysitting version of the personal
security system may be implemented such that once the alarm is
activated, the alarm condition may be triggered by shaking the
mobile device to activate the accelerometer. In such cases, the
personal safety application may run in the background of the mobile
device, rather than as the active application. Similarly,
embodiments of the personal safety application may include a timed
operation whereby a user inputs a duration of time or an absolute
time after which an alarm condition is triggered if not previously
disarmed.
[0031] For example, a user bringing home groceries from the grocery
store may set a timer for a period of time just longer than it will
take to get home. If the user does not disarm the personal security
system prior to that period of time expires, the personal security
system will trigger the alarm condition, which will start a twenty
second countdown to disarm the personal security system before the
alarm condition is verified.
[0032] There are various ways in which incoming calls, messages,
and other alerts to the mobile device may be handled while the
personal security application is active. For example, in order to
allow a call to come through without forcing the user to break
contact with the mobile device, the mobile device may automatically
answer on speakerphone while the personal security application is
active. Alternatively, any incoming call may be routed to voicemail
with an alternate greeting indicating that the user is currently
using the personal security system and cannot answer the phone at
that moment.
[0033] The personal security system may be monetized in numerous
ways. For example, the personal security system may include
advertising within the mobile application (e.g., on a splash
screen, on banners, etc.). In addition, the user may opt-in for SMS
or MMS based ads, geo-fencing ads, etc.
[0034] In one embodiment, a personal security system includes: a
system server adapted to receive communications from a mobile
electronic device and provide communications to at least a selected
one of a plurality of 911 command centers; wherein the system
server is adapted to receive a triggered alarm condition from a
mobile electronic device, the triggered alarm condition including a
geo-location of the mobile electronic device at the time the alarm
condition is triggered, wherein the mobile electronic device
includes a processor and a user input mechanism, wherein the
processor is adapted to provide geo-location services and
communication services adapted for communicating with the system
server, wherein the processor is further adapted to: receive a
command from a user to provide an armed alarm condition; initiate
the armed alarm condition by receiving a continuous user command
through the user input mechanism, wherein the continuous user
command requires an active physical touch from the user; when the
user ceases to provide the active physical touch required to
maintain the continuous user command, trigger an alarm condition;
and in response to the triggered alarm condition, communicate the
geo-location of the mobile electronic device at the time the alarm
condition is triggered to the remote server; wherein the system
server is further adapted to, subsequent to receiving the triggered
alarm condition, either receive a user command to disarm the
triggered alarm condition or verify the triggered alarm condition;
and if the triggered alarm condition is verified, the system server
is adapted to communicate the geo-location of the mobile electronic
device at the time the alarm condition is triggered to the at least
a selected one of the plurality of 911 command centers and further
to a plurality of additional contacts.
[0035] In some examples, the user input mechanism is provided
through a capacitive touch screen. In others, the user input
mechanism is provided through a physical or virtual button.
[0036] The additional contacts are typically emergency contacts
that are defined by the user prior to the triggering of the alarm
condition.
[0037] The at least a selected one of a plurality of 911 command
centers may be selected using the geo-location of the mobile
electronic device at the time the alarm condition is triggered in
combination with a database of geo-fenced location data for a
plurality of 911 command centers. The selected 911 command centers
may be chosen as being those nearest to the geo-location of the
mobile electronic device at the time the alarm condition is
triggered. Direct contact information may be provided for each of
the selected 911 command centers. For example, the at least a
selected one of a plurality of 911 command centers may include the
three 911 command centers located nearest the geo-location of the
mobile electronic device at the time the alarm condition is
triggered.
[0038] In some embodiments, the user command to disarm the
triggered alarm condition is a disarm code. Alternatively, the user
command to disarm the triggered alarm condition may be the correct
answer to a question answer challenge presented to the user.
[0039] In a preferred embodiment, the triggered alarm condition is
verified if the user command to disarm the triggered alarm
condition is not received within twenty seconds from the triggering
of the alarm condition. Of course there are numerous manners in
which the triggered alarm condition may be verified.
