Information handling and alarm system

ABSTRACT

An information handling and alarm system provided to help pet owners care for and find lost pets.

CROSS-REFERENCES TO RELATED APPLICATIONS

This Application takes priority to U.S. Application 62/907,899, filed onSep. 30, 2019, in incorporated in its entirety herein by reference.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

Not Applicable

INCORPORATION-BY-REFERENCE OF MATERIAL SUBMITTED ON A COMPACT DISC

Not Applicable

BACKGROUND

Pet owners leave their pets at home every day with the expectation ofreturning home to take care of them. Sometimes pet owners are delayed atwork, preventing them from providing care, such as walking a dog ontime. In a worst-case scenario, a pet owner may not be able to return tohis or her pets for an extended period due to an accident,hospitalization, or another unplanned event. Here, it is imperative thatthe pet owner be able to communicate with a pet caretaker.

In some cases, pet owners may rely on a pet caretaker for routineactivities such as: take a dog for a midday walk, take a pet to the vet,etc. Pet caretakers may need a pet owner to remind them of this task.Additionally, the pet caretaker should communicate that pet relatedtasks are completed in a timely manner so that the pet owner can havepeace of mind.

In some instances, pet owners may want to alert pet caretakers of anemergency that a pet may be experiencing. The pet owner may not be ableto respond to the emergency or may need help with the emergency. Here,it would be beneficial to provide a system that would alert knowncaretakers and first responders of the emergency.

Pet owners may also depend on a pet rescuer to take care of a pet whenit gets lost. Commonly, pets, such as dogs, wear collars having a tagwith the pet owner's contact information. However, the pet rescuer maynot be able to reach a pet owner quickly. In this case, it would bebeneficial for the pet rescuer to know about any food allergies ormedical conditions that the pet may have. It would also be beneficial,if the pet rescuer could notify a pet owner or pet caretaker who may beable to collect the pet from the pet rescuer.

There is a need for an information handling and alarm system that allowspet owners to confirm that their pets are safe and pet needs are met ineach of the above scenarios.

BRIEF DESCRIPTION OF INVENTION

An object of the invention is to provide an information handling andalarm system that allows pet owners to alert a trusted pet caretakerwhen the pet owner is unable to take care of a pet.

Another object of this invention is to provide an information handlingand alarm system that can provide confirmation to a pet owner that petcaretakers have completed an assigned pet care task.

Another object of this invention is to provide a pet collar thatcommunicates with the information handling and alarm system.

Another object of this invention is to provide an information handlingand alarm system that notifies emergency professionals when a pet ownerhas “gone missing”.

Another object of this invention is to provide an information handlingand alarm system that can provide essential information regarding a petto the rescuer of a lost pet.

Another object of this invention is to provide a pet owner an automatedphone call, email and/or SMS message when an identification number isentered into the information handling and alarm system by a pet rescuer.

Another object of this invention is to provide an information handlingand alarm system that allows a pet rescuer to communicate with a petowner or pet caretaker.

DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

Other features and advantages of the present invention will becomeapparent in the following detailed descriptions of the preferredembodiment with reference to the accompanying drawings:

FIG. 1 is an embodiment of the invention;

FIG. 1A is an embodiment of the invention;

FIG. 1B is an embodiment of the invention;

FIG. 2 is a method of the invention;

FIG. 3 is a method of the invention;

FIG. 4 is an embodiment of the invention;

FIG. 5 is an embodiment of the invention.

DETAILED DESCRIPTION OF THE INVENTION

In the following detailed description, reference is made to theaccompanying drawings, which form a part hereof. In the drawings, theuse of similar or the same symbols in different drawings typicallyindicates similar or identical items, unless context dictates otherwise.

The illustrative embodiments described in the detailed description,drawings, and claims are not meant to be limiting. Other embodiments maybe utilized, and other changes may be made, without departing from thespirit or scope of the subject matter presented here.

