Emergency communication flow management and notification system

ABSTRACT

Described herein are systems, devices, methods, and media for connecting a user for providing emergency assistance based on emergency alerts from triggering devices such as voice or sound triggered emergency alerts. In some cases, the location of the emergency is provided.

CROSS-REFERENCE

This application is a continuation of U.S. Ser. No. 16/663,295, filedOct. 24, 2019, which claims the benefit of U.S. Provisional ApplicationNo. 62/750,175, filed Oct. 24, 2018, the contents of which is herebyincorporated herein by reference.

BACKGROUND OF THE INVENTION

A person in an emergency situation may request help using a mobilecommunication device such as a cell phone to dial a designated emergencynumber like 9-1-1 or a direct access phone number for the localemergency service provider (e.g., an emergency dispatch center). Thiscall is assigned to one or more first responders by the emergencyservice provider. However, these communications are typically limited toaudio calls with narrow functionality since most emergency serviceproviders that receive emergency calls currently lack the capacity formore sophisticated communications.

SUMMARY OF THE INVENTION

One advantage provided by the systems, servers, devices, methods, andmedia of the instant application is the ability to easily andefficiently make customized emergency flow scripts for handlingemergency alerts. In some embodiments, emergency flows scripts areassembled into custom emergency flows using various emergency flowbuilding blocks. These blocks provide a modular structure that allowsauthorized users to select specific building blocks as desired to createunique emergency flows that are tailored to the needs of the users. Insome embodiments, the blocks are depicted on a graphic user interfacethat allows users to drag and drop building blocks to generate emergencyflows with ease.

Another advantage provided by the systems, servers, devices, methods,and media of the instant application are emergency response managementprocesses that execute customized emergency flow scripts based on theemergency alert. In some embodiments, an emergency alert comprises anemergency flow identifier that is used to determine the emergency flowscript to execute in response to receiving the alert. Thus, a singlecall management system may provide multiple customized emergency flowscripts based on various parameters (e.g., type of device sending theemergency alert, device functionality, type of emergency, etc.).

Another advantage provided by the systems, servers, devices, methods,and media of the instant application is the facilitation of emergencyresponse communications. Many companies and institutions provide devicesand services for monitoring potential emergencies, such as wearabledevices that monitor heart rates or intelligent vehicular systems thatcan detect when a vehicle has been in an accident. However, due to theregulatory requirements for emergency communications (e.g., calling9-1-1 in the United States), few of the aforementioned services anddevices are capable of connecting end users directly to emergencyresponders. The management systems provided herein provide theseservices and devices with the infrastructure necessary to connect theirend users with emergency responders through a simple and customizableintegration.

Another advantage provided by the systems, servers, devices, methods,and media of the instant application are emergency response managementprocesses that execute emergency flow scripts or notification proceduresin response to receiving an emergency indication (e.g., a query foremergency information) from an emergency service provider (e.g., apublic safety answering point (PSAP)). By executing emergency flowscripts or notification procedures in response to emergency indicationsreceived from emergency service providers, the emergency managementsystem can eliminate the need for additional hardware and software to beinstalled on communication devices in order to initiate emergency flowscripts or notification procedures.

Another advantage provided by the systems, servers, devices, methods,and media of the instant application are emergency flows or notificationprocedures that allow to continue a sequence of notification until auser who is available and willing to call for emergency help is found.In addition, automated notification messages and status updates can alsobe sent during an emergency situation.

Another advantage provided by the systems, servers, devices, methods,and media of the instant application is an emergency management system(EMS) for receiving emergency data from an emergency service provider(ESP; e.g., a public safety answering point (PSAP)) and share theemergency data with one or more “upstream” recipients. By sharingemergency data upstream, the EMS can help facilitate faster and moreintelligent emergency responses. In some embodiments, the EMS can useemergency data received from an ESP to trigger a notification procedureor an emergency flow. In some embodiments, the EMS can use emergencydata received from an ESP to provide the ESP with functionalenhancements, such as the ability to remotely activate a schoolbuilding's emergency lockdown system.

In one aspect, disclosed herein is a method for notifying one or morecontacts of an emergency by an emergency management system, the methodcomprising: (a) receiving a query comprising a user identifier from anemergency service provider (ESP), wherein the user identifier isassociated with a user in an emergency; (b) determining a personalizednotification procedure associated with the user identifier; (c)identifying the one or more contacts to be notified regarding theemergency according to the personalized notification procedure; and (d)initiating communication with the one or more contacts according to thepersonalized notification procedure. In some embodiments, thepersonalized notification procedure comprises sending at least onemessage to a contact list comprising one or more emergency contacts tobe notified regarding the emergency. In some embodiments, the step ofinitiating communication with the one or more contacts in (d) comprisescalling one or more emergency contacts to be notified regarding theemergency. In some embodiments, the query is received based on a proxyemergency communication made by an emergency contact from the contactlist on behalf of the user in an emergency. In some embodiments, theuser is in a data sharing group comprising the one or more contactslinked to one or more member devices. In some embodiments, the user hasauthorized location sharing with the one or more member devicesassociated with the one or more emergency contacts during the emergency.In some embodiments, the method further comprises obtaining a locationof the user and sharing the location with one or more member devicesauthorized for location sharing according to the personalizednotification procedure. In some embodiments, the location of the user isdetermined using location services for an electronic device associatedwith the user. In some embodiments, one or more emergency contacts ofthe user are authorized to receive additional data comprising images,video feed, sensor data, or ESP or response data during an emergency. Insome embodiments, the one or more contacts comprise an emergency contactassociated with the user identifier, or an organizational contactassociated with the user identifier, or both. In some embodiments, theone or more contacts includes an organizational contact. In someembodiments, the one or more contacts comprises a call center. In someembodiments, the user identifier is a phone number. In some embodiments,the user identifier is an email address, user account ID or username. Insome embodiments, the user identifier identifies an electronic deviceassociated with the user. In some embodiments, the user identifier is aninternational mobile equipment identity (IMEI) number for a user device,a device ID, Mac address, an internet protocol (IP) address, Wi-fi orBluetooth access point, or a SIM card number. In some embodiments, themethod further comprises: (a) receiving submission of the useridentifier to be associated with the personalized notificationprocedure; (b) configuring the personalized notification procedure basedon user instructions or organizational customizations; and (c)associating the user identifier with the personalized notificationprocedure in a user identification database. Disclosed herein, inanother aspect, is an emergency management system configured to carryout the method of any of the preceding embodiments. Disclosed herein, inanother aspect, is non-transitory computer readable medium includinginstructions executable by a processor to create an applicationconfigured to carry out the method of any of the preceding embodiments.

Disclosed herein, in another aspect, is a method for identifying andexecuting emergency flows by an emergency management system, the methodcomprising: (a) receiving a query comprising a user identifier from anemergency service provider (ESP); (b) identifying at least one emergencyflow script associated with the user identifier, said emergency flowscript defining a pathway of execution of two or more emergency flowbuilding blocks, wherein each of said two or more emergency flowbuilding blocks comprises instructions to perform an emergency responsefunction; and (c) executing the emergency flow script associated withthe user identifier. In some embodiments, the at least one emergencyflow script comprises two emergency flow scripts associated with theuser identifier. In some embodiments, the two emergency flow scriptscomprise a main emergency flow and an auxiliary emergency flow. In someembodiments, the two emergency flow scripts comprise a home emergencyflow and a work emergency flow. In some embodiments, the ESP is a publicsafety answering point (PSAP). In some embodiments, the user identifieris a phone number. In some embodiments, the method further comprises:(a) providing a graphical user interface comprising a plurality ofemergency flow building blocks; and (b) providing an interactive digitalenvironment within which two or more emergency flow building blocks arevisually assembled into the emergency flow script. In some embodiments,the emergency flow script is stored within an emergency flow databasecomprising a plurality of emergency flow scripts. In some embodiments,the method further comprises: (a) receiving submission of the useridentifier to be associated with the emergency flow script; and (b)associating the user identifier with the emergency flow script. In someembodiments, executing the emergency flow script comprises: (a)accessing a prioritized list of accounts associated with the useridentifier; (b) attempting to connect with an account on the prioritizedlist in order of priority; and (c) attempting to connect with a nextaccount on the prioritized list in order of priority when a connectionwith a preceding account on the prioritized list is unsuccessful. Insome embodiments, executing the emergency flow script comprisesdelivering an emergency notification to an electronic device associatedwith an emergency contact associated with the user identifier. In someembodiments, the emergency notification is an SMS text message. In someembodiments, executing the emergency flow script further comprises: (a)querying a location database using the user identifier; and (b)retrieving a location associated with the user identifier from thelocation database; wherein the emergency notification comprises thelocation associated with the user identifier. In some embodiments, thelocation database receives the location associated with the useridentifier from an electronic device associated with the user identifierbefore being queried using the user identifier. In some embodiments,executing the emergency flow script comprises: (a) transmitting aninteractive message to an electronic device linked to an emergencycontact associated with the user identifier; (b) receiving confirmationof receipt of the interactive message; and (c) establishing acommunication link between an emergency service provider and theelectronic device associated with the emergency contact. In someembodiments, the communication link comprises a data channel. In someembodiments, the communication link comprises a voice over IP (VoIP)channel. In some embodiments, the method further comprises: (a) queryingan emergency database using the user identifier; (b) retrievingemergency data associated with the user identifier from the emergencydatabase; and (c) transmitting the emergency data associated with theuser identifier to the emergency service provider. In some embodiments,the method further comprises establishing a communicative link with anelectronic device associated with the user identifier. In someembodiments, the method further comprises gathering emergency data fromthe electronic device through the communicative link. In someembodiments, executing the emergency flow script comprises transmittingthe emergency data gathered from the electronic device to an emergencycontact associated with the user identifier or an emergency serviceprovider. In some embodiments, the electronic device is a computer, atablet, a mobile phone, a smartphone, a laptop, a vehicle emergencysystem, a server, a panic button, a wearable device, an IoT device, asensor, or a home security device. In some embodiments, the methodfurther comprises delivering an emergency notification to the electronicdevice according to the emergency flow script. Disclosed herein, inanother aspect, is an emergency management system configured to carryout the method of any of the preceding embodiments. Disclosed herein, inanother aspect, is non-transitory computer readable medium includinginstructions executable by a processor to create an applicationconfigured to carry out the method of any of the preceding embodiments.

Disclosed herein, in another aspect, is a method for identifying andexecuting emergency flows by an emergency management system, the methodcomprising: (a) receiving a query comprising a user identifier from anemergency service provider (ESP); (b) identifying an organizationalidentifier associated with the user identifier; (c) identifying anemergency flow script associated with the organizational identifier, theemergency flow script defining a pathway of execution of emergencyfunctions; and (d) executing the emergency flow script associated withthe organizational identifier. In some embodiments, identifying theorganizational identifier in step (b) comprises searching for anassociated organization in one or more databases using the useridentifier. In some embodiments, organizational identifier is associatedwith one or more organizational credentials. Disclosed herein, inanother aspect, is an emergency management system configured to carryout the method of any of the preceding embodiments. Disclosed herein, inanother aspect, is non-transitory computer readable medium includinginstructions executable by a processor to create an applicationconfigured to carry out the method of any of the preceding embodiments.

Disclosed herein, in another aspect, is a method for providingnotification of an emergency by an emergency management system, themethod comprising: (a) receiving a query comprising a user identifierfrom an emergency service provider (ESP); (b) identifying anorganizational identifier associated with the user identifier; (c)identifying a notification procedure associated with the organizationalidentifier; and (d) executing the notification procedure associated withthe organizational identifier. In some embodiments, the notificationprocedure comprises connecting with one or more organizational emergencycontacts. In some embodiments, connecting with one or moreorganizational emergency contacts comprises sending a text message,sending an email message, sending a chat message, and calling theorganizational emergency contacts. Disclosed herein, in another aspect,is an emergency management system configured to carry out the method ofany of the preceding embodiments. Disclosed herein, in another aspect,is non-transitory computer readable medium including instructionsexecutable by a processor to create an application configured to carryout the method of any of the preceding embodiments.

Disclosed herein, in another aspect, is a method for providingnotification of an emergency by an emergency management system, themethod comprising: (a) receiving a query comprising a user identifierfrom an emergency service provider (ESP); (b) querying a locationdatabase using the user identifier to retrieve a location associatedwith the user identifier; (c) determining that the location associatedwith the user identifier is located within an organizational geofenceassociated with an organizational identifier; (d) identifying anemergency flow script associated with the organizational identifier, theemergency flow script defining a pathway of execution of emergencyfunctions comprising steps for notifying one or more emergency contacts;and (e) executing the emergency flow script associated with theorganizational identifier. In some embodiments, the emergency flowscript specifies an organizational contact to be notified of anemergency. Disclosed herein, in another aspect, is an emergencymanagement system configured to carry out the method of any of thepreceding embodiments. Disclosed herein, in another aspect, isnon-transitory computer readable medium including instructionsexecutable by a processor to create an application configured to carryout the method of any of the preceding embodiments.

Disclosed herein, in another aspect, is an emergency management systemcomprising: (a) a user identification database storing a plurality ofuser identifiers associated with notification procedures; (b) a servercomprising at least one processor and a memory; and (c) non-transitorycomputer readable storage medium encoded with a server applicationincluding instructions executable by the at least one processor, theserver application comprising: (i) a query module configured to receivea query comprising a user identifier from an emergency service provider(ESP); (ii) a user identification module configured to locate anotification procedure associated with the user identifier in the useridentification database; and (iii) an emergency notification moduleconfigured to execute the notification procedure associated with theuser identifier, wherein the notification procedure defines a pathway ofexecution of emergency functions comprising steps for notifying one ormore emergency contacts. In some embodiments, the system furthercomprises a registration application configured to: (a) receive asubmission of the user identifier; (b) receive a definition of thenotification procedure; and (c) associate the user identifier with thenotification procedure within the user identification database. In someembodiments, the registration application is a mobile application or webapplication and comprises a graphical user interface for receiving thesubmission of the user identifier and the definition of the notificationprocedure.

Disclosed herein, in another aspect, is an emergency management systemfor identifying and executing emergency flows, the system comprising:(a) an emergency flow database configured to: (i) store a plurality ofemergency flow scripts; and (ii) store a plurality of user identifiers,wherein each user identifier is associated with one or more emergencyflow scripts; and (b) an emergency response server configured to: (i)receive a query comprising a user identifier from an emergency serviceprovider (ESP); (ii) identify an emergency flow script associated withthe user identifier from the emergency flow database; and (iii) executethe emergency flow script associated with the user identifier, whereinthe emergency flow script defines a pathway of execution of emergencyfunctions comprising steps for notifying one or more emergency contactsregarding an emergency. In some embodiments, the system furthercomprises an emergency flow editor application providing a graphicaluser interface comprising: (a) a plurality of emergency flow buildingblocks, wherein each emergency flow building block comprisesinstructions to perform an emergency response function; and (b) aninteractive digital environment within which two or more emergency flowbuilding blocks are visually assembled into the emergency flow script.

Disclosed herein, in another aspect, is a system for emergencycommunications comprising: (a) an emergency triggering device configuredto transmit an emergency alert when an emergency is detected; and (b) atleast one server providing an emergency management system serverapplication configured to: (i) receive the emergency alert from thetriggering device, the emergency alert comprising a list of at least oneassociated device of the triggering device; and (ii) connect to anassociated device from the list; (iii) prompt the associated device forconfirmation of the emergency by a user of the associated device; and(iv) establish a conference bridge with the user and an appropriatedispatch center for responding to the emergency. In some embodiments,the emergency alert is triggered autonomously based on sensor data. Insome embodiments, the emergency alert is triggered when sensor valuesexceed a threshold. In some embodiments, the server application isconfigured to determine an appropriate emergency dispatch center basedon location information from the emergency alert. In some embodiments,the server application is configured to connect with the triggeringdevice before connecting with the at least one associated device. Insome embodiments, the list is a prioritized list having a plurality ofassociated devices. In some embodiments, the server application isconfigured to connect to a next associated device in the prioritizedlist in order of priority when a connection with a preceding associateddevice is unsuccessful. In some embodiments, the server applicationattempts to connect to at least two associated devices concurrently. Insome embodiments, the system further comprises a database storing useraccount information comprising at least one phone number and anyemergency contacts for one or more users. In some embodiments, theserver application looks up the at least one associated device byquerying the at least one database using a telephone number associatedwith the triggering device. In some embodiments, the emergency alertcomprises an authorization code or credential for initiating anemergency call. In some embodiments, the server application looks up anassociated device by querying the at least one database using one of anemail address, physical address, x-y coordinate, BSSID, SSID, and MACaddress of the associated device. In some embodiments, the user isconnected to the emergency dispatch center by an audio call, wherein anemergency management system establishes a conference bridge with theuser and the emergency dispatch center. In some embodiments, the user isconnected to an appropriate emergency dispatch center based on thelocation information in the emergency alert through a proxy emergencycall. In some embodiments, a notification is sent to the user when theemergency alert has been triggered and the server application was unableto connect to a user. In some embodiments, a unique sessionidentification for the emergency is included in the emergency alert andincluded in session updates. In some embodiments, the emergency istriggered by user interaction with the triggering device, wherein theuser interaction comprises at least one of pressing a soft or hardbutton, a gesture, or a voice command.