[0040] In another example, a personal security system includes: a
mobile electronic device including a processor and a user input
mechanism, wherein the processor is adapted to provide an alarm
trigger, wherein the processor is further adapted to: receive a
command from a user to provide an armed alarm condition; initiate
the armed alarm condition by receiving a continuous user command
through the user input mechanism, wherein the continuous user
command requires an active physical touch from the user; and when
the user ceases to provide the active physical touch required to
maintain the continuous user command, trigger an alarm
condition.
[0041] In response to triggering the alarm condition, the processor
may communicate geo-location information to a remote server,
wherein the geo-location information identifies the geo-location of
the mobile electronic device at the time the alarm condition is
triggered. Direct contact information may be determined for one or
more 911 command centers based on the geo-location information.
[0042] In one example, the continuous user command that requires an
active physical touch from the user may be contact with a
capacitive touch screen. In another example, the continuous user
command that requires an active physical touch from the user may be
contact with a specific position located on a capacitive touch
screen. In still another example, the continuous user command that
requires an active physical touch from the user may be the
activation of a physical switch.
[0043] A method of triggering an alarm condition under duress may
include providing a mobile electronic device including a touch
responsive user control for which, when placed in active mode, the
mobile electronic device is prevented from triggering an alarm
condition by an active user input received through the user control
and, when the active user input is no longer received through the
user control, the alarm condition is triggered, such that, when the
alarm condition is triggered geo-location information is
communicated to a remote server, wherein the geo-location
information identifies the geo-location of the mobile electronic
device at the time the alarm condition is triggered.
[0044] The direct contact information for one or more 911 command
centers may be determined based on the geo-location information
communicated to the remote server. The active user input may be
contact with a capacitive touch screen. The active user input may
be activation of a physical switch.
[0045] An advantage of the personal security system is to provide
an easy to use personal security system.
[0046] Another advantage of the personal security system is a
simplified alarm triggering mechanism.
[0047] A further advantage of the personal security system is an
efficient communication of an alarm condition between a mobile
device and a central system server.
[0048] Yet another advantage of the personal security system is
that it provides increased redundancy by requiring a plurality of
lifelines to be contacted in the event the alarm is triggered.
[0049] Additional objects, advantages and novel features of the
examples will be set forth in part in the description which
follows, and in part will become apparent to those skilled in the
art upon examination of the following description and the
accompanying drawings or may be learned by production or operation
of the examples. The objects and advantages of the concepts may be
realized and attained by means of the methodologies,
instrumentalities and combinations particularly pointed out in the
appended claims.
BRIEF DESCRIPTION OF THE DRAWINGS
[0050] The drawing figures depict one or more implementations in
accord with the present concepts, by way of example only, not by
way of limitations. In the figures, like reference numerals refer
to the same or similar elements.
[0051] FIG. 1 is a schematic representation of an example of the
elements of the personal security system.
[0052] FIG. 2 is flow chart illustrating the steps of a method of
setting up and registering a personal safety system.
[0053] FIG. 3 is a flow chart illustrating the steps of a method of
operating a personal safety system.
[0054] FIGS. 4A and 4B are a flow chart illustrating the steps of a
method of operating a personal safety system.
[0055] FIG. 5 is an example of an event panel provided through an
event portal.
[0056] FIG. 6a is an example of instructions provided to
lifelines.
[0057] FIG. 6b is an example of location-based information provided
to lifelines.
DETAILED DESCRIPTION OF THE INVENTION
[0058] FIG. 1 illustrates an example of a personal security system
10. As shown in FIG. 1, the personal security system 10 may include
a mobile device 12 in communication with a system server 14.
Further, the system server 14 may be in communication with one or
more emergency responders 16 and one or more lifelines 18 (as used
herein, lifelines are user defined contacts that are contacted in
case of an emergency event). As shown, the system server 14 may be
associated with a response verification call center 20 through
which one or more operators/representatives may interact with the
system 10.