One skilled in the art will recognize that the herein describedcomponents (e.g., operations), devices, objects, and the discussionaccompanying them are used as examples for the sake of conceptualclarity and that various configuration modifications are contemplated.Consequently, as used herein, the specific exemplars set forth and theaccompanying discussion are intended to be representative of their moregeneral classes. In general, use of any specific exemplar is intended tobe representative of its class, and the non-inclusion of specificcomponents (e.g., operations), devices, and objects should not be takenas limiting.

The present application uses formal outline headings for clarity ofpresentation. However, it is to be understood that the outline headingsare for presentation purposes, and that different types of subjectmatter may be discussed throughout the application (e.g.,device(s)/structure(s) may be described under process(es)/operationsheading(s) and/or process(es)/operations may be discussed understructure(s)/process(es) headings; and/or descriptions of single topicsmay span two or more topic headings). Hence, the use of the formaloutline headings is not intended to be in any way limiting. Given by wayof overview, illustrative embodiments include an information handlingand alarm system (100) that creates a communication bridge between petowners, pet caretakers, and pet rescuers and a collar (400) thatcommunicates with the information handling and alarm system (100).Although the description below is provided for pets, it will be obviousto one having ordinary skill in the art that the information handlingand alarm system (100) can be employed to any situation where somethingor someone needs care.

Referring to FIG. 1 , in an embodiment, the information handling andalarm system (100) is comprised of a database (60), a communicationsystem (80) and an alarm system (20). In an embodiment, the informationhandling and alarm system (100) allows a user or pet owner (10) toprovide information related to a pet to at least one third-party (31).In an embodiment, an information handling and alarm system (100) accountis associated with a pet owner (10); while a third-party (31) is notrequired to be associated with an account. The information may include:where the pet is located (e.g. 262 Maple Street, Anywhere, USA); how toaccess the pet (e.g. “a key is under the mat” or “the door entrance codeis 123”); medical information for the pet; the pet's preferred food; atask list for the pet; amongst others.

In an embodiment, the communication system (80) is comprised of acommunication bridge (81). The communication bridge (81) allowscommunication between the information handling system (100) and at leastone third-party (31) via email, short message service (“SMS”),multimedia service (“MMS”), voice over internet protocol (“VOIP”),cellular phone, or any combination thereof; or any other form ofelectronic communication not enumerated herein. In an embodiment, thecommunication system (80) may also communicate with third-party firstresponders (31) via the communication bridge (81) or via a third-partyapplication programming interface (“API”) or other types orcommunication software or hardware. For example, the communicationsystem (80) may communicate an emergency to a third-party firstresponders (31) via an ADT® API. In the description provided herein, theword “communicate” is used to describe any method of communicationenumerated above or any combination thereof.

Referring to FIG. 1 and FIG. 1A, a user or pet owner (10) storesinformation related to at least one pet in the database (60). Theinformation may be a profile (61) and may include location information(61A) (e.g. address where the pet is located on a certain day), petidentification information (61B) (e.g. what does the pet look like, aphoto, etc.), health information (61C) (e.g. veterinarian information,medical history, etc.), how to access the pet (61D)) (e.g. the key isunder the mat), list of tasks (61E) (e.g. walk the dog at noon, feed thecat at 6 pm, etc.), or other user defined information (61F).

In an embodiment, the information handling and alarm system (100) allowsa pet owner (10) to identify at least one third-party (31) who mayreceive communication from the information handling and alarm system(100). The communication system (80) communicates to the third-party(31) a request, on behalf of the pet owner (10), to accept theresponsibility of being a pet caretaker (31). The third-party may acceptor reject responsibility. The communication system (80) communicates anotification of acceptance or rejection to the pet owner (10). In anembodiment, if the third-party (31) does not respond within apredetermined period, the communication system (80) communicates arejection notification to the pet owner (10).