Disclosed herein, in another aspect, is a method for notifying one ormore contacts of an emergency by an emergency management system, themethod comprising: (a) receiving a query comprising a user identifierfrom an emergency service provider (ESP), wherein the user identifier isassociated with a user in an emergency; (b) sending location data forthe user identifier to the ESP through a secure pathway; (c) identifyinga personalized notification procedure associated with the useridentifier; (d) executing the notification procedure associated with theuser identifier, said notification procedure comprising identifying theone or more contacts to be notified regarding the emergency andcommunicating with the one or more contacts. In some embodiments, theuser identifier is used to query for location data in one or moreemergency databases. In some embodiments, the location data isdevice-based hybrid location determined on one or more devicesassociated with the user. In some embodiments, the location datacomprises latitude, longitude and location accuracy. In someembodiments, the location data is shared with the one or more contacts.In some embodiments, additional data associated with the user identifieris shared with the one or more contacts, wherein the additional datacomprises user data, medical data, webcam images, video feed, audiofiles, or any combination thereof. Disclosed herein, in another aspect,is an emergency management system configured to carry out the method ofany of the preceding embodiments. Disclosed herein, in another aspect,is non-transitory computer readable medium including instructionsexecutable by a processor to create an application configured to carryout the method of any of the preceding embodiments.

Disclosed herein, in another aspect, is a method for notifying one ormore contacts of an emergency by an emergency management system, themethod comprising: (a) receiving a query comprising a user identifierfrom an emergency service provider (ESP), wherein the user identifier isassociated with a user in an emergency; (b) identifying a personalizednotification procedure associated with the user identifier wherein thepersonalized notification procedure takes the location data as an inputfor selecting an emergency flow script from a plurality of emergencyflow scripts; (c) executing the selected emergency flow scriptassociated with the user identifier. In some embodiments, the selectedemergency flow script is an organizational emergency flow, wherein thelocation data indicates that the user was on the premises of theassociated organization. In some embodiments, the selected emergencyflow script is a family emergency flow, wherein the location data isshared with verified emergency contacts. In some embodiments, theselected emergency flow script is a work emergency flow, wherein thetime of the emergency indicates that the user is working. Disclosedherein, in another aspect, is an emergency management system configuredto carry out the method of any of the preceding embodiments. Disclosedherein, in another aspect, is non-transitory computer readable mediumincluding instructions executable by a processor to create anapplication configured to carry out the method of any of the precedingembodiments.

Disclosed herein, in another aspect, is a system for emergencycommunications comprising: (a) a triggering device detecting an audioemergency trigger and sending an emergency alert to the emergencymanagement system; and (b) at least one server providing a serverapplication at the emergency management system, said server applicationcomprising: (i) a software module receiving the emergency alert from thetriggering device; (ii) a software module determining a callback numberfor the triggering device, wherein the callback number is selected andassigned to the triggering device when the triggering device does nothave a phone number; (iii) a software module determining a location ofthe triggering device, pairing the location with the callback number,and updating a location database accessible by emergency serviceproviders with the paired location and callback number; (iv) a softwaremodule identifying an appropriate emergency service provider forresponding to the emergency alert based on the location of thetriggering device and facilitating an emergency communication sessionwith the appropriate emergency service provider, wherein the callbacknumber enables the emergency communication session with the triggeringdevice to be re-established in case of disconnection. In someembodiments, the triggering device comprises a microphone for picking upvoice and sound triggers. In some embodiments, the triggering devicecomprises a microphone and speakers for establishing an emergency call.In some embodiments, the audio emergency trigger is a voice command. Insome embodiments, the emergency communication session is initiated afterreceiving a confirmation of the emergency selected from the listcomprising a second voice command, background sounds, webcam images, andvideo feed. In some embodiments, the emergency communication session isinitiated after receiving confirmation of the emergency by firstconnecting with a call center. In some embodiments, determining thelocation of the triggering device comprises getting a user to provide orconfirm the location of the emergency. In some embodiments, theemergency communication session is initiated after verifying userconsent for initiating the emergency communication session. In someembodiments, the emergency alert comprises an API request to theemergency management system to initiate the emergency communicationsession. In some embodiments, the triggering device is a phone and thecallback number is a phone number of the triggering device. In someembodiments, the triggering device is an Internet of Things (IoT)device. In some embodiments, the triggering device is a smart speaker.In some embodiments, the triggering device is connected as part of amesh network. In some embodiments, the triggering device is part of alocal network of smart devices. In some embodiments, the local networkis a home, office, or business network. In some embodiments, theemergency communication session is established on a communication devicethat is paired or synched with the triggering device via Bluetooth orother connection. In some embodiments, the emergency alert from thetriggering device is sent to the emergency management system through amesh network or an intermediate communication device. In someembodiments, the intermediate communication device is a cell phone orInternet router. In some embodiments, the triggering device gathersemergency information in response to detecting the audio emergencytrigger and provides the emergency information to the emergencymanagement system. In some embodiments, the emergency informationcomprises location information, sensor data, audio, video, userinformation, emergency contact information, type of emergency, or anycombination thereof. In some embodiments, the triggering device gathersthe emergency information from one or more devices in a local network.In some embodiments, the location database is an E911 ALI database. Insome embodiments, the location database is an NG911 clearinghousedatabase. In some embodiments, the emergency communication session is atwo-way audio session established using SIP protocol. In someembodiments, wherein the triggering device utilizes a voice assistanceservice to transmit the emergency alert to the emergency managementsystem as an API request. In some embodiments, the server applicationfurther comprises a software module re-establishing the communicationsession upon receiving a request to re-establish communications with thecallback number from the emergency service provider. In someembodiments, the triggering device receives sensor data from a networkof sensor devices indicative of an emergency situation and attempts toreport the emergency situation to a user. In some embodiments, thetriggering device attempts to report the emergency situation to the userby broadcasting an audio message. In some embodiments, participants inthe emergency communication session are the emergency service providerand an associated device of the triggering device. In some embodiments,the associated device is a communication device associated with thetriggering device or a user of the triggering device and is selectedfrom a prioritized list of associated devices to participate in theemergency communication session.

In another aspect, disclosed herein is a method for notifying one ormore recipients of an emergency by an emergency management systemcomprises: a) receiving an electronic communication from an emergencyservice provider (ESP), wherein the electronic communication is anindication of an emergency alert received by the ESP and comprises auser identifier; b) gathering a set of emergency data associated withthe emergency alert, wherein the set of emergency data comprises theuser identifier; c) determining, using the set of emergency data, anappropriate notification procedure to be executed; and d) executing thenotification procedure to initiate communication with the one or morerecipients. In some embodiments, the one or more recipients arespecified by the notification procedure. In some embodiments, the one ormore recipients comprises a prioritized list of emergency contacts thatare contacted sequentially. In some embodiments, the electroniccommunication is received through an application programming interface(API). In some embodiments, the electronic communication comprises someor all of the set of emergency data. In some embodiments, the methodfurther comprises: a) wherein the set of emergency data comprises a useridentifier; and b) wherein determining the appropriate notificationprocedure using the set of emergency data comprises identifying anotification procedure associated with the user identifier from anotification procedure database. In some embodiments, the useridentifier is a phone number or an email address. In some embodiments,the method further comprises: a) receiving definition of thenotification procedure, wherein the notification procedure defines oneor more contacts and an order of contacting the one or more contacts; b)associating the notification procedure with the user identifier; and c)storing the notification procedure in a notification procedure database.In some embodiments, the definition of the notification procedure isreceived through a graphical user interface of an emergency responseapplication provided by the EMS. In some embodiments, executing thenotification procedure to initiate communication with the one or morerecipients comprises transmitting at least one electronic messageindicative of an emergency associated with the user identifier to theone or more contacts. In some embodiments, executing the notificationprocedure to initiate communication with the one or more recipientscomprises initiating a voice call with the one or more contacts. In someembodiments, the voice call is facilitated over voice over internetprotocol (VoIP). In some embodiments, the one or more contacts comprisesan emergency contact associated with the user identifier. In someembodiments, the one or more contacts comprises an organizationalcontact associated with the user identifier. In some embodiments, themethod further comprises obtaining a location associated with the useridentifier and sharing the location with the one or more contactsaccording to the notification procedure. In some embodiments, thelocation associated with the user identifier is obtained from anelectronic device associated with the user identifier. In someembodiments, the location associated with the user identifier is adevice-based hybrid location generated by the electronic deviceassociated with the user identifier. In some embodiments, the set ofemergency data comprises the location associated with the useridentifier. In some embodiments, the set of emergency data comprises alocation; and determining the appropriate notification procedure usingthe set of emergency data comprises: i) accessing a set of geofencesassociated with a plurality of third-party accounts; ii) determiningthat the location is within a geofence associated with a firstthird-party account; and iii) identifying a notification procedureassociated with the first third-party account. In some embodiments, theset of emergency data further comprises an emergency type; and executingthe notification procedure comprises: i) identifying a set of emergencytypes selected for the first third-party account; ii) determining thatthe emergency type associated with the emergency alert is included inthe set of emergency types selected for the first third-party account;and iii) executing the notification procedure in response to determiningthat the emergency type is included in the set of emergency typesselected for the first third-party account. In some embodiments, thethird-party account is a second ESP. In some embodiments, the set ofemergency data comprises a user identifier and wherein determining theappropriate notification procedure to be executed comprises: a)identifying a third-party account associated with the user identifier;and b) identifying a notification procedure associated with thethird-party account. In some embodiments, executing the notificationprocedure comprises transmitting a second set of data comprising some orall of the set of emergency data to the one or more recipients. In someembodiments, the ESP is a public safety answering point (PSAP) andwherein the emergency alert is an emergency call received by the PSAP.In some embodiments, the ESP is an alarm monitoring center. In someembodiments, the recipient is a neighboring PSAP. Disclosed herein is anemergency management system (EMS) comprising at least one processor andnon-transitory computer readable storage medium including instructionsexecutable by the at least one processor to perform the method fornotifying one or more recipients of an emergency.

In another aspect, disclosed herein is a method for notifying one ormore contacts of an emergency by an emergency management systemcomprises: a) receiving definition of a personalized notificationprocedure defining one or more contacts and an order of contacting theone or more contacts; b) associating the personalized notificationprocedure with a user identifier; c) storing the personalizednotification procedure in a notification procedure database; d)receiving an emergency communication comprising the user identifier froman emergency service provider (ESP); e) identifying the personalizednotification procedure associated with the user identifier from thenotification procedure database; and f) executing the personalizednotification procedure to initiate communication with the one or morecontacts according to the personalized notification procedure. Disclosedherein is an emergency management system (EMS) comprising at least oneprocessor and non-transitory computer readable storage medium includinginstructions executable by the at least one processor to perform themethod for notifying one or more recipients of an emergency.

In another aspect, disclosed herein is a method for notifying one ormore recipients of an emergency by an emergency management systemcomprises: a) receiving an electronic communication from an emergencyservice provider (ESP), wherein the electronic communication isassociated with an emergency alert received by the ESP and comprises aset of emergency data comprising a location; b) accessing a set ofgeofences associated with third-party accounts; c) determining that thelocation is within a geofence associated with a first third-partyaccount; d) identifying a notification procedure associated with thefirst third-party account; and e) executing the notification procedureto initiate communication with the one or more recipients. Disclosedherein is an emergency management system (EMS) comprising at least oneprocessor and non-transitory computer readable storage medium includinginstructions executable by the at least one processor to perform themethod for notifying one or more recipients of an emergency.

In another aspect, disclosed herein is a method for notifying one ormore recipients of an emergency by an emergency management systemcomprises: a) receiving an electronic communication from an emergencyservice provider (ESP), wherein the electronic communication isassociated with an emergency alert received by the ESP and comprises aset of emergency data comprising a location and an emergency type; b)accessing a set of geofences associated with third-party accounts; c)determining that the location is within a geofence associated with afirst third-party account; d) identifying a notification procedureassociated with the first third-party account; e) identifying a set ofemergency types selected for the first third-party account; f)determining that the emergency type is included in the set of emergencytypes selected for the first third-party account; and g) in response todetermining that the emergency type is included in the set of emergencytypes selected for the first third-party account, executing thenotification procedure to initiate communication with the one or morerecipients. Disclosed herein is an emergency management system (EMS)comprising at least one processor and non-transitory computer readablestorage medium including instructions executable by the at least oneprocessor to perform the method for notifying one or more recipients ofan emergency.

In another aspect, disclosed herein is a method for notifying one ormore recipients of an emergency by an emergency management systemcomprises: a) receiving an electronic communication from an emergencyservice provider (ESP), wherein the electronic communication isassociated with an emergency alert received by the ESP and comprises aset of emergency data comprising a user identifier; b) identifying athird-party account associated with the user identifier from a database;c) identifying a notification procedure associated with the third-partyaccount from a notification procedure database comprising a plurality ofnotification procedures associated with a plurality of third-partyaccounts; and d) executing the notification procedure associated withthe third-party account to initiate communication with the one or morerecipients according to the notification procedure. Disclosed herein isan emergency management system (EMS) comprising at least one processorand non-transitory computer readable storage medium includinginstructions executable by the at least one processor to perform themethod for notifying one or more recipients of an emergency.

BRIEF DESCRIPTION OF THE DRAWINGS

The novel features of the invention are set forth with particularity inthe appended claims. A better understanding of the features andadvantages of the present invention will be obtained by reference to thefollowing detailed description that sets forth illustrative embodiments,in which the principles of the invention are utilized, and theaccompanying drawings of which:

FIG. 1A, FIG. 1B, FIG. 1C, and FIG. 1D depict embodiments of the (i)emergency flow management system (EFMS), (ii) communication device(e.g., a triggering device), (iii) emergency management system (alsoreferred to as “EMS”), (iv) emergency flow program, (v) emergencyservice provider (ESP) system, and (vi) ESP software;

FIG. 2 depicts an embodiment of a system for managing emergency flows;

FIG. 3 depicts an embodiment of a system for managing emergency flows;

FIG. 4 depicts an embodiment of a system for developing and deployingemergency flows;

FIG. 5 depicts an embodiment of a system for developing and deployingemergency flows;

FIG. 6 shows an user interface of an application for developing anddeploying emergency flows;

FIG. 7 illustrates an embodiment of an emergency flow;

FIG. 8 illustrates an embodiment of an emergency flow;

FIG. 9A and FIG. 9B depict an embodiment of a dashboard for testingemergency flows;

FIG. 10 depicts an embodiment of a system for managing upstreamemergency data flow;

FIG. 11 depicts an embodiment of emergency management system;

FIG. 12 depicts an embodiment of a system for managing emergency flowsand emergency notifications;

FIG. 13A and FIG. 13B depict embodiments of a system for managingupstream emergency data flow, emergency flows, and emergencynotifications;

FIG. 14A and FIG. 14B illustrate embodiments of a process for managingemergency flows and notifications;

FIG. 15 illustrates an embodiment of a process for managing emergencynotifications;

FIG. 16 illustrates an embodiment of a process for managing emergencyflows;

FIG. 17 depicts an embodiment of an emergency management system andgeofence system;

FIG. 18 illustrates embodiments of geofences;

FIG. 19 illustrates an embodiment of an emergency response application;and

FIG. 20 depicts embodiments of a system for providing emergency serviceproviders with functional enhancements.

DETAILED DESCRIPTION

In some embodiments, disclosed herein is a method for notifying one ormore contacts of an emergency by an emergency management system, themethod comprising: (a) receiving a query comprising a user identifierfrom an emergency service provider (ESP), wherein the user identifier isassociated with a user in an emergency; (b) determining a personalizednotification procedure associated with the user identifier; (c)identifying the one or more contacts to be notified regarding theemergency according to the personalized notification procedure; and (d)initiating communication with the one or more contacts according to thepersonalized notification procedure.

In some embodiments, disclosed herein is a method for identifying andexecuting emergency flows by an emergency management system, the methodcomprising: (a) receiving a query comprising a user identifier from anemergency service provider (ESP); (b) identifying at least one emergencyflow script associated with the user identifier, said emergency flowscript defining a pathway of execution of two or more emergency flowbuilding blocks, wherein each of said two or more emergency flowbuilding blocks comprises instructions to perform an emergency responsefunction; and (c) executing the emergency flow script associated withthe user identifier.

In some embodiments, disclosed herein is a method for identifying andexecuting emergency flows by an emergency management system, the methodcomprising: (a) receiving a query comprising a user identifier from anemergency service provider (ESP); (b) identifying an organizationalidentifier associated with the user identifier; (c) identifying anemergency flow script associated with the organizational identifier, theemergency flow script defining a pathway of execution of emergencyfunctions; and (d) executing the emergency flow script associated withthe organizational identifier. In some embodiments, identifying theorganizational identifier in step (b) comprises searching for anassociated organization in one or more databases using the useridentifier.