[0059] In some examples, the mobile device 12 may be in one-way
communication with the system server 14 (e.g., syncing setup
information and communicating alarm conditions). Of course, in
other embodiments, the mobile device 12 may be in two-way
communication with the system server 14 (e.g., syncing setup
information and communicating alarm conditions, as well as,
confirming receipt of information received by the system server
14). While shown and described as a singular system server 14, it
is understood that the system server 14 may be any number of system
servers 14 adapted to support the necessary data management to
support the various features and functions of the personal safety
system 10 described herein. Further, while the preferred
embodiments described herein refer to the system server 14, it is
understood that a system server 14 may not be a requirement of the
personal safety system 10 described herein, and that any other
suitable mechanism or mode of data management may be employed.
[0060] The mobile device 12 may be any mobile device that enables
the communication described herein. For example, various makes and
models of touch screen smartphones are presently preferred as the
mobile device 12. However, it is understood that various mobile
devices 12 may function as the mobile device 12, including, tablet
computers, personal navigation devices, digital cameras, and other
electronic mobile devices 12 that are capable of geo-location and
communication.
[0061] The emergency responders 16 shown in FIG. 1 may be any one
or more organizations appropriate for responding to an event
triggering an alarm condition, as described herein. In preferred
embodiments, the emergency responders 16 shown in FIG. 1 represent
one or more 911 Command Centers and their associated emergency
services (e.g., police department, fire department, emergency
medical response team, etc.). However, it is understood that the
various organizations represented by the emergency responders 16
will be understood by those skilled in the art based on the
disclosures provided herein. The lifelines 18 shown in FIG. 1
represent user defined emergency contacts that are to be contacted
in the event that an alarm condition is triggered and verified. As
described further herein, in the event of a triggered and verified
alarm condition, the system server 14 provides emergency responders
16 and the lifelines 18 an event portal 22 (FIG. 5) and additional
information 24 (FIGS. 6a and 6b) as described further herein.
[0062] Turning now to FIG. 2, a method 200 of setting up and
registering a personal safety system is shown (setup method 200).
The first step 202 in the setup method 200 is providing the user
demographic and personal information. This is the information that
the personal safety system 10 will communicate to the emergency
responders 16 and lifelines 18 to identify the user in the event of
a triggered and verified alarm condition. For example, the user may
provide a photograph and personal description (age, height, weight,
hair color, eye color, ethnicity, etc.). Any other identification
and demographic information may be provided as part of this first
step 202. The information may be collected and stored by the system
server 14 to be matched up with a triggered alarm, should the alarm
be triggered in use.
[0063] As further shown in FIG. 2, the second step 204 may include
inputting contact information for a number of lifelines 18. These
lifelines 18 are the contacts that will be automatically contacted
when an alarm is triggered and verified within the personal
security system 10. The personal security system 10 may require a
minimum number of lifelines 18 to ensure that the user does not
bypass this important step in the setup method 200. For example, in
a preferred embodiment, the minimum number of lifelines 18 is five.
The greater number of lifelines 18 provided, the greater redundancy
in the personal security system 10. Redundancy is critical to
ensuring a triggered alarm is acted upon appropriately.
Accordingly, the personal security system 10 may require a minimum
number of lifelines 18 greater than one. In some embodiments, the
personal security system 10 may enable the lifeline contact
information to be imported from the user's contacts stored on the
mobile device 12 or from a social media or other communication
platform (e.g., Facebook, Gmail, etc.).
[0064] In an optional third step 206, the lifelines 18 provided by
the user may be confirmed by the personal safety system 10 by
sending a test message, or other communication (e.g., a test phone
call), to each of the lifelines 18. The test message may, for
example, require a response by the lifeline 18 to confirm receipt.
In some embodiments, the confirmation of the lifeline 18 may
require the registration of the lifeline 18 in the personal safety
system 10.
[0065] The fourth step 208 of the setup method 200 may be providing
the arm/disarm code(s) and/or panic code(s) to the personal
security system 10. In a preferred embodiment, the personal safety
system 10 includes only a single arm/disarm code. Minimizing the
number of codes/passwords required for operation of the personal
safety system 10 may make the system 10 easier for a user to
operate. However, certain embodiments of the personal safety system
10 may include a greater number of codes and/or passwords for
increased functionality. For example, dedicated codes may be used
to: (1) arm/disarm the system; and (2) trigger a panic code and/or
silent alarm. For example, the user may have a code that, when
entered into the mobile device 12 during a triggered alarm
condition, appears to disable the alarm condition, but in fact is a
"silent alarm" that inconspicuously confirms the alarm condition to
the system server 14.