Referring to FIG. 1B, in an embodiment, the third-party is a petcaretaker (31). Once a pet caretaker (31) accepts responsibility for apet, the pet owner (10) may assign at least one task (61E), via thecommunication system (80) to the pet caretaker (31). (70) In anembodiment, the pet caretaker (31) accepts the task (61E). (71) In anembodiment, the pet owner (10) may request the communication system (80)to provide the pet caretaker (31) a reminder of the task (61E). (72) Inan embodiment, the pet owner (10) may request the communication system(80) to confirm completion of the assigned task by the pet caretaker(31). (73) In an embodiment, the task (61E) may be a recurring task(61E). In an embodiment, the pet owner (10) may request thecommunication system (80) to provide the pet caretaker (31) with atleast one reminder for each recurring task (61E).

In an exemplary embodiment, the communication bridge (81) sends a SMS toa pet caretaker (31) to accept a task. (70) The SMS may request the petcaretaker to respond with “Y”, for example, if he accepts the task. (71)The communication bridge (81) may send an SMS to the pet owner (10)informing the pet owner (10) that the task has been accepted. (74) Thecommunication bridge (81) may provide the pet caretaker (31) with atleast a second SMS as a reminder. (72) The communication bridge (81)sends an SMS to the pet caretaker (31) asking for confirmation that thetask has been completed. (73) The SMS may request the pet caretaker (31)to respond with a “Y” or “N”, for example. The response is communicatedto the pet owner (10) by the communication bridge (81) with an SMS, forexample. (74)

Referring to FIGS. 1, 4, and 5 , in an embodiment, the informationhandling and alarm system (100) communicates with a collar (400); wherethe collar (400) is comprised of at least one central processing unit(50) and a tag having a unique identifier (65). In an embodiment, thecollar (400) is further comprised of at least one modular, removeableattachment (410). In an embodiment, the modular, removable attachment(410) maybe a GPS system (64), a RFID system (66), and/or a temperaturealarm (62). In a preferred embodiment, the pet collar (400) has anintegrated charging system that charges all components (GPS system, RFIDsystem, and/or temperature alarm). In an embodiment, the collar (400)may have accessories such as an LED light.

The RFID system (66) communicates with the information handling andalarm system (100). One purpose of the RFID system is to locate lostpets quickly by employing all users (10 a, 10 b . . . 10 n) that areassociated with an account on the information handling and alarm system(100).

A user (10) having associated with an account on the informationhandling and alarm system (100) may deploy the system on his/her mobiledevice. The information handling and alarm system (100), when active onthe mobile device, will receive an RFID signal. In turn, the informationhandling and alarm system (100) will communicate a pet profile (61) tousers (10 a, 10 b, . . . 10 n) in the local vicinity alerting them thata lost pet is nearby; and communicate with the pet owner (10) thelocation of the lost pet.

In an embodiment, the information handling and alarm system (100) isfurther comprised of a pet microchip scanner (40). A user may utilizethe microchip scanner (40) to obtain a pet profile (61).

In an exemplary embodiment, a pet may become lost. Here the pet owner(10) may communicate that the pet is lost to the information handlingand alarm system (100); the information handling and alarm system (100)alerts the alarm system (20). This alert notifies all user accounts tolisten for a particular RFID signal. Once the RFID signal is confirmedat a location, that location is communicated with the pet owner (10).Other nearby users (10 a, 10 b, . . . 10 n) may receive a request toaccept responsibility for the lost pet. The nearby user (10 a, 10 b, . .. 10 n) may accept or reject responsibility. Acceptance or rejection iscommunicated to the pet owner (10). If the user (10 a, 10 b, . . . 10 n)accepts responsibility, he will be provided with the pet profile (61);and the communication system (80) will allow the user (10 a, 10 b, . . .10 n) and pet owner (10) to communicate.

In an embodiment, referring to FIG. 1 and FIG. 2 , in an exemplarymethod to use the information handling and alarm system (100), a petowner (10) activates the alarm system (20) to alert at a certaintime.(202) If the pet owner (10) does not disarm the alarm system (20)or “check in” (203), the communication system (80) notifies at least onethird-party (31).(204)

In another embodiment, the alarm system (20) is set to alert based ongeo-location (205). The GPS system (64) communicates that the pet owner(10) or pet leaves a defined geo-location. (206) In an embodiment, theLED light embedded in the pet collar may start flashing when a petleaves a defined geo-location.