In some embodiments, disclosed herein is a method for providingnotification of an emergency by an emergency management system, themethod comprising: (a) receiving a query comprising a user identifierfrom an emergency service provider (ESP); (b) identifying anorganizational identifier associated with the user identifier; (c)identifying a notification procedure associated with the organizationalidentifier; and (d) executing the notification procedure associated withthe organizational identifier.

In some embodiments, disclosed herein is a method for providingnotification of an emergency by an emergency management system, themethod comprising: (a) receiving a query comprising a user identifierfrom an emergency service provider (ESP); (b) querying a locationdatabase using the user identifier to retrieve a location associatedwith the user identifier; (c) determining that the location associatedwith the user identifier is located within an organizational geofenceassociated with an organizational identifier; (d) identifying anemergency flow script associated with the organizational identifier, theemergency flow script defining a pathway of execution of emergencyfunctions comprising steps for notifying one or more emergency contacts;and (e) executing the emergency flow script associated with theorganizational identifier.

In some embodiments, disclosed herein is an emergency management systemcomprising: (a) a user identification database storing a plurality ofuser identifiers associated with notification procedures; (b) a servercomprising at least one processor and a memory; and (c) non-transitorycomputer readable storage medium encoded with a server applicationincluding instructions executable by the at least one processor, theserver application comprising: (i) a query module configured to receivea query comprising a user identifier from an emergency service provider(ESP); (ii) a user identification module configured to locate anotification procedure associated with the user identifier in the useridentification database; and (iii) an emergency notification moduleconfigured to execute the notification procedure associated with theuser identifier, wherein the notification procedure defines a pathway ofexecution of emergency functions comprising steps for notifying one ormore emergency contacts.

In some embodiments, disclosed herein is an emergency management systemfor identifying and executing emergency flows, the system comprising:(a) an emergency flow database configured to: (i) store a plurality ofemergency flow scripts; and (ii) store a plurality of user identifiers,wherein each user identifier is associated with one or more emergencyflow scripts; and (b) an emergency response server configured to: (i)receive a query comprising a user identifier from an emergency serviceprovider (ESP); (ii) identify an emergency flow script associated withthe user identifier from the emergency flow database; and (iii) executethe emergency flow script associated with the user identifier, whereinthe emergency flow script defines a pathway of execution of emergencyfunctions comprising steps for notifying one or more emergency contactsregarding an emergency.

In some embodiments, disclosed herein is a system for emergencycommunications comprising: (a) an emergency triggering device configuredto transmit an emergency alert when an emergency is detected; and (b) atleast one server providing an emergency management system serverapplication configured to: (i) receive the emergency alert from thetriggering device, the emergency alert comprising a list of at least oneassociated device of the triggering device; and (ii) connect to anassociated device from the list; (iii) prompt the associated device forconfirmation of the emergency by a user of the associated device; and(iv) establish a conference bridge with the user and an appropriatedispatch center for responding to the emergency.

In some embodiments, disclosed herein is a method for notifying one ormore contacts of an emergency by an emergency management system, themethod comprising: (a) receiving a query comprising a user identifierfrom an emergency service provider (ESP), wherein the user identifier isassociated with a user in an emergency; (b) sending location data forthe user identifier to the ESP through a secure pathway; (c) identifyinga personalized notification procedure associated with the useridentifier; (d) executing the notification procedure associated with theuser identifier, said notification procedure comprising identifying theone or more contacts to be notified regarding the emergency andcommunicating with the one or more contacts.

In some embodiments, disclosed herein is a method for notifying one ormore contacts of an emergency by an emergency management system, themethod comprising: (a) receiving a query comprising a user identifierfrom an emergency service provider (ESP), wherein the user identifier isassociated with a user in an emergency; (b) identifying a personalizednotification procedure associated with the user identifier wherein thepersonalized notification procedure takes the location data as an inputfor selecting an emergency flow script from a plurality of emergencyflow scripts; (c) executing the selected emergency flow scriptassociated with the user identifier.

In some embodiments, disclosed herein is a system for emergencycommunications comprising: (a) a triggering device detecting an audioemergency trigger and sending an emergency alert to the emergencymanagement system; and (b) at least one server providing a serverapplication at the emergency management system, said server applicationcomprising: (i) a software module receiving the emergency alert from thetriggering device; (ii) a software module determining a callback numberfor the triggering device, wherein the callback number is selected andassigned to the triggering device when the triggering device does nothave a phone number; (iii) a software module determining a location ofthe triggering device, pairing the location with the callback number,and updating a location database accessible by emergency serviceproviders with the paired location and callback number; (iv) a softwaremodule identifying an appropriate emergency service provider forresponding to the emergency alert based on the location of thetriggering device and facilitating an emergency communication sessionwith the appropriate emergency service provider, wherein the callbacknumber enables the emergency communication session with the triggeringdevice to be re-established in case of disconnection.

Emergency Communications

Modern communication devices, for example, smart phones, tabletcomputers, wearable communication devices, smart sensor devices and/orsystems are often equipped with a variety of features for determininglocation information of the communication device using, for example,GPS, or triangulation with cellular phone towers. Modern communicationdevices also often include functionality to store data regarding a userof the communication device, for example, health information about theuser.

In some embodiments, the communication device (or communication moduleof the device) communicates with a recipient through one or more datachannels. In some embodiments, the recipient is an emergency managementsystem. In some embodiments, the EMS routes communications to an EDC. Infurther embodiments, the EMS establishes a first data channel with thecommunication device and a second data channel between the EMS and theEDC, wherein the EMS bridges the first and second data channels toenable the communication device and the EDC to communicate. In someembodiments, the EMS converts data (e.g., data set) from thecommunication device into a format suitable for the EDC (e.g., analog ordigital, audio, SMS, data, etc.) before sending or routing the formatteddata to the EDC. In some embodiments, the EMS routes communications to adevice associated with a first responder. In some embodiments, thecommunication device relays additional communications, information,and/or data sent or shared between member devices in the group ofdevices to the EMS or EDC after a request for assistance has been sent.In further embodiments, the additional information is relayed to the EMSor EDC after the request for assistance has been sent in order toprovide current information that is relevant to the request. Forexample, in some instances, communications between member devicescontain information relevant to the emergency (e.g., information thatthe user of member device who is experiencing a medical emergencysuffers from diabetes). Accordingly, in some embodiments, theinformation is sent autonomously, at request of a user of thecommunication device, or at request of the recipient (e.g., EMS, EDC,first responder, etc.).

Emergency Management System

FIG. 1A shows a schematic diagram of one embodiment of an emergency flowmanagement system 140 as described herein. In some embodiments, theemergency flow management system 140 is a standalone system that caninteract with devices, the emergency management system, and/or dispatchcenters. In other embodiments, the emergency flow management system isdistributed in various devices and systems.

In some embodiments, the emergency flow management system (EFMS) 140comprises one or more of an operating system 101, a central processingunit 103, a memory unit 136, a communication element 107, a display oruser interface 149 (for an EFMS administrator to maintain and update thesystem) and an emergency flow program 151 (e.g., server application)including at least one software module 153.

In some embodiments, the emergency flow management system 140 comprisesone or more databases 135. In some embodiments, the emergency flowmanagement system 140 comprises an emergency flow database 157 fromwhich emergency flows may be called when there is an emergency trigger.In some embodiments, the emergency flow management system 140 comprisesan emergency history database, which enters and maintains a log ofemergency incidents, emergencies triggered, and/or emergency flows thathave been implemented. In some embodiments, emergency flow managementsystem 140 includes a message bus 146, one or more servers 148implementing instructions form the emergency flow program 151 (e.g.,emergency flow server 128 for generating emergency flows and emergencyresponse server 109 for executing emergency flows) and output services160.

FIG. 1B shows a schematic diagram of one embodiment of a devicedescribed herein. In some embodiments, the device 167 is an electronicdevice such as a triggering device which may be a communication device(e.g., wearable, mobile or cellular phone, computer, laptop, vehicularconsole, smart car, personal digital assistant, IoT devices, smart home,smart TV, etc.). In some embodiments, the triggering device is awearable device. In some embodiments, the triggering device is awireless mobile device or a smartphone. In some embodiments, thetriggering device is a combination of devices (e.g., a wearable devicecommunicatively connected to a mobile phone). In some embodiments, thetriggering device is a walkie-talkie or a two-way radio. In someembodiments, a user 102 (not shown) is selected from one or more personswho are the primary users of the device 167. When the user 102 is in anemergency situation, the device 167 can be triggered.

In some embodiments, the device 167 comprises at least one processor161, a memory 171 (e.g., an EPROM memory, a RAM, a solid-state memory),a display 165, a user interface 163, a network component 164 (e.g., anantenna and associated components, Wi-Fi adapters, Bluetooth® adapters,etc.), sensors 181, and an emergency trigger program 169 (e.g., mobileapplication, server application, computer program, application). In someembodiments, the device is equipped with a location component 173, forexample, a global positioning system (GPS), location services, etc. Insome embodiments, the device comprises data storage 175. In furtherembodiments, the device comprises a location data cache 177 and a userdata cache 179.

In some embodiments, the device 167 has several components including adisplay 165 and user interface 173, which allow the user 102 (not shown)to interact with the device 167. In some embodiments, the display 165 isa part of the user interface 163 (e.g., a touchscreen is both a displayand provides an interface to accept user interactions). In someembodiments, the user interface 163 includes physical buttons such asthe on/off and volume buttons. In some embodiments, the display 165and/or the user interface 163 comprises a touch screen (e.g., acapacitive touch screen), which is capable of displaying information andreceiving user input. In some embodiments, the device 167 compriseshardware components not including a display 165 and a user interface163, wherein the device functions autonomously without requiring activeuser guidance or interaction.

In some embodiments, a device 167 includes various accessories thatallow additional functionality. In some embodiments, the accessories(not shown) include one or more of the following: microphone (e.g., foruser voice interaction), a camera (e.g., for input of gestures commandsor pictures from the user), speakers, one or more sensors 181, such as afingerprint reader or scanner/health or environmental sensors,USB/micro-USB port, headphone jack, a card reader, SIM card slot, andany combination thereof.

In some embodiments, a device 167 autonomously detects emergencies basedon data from various sources such as the sensors 181 (sensor data) orsound detection picked up from the microphone or another accessory(e.g., smoke detector). For example, in some embodiments, a deviceautonomously detects an emergency based on sensor data when sensorreadings or values exceed a threshold (e.g., a predefined threshold setby the device software by default, by a user, or by an EMS). In someembodiments, the device 167 obtains relevant data from associated deviceto trigger the emergency.

In some embodiments, the emergency management system 130 housescomponents of the emergency flow management system (EFMS). In someembodiments, the emergency management system 130 comprises anapplication for assembling and/or configuring emergency flow scripts. Insome embodiments, the emergency management system 130 comprises anapplication for managing an emergency response to an emergency alertincluding execution of an emergency flow script. In some embodiments,the emergency management system 130 comprises one or more of anoperating system 132, at least one central processing unit or processor134, a memory unit 136, a communication element 138, and a serverapplication 151 (e.g., an emergency flow program). In some embodiments,the emergency management system 130 comprises one or more databases 135(e.g., location database 137, an additional information database 139,emergency flow database 157, user identification database 182, and/oremergency history database 197). In some embodiments, the emergencymanagement system 130 may include one or more servers 148. In someembodiments, an emergency response server 109 executes an emergency flowwhen an emergency or emergency-like situation is triggered via a userpathway 111. In some embodiments, an emergency flow server 128 allows anadministrator to generate and modify emergency flows via an adminpathway 113. In some embodiments, the emergency management system 130comprises at least one of a location database 137 and an additionalinformation database 139. In some embodiments, the emergency flowprogram 151 comprises at least one software module 153 for carrying outone or more instructions.

In some embodiments, as depicted by FIG. 1B, the emergency managementsystem 130 includes a user identification module 180 or a useridentification database 182. In some embodiments, the useridentification module 180 associates user identifiers (e.g., phonenumbers or email addresses) with notification procedures or emergencyflows and stores with user identifiers in the user identificationdatabase 182. In some embodiments, the user identification database 182is a relational database. In some embodiments, a user identifier isstored in the user identification database 182 and associated with oneor more attributes, such as a notification procedure identifier, anemergency flow identifier, an organizational identifier, or another useridentifier. For example, in some embodiments, a user identifier for JohnDoe is his phone number, (123) 456-7890. In this example, John works forWells Fargo and has a wife and two children. The user identifier forJohn (phone number (123) 456-7890) may be stored in the useridentification database 182 and associated with an organizationalidentifier for Wells Fargo, as well as user identifiers (e.g., phonenumbers) for John's wife and two children. In some embodiments, the useridentification module 180 is included in the emergency flow managementsystem 140. In some embodiments, the user identification module 180 ispart of an emergency notification system, as described below withrespect to FIG. 14. In some embodiments, the user identification modulereceives submission of a user identifier and definition or selection ofa notification procedure to be associated with the user identifierthrough a registration application. In some embodiments, theregistration application is a mobile or web application and provides agraphical user interface for the submission of user identifiers anddefinition or selection of notification procedures. In some embodiments,the user identification database 182 is a component (e.g., a portion orsub-database) of the emergency flow database 157.

In some embodiments, the emergency management system (EMS) 130 includesa clearinghouse 150 (also referred to as an “Emergency Clearinghouse”)for storing and retrieving emergency data. In some embodiments, theclearinghouse 150 includes sub-clearinghouses, such as a locationclearinghouse and an additional data clearinghouse. In some embodiments,the location clearinghouse includes a location ingestion module and alocation retrieval module (not shown). In some embodiments, theadditional data clearinghouse includes an additional data ingestionmodule and an additional data retrieval module (not shown). In otherembodiments, additional data and location data (e.g., emergency data)are stored in one or more databases in a distributed manner. In someembodiments, the emergency data is stored in an external or third-partyserver that is accessible to the EMS 130. Generally, the clearinghouse150 functions as an interface that receives and stores emergency datafrom electronic or communication devices that is then retrieved,transmitted, and/or distributed to recipients (e.g., emergencypersonnel) before, during, or after emergencies. The clearinghouse canreceive emergency data from electronic or communication devices such asmobile phones, wearable devices, laptop or desktop computers, personalassistants, intelligent vehicle systems, home security systems, IoTdevices, camera feeds, and other sources. In some embodiments, theemergency data optionally consists of locations or additional data suchas medical history, personal information, or contact information. Insome embodiments, during an emergency, an emergency service provider(ESP; e.g., a public safety answering point (PSAP)) queries theclearinghouse 150 for emergency data pertaining to an emergency. Theclearinghouse 150 then identifies the emergency and any emergency datapertaining to the emergency stored within the clearinghouse 150 andtransmits the pertinent emergency data to the requesting ESP.Accordingly, in some embodiments, the clearinghouse 150 acts as a datapipeline for ESPs otherwise without access to emergency data that iscritical to most effectively and efficiently responding to an emergency.Location data stored within the clearinghouse 150 can allow emergencyresponders to arrive at the scene of an emergency faster, and additionaldata stored within the clearinghouse 150 can allow emergency respondersto be better prepared for the emergencies they face.

FIG. 1C shows a schematic diagram of one embodiment of an emergencytrigger program 169 installed on a device, such as a triggering device167. In some embodiments, the emergency trigger program 169 comprisesone or more device software modules selected from an emergency triggermodule 172 (for saving conditions for triggering an emergency alert), analert module 125 (for sending the emergency alert), a user data module174 (for entering and storing user contacts and other preferences anduser data), a location determination module 129 (for determiningdevice-based location through GPS, location services, or other methods),a data sharing module 176 (for sharing data from the device with EMS,EFMS, EDC or responders, etc.), a proxy communication module 127 (formaking a proxy call on behalf of another), a notification module 178(for displaying communications from the EFMS to the user), or anycombination thereof.

FIG. 1C also shows a schematic diagram of one embodiment of an emergencyflow program 151 installed on a server (e.g., a server in an EMS). Insome embodiments, the emergency flow program 151 comprises one or moreserver software modules selected from an administrator's (admin) pathway113 comprising an emergency flow editor module 170, a flow provisioningmodule 147, a data module 143, a telephony module 145, or anycombination thereof. In some embodiments, the emergency flow editormodule 170 comprises a building blocks module 194, an interactive spacemodule 196, or any combination thereof.

In some embodiments, the emergency flow program 151 comprises one ormore server software modules selected from a user pathway 111 comprisinga response server API module 141, a core module 142, a service actionsmodule 144, a telephony module 145, or any combination thereof. In someembodiments, the response server API module 141 comprises an emergencyalert module 191, a flow identification module 192, a flow executionmodule 193, or any combination thereof.

FIG. 1D shows a schematic diagram of one embodiment of a Public SafetyAnswering Point (PSAP) system 152 as described herein. In someembodiments, the PSAP system 152 comprises one or more of a display 182,a user interface 186, at least one central processing unit or processor183, a memory unit 184, a network component 185, an audio system 154(e.g., microphone, speaker and/or a call-taking headset) and a computerprogram such as a PSAP Emergency Display Application 158. In someembodiments, the PSAP application 158 comprises one or more softwaremodules 159. In some embodiments, the PSAP system 152 comprises adatabase of responders 156, such as medical assets, police assets, fireresponse assets, rescue assets, safety assets, etc.