[0066] The final step 210 in the setup method 200 may be confirming
the setup by sending a test alarm signal to the system server 14.
Such test signal would not trigger the alarm condition (and further
actions associated with a verified alarm condition), but it would
confirm that the mobile device 12 is communicating the information
necessary to trigger an actual alarm condition.
[0067] Turning now to FIG. 3, a method 300 of operating the
personal security system 10 (operation method 300) is shown. As
shown, the first step 302 in the operation method 300 is arming the
personal security system 10 by entering the arming code established
in the setup method 200. After the arming code is entered in the
first step 302, the screen of the mobile device 12 may change color
or otherwise indicate the personal security system 10 is armed. For
example, the screen of the mobile device 12 may change color from
green (unarmed) to red (armed). In another example, the mobile
device 12 may cycle between three modes: (1) unarmed; (2) ready;
and (3) armed conditions. For example, the screen of the mobile
device 12 may change color from green (unarmed) to yellow (ready)
to red (armed). Of course, in other embodiments, arming the mobile
device 12 may not result in any visual distinction or change in
colors.
[0068] The second step 304 in the operation method 300 shown in
FIG. 3 is activating the personal security system 10. For example,
after the screen of the mobile device 12 changes color, the user
may be prompted to make contact with the mobile device 12, for
example, by making contact with a touch screen or by pressing a
button on the mobile device 12. As long as the user maintains
contact with the mobile device 12, the personal safety system 10
will be active and armed. In certain embodiments, the user may be
required to contact a specific point on the touch screen to
activate the personal security system 10. For example, a circular
icon may appear on the screen to be contacted to activate the
alarm. In a further example, the icon may move around the screen
such that the user must be very deliberate in making contact with
the screen in order to activate the personal security system
10.
[0069] As further shown in FIG. 3, the third step 306 in the
operation method 300 is triggering the alarm condition. The third
step 306 of triggering the alarm condition is initiated when the
user discontinues contact with the mobile device 12 in the manner
required to activate the alarm as described above with respect to
the second step 304. For example, if making contact with the touch
screen of the mobile device 12 arms the alarm, the alarm triggering
process is initiated when the user breaks contact with the touch
screen. Similarly, if depressing one of the volume buttons on the
mobile device 12 arms the alarm, the alarm triggering process is
initiated when the user stops depressing the volume button.
[0070] After the third step 306 of triggering the alarm condition
is executed, a fourth step 308 of sending a packet of information
to the system server 14 is triggered. In some embodiments of the
personal safety system 10, the packet of information may be the
smallest packet of information required to communicate the alarm
condition to the system server 14. For example, the information
packet may include only the trigger and the user's geo-location. By
minimizing the size of the information packet being sent, it is
less likely that the communication will be interrupted,
intentionally or unintentionally. For example, it may be possible
for a small information packet to be communicated from the mobile
device 12 in between the time the user loses contact with the
mobile device 12 and the time mobile device 12 hits the ground.
Similarly, the information should be communicated before an
attacker has an opportunity to identify the alarm and destroy the
mobile device 12.
[0071] When the system server 14 receives the packet of
information, the system server 14 may hold the packet of
information in a queue for a limited time before releasing the
alarm and contacting the lifelines 18 and emergency responders 16
or other intermediaries. During this period of time, the user may
perform the fifth step 310 of providing the disarm code to halt the
alarm process. For example, a user may have a 20 second window
within which the disarm code may be entered before the alarm
conditions are fully met. Of course, various durations may be used
and, in certain embodiments of the personal security system 10, the
user may select a specific duration during the setup method
200.
[0072] In addition, an audible alarm may be provided through the
mobile device 12. The audible alarm may be activated a short
duration of time after the contact with the mobile device 12 is
lost. For example, the audible alarm may sound seven seconds after
contact is broken. The audible alarm may be any sound, including
traditional alarm sounds, as well as recorded messages, such as,
"the police have been contacted." This step is shown in FIG. 3 as a
sixth step 312 of sounding an audible alarm on the mobile device
12.