In a preferred embodiment, the pet owner's (10) mobile phone or tablet,deploying the information handling and alarm system (100), and having aGPS system communicates that the user (10) is leaving definedgeo-location to the information handling and alarm system (100). If thepet owner (10) does not return within to a defined geo-location—withinthe defined time (207), the communication system (80) communicates thisinformation with at least one third-party (31). (208) In an embodiment,the third party (31) is a first responder or security service. (209)

Referring to FIG. 1 , and FIG. 1A, in one embodiment, the informationhandling and alarm system (100) allows a pet owner (10) to identify aplurality of third parties (31) as potential pet caretakers (31 a, 31 b,. . . 31 n). The communication bridge (81) will communicate a request toeach of the plurality of third parties (31), on behalf of the pet owner(10), requesting each to accept the responsibility of being a petcaretaker (31 a, 31 b, . . . 31 n). The communication system (80)communicates a notification of acceptance or rejection to the pet owner(10) for each of the plurality of pet caretakers (31 a, 31 b, . . . 31n). The communication bridge (81) will communicate a request to takecare of pet(s) with the first pet caretaker (31 a). If the first petcaretaker (31 a) communicates that he or she is unable take care of thepet, then the communication bridge (81) will communicate with a second,pet caretaker (31 b) to take care of the pet. In an embodiment, thecommunication bridge (81) may cycle through each set of pet caretakers(31 a, 31 b, . . . 31 n) until one pet caretaker (31) acceptsresponsibility for the pet. In an embodiment, if the first pet caretaker(31 a) is unable to complete an assigned task (61E), the communicationbridge (81) may cycle through each set of pet caretakers (31 a, 31 b, .. . 31 n) until one pet caretaker (31) accepts the task (61E).

In an embodiment, when the pet caretaker (31) accepts responsibility forthe pet, the information handling and alarm system (100) allows the petcaretaker (31) to access information in the database (60).

In an embodiment, a third-party or pet rescuer (31) may input the uniqueidentifier (65) into the information handling and alarm system (100) toreceive information on how to contact the pet owner (10). In oneembodiment, the communication system (80) notifies the pet owner (10)that his or her pet has been found. In one embodiment, the communicationsystem (80) creates a communication bridge (81) between the pet owner(10) and the pet rescuer (31).

In one embodiment, if the pet owner (10) does not respond to thenotification from the information handling and alarm system (100), thecommunication bridge (81) will communicate with each pet caretaker (31a, 31 b, . . . 31 n) that the pet has been found until one pet caretakerresponds to the pet rescuer (31). In an embodiment, once a pet caretaker(31) has accepted responsibility for the pet, the pet owner (10) andeach pet caretaker (31 a, 31 b, . . . 31 n) is notified.

In one embodiment, when the local environmental temperature of a petgets too high or low the temperature alarm (62) is activated and thecommunication system (80) alerts the pet owner (10); a request toacknowledge the alert is communicated with the pet owner (10). If thepet owner (10) does not acknowledge the alert, the communication bridge(81) cycles through each pet caretaker (31 a, 31 b, . . . 31 n) untilone acknowledges the alert and accepts responsibility for the pet. Ifthere is no acknowledgement from the pet owner (10) or pet caretaker (31a, 31 b, . . . 31 n), the communication bridge (80) communicates withthird-party first responders (31).

Referring to FIG. 1 , FIG. 1A and FIG. 3 , in an embodiment, if the petowner (10) realizes that his or her pet is missing (301), the pet owner(10) may alert the alarm system (20). of a lost pet (302). In anembodiment, once the alarm system (20) is activated, the communicationsystem (80) notifies all users (10 a, 10 b, . . . 10 n) that the pet ismissing. (303) In an embodiment, the communication system (80) alertsand provides a profile (61) to all users (10 a, 10 b, . . . 10 n) withina certain geo-location.(306) In an embodiment, the communication system(80) alerts third-party first responders (31). (307) In an embodiment,the communication system (80) shares a profile to social media. (305)