FIG. 1D also shows a schematic diagram of one embodiment of a PSAPapplication 158 installed on a PSAP system 152 (e.g., a server in thePSAP system). In some embodiments, the PSAP application 158 comprisesone or more software modules. In some embodiments, a software module isa call taking module 195, a PSAP display module 198, a supplemental orupdated information module 199 or a combination thereof. In someembodiments, the PSAP application 158 displays the information asdepicted in the example shown in FIG. 9B. In some embodiments, the PSAPapplication 158 displays the information on a map.

In some embodiments, location and supplemental information may bedisplayed for emergency service providers (e.g., police, fire, medical,etc.) and/or responders on their devices. It is contemplated thatresponder devices may be installed a responder device program (notshown) similar to PSAP display module 198 as depicted in FIG. 12. Insome embodiments, the responder device program displays the emergencylocation on a map.

FIG. 2 also depicts an embodiment of a system for connecting with otherdevices after an emergency alert has been triggered. As shown, atriggering device 267 sends the emergency alert, which is a request forassistance to respond to an emergency, to the EFMS 240, which is housedin the EMS 230.

In some embodiments, the triggering device 267 includes a networkcomponent (e.g., a Wi-Fi antenna) which sends the emergency alert. Insome embodiments, the emergency alert is sent via the internet, cellularnetwork, or landline network. For example, the emergency alert may besent via an API call (such as through the alert module depicted in FIG.1B) over the internet to the EMS 230, or to a third-party system (e.g.,a home security device could contact the security company's system),which is able to contact the EMS via an API call. In some embodiments,the alert is an SMS notification to the EMS or to the third-partysystem, which will contact the EMS. In some embodiments, when the datasignal is strong, data API calls are used because of good data transferrates for sending the alert quickly. In some embodiments, when the datasignal is not good (e.g., low signal-to-noise ratio, high latency), SMSand/or other methods are used as a fallback option for sending theemergency alert.

In some embodiments, the emergency alert is transmitted via a landmobile radio system (LMRS) using custom signals to a third-party system,which optionally connects to the EMS. As an example, the triggeringdevice is a two-way radio in a vehicle, which connects to anothertwo-way radio in its vicinity to send the emergency alert. In certainembodiments, whenever a device or user is able to connect to the EMS(e.g., via an API call), the alert is optionally sent to the EMS.

In some cases, the connectivity (e.g., Wi-Fi signals) is weak or thepathways are not secure, and the emergency alert is transmitted usinganother communication device (e.g., a mobile phone) or a routing device(e.g., Wi-Fi router). In some embodiments, the triggering device 267 isnot Internet-enabled and sends the alert through designated pathways orto designated devices (e.g., via a mobile phone connected by Bluetoothto device 267). In some embodiments, an IoT device sends the alert to acontrolling or master device (e.g., a home console that connects tosmoke alarms). In another example of this embodiment, the triggeringdevice 267 is a physical “panic” button (e.g., a button under the deskof a bank teller) that is discreetly pressed in the event of a possibleemergency situation and sends an emergency alert to a controlling ormaster device (e.g., a bank's central communication system). In someembodiments, the controlling or master device forwards the alert to anemergency service such as an EMS or EDC such as according to anemergency flow script. In some embodiments, an IoT device includessensors that detect environmental conditions, and another device (e.g.,a digital assistant, wearable, phone, etc.) evaluates if the sensedvalue indicates an emergency situation or likely emergency situation andsends an emergency alert. In some embodiments, the IoT devices ordigital assistants on the ground detect a voice command or sense data,and the processing is done at a remote location, such as on the cloud.

In some embodiments, an emergency is detected when sensor values exceeda certain threshold or fall outside an acceptable range. In someembodiments, an emergency is detected when sensor values exceed acertain threshold (that is optionally user configurable or preset) suchas for a temperature sensor, a smoke detector, a carbon dioxidedetector, or a carbon monoxide detector.

In some embodiments, the triggering device 267 includes a computerprogram 269 for triggering the emergency flow and sending the alert. Thecomputer program 269 pre-installed on the device or has been loaded andinstalled by the user (e.g., user 202, not shown). In some embodiments,the user 202 went through a setup or registration process for the device267, where he or she has provided user data such as emergency contacts(e.g., phone numbers, email addresses, messaging IDs), user information,location (e.g., a physical address of the location of the device 267),etc. In some embodiments, user data, location data, emergency data,etc., is saved in data cache or storage in the device 267. In otherembodiments, the data is saved in one or more databases 235 in the EMS,in third-party servers or in cloud-based systems. In some embodiments,the data is protected by password protection, authentication protocolsfor transmission, encryption, use of secured pathways, and other methodsfor limiting the risk of security breaches. In some embodiments, thecomputer program 269 includes an emergency trigger script that has beenintegrated into the computer program 269 and provides instructions forgenerating and transmitting the emergency alert, as described below. Theemergency trigger script may be integrated into the computer program 269by default or integrated into the computer program 269 as an add-on. Insome embodiments, the emergency trigger script is provided by the EMS230, such as through a web interface. In some embodiments, the emergencytrigger script is an API client, wherein the API client is a set of codeconfigured to generate a request (e.g., an API call) against an API(application programming interface).

In some embodiments, the emergency is triggered by user input such asthe user interacting with the user interface 263 of the triggeringdevice 267. In some embodiments, the user presses one or more hard orsoft buttons on the user interface 263. However, other types of userinteractions such as touch, tap, pattern of touches, gesture, andvoice-activation are also contemplated. For example, a user in a taxicabwho suspects that the cab driver does not know where he or she is going,or is intoxicated, or is attempting to abduct the user, the user mayselect a hard or soft button (e.g., a panic button) or a pattern ofpresses on the user's cell phone to discreetly trigger an emergencyalert.

In some embodiments, the triggering device 267 autonomously detectsemergency situations or likely emergency situations. In someembodiments, the triggering device 267 sends an alert based onautonomously detected emergencies using one or more sensors (not shown)such as, for example, a smoke alarm, thermometer, or carbon monoxidesensor in a building. In some embodiments, the sensors sense one or moreenvironmental or health parameters. In some embodiments, theenvironmental parameter is selected from the group consisting of: light,motion, temperature, pressure, humidity, vibration, magnetic field,sound, smoke, carbon monoxide, radiation, hazardous chemicals, acid,base, reactive compounds, volatile organic compounds, and smog. In someembodiments, health parameters include heart rate, pulse, electricsignals from the heart, blood oxygen levels, blood pressure, blood sugarlevel, and other health parameters. In some embodiments, the triggeringdevice 267 is an Internet of Things (IoT) device such as a homethermostat, vehicle console, a pacemaker implant, etc. As used herein,IoT refers to the ever-growing network of physical devices, buildings,vehicles, and other objects that feature an IP address for internetnetwork connectivity for exchanging data. In many cases, IoT devices areembedded with electronics, software, sensors, network connectivity, or acombination thereof. In some embodiments, IoT devices feature an IPaddress for internet connectivity. In addition to an IP address, an IoTdevice is optionally associated with a MAC address or an SSID. It isunderstood that, IoT devices are connected with one or more otherdevices through Bluetooth®, Wi-Fi, or other wired and/or wirelesstechnologies which allow for transfer of data.

In some embodiments, the IoT device is in a network of sensors. As anexample, IoT networks, wireless sensor networks (WSN) or wireless sensorand actuator networks (WSAN) monitor environmental parameters such astemperature, pressure, sound, etc., using a network of sensors ordevices. When one sensor or device detects a sensed value outside of theidentified range indicating a likely emergency, it will pass the data toother devices in the network. In some embodiments, the sensor network isa Wi-Fi, WiMAX, or LTE MESH network. In some embodiments, the sensor orIoT devices form nodes in the sensor network. In some embodiments, thesensor network includes a central node for controlling the network. Insome embodiments, the sensor network has a distributed architecture toreduce the impact of a failed node.

In some embodiments, an IoT device comprises at least one of thefollowing components including a sensing component (e.g., thermocouple),a networking component (a radio transceiver with an antenna orconnection for an external antenna), a microcontroller, an electroniccircuit connected to the sensing component, and an energy source. Insome embodiments, the sensor network is controlled by a center console(e.g., a smart home console).

In some embodiments, the triggering device 267 is a communication devicesuch as a mobile phone, a computer, a wearable device (e.g., a smartwatch), a digital assistant, etc. In some embodiments, when thetriggering device 267 is a mobile phone, the emergency alert is sent viaa cellular connection, if it is available. In some embodiments, afterthe alert is sent to the EFMS 240 via communication link 222, the EFMS230 initiates an emergency flow script. As a part of the emergency flow,an emergency call along two-way communication link 226 may beestablished (e.g., via path 702, 704A, 708 shown in FIG. 7). In somecases, communication link 222 is a data link, which optionally supportsa data call such as VoIP. In some embodiments, link 222 is used forsending data such as user data, location data, emergency data, text,images, and video from the triggering device 267. In some embodiments,communication link 222 is established via landline, cellular network orthe Internet. In some embodiments, the communication link 222 is throughVoIP with both voice and data transmitted in the same path (e.g., in theSIP signaling, as headers or in multi-part messages). In someembodiments, the communication link 222 is an analog voice call overlandline or cellular network and a data link for transferring data viaWi-Fi, cellular data, etc. Generally, data links are preferred fortransmission of both voice and data whenever they are available, and thesignal strength is good. In certain cases, the communication link issent through NG911 systems, where the data is optionally sent throughSIP signaling. In some embodiments, updated data (e.g., current locationdata) may be transmitted via link 222 and provided to the EDC 250 vialink 226.

In some embodiments, the EMS 230 includes one or more databases 235housed in one or more servers in the same or in a remote location. Insome embodiments, location database 237 (not shown) houses location dataregarding the location of the emergency. In some embodiments, userdatabase 239 (not shown) houses user data and/or emergency data (such asan emergency contact list 265). In other embodiments, the location,user, and/or emergency data (such as an emergency contact list 265) aresaved on a data cache 215 (not shown) in the triggering device 267 or indata storage in other devices such as mobile phone 206, computer 246, ormobile phone 216, etc. In other embodiments, the data is saved online inone or more remote servers or cloud-based systems. The location data andadditional data (user data and emergency data) may be provisioned in thedatabases 235, 239 (not shown), or a third-party server, etc. and sentto the EDC 250 after a query has been received. In some embodiments witha standalone EFMS 240 (as depicted in FIG. 1A), databases 135 may behoused within the EFMS 240.

In some embodiments, the emergency contact list 265 is entered by theuser 202 at the time of registration or installation of the computerprogram 269 or at another time. In some embodiments, the emergencycontact list 265 is a list of phone numbers, email addresses, IPaddresses, MAC addresses, or any combination thereof. In someembodiments, computing devices which are not associated with a phonenumber (such as computer 246, not shown) are identified by an IPaddress, MAC address, URLs or SSIDs.

In some embodiments, the EFMS 240 attempts to connect to a user usingone or more communication links (e.g., 234) when the user has notanswered the call (NA response). In some emergency flows, the EFMS 240sends the alert indirectly to an EDC 250 (e.g., a PSAP). In someemergency flows, the EFMS 240 sends the alert to a third-party (notassociated with user 202 (e.g., a corporate representative of anorganization, etc.). In some emergency flows, the EFMS 240 attempts toconnect to user 202 via devices associated with user 202's account suchas communication device 206 (not shown) or computer 246 (not shown). Insome emergency flows, the EFMS 240 optionally connects to user 205 (andother users designated as emergency contacts or frequently calledcontacts, etc.) via communication device 216. In some embodiments, adirect connection 238 between device 216 and dispatcher 250 isestablished or the user 205 is connected via the EFMS 240 via links 222and 226. However, the EFMS 240 may send the alert to any number ofrecipients, separately or simultaneously, in any order (e.g., accordingto any emergency flow). Examples of flows are depicted in FIGS. 7 & 8.

In another configuration of an emergency flow, a mobile device (e.g., awearable 267) is communicatively connected to a communication device(e.g., a mobile phone 206, not shown) via Bluetooth®, Wi-Fi, or otherwireless communication methods. In some embodiments, the communicationdevice 206 provides location and/or communication capabilities (e.g.,whether the device is SMS, email, and/or data enabled). In someembodiments, the mobile device is Internet-enabled & Location-enabled,allowing the user to send the emergency alert triggering an emergencyflow in the EFMS 240. Subsequently, the wearable device 267 optionallyparticipates in an emergency session with EDC 250 via the communicationdevice 206 through an indirect connection.

In some emergency flows, the communication device 206 comprises anapplication 208 (not shown), which may include some modules fromemergency trigger program 269 on wearable 267. In some embodiments, theemergency trigger program 269 on wearable 267 is distributed between thetwo devices (wearable 267 and communication device 206). This providesan advantage in allowing the wearable device that is light-weight withlimited functions to be used in combination with the information andcapabilities of the communication device 206 for responding to anemergency. Various hardware and software capabilities of the wearabledevices are contemplated.

In some scenarios, a user 202 configures emergency contacts (name, phonenumber), validates phone numbers, and enables the emergency flow fromthe communication device 206 while only sensor readings are obtainedfrom the wearable 267 to trigger the emergency. In other embodiments,the application 208 receives an emergency alert from a device overBluetooth. In some embodiments, the application 208 sends an emergencyalert with a list of two contacts and emergency location (as reported bythe phone) to the EFMS 240. The EFMS 240 may then execute an emergencyflow comprising: first call contact and prompt contact to confirmemergency by pressing 1; if the call is not answered or confirmed,repeat with second contact; if someone answered and confirmed emergency,connect call to appropriate PSAP based on the provided location; andwherein each contact hears a descriptive TTS message upon answering thecall.

FIG. 3 depicts an embodiment of a system 300 including triggeringdevices 367, an Emergency Flow Management System (EFMS) 340, and outputservices 360. As previously mentioned, one advantage provided by thesystems, servers, devices, and methods described herein is the abilityto facilitate emergency response communications across devices,services, and systems managed by different parties. As will be discussedin further detail, in some embodiments, the EFMS 340 is capable of beingreconfigured and customized by any individual or organization (e.g., asmartphone application developer or a wearable device manufacturer) suchthat the EFMS 340 can be seamlessly integrated into the devices,services, and/or systems provided by the individual or organization(hereinafter, “administrator”) according to the individual ororganization's specific needs. Accordingly, as shown in this embodiment,the system 300 is implemented with a variety of triggering devices 367and a variety of output services 360.

In some embodiments, a triggering device 367 is activated and deliversan emergency alert to the EFMS 340. In some embodiments, the triggeringdevice 367 is an electronic device associated with a user, such as asmartphone 367A (e.g., an iPhone), a wearable device 367B (e.g., anApple Watch or FitBit tracker), or a smart home IoT device 367E (e.g.,an Amazon Echo or a Nest smoke and carbon monoxide alarm). In someembodiments, the triggering device is a vehicle 367C such as a car ortruck. In one example of this embodiment, the vehicle 367C includes anintelligent vehicle system capable of detecting when a component of thevehicle 367C has failed or when the vehicle 367C has been in an accidentor otherwise compromised. In another example of this embodiment, thevehicle 367C includes or is otherwise communicatively coupled to avehicle safety service that can connect the passengers of a vehicle thathas been compromised with a first responder or a customer service agent(e.g., OnStar or AAA). In this example, when the vehicle 367C becomescompromised, the intelligent vehicle system can deliver an emergencyalert to the vehicle safety service, which may in turn attempt tocontact passengers of the vehicle 367C or send a corresponding emergencyalert to another recipient (e.g., to the EFMS 340). In some embodiments,the triggering device comprises a software or hardware panic button367D. As an example, the triggering device 367 is a physical buttoninstalled under the steering wheel of a taxi cab, so that a taxi driverwho feels threatened by a passenger (e.g., a passenger with a weapon ora passenger who is being verbally abusive) may discreetly call for help.Similarly, in another example, the triggering device 367 is a digitalbutton found in a graphical user interface of a ride sharing smartphoneapplication (e.g., the Uber app) that a passenger may select todiscreetly call for help if the passenger feels threatened by a driverof a ride sharing vehicle.

In some embodiments, the triggering device 367 is triggered via userinput or automatic detection. For example, in embodiments in which thetriggering device is a wearable device 367B (e.g., an Apple Watch), thewearable device 367B comprises at least one sensor such as a gyroscope,an accelerometer, and/or a heart rate monitor. In this example, if theheart rate monitor detects that the heartrate of the user is abnormal(e.g., higher or lower than average for the user, or arrhythmic), andthe gyroscope and/or accelerometer detect a sudden, downward motion ofthe wearable device 367B (e.g., acceleration exceeds a threshold), thewearable device 367B determines that the user has potentially fallen dueto a cardiac emergency and may need assistance. In response to such adetermination, the wearable device 367B automatically delivers anemergency alert to the EFMS 340 without input from the user.Alternatively, in some embodiments, if a user of a wearable device 367Bfeels that they are experiencing or soon to experience a medicalemergency, the user optionally selects a button on the wearable device367B to manually deliver an emergency alert to the EFMS 340. Similarly,in some embodiments, a user of a smartphone 367A or wearable device 367Bwho is under assault or feels they will soon be under assault is able toselect a button on the smartphone 367A or wearable device 367B tomanually deliver an emergency alert to the EFMS 340. In someembodiments, the emergency alert is delivered to the EFMS 340 by anelectronic device communicatively coupled to the triggering device. Forexample, in some embodiments, a wearable device coupled to a cell phonevia Bluetooth generates an emergency alert that is then delivered to theEFMS by the cell phone via Wi-Fi or cellular data.