[0073] If the duration of time within which the disarm code may be
received passes without receipt of the disarm code, a seventh step
314 is triggered and the system server 14 notifies the emergency
responders 16 (e.g., local 911 Command Center based on the user's
geo-location communicated at the time the alarm condition is
triggered) and lifelines 18. Accordingly, from the breaking of
contact with the mobile device 12 in the third step 306 to the
contacting of the emergency responders 16 and lifelines 18 in the
seventh step 314 may be a matter of seconds.
[0074] While described above with respect to an embodiment in which
the alarm condition is triggered by a break in contact with a
touchscreen or button on the mobile device 12, it is understood
that an alarm condition may be triggered by a timed operation in
which a user inputs a duration of time (or an absolute time) after
which an alarm condition is triggered, if not previously disarmed.
Such embodiments may operate substantially the same as others
described herein, other than the change in the trigger
mechanism.
[0075] Turning now to FIGS. 4A and 4B (referred to herein
collectively as FIG. 4), another method 400 (operation method 400)
of operating the personal security system 10 is shown. As shown in
FIG. 4, the operation method 400 shown in FIG. 4 details an example
of the operation of the mobile device 12 while the mobile device 12
is in an armed mode. Of course, this is merely one example and it
will be understood by those skilled in the art that other
embodiments may be employed.
[0076] As shown in FIG. 4, after the mobile device 12 enters "armed
mode," the first step 402 is the mobile device 12 (e.g., phone)
vibrates every X seconds, where X is a predetermined number and/or
a user controlled number. Then, as shown in step 404, when the
user's thumb is taken off the screen, a message is sent to the
system server 14. Next, a keypad is displayed on the screen, as
shown in step 406.
[0077] Then, as shown in step 408, the mobile device 12 determines
whether to trigger the silent alarm. If the silent alarm is
triggered (e.g., by the input of a silent alarm code by the user),
the alerts are triggered in step 410, the app goes back to the home
screen in step 412, and the system continues to send coordinate
updates until the user goes back in to start another alarm session
in step 414. This enables the mobile device 12 to appear as though
it has been disarmed, even while continuing the alarm process.
[0078] If the silent alarm is not triggered, the mobile device 12
determines whether the appropriate code was entered within seven
seconds in step 416. If it was, a kill command is sent to the
system server 14 and no further alerts are sent to or from the
system server 14, as shown in step 418. In this example, multiple
kill codes are sent to ensure the system server 14 receives the
kill code in step 418. If the appropriate code was not entered
within seven seconds, the camera flash starts to strobe and the
alarm sound plays, as shown in step 420.
[0079] Next, the mobile device 12 determines whether the
appropriate code was entered within 13 seconds, as shown in step
422. If so, the kill command is sent to the system server 14 and no
alerts are sent to the system server 14, as shown in step 424. In
this example, multiple kill codes are sent to ensure the system
server 14 receives the kill code in step 424. If the appropriate
code was not entered within 13 seconds, the mobile device 12 starts
to vibrate and an alert is sent to the system server 14, as shown
in step 426, and the app goes into an alert screen that will send
latitude and longitude positions to the system server 14 whenever
the phone is moved, as shown in step 428. Then the mobile device 12
vibrates, plays an alert, flickers the flash for two minutes and
then stops, and sends the latitude and longitude coordinates to the
system server 14, as shown in step 430. The system server 14 sends
a message into a call center API, as shown in step 432, the call
center receives the data into their system in step 434, and the
call center calls the user in step 436. For example, the call
center may be the response verification call center 20 shown in
FIG. 1.
[0080] As shown in step 438, the user has an opportunity to respond
that all is OK. If the user responds that all is OK, the system
server 14 updates the matter as a closed case, as shown in step
440. Alternatively, if the user does not respond that all is OK,
the system server 14 contacts the emergency responders 16 and
lifelines 18 in step 442 and the system server 14 is updated and
the case is communicated to the emergency responders 16 in step
444.