The methods and systems described herein may be deployed in part or inwhole through a machine that executes computer software, program codes,and/or instructions on a processor. The present invention may beimplemented as a method on a machine, as a system or apparatus as of orin relation to the machine, or as a computer program product embodied incomputer readable medium executing on one or more of the machines. Theprocessor may be part of a servicer, client, network infrastructure,mobile computing platform, stationary computing platform, or othercomputing platform. A processor may be any kind of computational orprocessing device capable of executing program instructions, codes,binary instructions, and the like. The processor may be or includes asingle processor, digital processor, embedded processor, microprocessor,or any variant such as a co-processor (math co-processor, graphicco-processor, communication co-processor and the like) and may directlyor indirectly facilitate execution of multiple program code or programinstructions stored thereon. In addition, the processor may enableexecution of multiple programs, threads, and codes. The threads may beexecuted simultaneously to enhance the performance of the processor andto facilitate simultaneous operations of the application. By way ofimplementation, methods, program codes, program instructions and thelike described herein may be implemented in one or more thread. Thethread may spawn other threads that may have been assigned prioritiesassociated with them; the processor may execute these threads based onpriority or any other order based on instructions provided in theprogram code. The processor may include memory that stores methods,codes, instructions, and programs as described herein and elsewhere. Theprocessor may access a storage medium associated with the processor tostoring methods, programs, codes, program instructions or other types ofinstruction capable of being executed by the computing process devicemay include but may not be limited to one or more of CD-ROM, DVD,memory, hard disk, flash drive, RAM, ROM, cache, and the like.

A processor may include one or more cores that may enhance speed andperformance of a multiprocessor. In embodiments, the processor may be adual core processor, quad core processor, or other chip levelmultiprocessor and the like that combine two or more independent cores(called a die).

The methods and systems described herein may be deployed in part or inwhole through a machine that executes computer software on a server,client, firewall, gateway, hub, router, or other such computer ornetworking hardware. The software program may be associated with aserver that may include a file server, print server, domain server,internet server, intranet server, and another variant such as secondaryserver, host server, distributed server, and the like. The server mayinclude one or more of memories, processors, computer communicationdevices, and interfaces capable of accessing other client servers,clients, machines, and devices through wired or wireless medium, and thelike. The methods, programs or codes described herewith and elsewheremay be executed by the server. In addition, other devices required forexecution of methods as described in this application as part of aninfrastructure associated with the server.

The server may provide an interface to other devices including, withoutlimitation, clients, other servers, printers, database servers, printservers, file servers, communication servers, distributed servers, andthe like. Additionally, this coupling and connection may facilitateremote execution of program across the network. The networking of someor all these devices may facilitate parallel processing of a program ormethod at one or more locations without deviating from the scope of theinvention. In addition, any of the devices attached to the serverthrough an interface may include at least one storage medium capable ofstoring methods, programs, code and/or instructions to be executed ondifferent devices. In this implementation, the remote repository may actas a storage medium for program code, instructions, and programs.

The software program may be associated with a client that may include afile client, print client, domain client, internet client, and othervariants such as secondary clients, host clients, distributed clients,and the like. The client may include one or more memories, processors,computer readable media, storage media, ports (physical and virtual).Communication devices, and interfaces capable of accessing otherclients, servers, machines, and devices, and interfaces capable ofaccessing other clients, servers, machines, and devices, through a wiredor wireless medium, and the like. The methods, programs or codes asdescribed herein and elsewhere may be executed by the client. Inaddition, other devices required for execution of the methods asdescribed herein this application may be considered as a part of theinfrastructure associated with the client.

The client may provide an interface to other devices including withoutlimitation, servers, other clients, printers, data-based servers, fileservers, communications servers, distributed servers, and the like.Additionally, coupling and/or connection may facilitate remote executionof a program across the network. The networking of some or all thedevices may facilitate parallel processing of a program or method at oneor more locations without deviating from the scope of this invention. Inaddition, any of the devices attached to the client through an interfacemay include at least one storage medium capable of storing methods,programs, applications, code and/or instructions. A central repositorymay provide program instructions to be executed on different devices. Inthis implementation, the remote repository may act as a storage mediumfor program code, instructions, and programs.