In another example, in an embodiment in which the triggering device 367is a smart home device 367E, the smart home device optionally includesat least one sensor such as a smoke detector or carbon monoxidedetector. In this example, when the smart home device 367E detects aconcentration of carbon monoxide that exceeds a threshold concentration,the smart home device 367E determines that the user and or house of theuser is in a state of emergency, and automatically deliver an emergencyalert to the EFMS 340. In another example, when a user is experiencingan emergency, the user optionally manually prompts the smart home device367E to deliver an emergency alert to the EFMS 340 by pressing a buttonon the smart home device 367E or by interacting with the smart homedevice 367E non-physically, such as by verbally communicating with thesmart home device 367E (e.g., by saying aloud, “[name of smart homedevice 367E], call 9-1-1”). In another example of this embodiment, thesmart home device 367B includes a video camera or optical sensor. Whenthe video camera (and accompanying software and/or processor) or opticalsensor determines the presence of an unauthorized person inside orotherwise proximal to the house of the user, in some embodiments, thesmart home device 367E automatically delivers an emergency alert to theEFMS 340. Alternatively, the triggering device 367 is a non-opticaldevice or application and is activated manually or automatically in anyfashion.

In some embodiments, the EFMS 340 is configured to receive an emergencyalert from a triggering device 367 and execute an emergency flow, aswill be discussed in further detail below. In some embodiments, asdepicted in FIG. 3, the EFMS 340 includes an API module 341, a coremodule 342, a data module 343, a service actions module 344, and atelephony module 345. In some embodiments, these modules interact toexecute premade or customized emergency flows. In some embodiments, theemergency flows are executed according to various configurations ofemergency flow building blocks, wherein the emergency flow buildingblocks each represent an emergency flow script that performs at leastone function. In some embodiments, the various configurations ofemergency flow building blocks are labeled and identified with uniqueemergency flow identification numbers (hereinafter, “emergency flowID”). In some embodiments, an emergency alert delivered to the EFMS 340from a triggering device 367 is accompanied by an emergency flow ID,which is recognized by the API module 341 to point to an associatedemergency flow for execution by the EFMS 340.

In some embodiments, the EFMS 340 is configured to receive an emergencyalert delivered from a triggering device 367 at the API module 341. Insome embodiments, the emergency alert delivered from the triggeringdevice 367 includes an emergency flow ID or a user identifier, such as aphone number or email address. In some embodiments, the emergency alertdelivered from the triggering device 367 includes additional data. Forexample, in some embodiments, the emergency alert delivered from thetriggering device 367 includes location data, such as a longitude andlatitude coordinate pair, or a street address. The location data mayinclude information obtained from one or more sources such as, forexample, a location component (such as a GPS, not shown), Wi-Fi accesspoints information using a Wi-Fi antenna (not shown), Bluetooth beacondata using a Bluetooth antenna (not shown), cellular trilateration usinga cellular transmitter capable of supporting various technologies suchas CDMA, LTE, or WiMAX, and barometric pressure using a pressure sensorto estimate altitude. In some embodiments, the emergency alert deliveredfrom the triggering device 367 includes user data associated with a userof the triggering device 367. For example, the emergency alert deliveredfrom the triggering device 367 is optionally accompanied by medicalhistory data associated with a user that the user has stored on asmartphone 367A. In another example, the emergency alert delivered fromthe triggering device 367 is accompanied by heart rate data obtained bya wearable device 367B before or during the time that the emergencyalert was delivered. In another example, the emergency alert deliveredby the triggering device 367 is accompanied by driving data determinedby an intelligent vehicle system integrated into a vehicle 367C, such asthe speed at which the vehicle was moving before or during the time thatthe emergency alert was delivered.

Once the EFMS 340 receives an emergency alert (e.g., an API callgenerated by an emergency trigger script integrated into a computerprogram on a triggering device), the EFMS 340 then executes an emergencyflow associated with the emergency alert (e.g., an emergency flowassociated with the emergency trigger script or any data included in theemergency alert). In some embodiments, the EFMS 340 employs the APImodule 341 to process the emergency alert and any accompanying data(e.g., emergency flow ID, location data, or user data) and activate thecore module 342 to execute one or more emergency flows. In someembodiments, before activating the core module 342, the API module mustaccess an emergency flow database (e.g., data module 343) to identifyone or more emergency flows for the EFMS 340 to execute. In someembodiments, an emergency flow script (as described above) thatgenerates an emergency alert is directly associated with one or moreemergency flows. In some embodiments, the API module 341 determineswhich emergency flow for the EFMS 340 to execute based on a useridentifier included in the emergency alert. In some embodiments, the APImodule 341 determines which emergency flow for the EFMS 340 to executebased on an emergency flow ID included with the emergency alertdelivered from the triggering device 367. In some embodiments, the APImodule 341 determines which emergency flow for the EFMS 340 to executebased on an emergency flow ID (also referred to as an emergency callflow identifier or flow identifier) and additional data included withthe emergency alert. For example, in some embodiments, an emergency flowID corresponds to multiple emergency flows (e.g., emergency flow A,emergency flow B, emergency flow C, etc.) which are optionally executedpreferentially based on the assessed situation of a user. In one exampleof this embodiment, an emergency alert is delivered to the EFMS 340 froma wearable device 367B. In this example, the emergency alert includesemergency flow ID #123 and additional data gathered by a heart ratemonitor, a gyroscope, and an accelerometer. In this example, emergencyflow ID #123 corresponds to two emergency flows, emergency flow A, whichincludes contacting a nurse and calling 9-1-1, and emergency flow B,which includes contacting a nurse but does not include calling 9-1-1.When the additional data included in the emergency alert indicates thata user of the wearable device has merely fallen, the API module 341optionally executes emergency flow B. However, if the additional dataincluded in the emergency alert indicates that the user has fallen dueto a cardiac emergency, the API module 341 optionally executes emergencyflow A instead. In some embodiments, emergency flow A and emergency flowB are considered and/or referred to as complete definitions of anemergency flow (e.g., emergency flow ID #123 represents a template of anemergency flow that requires one or more additional inputs to completethe definition of the emergency flow; emergency flow A and emergencyflow B represent complete definitions of the emergency flowcorresponding to emergency flow ID #123).

In some embodiments, a particular emergency flow ID only corresponds toone particular emergency flow. In some embodiments, the triggeringdevice 367 selects between multiple emergency flow IDs based on datacollected by the triggering device 367 or provided by a user. In someother embodiments, in which an emergency alert does not include anemergency flow ID, the API module 341 selects an emergency flow toexecute based on alternative factors, such as the type or brand oftriggering device 367, a location of the triggering device, a weatherforecast at the location of the triggering device 367, or otherparameters. In some embodiments, the flow identifier (e.g., an emergencyflow ID) is a flow identification number included in the emergencyalert. In some embodiments, the flow identifier is included in theheader, footer, message, metadata, or a combination thereof in theemergency alert. In some embodiments, the flow identifier is not a flowidentification number and takes another form (e.g., device type, devicename, application name, application publisher, etc.). In someembodiments, an emergency alert includes an emergency flow ID and/or anidentifier of the organization (hereinafter “organization ID” or“organization identifier”) that created the associated emergency flow.For example, in some embodiments, the emergency alert is an HTTP POSTthat includes an emergency flow ID in the payload of the HTTP POST andan organization ID associated with the organization that created theassociated emergency flow in the header of the HTTP POST, as shownbelow. In some embodiments, after receiving an emergency alert, the APImodule 341 first identifies an organization using an organization IDincluded in the emergency alert and then references the emergency flowdatabase (e.g., data module 343) to determine one or more emergencyflows created by the organization. In some embodiments, the API module341 then uses an emergency flow ID included in the emergency alert toselect a corresponding emergency flow from the one or more emergencyflows created by the organization to execute. In some embodiments, theemergency flow ID is a name of the corresponding emergency flow selectedby the organization that created the emergency flow. In someembodiments, the API module 341 selects an emergency flow in response toan emergency alert from a triggering device 367 through any appropriatemeans regardless of the form of the flow identifier. In someembodiments, the emergency alert does not include a flow identifier. Insome embodiments, the API module 341 selects a default emergency flow inresponse to an emergency alert that includes no additional data (e.g.,no flow identifier, device location, sensor data, etc.).

An embodiment of a template of an emergency alert is shown below in theform of an HTTP POST:

url = “https://api-sandbox.rapidsos.com/v1/rem/trigger” payload = [“callflow”: “company_contacts”, “variables”: [ “location”: [ “latitude”:“”, “longitude”: “”, “uncertainty”: “” ], “user”: [ “full_name”: “”,“phone_number”: “” ], “contacts”: [ [ “full_name”: “”, “phone_number”:“” ] ], ]

In the foregoing template of an emergency alert, “company_contacts” isboth the emergency flow ID and the name of the associated emergency flowas selected or inputted by the administrator that created the emergencyflow. In this example, “location”; “user”; “contacts”; and “company” arevariables required by the “company_contacts” emergency call flow.“Latitude”; “longitude”; and “uncertainty” are components of the“location” variable; “full_name”; and “phone_number” are components ofthe “user” variable; and “full_name” and “phone_number” are componentsof the “contacts” variable. In some embodiments, a value is provided inthe emergency alert for each of the variables or components of avariable. In some embodiments, as described above, all variables, andcomponents therein, defined or required by an emergency call flow arenecessary for the emergency call flow to be executed by the API module341.

In some embodiments, emergency flows are stored within a data module 343located within or otherwise communicatively coupled to the EFMS 340. Insome embodiments, the API module 341 consults the data module todetermine an emergency flow to execute in response to the emergencyalert. For example, in some embodiments, the emergency alert includes anemergency flow ID that corresponds to one or more emergency flows storedwithin the data module 343. The API module 341 then optionallyreferences the data module 343 for an emergency flow corresponding tothe emergency flow ID. In some embodiments, after receiving an emergencyalert including an emergency flow ID and any accompanying additionaldata, the API module 341 references the data module 343 to find anemergency flow corresponding to the emergency flow ID. In someembodiments, the API module 341 then processes the emergency flow,determines any necessary inputs for the emergency flow, and verifiesthat the additional information included in the emergency alert includesthe necessary inputs for the emergency flow. For example, a particularemergency flow may additionally require a measurement of a user's heartrate as a necessary input for the emergency flow. In this example, ifthe emergency alert does not include a user's heart rate (e.g., theemergency alert includes an emergency flow ID corresponding to theparticular emergency flow and a location, but is missing a user's heartrate), the EFMS 340 may not be able to execute the particular emergencyflow. In response, the EFMS 340 optionally declines the emergency alertor delivers a notification to the triggering device 367 informing theuser that the emergency alert was incomplete. In this embodiment, whenthe API module 341 determines that the emergency alert does include thenecessary inputs for the emergency flow, the API module 341 compiles thenecessary inputs received from the emergency alert with the emergencyflow to create a complete definition of the emergency flow (as discussedabove) and delivers the complete definition of the emergency flow to thecore module 342.

In some embodiments, the data module 343 additionally includes anemergency flow history database that records individual instances ofparticular emergency flow sessions. For example, in some embodiments,after the API module 341 receives an emergency alert including anemergency flow ID and activates the core module 342, the core module 342records an entry in the emergency flow history database for theparticular emergency flow session of the particular emergency flow beingexecuted. In some embodiments, the entry is given a unique session ID oran identifier from the emergency flow history database. In someembodiments, the core module 342 records an entry in the emergency flowhistory database for every emergency flow session. In some embodiments,the core module 342 records an entry in the emergency flow historydatabase for each emergency alert received by the API module 341. Insome embodiments, the core module 342 records an entry in the emergencyflow history database for each emergency alert received by the APImodule 341 that includes an emergency flow ID. In some embodiments, thecore module 342 records an entry in the emergency flow history databasefor a particular emergency flow session of a particular emergency flowafter the particular emergency flow has been fully executed. In someembodiments, the core module 342 updates an entry in the emergency flowhistory database for a particular emergency flow session of a particularemergency flow after each step (e.g., after each individual emergencyflow building block) of the execution of the particular emergency flow,or after some steps of the execution of the particular emergency flow.

In some embodiments, after an emergency flow is executed by the EFMS340, the core module 342 updates an entry in the emergency flow historydatabase for a particular emergency flow session of a particularemergency flow to include additional data about the particular emergencyflow session. For example, in some embodiments, the core module 342records in the emergency flow history database data including, but notlimited to: which emergency contacts were contacted, and/or whichemergency contacts responded, if an EDC was contacted, if contacting anEDC was successful or unsuccessful, if a party opted to contact an EDC,or which party opted to contact an EDC. In some embodiments, after theexecution of a particular emergency flow, the core module 342 updates anentry in the emergency flow history database for the particularemergency flow session of the particular emergency flow to reflect thatthe particular emergency flow session was successful or unsuccessful. Insome embodiments, the criteria for success of a particular emergencyflow are predetermined by the administrator that created the particularemergency flow. In some embodiments, the criteria for success of aparticular emergency flow are predetermined by the EFMS 340.

The EFMS 340 is capable of executing many different permutations ofemergency flows as disclosed herein. In some embodiments, emergencyflows are defined by various emergency flow building blocks, eachemergency flow building block defined by a script, written in aprogramming language, which contains instructions for executing variousfunctions relating to an emergency flow. In some embodiments, thevarious functions are executed by the telephony module 345 and theservice actions module 344, as depicted in FIG. 3.

In some embodiments, the EFMS 340 employs the service actions module 344to execute various emergency flow building blocks that requiretransmitting data and communications to and from various users andoutput services 360 using various mediums and communication modes. Forexample, in some embodiments, an emergency flow includes an emergencyflow building block with instructions for delivering a text messagethrough short message service (SMS) or multimedia messaging service(MMS) or text message 360C to an account associated with a user, whichis optionally executed by the service actions module 344. In anotherexample, in some embodiments, an emergency call block requires the EFMS340 to deliver a message to an account associated with a user through aninternet enabled communication service 360E (e.g., WhatsApp, Slack, orFacebook Messenger) via an API call or HTTP post, which is optionallyexecuted by the service actions module 344. In some embodiments,associated contacts are also contacted by a voice call (PSTN or data orVoIP call). In some embodiments, associated contacts are called, and aTTS message is played. In yet another example, in some embodiments, anemergency flow includes an emergency flow building block withinstructions for delivering an audio adaptation of a text message (e.g.,text-to-speech message) to an account associated with a user, which isoptionally executed by the service action module 344. In yet anotherexample, an emergency flow may include an emergency flow building blockwith instructions for querying a triggering device 367 or an electronicdevice associated with a user for a location associated with a user,which is optionally executed by the service actions module 344.

In some embodiments, the service actions module 344 includes a locationservice (e.g., a location API) that can be employed by the API module341 to send or retrieve locations to and from a location database. Insome embodiments, the location database is external to the EFMS. Forexample, in some embodiments, an emergency alert includes a location(e.g., a location generated by the triggering device or an electronicdevice associated with the triggering device). After receiving theemergency alert, the API module 341 can employ the location service totransmit the location included in the emergency alert to an externallocation database. In some embodiments, the service actions module 344includes a voice command service that the API module 341 can employduring emergency flows to receive oral input from users. For example, insome embodiments, an emergency flow building block, such as aninteractive call block, as described below, may accept voice inputsusing the voice command service.

In some embodiments, the telephony module 345 is constructed usinghardware components such as voice over internet protocol (VoIP) gatewaysand open source communication software. In some embodiments, the EFMS340 employs the telephony module 345 to execute various emergency flowbuilding blocks requiring communication links. For example, in someembodiments, an emergency flow includes a building block withinstructions for delivering an interactive phone call to a user (e.g.,an automated phone call that accepts inputs from the recipient of thecall). In some embodiments, while executing the emergency flow, the coremodule 342 employs the telephony module 345 to execute the interactivecall. In another example, in some embodiments, an emergency flowincludes a building block with instructions for delivering a call to anoutput service 360 (e.g., an emergency dispatch center 360A,specifically a 911 call center or PSAP 360B, or a customer servicerepresentative 360D), which is optionally executed by the telephonymodule 345.