[0081] Turning now to FIG. 5, in instances in which an alarm
condition is triggered, the system server 14 may provide an event
portal 22 accessible to the user, the response verification call
center 20, the lifelines 18, and the emergency responders 16. In a
preferred embodiment, the event portal 22 provides an event panel
26 through which the various parties can access information related
to the verified alarm condition. For example, the event panel 26
may provide an event ID 28 and a user name 30 for quickly
identifying the user in question and providing a convenient manner
to track the data related to the alarm condition. The event panel
26 may further provide an approximate event address 32 that
identifies the current location of the mobile device and/or the
location at which the mobile device was located when the alarm
condition was triggered. The event panel 26 may further provide a
map 34 that identifies the relevant locations (e.g.,
current/initial event locations, location of emergency response
personnel, etc.) and updates in real-time.
[0082] As shown in FIG. 5, additional information provided by the
event panel 26 may include: user identification information 36,
such as, gender, height, weight, hair color, eye color, ethnicity,
etc.; a personal question and answer 38 used to verify the user to
disable the alarm condition (e.g., Q: What street did you grow up
on? A: Flintwood Drive); and the one or more direct dial phone
numbers for the 911 Command Centers in closest proximity to the
event location 40. The event panel 26 may provide functionality
through which the system server 14 may clear the alarm condition,
confirm appropriate action has been taken, perform various
reporting functionality (e.g., reporting to authorities and
emergency response personnel, reporting to lifelines, reporting the
resolution of the event, etc.), initiate the identification process
(e.g., automatically prompt the response verification call center
operator/representative to identify the user to confirm or clear an
alarm condition), amongst any other functionality that will be
apparent to those skilled in the art based on the description
provided herein.
[0083] In a preferred embodiment, the information provided to the
lifelines 18 may include a set of instructions 42 and
location-based information 44. As shown in FIG. 6a, in one example,
the instructions 42 may include clear and succinct instructions
adapted to most clearly help the lifelines respond appropriately.
For example, a set of instructions may include a numbered list of
instructions, such as: [0084] 1. Do not call the user. [0085] 2.
Write this address down. This is the closest address to where the
Distress Alert was activated. [Address provided.] [0086] 3. Click
on the LOCATION tab (referencing a location tab on the lifeline's
screen). [0087] 4. Refer to the map of the user's location. Use the
zoom feature to better access the area.
[0088] The location-based information 44 may include the one or
more direct dial phone numbers for the 911 Command Centers in
closest proximity to the event location 46 and a real-time updating
map identifying the event location 48. Of course many variations of
the information provided to the lifelines may be implemented.
[0089] In addition to the features and functions described above,
the personal safety system may further provide various recording
and/or streaming audio and/or video functions. For example, once a
user breaks contact with the armed mobile device, the mobile device
may immediately start recording and/or streaming audio and/or
video. Any recording may be captured within the mobile device 12.
Any streaming may be provided to the system server 14. These
functions may be helpful in identifying an assailant or otherwise
understanding what occurred immediately following the breaking of
contact with the mobile device 12. It is contemplated that in
certain versions, the mobile device 12 may record and/or stream
audio and/or video anytime the alarm is activated, such that the
audio and/or video may be used to identify the events preceding
and/or succeeding the time the user breaks contact with the armed
mobile device 12.
[0090] The geo-locating elements of the mobile device 12 may be
further utilized to provide targeted advertising to a user of the
mobile device 12. For example, the user may voluntarily enroll in
geo-fencing advertising such that the user may select the types of
advertising and discounts (e.g., locations, categories, etc.) for
which the user would like alerts/notices. Then, when the user
passes a location with which advertising is associated, an alert or
notification will be triggered on the user's mobile device 12. For
example, if a user indicates an interest in "shoes" and then walks
past a Footlocker shoe store, the mobile device 12 may be
recognized as passing within close proximity to the shoe store and
trigger a notification message that provides a discount for shoes
at the Footlocker shoe store.
[0091] It should be noted that various changes and modifications to
the presently preferred embodiments described herein will be
apparent to those skilled in the art. Such changes and
modifications may be made without departing from the spirit and
scope of the present invention and without diminishing its
attendant advantages.
* * * * *