The method and systems described herein may be deployed in part or inwhole through network infrastructures. The network infrastructure mayinclude elements such as computing devices, servers, routers, hubs,firewalls, clients, personal computers, communication devices, routingdevices, and other active and passive devices, modules and/or componentsknown in the art. The computing and or non-computing device(s)associated with the network infrastructure may include, apart from othercomponents, a storage medium such as flash memory, buffer, stack, RAM,ROM, and the like. The processes, methods, program codes, instructionsdescribed herein and elsewhere may be executed by one or more of thenetwork infrastructural elements.

The methods, program codes, and instructions described herein andelsewhere may be implemented on a cellular network having multiplecells. The cellular network may either be frequency division multipleaccess (FDMA) network or code division multiple access (CDMA) network.The cellular network may include mobile devices, cell sites, basestations, repeaters, antennas, towers, and the like. The cell networkmay be GSM, GPRS, #G 4G, EVDO, mesh, or other network types.

The methods, programs, codes, and instructions described herein andelsewhere may be implemented on or through mobile devices. The mobiledevices may include navigation devices, cell phones, mobile phones,mobile personal digital assistants, laptops, palmtops, netbooks, pagers,electronic book readers, music players and the like. These devices mayinclude, apart from other components, a storage medium such as a flashmemory, buffer, RAM, ROM, and one or more computing devices. Thecomputing devices associated with mobile devices maybe enabled toexecute program codes, methods, and instructions stored thereon.Alternatively, the mobile device maybe configured to executeinstructions in collaboration with other devices. The mobile devices maycommunicate on a peer to peer network. The program code maybe stored onthe storage medium associated with the server and executed by acomputing device embedded within the server. The base station mayinclude a computing device and a storage medium. The storage device maystore program code and instructions executed by computing devicesassociated with the base station.

The computer software, program codes, and/or instructions may be storedand/or accessed on machine readable media that may include: computercomponents, devices, and recording media that retain digital data usedfor computing for some interval of time; semiconductor storage known asrandom access memory (RAM); mass storage typically for more permanentstorage such as optical discs, forms of magnetic storage, like harddisks, tapes, drums, cards, and other types; processor registers, cachememory, volatile memory, non-volatile memory, optical storage such asCD, DVD; removable media such as flash memory (e.g. USB sticks or keys),floppy disks, magnetic tape, paper tape, punch cards, standalone RAMdisks, Zip drives, removable mass storage, off-line, and the like; othercomputer memory such as dynamic memory, static memory, read/writestorage, mutable storage, read only, random access, sequential access,network attached storage, file addressable, content addressable,network, barcodes, magnetic ink, and the like.

The methods and systems described herein may transform physical and/orintangible items from one state to another. The methods and systemsdescribed herein may also transform data representing physical and/orintangible items from one state to another.

The elements described and depicted herein, including flow charts andblock diagrams throughout the figures, imply logical boundaries betweenthe elements. However, according to software or hardware engineeringpractices, the depicted elements and functions thereof may beimplemented on machines through computer executable media having aprocessor capable of executing program instructions, as standalonesoftware modules, or as modules that employ external routines, codes,services, and so forth, or any combination of these, and all suchimplementations maybe within the scope of the present disclosures.Examples of such machines may include, but may not be limited to,personal digital assistants, laptops, personal computers, mobile phones,other handheld computing devices, medical equipment, wired or wirelesscommunication devices, transducers, chips, calculators, sat-ellites,tablet PCs, electronic books, gadgets, electronic devices, deviceshaving artificial intelligence, computing devices, networking equipment,servers, routers and the like. Furthermore, the elements depicted in theflow chart and block diagrams or any other logical component may beimplemented on a machine capable of executing program instructions.Thus, while the foregoing drawings and descriptions set forth functionalaspects of the disclosed systems, no particular arrangement of softwarefor implementing these functional aspects should be inferred from thesedescriptions unless explicitly stated or otherwise clear from thecontext. Similarly, it will be appreciated that the various stepsidentified and described above may be varied, and that the order ofsteps may be adapted to applications of the techniques disclosed herein.All such variations and modifications are intended to fall within thescope of this disclosure. As such, the depiction and/or description ofan order for various steps should not be understood to require aparticular order of execution for those steps, unless required by aparticular application, or explicitly stated or otherwise clear from thecontext.