FIG. 4 depicts an embodiment of a system 400 including a graphical userinterface (GUI) 470 for managing emergency flows, triggering devices467, a pipeline 423 for delivering an emergency alert, the EFMS 440, theEMS 430, and an output service 450. Examples of triggering devicesinclude mobile or smart phones 467A, wearables 467B, and portablecomputing devices 467C such as laptops or tablets. In some embodiments,the GUI 470 is a web interface (such as a website or a mobileapplication) from which a user can download an emergency trigger scriptthat can be integrated into a triggering device 467. In someembodiments, the web interface is provided by the EMS 430. In otherembodiments, the web interface is provided by a third-party. The webinterface may provide access to one or more default or customizedemergency flows. For example, the web interface may provide a defaultemergency flow A designed for smartwatches and a default emergency flowB designed for smart speaker devices. In such an embodiment, a user witha smartwatch could then access the web interface (e.g., on a computer ordirectly from the smartwatch) and select to download an emergencytrigger script associated with default emergency flow A. The emergencytrigger script can be downloaded in numerous forms, including, but notlimited to, a block of code, an executable program, a plug-in, or amobile application. Likewise, the emergency trigger script can beintegrated into various devices and applications in different ways. Forexample, Amazon provides a “Skills Store” for the Amazon Alexa, a smartspeaker device, where users can download new “skills” (app like programsthat allow the Alexa to perform additional functions). In this example,an emergency trigger script associated with default emergency flow B maybe downloaded in the form of a skill from the Alexa Skills Store.

In some embodiments, a method for managing emergency flows by anemergency management system comprises: a) providing an emergency triggerscript configured to be integrated into a software application installedon an electronic device; b) receiving an emergency alert from atriggering device into which the emergency trigger script has beenintegrated, wherein the emergency alert is generated by the emergencytrigger script in response to the triggering device detecting anindication of an emergency and comprises a user identifier and alocation associated with the user identifier; c) identifying anemergency flow script associated with the emergency trigger script; andd) executing the emergency flow script associated with the emergencytrigger script to provide the location associated with the useridentifier to one or more recipients. In some embodiments, the emergencytrigger script is provided through a web interface. In some embodiments,the emergency alert is an application programming interface (API) call.In some embodiments, the emergency flow script associated with theemergency trigger script is identified using the user identifier. Insome embodiments, the emergency alert further comprises an emergencyflow identifier and wherein the emergency flow script associated withthe emergency trigger script is identified using the emergency flowidentifier. In some embodiments, the triggering device generates theemergency alert using the emergency trigger script. In some embodiments,the emergency flow script is identified within an emergency flowdatabase comprising two or more emergency flow scripts. In someembodiments, the emergency alert further comprises emergency dataassociated with the user identifier and wherein executing the emergencyflow script further comprises transmitting the emergency data associatedwith the user identifier to the one or more recipients. In someembodiments, the method further comprises gathering emergency dataassociated with the user identifier from one or more databases, whereinexecuting the emergency flow script further comprises transmitting theemergency data associated with the user identifier to the one or morerecipients. In some embodiments, executing the emergency flow scriptassociated with the emergency trigger script comprises transmitting atext-based message to the one or more recipients. In some embodiments,the emergency flow script defines a pathway of execution of two or moreemergency flow building blocks, wherein each of the two or moreemergency flow building blocks comprises instructions for performing anemergency function. In some embodiments, the indication of the emergencyis a selection of a soft or physical button on the triggering device bya user. In some embodiments, the indication of the emergency is a voicecommand detected by the triggering device. In some embodiments, theindication of the emergency is sensor data generated by a sensorcommunicatively coupled to the triggering device. In some embodiments,the one or more recipients comprises a call center or a public safetyanswering point (PSAP). In some embodiments, the emergency alertcomprises a list of emergency contacts for a user associated with thetriggering device. In some embodiments, the triggering device is one ofa communication device, a wearable device, or an internet of things(IoT) device. In some embodiments, the method further comprises: a)retrieving emergency data associated with the emergency alert from oneor more databases; and b) transmitting the emergency data to the one ormore recipients.

In some embodiments, a method for managing emergency flows by anemergency management system comprises: a) receiving an emergencycommunication comprising a user identifier from an emergency serviceprovider (ESP), wherein the emergency communication is indicative of anemergency; b) identifying an emergency flow script associated with theuser identifier, said emergency flow script defining a pathway ofexecution of two or more emergency flow building blocks, wherein each ofthe two or more emergency flow building blocks comprises instructionsfor performing an emergency response function; and c) executing theemergency flow script associated with the user identifier according tothe pathway of execution of the two or more emergency flow buildingblocks. In some embodiments, at least two emergency flow scripts areassociated with the user identifier, including a main emergency flow andan auxiliary emergency flow. In some embodiments, at least two emergencyflow scripts are associated with the user identifier, including a homeemergency flow and a work emergency flow. In some embodiments, the ESPis a public safety answering point (PSAP). In some embodiments, theemergency communication is an application programming interface (API)call. In some embodiments, the user identifier is a phone number. Insome embodiments, the method further comprises: a) providing a graphicaluser interface comprising a plurality of emergency flow building blocks,wherein each emergency flow building block comprises instructions forperforming an emergency response function; and b) providing aninteractive digital environment within which two or more emergency flowbuilding blocks are visually assembled into the emergency flow script,wherein the emergency flow script defines a pathway of execution of thetwo or more emergency flow building blocks. In some embodiments, theemergency flow script is stored within an emergency flow databasecomprising a plurality of emergency flow scripts.

In some embodiments of the system 400, the GUI 470 is an emergency floweditor that an administrator accesses to configure an emergency flow.The emergency flow editor 470 then optionally stores the emergency flowin an emergency flow database (e.g., the data module 343 depicted inFIG. 3) and assigns the emergency flow an emergency flow ID. In someembodiments, the administrator then installs a program, application, orscript (e.g., an emergency trigger script) into a triggering device 467configured to deliver data pertaining to the emergency via pipeline 423.Non-limiting examples of the data delivered through the pipeline 423sent by the triggering device 467 include location data, audio and/orvideo (streaming or a file), sensor data, emergency indication(s) (e.g.,user pressed panic button for a specific type of emergency), and anyuser commands (e.g., command to notify certain contacts in the contactlist). In some embodiments, the data is transmitted within the emergencyalert including the emergency flow ID. In some embodiments, the data istransmitted before or after the emergency alert is sent via the pipeline423 to the EFMS 440, which functions in conjunction with the EMS 430 toexecute the emergency flow. In some embodiments, the emergency alert 425(not shown) includes additional data, such as a location associated witha user, health data associated with a user, or a list of accountsassociated with a user. In some embodiments, the execution of theemergency flow includes initiating communications with an output service450, such as an EDC or PSAP.

In some embodiments, the data pertaining to the emergency is transmittedto the EDC 450 via a pipeline 424 (not marked). The data is transmittedas a part of an emergency alert or afterwards. In some embodiments, thedata is provisioned in the EFMS 440, EMS 430 or a third-party server andsent to the EDC 450 in response to a query from the EDC 450.

The data transmitted through pipelines 423, 424 is optionally encryptedand sent through secure pathways to authorized recipients. Pipelines423, 424 are contemplated to deliver location, voice, and additionaldata (e.g., user data, images, video feed) from device 467 to the EDC450 in a secure and compatible format.

In one implementation of this embodiment, the administrator is a companythat produces a smartwatch. The company optionally uses the emergencyflow editor 470 to create an emergency flow that activates when a wearerof the smartwatch (e.g., the triggering device 467) presses a button onthe smartwatch that indicates (e.g., delivers an emergency alert 425 tothe EFMS 440) that the wearer is in a state of distress (e.g., thewearer of the smartwatch has fallen and is incapable of pickingthemselves up). When activated, the emergency flow is configured by thecompany to instruct the EFMS 440 to deliver an interactive call to thesmartwatch (if the smartwatch is capable of receiving calls) or to aphone associated with the wearer in which the interactive call asks thewearer if they are in need of emergency assistance. The interactive callthen optionally waits for a predetermined duration of time (e.g., 20seconds) for an input from the wearer of the smartwatch (e.g., theinteractive call may present the wearer with two options: press 1 foryes or * for no). If the wearer selects 1, or the predetermined durationof time expires before the wearer submits an input, the EFMS 440 theninitiates a call with an EDC and connects the wearer with the EDC 450once the EDC has accepted the call. If the wearer selects *, the EFMS440 terminates the emergency response flow.

In another implementation of this embodiment, the administrator is acompany that provides a vehicle safety service (e.g., OnStar or AAA). Inthis example, the company uses the emergency flow editor 470 to createan emergency flow that is automatically activated when an intelligentvehicular system (integrated with the vehicle safety service) within avehicle detects that the vehicle has been compromised (e.g., when thevehicle has been in an accident). In this example, when the intelligentvehicular system detects that the vehicle has been compromised, thevehicle (e.g., the triggering device 467) delivers an emergency alert425 to the EFMS 440, which executes the emergency flow. In this example,when executed, the emergency flow is configured by the company toinstruct the EFMS 440 to call a customer service provider 450 (e.g., aAAA representative), call the vehicle, and bridge the calls between thevehicle and the customer service provider 450. The emergency flow alsooptionally provides the customer service provider 450 with an option toinitiate a call with an EDC 450 (e.g., call a PSAP).

FIG. 5 depicts an embodiment of a system 500 for the creation andimplementation of an emergency flow. As depicted in FIG. 5, in someembodiments, the system 500 contains two pathways: an administratorpathway 513 (admin path) and a user pathway 511 (user path). The adminpath 513 is initiated by an administrator. In the admin path, theadministrator accesses an emergency flow editor 570 to configure anemergency flow to fit the needs of the administrator's product orservice, such as the smartwatch or vehicle described in the examplesprovided above with respect to FIG. 4. In some embodiments, in the adminpath, an emergency flow provisioning API service 547 compiles theemergency flow, assigns an emergency flow ID to the emergency flow, andstores the emergency flow within a data module 543. The user path 511 isinitiated by a user 500, or a device associated with a user, of theproduct or service provided by the administrator, such as the vehicle orthe wearer of the smartwatch described in the examples provided abovewith respect to FIG. 4. In some embodiments, in the user path, the APImodule 541 receives an emergency alert including an emergency flow IDfrom a triggering device. In some embodiments, the API module 541 thenreferences the emergency flow ID with the data module 543 to find theemergency flow corresponding to the emergency flow ID and delivers theemergency flow to the core module 542 for execution. In someembodiments, the core module 542 employs the service actions module 544and the telephony module 545 to execute various blocks of the emergencyflow. In some embodiments, the API module 541, the core module 542, theservice actions module 544, and the telephony module 545 are separatelyand simultaneously in communication with the message bus 546, whichfacilitates and coordinates synchronous and asynchronous communications(e.g., a communication bridge, text messages, etc.) between the modulesand various users and accounts (e.g., a user, emergency contacts,emergency responders, etc.).

The Emergency Console

FIG. 6 depicts a view of an emergency flow configuration editor 670(also referred to as the Emergency Console or an emergency flow editor).In some embodiments, the emergency flow editor 670 is used to configurecustomized emergency flows. In some embodiments, the emergency floweditor 670 includes a programming language input field 671 in whichusers manually program an emergency flow by inputting writtenprogramming commands to create a script 672 (not shown; also referred toas an “emergency flow script”) that defines the emergency flow. In someembodiments, the emergency flow editor additionally or alternativelyincludes a graphical user interface 673 (also referred to as an“interactive space”) which users can use to visually assemble emergencyflows by dragging and dropping (or otherwise manipulating) graphicalrepresentations of emergency flow building blocks 674 into variousarrangements. In some embodiments, an emergency flow building block isdefined by a short script (e.g., a compilation or block of writtenprogramming commands), written in a programming language, that containsinstructions for executing various functions (also referred to asemergency response functions) relating to an emergency flow. A singleemergency flow building block generally contains instructions relatingto one emergency flow function, as will be described in greater detail,and generally does not represent an entire emergency flow. In someembodiments, an arrangement of emergency flow building blocks in thegraphical user interface 673 automatically results in the creation of ascript 672 (e.g., an emergency flow script), which is optionallydisplayed in the programming language input field 671. In someembodiments, an emergency flow building block receives at least oneinput, performs at least one emergency response function based upon theat least one input, and generates at least one output. In someembodiments, at least one input for an emergency flow building blockcomprises an output received from another emergency flow building block.In some embodiments, adjacent emergency flow building blocks in anemergency flow script are connected such that an output of a precedingemergency flow building block forms an input for at least one succeedingemergency flow building block. In some embodiments, the emergency floweditor 670 includes either the programming language input field 671 orthe graphical user interface 673, but not both. In some embodiments, theemergency flow editor includes both the programming language input field671 and the graphical user interface 673. In some embodiments, theemergency flow editor 673 includes options or buttons to save, test, andpublish an emergency flow. While users can use the emergency flow editor670 to visually assemble customized emergency flows, the emergency floweditor 670 may additionally or alternatively allow users to accessdefault or premade emergency flows provided by the emergency managementsystem.

In some embodiments, the Emergency Console allows a variety ofcustomizable emergency flows between users, emergency contacts,emergency services, and related third parties by establishing amultitude of voice and data connections to Public Safety AnsweringPoints (PSAPs) through a variety of trigger mechanisms. In someembodiments, the trigger mechanisms enable implementation in a varietyof scenarios including software panic buttons (e.g., within mobileapplications), remote activation by associated emergency contacts, andothers. The Emergency Console allows for the customization andgeneration of emergency flows while ensuring that the generatedemergency flows comply with regulatory constraints (Federal, State orlocal laws, regulations, policies, best practices, etc.) applicable tothe location and type of emergency. In some embodiments, the EmergencyConsole is a part of the EMS. In some embodiments, the Emergency Consoleis part of an EDC such as a PSAP. In some embodiments, the EmergencyConsole is operated on an emergency response server. In someembodiments, the EMS comprises an emergency response server. In someembodiments, the Emergency Console is a web interface that providestools for generating and testing emergency flows. In some embodiments,the Emergency Console allows for emergency flows to be initiated viasimple API triggers from any device.

As described above, in some embodiments, emergency flow building blocks674 are visually arranged into an emergency flow within the graphicaluser interface 673 of the emergency flow editor 670. In someembodiments, the emergency flow building blocks are connected with oneor more connectors 675. A single emergency flow building block may beconnected to a plurality of other emergency flow building blockspreceding the single emergency flow building block and/or a plurality ofother emergency flow building blocks succeeding the single emergencyflow building block. For example, in emergency flow 700 (described belowwith regard to FIG. 7), call contact block 706 is connected to oneproceeding emergency flow building block (call user interactive block704A) and two succeeding emergency flow building blocks (call userinteractive block 704B and call EDC block 708). In some embodiments, theemergency flow building blocks 674 and connectors 675 that make up anemergency flow define a pathway of execution for the emergency flow. Insuch embodiments, the emergency flow management system executes theemergency flow according to the pathway of execution defined by theemergency flow building blocks and connectors.

For example, referring back to emergency flow 700, after executing thecall contact block 706, according to the pathway of execution defined bythe emergency flow building blocks and connectors that constituteemergency flow 700, the emergency flow management system will eitherexecute the call user interactive block 704B or execute the call EDCblock 708, depending on the output of the call contact 706 block, asdescribed below. For example, as described below, in some embodiments, acall contact block (also referred to as a “Find Next Available ContactBlock”) has three potential outputs: (i) contact answers the call, (ii)contact does not answer the call, and/or (iii) there are no availablecontacts (also referred to as an NAC response). Referring again to FIG.7 (as described below), according to the pathway of execution defined bythe emergency flow building blocks and connectors of emergency flow 700,if the output of the call contact block 706A is a contact answers thecall, the emergency flow 700 continues with call EDC block 708.According to the pathway of execution, if the output of the call contactblock 706 is the contact did not answer the call or there was an NACresponse, the emergency flow 700 continues with call user interactiveblock 704B.

Emergency Flow Building Blocks

In some embodiments, the emergency flow editor 670 (e.g., the EmergencyConsole) contains a set of predefined emergency flow building blocks.Below is a non-exhaustive list of emergency flow building blocks thatare optionally included in the set of predefined emergency flow buildingblocks and that may be incorporated into a customized emergency flow(e.g., customized emergency flow script).

In some embodiments, the customized emergency flow script is associatedwith a user identifier. In some embodiments, the customized emergencyflow script is configured to account for additional user data or input.User data or input can include location information (e.g., user devicelocation determined using GPS and/or WiFi access points), sensor data,user demographic information, health information, or other relevantdata. In some embodiments, the flow script comprises one or moreemergency flow building blocks configured to perform distinct emergencyfunctions based on the user data or input. In some embodiments, thedistinct emergency functions arise from a decision made within the flowscript such as to decide on the path of execution of building blocksbased on the user data or input. In some embodiments, when an identifieris received, it is matched with a flow script. In some embodiments,additional data is obtained including location of the user (e.g.,location of the user communication device) and user data (e.g., userhome and work addresses). In some embodiments, a distinct sequence ofemergency functions is performed depending on the user location relativeto home, work or other known locations. As an example, when a user has afire emergency at home (e.g., based on specific emergency indication inthe alert and user location compared to stored home location), theexecuted flow script may cause the emergency management system to notifyhis neighbors. Conversely, when a user who has a medical emergency atwork (e.g., determined by the emergency indication in the alert and bycomparing current user location to stored work address), the executedflow script may cause the user's employer to receive notification thatthe user had a medical emergency and will be transported to a nearbyhospital. In the case when a user has a car breakdown on the freeway,the route of travel and/or recent movement/travel speed (e.g., based onGPS signal or data from a mobile map application for the last 5 minutes)can result in the executed flow script notifying the user's insurancecompany and/or an associated towing service.