The methods and/or processes described above, and steps hereof, may berealized in hardware, software or any combination of hardware andsoftware suitable for an application. The hardware may include ageneral-purpose computer and/or dedicated computing device or specificcomputing device or aspect or component of a specific computing device.The processes may be realized in one or more microprocessors,microcontrollers, embedded microcontrollers, programmable digital signalprocessors or other programmable device, along with internal and/orexternal memory. The processes may also, or instead, be embodied in anapplication specific integrated circuit, a programmable gate array,programmable array logic, or any other device or combination of devicesthat may be configured to process electronic signals. It will further beappreciated that one or more of the processes may be realized as acomputer executable code capable of being executed on a machine readablemedium.

The computer executable code may be created using a structuredprogramming language such as JAVA, C, an object oriented programminglanguage such as C++, or any other high level or low-level programminglanguage (including assembly languages, hardware description languages,and database programming languages and technologies) that may be stored,compiled or interpreted to run on one of the above devices, as well asheterogeneous combinations of processors, processor architectures, orcombinations of different hardware and software, or any other machinecapable of executing program instructions.

Thus, in one aspect, each method described above, and combinationsthereof may be embodied in computer executable code that, when executingon one or more computing devices, performs the steps thereof. In anotheraspect, the methods may be embodied in systems that perform the stepsthereof, and may be distributed across devices in several ways, or allthe functionality may be integrated into a dedicated, standalone deviceor other hardware. In another aspect, the means for performing the stepsassociated with the processes described above may include any of thehardware and/or software described above. All such permutations andcombinations are intended to fall within the scope of the presentdisclosure.

While the invention has been disclosed in connection with the preferredembodiments shown and described in detail, various modifications andimprovements thereon will become readily apparent to those skilled inthe art. Accordingly, the spirit and scope of the present invention isnot to be limited by the foregoing examples, but is to be understood inthe broadest sense allowable by law.

We claim:
 1. An information handling and alarm system deployed on amobile device comprising at least one database, a communication system,and an alarming system whereby: a. a user having an account on theinformation handling and alarm system provides to the databaseinformation related to one pet; whereby the information includes atleast: location information of the pet, identification information forthe pet, health information pet for the pet, how to access the pet, andlist of tasks for the pet; b. where the alarm system includes at leastone alert taken from the list comprising a geo-location alert, RFIDlost/found pet alert, a time away alert, and a temperature alert; c.whereby the user identifies at least one third-party; d. whereby thecommunication system allows communication between the user and thethird-party; e. whereby the third-party accepts or rejects futurecommunications from the information handling and alarm system; f.whereby, when the third-party accepts future communications, the usermay assign the third party at least one task.
 2. The informationhandling and alarm system of claim 1 where when the task is completed,the third-party communicates completion.
 3. The information handling andalarm system of claim 1 whereby the user identifies a plurality of thirdparties.
 4. The information handling system of claim 3 whereby an alertis alarmed and each third-party is notified of the alarm, in series,until one third-party responds to the alarm.
 5. The information handlingsystem of claim 4 where the alert is communicated to first responders orprivate security.
 6. The information handling and alarm system of claim1 communicates with a collar; whereby the collar is comprised of anunique identifier and at least one modular, removable unit; whereby themodular, removable unit is comprised of at least one taken from the listcomprising: temperature sensor, GPS system, RFID system.
 7. Theinformation handling and alarm system of claim 6 where at least one userreceives an alert when a RFID system is within range.
 8. The informationhandling and alarm system of claim 1 whereby an alerted alarm isdisplayed as a social media post.
 9. The information handling and alarmsystem of claim 1 is further comprised of a microchip reader.