Alternatively or in combination, multiple emergency flow scripts may bechosen from for a single user based on the additional user data.Examples of various emergency flow scripts include a traffic emergencyscript, a medical emergency script, a fire emergency script, a policeemergency script, a natural disaster emergency script, a home emergencyscript, a work emergency script, a travel emergency script, and otherpossible scripts.

(a) Create Emergency Bridge Block: In some embodiments, the createemergency bridge block instructs the EFMS to create a communicationbridge in which one or more calls are dynamically added or removed. Thecommunication bridge serves as a hub for various calls that are madeduring the execution of an emergency flow. In some embodiments, thecreate emergency bridge block takes no inputs and produces no outputs.In some embodiments, the create emergency bridge block is a corecomponent included in every emergency flow. In some embodiments, thecreate emergency bridge block is an implied emergency flow buildingblock (e.g., the script defining the create emergency bridge block isincluded in every emergency flow but the create emergency bridge blockis not depicted in the graphical user interface 673).

(b) Call User Block: In some embodiments, the call user block instructsthe EFMS to initiate a phone call to a phone number associated with theuser associated with the triggering device and connect the phone callwith a communication bridge. The input for the call user block is thephone number associated with the user. The outputs of the call userblock are: (i) the user answered the phone call or (ii) the user did notanswer the phone call.

(c) Play Pre-Recorded Message Block: In some embodiments, the playpre-recorded message block instructs the EFMS to play a pre-recordedaudio file to one or more parties currently connected to a communicationbridge. The input for the play pre-recorded message block is the name orfile location of the pre-recorded audio file. The play pre-recordedmessage block has no output.

(d) Play TTS Message Block: In some embodiments, the play TTS(text-to-speech) message block instructs the EFMS to play an audio fileadaptation of a text file to one or more parties currently connected toa communication bridge. The input for the play TTS message block is thetext of the message to be converted to audio. The play TTS message blockhas no output.

(e) Send SMS Message Block: In some embodiments, the send SMS messageblock instructs the EFMS to deliver a SMS message to a user or a groupof users. In some embodiments, the SMS message includes informationpertaining to status of the emergency flow session. The inputs for thesend SMS message block are the contents of the text message to be sentand the phone number(s) of the intended recipients of the text message.The send SMS message block has no output.

(f) Timeout Block: The timeout block instructs the EFMS to add a timeoutinstruction for a desired event. For example, in some embodiments, anadministrator can add a timeout instruction to another emergency flowbuilding block, such as the call user block, and specify an amount oftime that the emergency flow should wait at the call user block beforeautonomously determining a negative outcome (e.g., in the case of thecall user block, the user did not answer). The input for the timeoutblock is the amount of time (e.g., 1-30 seconds). The output of thetimeout is a confirmed negative outcome.

(g) Location Block: In some embodiments, the location block instructsthe EFMS to query or detect a location of a user. In some embodiments,the location block instructs the EFMS to parse a location database for alocation. In some embodiments, the location block instructs the EFMS tocommunicate with a triggering device to determine the location of thetriggering device. The input for the location block is an accountassociated with a user (e.g., a phone number of the user). The output ofthe location block is a location of the user.

(h) API/HTTP Request Block: In some embodiments, the API/HTTP requestblock instructs the EFMS to execute an API or HTTP post to aninternet-based service to provide status, alerts, and notificationsregarding the current emergency. The API or HTTP post may be provided bythe user or included in the Emergency Console. In some embodiments, theinputs for the API/HTTP request block are a URL and any necessaryparameters (named parameters included in HTTP post). In someembodiments, the outputs of the API/HTTP request block are (i) successor (ii) failure.

(i) Find Next Available Contact Block: In some embodiments, the findnext available contact block instructs the EFMS to loop through a listof contacts (e.g., accounts associated with a user or emergencycontacts), call each one-by-one in sequence, play an audio message tothem and wait for confirmation to determine whether to call the nextcontact. In some embodiments, a contact can confirm readiness to speakto an EDC or emergency dispatch center by responding to the audiomessage (e.g., by pressing 1). In some embodiments, the call of the findnext available contact block is an interactive call (as discussedbelow). In some embodiments, the input for the find next availablecontact block is a list of contacts, the list of contacts includingphone numbers and names. In some embodiments, the outputs of the findnext available contact block are (i) contact answers the call, (ii)contact does not answer the call, and/or (iii) there are no availablecontacts (also referred to as an NAC response).

(j) Interactive Call/IVR Block: In some embodiments, the interactivecall/IVR (interactive voice response) block instructs the EFMS to call aphone number (e.g., an account associated with a user) and play an audiomessage to the recipient of the call and wait for a dial tone response(e.g., an interactive call) to determine whether the recipient of thecall confirms readiness to speak to an EDC or emergency dispatch center.In some embodiments, the interactive call presents the recipient with aplurality of options to choose from (e.g., press 1 to dial 9-1-1, press2 to call an emergency contact, press * to hang up). In someembodiments, the inputs for the interactive call/IVR block are a nameand associated phone number of the intended recipient of the call and anaudio message to play to the recipient. In some embodiments, the inputsfor the interactive call include a plurality of options for therecipient to choose from. In some embodiments, the outputs of theinteractive call/IVR block are (i) a dial tone response from therecipient (ii) the call was answered or (iii) the call was unanswered.

(k) Connect to Customer Call/Operations Center Block: In someembodiments, the connect to customer/operations center block instructsthe EFMS to initiate a call with an operations center associated withthe administrator. The input for the connect to customer call/operationscenter is a phone number of the customer call/operations center. In someembodiments, the outputs of the connect to customer call/operationscenter are (i) successful connection to customer call/operations centeror (ii) unsuccessful connection to customer call/operations center. Insome embodiments, the call of the connect to customer call/operationscenter block is an interactive call (as described above).

(1) Connect to 9-1-1 Block: In some embodiments, the connect to 9-1-1block instructs the EFMS to call 9-1-1 (or another emergencyresponse/dispatch center number), add the call to a communicationbridge, and provide the EDC with a location and name of a user. Theinputs for the connect to 9-1-1 block are the location of the user andthe name and phone number of the user. The outputs of the connect to9-1-1 block are (i) successful connection to 9-1-1 or (ii) unsuccessfulconnection to 9-1-1.

(m) Add 3. Party Block: In some embodiments, the add third party blockinstructs the EFMS to initiate a call with an additional party (e.g., anemergency contact, customer service, a suicide hotline, etc.) and addthe call with the additional party to a communication bridge. The inputsfor the add 3rd party block are a name and number of a third party. Theoutputs of the add third party block are (i) successful connection tothird party or (ii) unsuccessful connection to third party.

(n) Failsafe Block: In some embodiments, the failsafe block instructsthe EFMS to detect a failure within an emergency flow and deliver amessage to a user notifying the user that the emergency flow has failed.In some embodiments, the failsafe block further instructs the API toprompt the user to call 9-1-1. In some embodiments, the failsafe blockis an implied emergency flow building block (e.g., the script definingthe failsafe block is included in every emergency flow but the “createemergency bridge” block is not depicted in the graphical user interface673). In some embodiments, the failsafe block is an implied additionalor associated component of every emergency flow building blockconfigured within an emergency flow. In general, the failsafe blockfunctions to ensure that an emergency flow is at least as reliable as atraditional emergency call (e.g., calling 9-1-1 in the United States).In some embodiments, the input for the failsafe block is a failedoutcome of a previous or associated emergency flow building block (e.g.,the previous or associated emergency flow building block failed toexecute its intended function). The failsafe block has no output.

In some embodiments, in addition to the emergency flow building blocks,the Emergency Console contains one or more utility building blocks. Forexample, in some embodiments, utility building blocks may performcomputational or logistical functions, as opposed to emergencyfunctions. For example, the utility building blocks may include acalculator building block configured to perform a mathematical equationon two inputs, a datetime building block configured to return thecurrent day and time, an evaluate building configured to evaluate anexpression (e.g., an algebraic expression), a compare building blockconfigured to execute an if/then statement. In some embodiments, theutility building blocks may include increase and decrease buildingblocks configured to increase or decrease the value of a numericalvariable, respectively.

The Emergency Console optionally contains any number of emergency flowbuilding blocks defining any number of emergency response functions. Insome embodiments, additional emergency response functions include, butare not limited to, at least one of the following: delivering a locationof a user to an emergency dispatch center or database accessible by theemergency dispatch center, identifying an emergency dispatch centersuitable for responding to an emergency alert based on location dataassociated with or received from an electronic device associated with auser, calling an emergency contact of a user for whom an emergency alerthas been received, calling an associated device of the user, andobtaining sensor data from a network of sensors associated with the useror user's electronic device. In some embodiments, the Emergency Consoleallows administrators to edit the short script of an emergency flowbuilding block to reprogram the building block to be more applicable tothe needs of the administrator. For example, in some embodiments, theEmergency Console may contain a predefined call user block that takes asingle phone number as an input. In this example, the Emergency Consoleoptionally allows an administrator to edit the short script of thepredefined call user block such that the edited call user block nowtakes a list of phone numbers as its input and dials each number in thelist of phone numbers one-by-one in sequence until one of the numbers issuccessfully reached. In some embodiments, the Emergency Console allowsadministrators to configure any parameter of an emergency flow buildingblock, including, but not limited to: the input, output, and emergencyresponse function. In some embodiments, the Emergency Console allowsadministrators to design their own original emergency flow buildingblocks, such as by writing their own short script in the programminglanguage input field 671. In some embodiments, the Emergency Consoleincludes a shared (e.g., accessible to all administrators) library ofadministrator generated emergency flow building blocks.

Example Emergency Flows

In some embodiments, emergency flows are designed based on desiredsolutions. As an example, a simple flow is configured to initiate adirect connection between the caller and 9-1-1. In some embodiments,complex logical flows include multiple callers or call centers withtunable timing, with text-to-speech and interactive voice response (IVR)components, with SMS messaging, with rich data interchange, etc. TheEFMS service is designed to be modular so that the various buildingblocks, such as the ones described above, can be assembled to constructan emergency flow that meets any particular emergency connectivitysolution design. In some embodiments, an emergency flow may beconsidered as a logic tree (e.g., a series of if/then statements thatprogressively lead to various actions or decisions based on the outcomeof the previous action or decision). The following emergency flowsexamples depict emergency flows constructed by an administrator withinthe Emergency Console.

FIG. 7 depicts a configuration of an emergency flow 700. The emergencyflow 700 may be designed for a user-triggered panic button (e.g., a softbutton on a mobile application, for example). FIG. 7 depicts theemergency flow 700, as it may appear in the graphical user interface 673in some embodiments of the Emergency Console, as a configuration ofemergency flow building blocks 701 and various accompanying connectors703. In some embodiments, connectors 703 are used to define the path orsequence of execution of the emergency flow building blocks 701. In someembodiments, emergency flow 700 begins with emergency flow activationblock 702. The emergency flow activation block 702 can be triggered invarious ways, such as by the EFMS 340 receiving an emergency alertincluding an emergency flow ID corresponding to emergency flow 700 froma triggering device 367 associated with a user at the API module 341;the API module 341 referencing the emergency flow ID with the datamodule 343, identifying emergency flow 700 as the emergency flowcorresponding to the emergency flow ID, and delivering the emergencyflow 700 to the core module 342 for execution; and the core module 342executing the emergency flow 700. In some embodiments, the emergencyflow activation 702 is an emergency flow building block. In someembodiments, the emergency flow activation 702 is an implied emergencyflow building block. In some embodiments, the emergency flow activation702 is functionally equivalent to a “create emergency bridge” block, asdescribed above.

In some embodiments, the emergency flow 700 continues with call userinteractive block 704A, an interactive call/IVR block that instructs theEFMS to deliver an interactive call (as described above) to a phonenumber associated with a user. The interactive call optionally plays anaudio message to the user and prompts the user to select one of aplurality of options. In some embodiments, the plurality of optionsincludes connect to an EDC (e.g., “press 1 for 9-1-1) or disconnect(e.g., press * to end this call). In some embodiments, the plurality ofoptions additionally or alternatively includes an option to deliver amessage to an emergency contact associated with the user (e.g., press 2to alert an emergency contact). In some embodiments, the option todeliver a message to an emergency contact prompts the EFMS to deliver atext message (e.g., an SMS or MMS message) to an emergency contact. Insome embodiments, the interactive call/IVR block additionally includesat least one default input parameter such as a timeout criterion (e.g.,user does not provide a selection before the expiration of 30 seconds),an NA response (e.g., the phone call is not answered), or a hang upresponse (e.g., the user answers the call but hangs up).

After the call user interactive block 704A, in some embodiments, asdepicted in FIG. 7, the emergency flow 700 proceeds in one or moredirections, dependent upon the output of the call user interactive block704A (e.g., the emergency flow building blocks shown in emergency flow700 optionally form parallel emergency flow pathways for both callingthe emergency responder 708 and messaging a contact 706). In someembodiments, when the output of the call user interactive block 704A isa user command or selection to connect to an EDC, the emergency flow 700continues with call EDC block 708. In some embodiments, when the outputof the call user interactive block 704A is a user command or selectionto deliver a message to an emergency contact, or the interactive calltimed out (e.g., the timeout criteria was satisfied), or there was an NAresponse, the emergency flow 700 continues with call contact block 706.In some embodiments, when the output of the call user interactive block704A is the user selected to disconnect, the emergency flow 700terminates.

In some embodiments, the emergency flow 700 continues with call contactblock 706, a find next available contact block (as described above) thatinstructs the EFMS to loop through a list of contacts associated withthe user and call each one-by-one in sequence until one of the contactsanswers. In some embodiments, the calls prompted by the call contactblock 706 are interactive calls that play an audio message that promptsthe recipients of the calls to select one of a plurality of options. Insome embodiments, the plurality of options includes an option to connectto an EDC or to disconnect. In some embodiments, the call contact block706 additionally includes a default input such as an NAC response (e.g.,there are no available contacts, or all of the listed contacts have beencalled and none answered) or a hang up response.

After the call contact block 706, in some embodiments, as depicted inFIG. 7, the emergency flow 700 proceeds in one or more directions,dependent upon the output of the call contact block 706. In someembodiments, when the output of the call contact block 706 is a contactselected to connect to an EDC, the emergency flow 700 continues withcall EDC block 708. In some embodiments, when the output of the callcontact block 706 is the contact selected to disconnect or there was anNAC response, the emergency flow 700 continues with call userinteractive block 704 b. In some embodiments, when the output of thecall contact block 706 is the contact selected to disconnect, a hang upresponse, or there was an NAC response, the emergency flow 700terminates.

In some embodiments, the emergency flow 700 continues with call userinteractive block 704B, an interactive call/IVR block. In someembodiments, call user interactive block 704B functions the same as calluser interactive block 704A, described above. In some embodiments, theinteractive call executed by call user interactive block 704B takesdifferent inputs and produces different outputs than those of call userinteractive block 704A. After the call user interactive block 704B, theemergency flow 700 proceed in one or more directions, depending upon theoutput of the call user interactive block 704B. In some embodiments,when the output of the call user interactive block 704B is a usercommand or selection to disconnect, or a hang up response, or an NAresponse, or the interactive call timed out, the emergency flow 700terminates. In some embodiments, when the output of the call userinteractive block 704B is the interactive call timed out or an NAresponse, the emergency flow 700 repeats the call contact block 706. Insome embodiments, when the output of the call user interactive block704B is a user command or selection to connect an EDC, the emergencyflow 700 continues with call EDC block 708.

In some embodiments, the emergency flow 700 continues with call EDCblock 708, a connect to 9-1-1 block (as described above) that instructsthe EFMS to call an emergency response or emergency dispatch center. Insome embodiments, once the EDC has answered the call and been added tothe communication bridge, the emergency flow 700 ends. In someembodiments, after answering the call, an EDC selects an option to querythe location of the user.

A section of an example of an emergency flow script corresponding toemergency flow 700 is shown below. In the example shown below, aninteractive call block ([0172]-[0190]) is shown first, followed first bya “connect to 9-1-1” block ([0191]-[0198]) and then by a “find nextavailable contact” block ([0199]-[0217]). The following example shouldnot be considered a complete emergency flow.

Example Emergency Flow Script

states:

-   -   name: call user    -   action: INTERACTIVE CALL    -   inputs:    -   phone_number: ‘{user.phone_number}’    -   text: >-        -   “This is an automated call from ${company}. If this is a            real emergency,        -   dial one to talk to a nine one operator and receive help. If            this        -   is a false alarm, please dial star to cancel your request            for help. You        -   have activated the emergency feature in ${company}. Please            dial one to        -   talk to a nine one one operator and receive help. If this is            a false        -   alarm, please dial star to cancel your request for help. If            you do not        -   press one for help or star to cancel, we will call your            emergency        -   contacts and prompt them to speak to nine one one in your            place. This        -   call will now disconnect.”    -   on_output:    -   ‘#1@.*’: user_call_911_play    -   ‘#\*@.*’: user_cancelled_911    -   HANGUP@.*: user_hangup_sms    -   ‘false’: find_available_contact

name: user_call_911_play

-   -   action: PLAY    -   inputs:        -   text: ‘Now calling nine one one . . . ’        -   phone_number: ‘{user.phone_number}’    -   on_output:    -   ‘true’: user_call_911_sms    -   goto: fail_safe

name: find_available_contact

-   -   action: CALL_LOOP    -   inputs:    -   callee list: contacts    -   text: >-        -   “This is an emergency call from ${company}.            ${user.full_name} has        -   designated you as an emergency contact in the app. The user            has        -   activated the emergency procedure, dial one to speak to a            nine one one        -   operator closest to ${user.full_name}'s location and send            help to his        -   exact location, or hang up to disconnect this call. If you            do not dial        -   one to connect to a nine one one operator, we will call        -   ${user.full_name}'s other emergency contacts if he has            provided any.        -   This call will now disconnect.”    -   time: 120    -   store: found_contact    -   on_output:    -   ‘#1@.*’: contact_call_911_play    -   ‘false’: user_call_final_911_call    -   goto: fail_safe

In the example shown above, after the emergency flow is activated, theemergency flow begins by executing an interactive call block (e.g., calluser interactive block 704A). A call is placed to {user.phone_number}(e.g., a phone number included in or associated with the emergency alertthat activated the emergency call flow) and the message shown inparagraphs [0177]-[0185] is dictated to the recipient of the call as atext-to-speech (TTS) message. As shown above, if the recipient selects“1”, the emergency flow continues by executing a connect to 9-1-1 block(e.g., call emergency responder block 708). If the recipient selects“*”, the emergency flow ends. If the recipient does not submit aresponse, the emergency flow continues by executing a find nextavailable contact block (e.g., call contact block 706).

FIG. 8 illustrates a configuration of an emergency flow 800. FIG. 8depicts the emergency flow 800, as it may appear in the graphical userinterface 673 in some embodiments of the Emergency Console, as aconfiguration of emergency flow building blocks and various accompanyingconnectors. The emergency flow 800 begins with a call operations centerblock 812. In this example, the call operations block 812 prompts theemergency flow management system to create an emergency bridge, call anoperations center, and connect the operations center call to theemergency bridge. According to the pathway of execution defined by theemergency flow building blocks and connectors of emergency flow 800,after the call operations center block 812, the emergency flow 800either ends with a failsafe block or continues with interactive callblock 804A, depending on the output of the call operations block 812. Inthis example, if the output of the call operations center block 812 is asuccessful connection the operations center, the emergency flow 800continues with interactive call block 804A. If the output of the calloperations center block 812 is anything else (e.g., the call times out,is denied, or is otherwise unsuccessful), the emergency flow 800 endswith the failsafe block, as described above.

Continuing with interactive call block 804A, in this example, theinteractive call block 804A plays an audio message to the recipient ofthe operations center call prompting the recipient (e.g., an operator)to press 1 to connect to 9-1-1. According to the pathway of executionfor the emergency flow 800, after the interactive call block 804A, theemergency flow 800 either ends with the failsafe block or continues withinteractive call block 804B, depending on the output of the interactivecall block 804A. In this example, if the output of the interactive callblock 804B is the audio message played successfully, the emergency flow800 continues with a connect to 9-1-1 block 808, which prompts theemergency flow management system to call 9-1-1 and connect the 9-1-1call to the emergency bridge. If the output of the interactive callblock 804B is anything else (e.g., the call is hung up or the audiomessage otherwise fails to play), the emergency flow 800 ends with thefailsafe block.

FIGS. 9A and 9B depict screenshots for an embodiment of an interface formanaging emergency flows. FIG. 9A shows a “code view” for an emergencyflow and FIG. 9B shows the “ALI display” that is shown on a PSAP display(e.g., EDC 450 in FIG. 4). In some embodiments, the Emergency Console isa web application that users (e.g., administrators) can access throughan internet browser (e.g., Internet Explorer, Google Chrome). In someembodiments, the Emergency Console is a desktop application that can beaccessed offline. In addition to the graphical user interface 673 (seeFIG. 6) in which users can configure emergency flows, the EmergencyConsole may include a dashboard where users can view, test, download,and otherwise manage their emergency flows. In some embodiments, userscan select emergency flows from a drop-down list, as depicted in FIG. 9.In the example depicted in FIG. 9, the selected emergency flow is called“company_contacts.” In some embodiments, once an emergency flow isselected, the dashboard automatically populates with informationregarding the selected emergency flow. In some embodiments, theinformation regarding the selected emergency flow includes user names,contact names, and associated accounts (e.g., phone numbers, emailaccounts). In some embodiments, after an emergency flow is selected, theEmergency Console displays data pertaining to the selected emergencyflow. For example, in some embodiments, the Emergency Console displaysan emergency flow history (such as from the emergency flow historydatabase described above with respect to FIG. 3) including an entry forevery individual execution of the selected emergency flow. An entryoptionally includes data including, but not limited to: the day and timethat the selected emergency flow was executed, what type of triggeringdevice sent the emergency alert that triggered the execution of theselected emergency flow, an identity of the user associated with thetriggering device, which contacts were contacted, if a party opted tocontact an emergency responder, if an emergency responder was contacted,if contacting an emergency responder was successful or unsuccessful,which party opted to contacted an emergency responder, how long theexecution of the selected emergency flow lasted, or combinationsthereof. In some embodiments, the emergency flow history includesadditional data pertaining to the selected emergency flow including, butnot limited to: the average length of the execution of the selectedemergency flow, the total number of times the selected emergency flowhas been executed, the absolute number of false positives (e.g., howmany times the selected emergency flow was triggered and then promptlycanceled), the percentage of false positives (e.g., the absolute numberof false positives divided by the total number of times the selectedemergency flow has been executed), the absolute number of times andpercentage that an EDC was contacted, the number of times the selectedemergency flow failed, or combinations thereof.

In some embodiments, as depicted in FIGS. 9A & 9B, the dashboardincludes a code example tab, an API request tab, and an ALI display tab.FIG. 9A depicts a view of a dashboard within the Emergency Console whenthe code example tab is selected. In some embodiments, the code exampletab displays the script that defines the selected emergency flow. FIG.9B depicts a view of a dashboard within the Emergency Console when theALI display tab is selected. In some embodiments, a user can download anemergency trigger script from the dashboard, such as under the APIrequest tab. In some embodiments, the ALI display tab depicts asimulation of information displayed at an emergency dispatch center(e.g., PSAP) generated by the selected emergency flow.

Authentication

In some embodiments, the EFMS authenticates requests using a short-livedOAuth 2.0 access token granted using application client credentials. Thetoken is valid for authenticating requests to the EFMS for a temporaryduration of time (e.g., one hour), after which a new token for futurerequests will need to be fetched. Details for retrieving and using oneof these tokens are described below.

(i) Getting an Authentication Token

POST https://api-sandbox.rapidsos.com/oauth/token

Request

Headers

Content-Type: x-www-form-urlencoded

Parameters

client_id: Client ID of an application authorized to use the service

client_secret: Client secret of an application authorized to use theservice

grant_type: client credentials

Response

Fields (access_token: Short-lived OAuth 2.0 access token)

(ii) Using an Authentication Token

To authenticate requests using an access token, requests typically mustinclude an Authorization header set to the value Bearer <ACCESS-TOKEN>where <ACCESS-TOKEN> is substituted for the retrieved access token.

(iii) Triggering/Initiating Emergency Flow

The logical entity triggering the emergency flow (e.g., a mobileapplication, service backend, or any connected device) will trigger theemergency flow with a single API call as described below.

POST https://api-sandbox.rapidsos.com/v1/rem/trigger

Request

Headers (Authorization: Bearer <ACCESS-TOKEN>; Content-Type:application/j son); Parameters (emergency flow: The name of theemergency flow to execute; variables: JSON Object defining any variablesthat you have defined and use in your emergency flow).

Response: Fields (code: Status code of the emergency flow initiation;id: Unique identifier of the instance (e.g., the particular emergencyflow session) of the emergency flow execution; message: Human-readabledescriptor of the emergency flow status).

Markup Language for Emergency Flows—REML (Proprietary Markup Language)

As discussed above, in some embodiments, emergency flows are defined byscripts written in a programming language. In some embodiments, theprogramming language used to write the scripts is the YAML (YAML Ain′tMarkup Language) language or a derivative thereof. In some embodiments,the programming language used to write the scripts is the RapidSOSEmergency Markup Language (REML). The REML language may be used todefine a REML state machine. In some embodiments, the REML state machinemay be specified by a “states” tag. Each REML state includes thefollowing main items including name of state, description of state,action to be executed, action inputs (also referred to as arguments),variable name to store the results of the action, transitions based onthe result of the action (e.g., which state to move to). An embodimentof the schema describes the syntax of a state:

name: <string>

description: <string>

action: <string>

inputs:

name1: value1

name2: value2

store: <string>

on_output:

result1: <string>

result2: <string> . . .

goto: <string>

log: <string>

Table 1 describes optional REML tags below.

TABLE 1 REML Tag Tag Description Name Name of a state DescriptionNonfunctional, descriptive comment of what a state accomplishes ActionName of the action to run i this state Inputs Map of variables toprovide the action as input parameters Store Name of a variable to storethe result of the action on_output Map of name/values to specify thestate transition Goto Specify transition (if there's no match with“on_output”) Log Mostly Troubleshooting add a customer log for thisstate

In addition to the current states, certain embodiments have two built-instates that can be used to stop execution of state-machine: (i)_STATE_END_: specify successful execution of state-machine; (ii)_STATE_ERROR_: specify unsuccessful execution of state-machine.

The built-in states are optionally used in various scenarios: one of thebuilt-in states can be specified in the script; in case of an error—thesystem will force transition to _STATE_ERROR_; when your state-machineends—the state-machine will automatically move to _STATE_END_.

In some embodiments, a “transition” is used for determining the “nextstate”. In order to demonstrate a simple transition, consider the nextexample of a state:

name: example-state

action: PLUS

inputs: a: 1, b: 2

on_output:

3: _STATE_END_

goto: _STATE_ERROR_

In this example, the PLUS action is run with inputs a=1″ and b=2. If theresult is 3 (as expected), the transition moves to the _STATE_END_state, otherwise the transition moves to the _STATE_ERROR_ state. Thisexample shows that the “on output” acts as an “if statement” for theaction's result.

In some embodiments, transition from one state to another is determinedby the following factors: the result of an action: REML will try tomatch the result of the action with one of the “on output” entries. Incase of a match—the next state; External events (e.g., while executingan action, the REML system can send events to your state-machine. Duringa phone-call between two users, each user can hang up the callregardless of the state. To handle such hang-up events and decide whatis the next state based on the user who hung up the call, transitionsare used. The same “on output” tag may be used to handle events—justlike the action=results); the “goto” tag—if there is no “on output”match, the user can specify the “default next state” using the “goto”tag; if the user hasn't specified goto—the system will move to the nextstate in the list.

REML Actions

In some embodiments, there is a single action that can be executed(e.g., telephony operations, control actions, data actions) for eachmachine state. Non-limiting examples of telephony operations includesCALL, EMERGENCY CALL, HANGUP, PLAY, STOP PLAYBACK. In some embodiments,EMERGENCY_CALL is an enhanced version of the “CALL” action. As anexample, in some embodiments, for EMERGENCY_CALL, the Admin ordesignated representative must provide the location(latitude/longitude), which is optionally passed to the 911 via ALIdatabase and SIP headers; the Admin or designated representative mustprovide the “caller name”, which may be passed to the ALI database;specifying a destination “phone number” is optional as theemergency-number is known (“test number” for non-production system, 911for production). If a phone-number is provided, the system willoptionally use it as an emergency number.

Non-limiting examples of inputs include: caller_name: name of callerthat will be presented to 911; caller_number: phone-number of caller(will be presented to 911); longitude, latitude: location of emergency(will be presented to 911); emergency number: optional string, theemergency number to call. In some embodiments, the defaultemergency-number is an answering machine.

Example: name: call_911

action: EMERGENCY_CALL

inputs: latitude: 10.10., longitude: −20.20, caller_name=“Kai”,

caller_number=“1234567789”

on_output:

“true”: play-message

“false”: die

Another REML action is FAILSAFE. A FAILSAFE action for handlingdifferent types of failures can be formulated. In some embodiments, afailure is either triggered by the system (e.g., 9-1-1 not answering) orby the emergency flow (e.g., explicitly triggered by the emergency flowauthor).

In some embodiments, the FAILSAFE action instructs the system to post anHTTP request to a backend system provided by the emergency flow authorand then immediately terminates the session, and therefore the on outputsection is not applicable and not needed.

In order to initiate a fail-safe procedure, some embodiments of theemergency flow include failsafe metadata. Two embodiments the FAILSAFEaction—the minimal one and the advanced one—are described below. Aminimal failsafe requires a URL and a failsafe-reason as shown below. Inthis minimal case, the action will trigger a POST request to the URLprovided by the author and the emergency flow will be terminated. As arequest-body, the system will provide the ‘reason’ in JSON dictionary.

In some embodiments, composite actions are formulated. Composite actionsdecompose into a series of smaller actions before they are executed bythe EFMS. In some embodiments, individual emergency flow building blocksare defined by a single REML action. In some embodiments, individualemergency flow building blocks are defined by composite actions.INTERACTIVE_CALL and CALL_LOOP are composite actions.

In some embodiments, the INTERACTIVE_CALL action decomposes into CALL,PLAY, AND WAIT actions. In cases where a user should be called, and anaudio message played to them while a DTMF tone is waited on to furtherthe emergency flow to the next state, a composite action can be used.

In some embodiments, inputs may include: phone_number: string, thephone-number to call; playback: media-resource to play; text: Text(string) to speech; time: Time to wait in seconds after the playback hasstopped.

An exemplar INTERACTIVE_CALL action is shown below.

action: INTERACTIVE_CALL

inputs: {phone_number: “${phone_number}”, text: “${text}”}

on output:

“false”: fail_state

“HANGUP@${phone_number}”: fail_state

“#1@${phone_number}”: next state

In some embodiments, the CALL_LOOP action decomposes into a list ofactions that perform a loop through a list of dictionaries that eachcontain a phone number of a user to call. When the users are called, anaudio is played to them, and they can hit a dtmf to break out of theloop. The final callee dict that is called during the loop is optionallysaved in the variable given in the store parameter after the CALL_LOOPruns.

In some embodiments, REML includes some specific events to handle caseswhere two users are contacted simultaneously. For example,HANGUP@<phone>: a hang-up event from user; #<num>@<phone>: DTMF eventfrom user.

In some embodiments, three players are connected in an emergency call.First, the user is called. When the user picks up the call, a message isplayed (e.g., “press 1 to connect . . . ”). Once the user press ‘1’, acorporate call center or representative may be called and during theircall—if anyone hits ‘9’, an emergency call is made and connected to theappropriate PSAP (based on location), so that there can be three or moreparticipants in the conference emergency call or session.

Upstream Emergency Data Management

As described above, the emergency management system (EMS) disclosedherein is capable of gathering data related to an emergency (emergencydata; e.g., locations and user data) and transmitting the emergency datato an emergency service provider (ESP; e.g., a public safety answeringpoint (PSAP)) to aid the ESP in responding to the emergency. Forexample, in some embodiments, when a person calls 911 from their mobilephone, the EMS may receive an emergency alert from the mobile phoneincluding a location of the mobile phone. The EMS can then transmit thelocation to the PSAP that receives the 911 call, either autonomously orby request, which the PSAP can use to more quickly and effectivelyrespond to the caller's emergency. This process of transmitting data toan ESP can be referred to as a downstream flow of data. Typically, asdescribed above, PSAPs and other ESPs have limited access to emergencydata. For example, when a 911 call is routed to an average PSAP, thePSAP receives at most the caller's name, the caller's phone number, anda triangulated location that is only accurate to a few hundred meters,which can be practically worthless in a densely populated area. Anysupplemental emergency data, such as a precise location or the caller'smedical history, is therefore extremely valuable for an ESP.

However, data generated by ESPs remains a largely untapped resource.Disclosed herein are systems, servers, devices, methods, and media forreceiving and utilizing emergency data from ESPs (hereinafter, “upstreamdata flow”). FIG. 10A depicts a diagram of an upstream data flowmanagement process. In some embodiments, during or after an emergency,an EMS 1030 receives an emergency communication associated with theemergency from an ESP 1050. The EMS 1030 can then process the emergencycommunication and any emergency data included therein and determine oneor more recipients 1060 to notify of the emergency or share theemergency data with or determine one or more actions to take based onthe emergency communication and emergency data, as will be described infurther detail below. As depicted in FIG. 10A, the one or morerecipients can include, but are not limited to, emergency contacts1060A, organizational contacts 1060B, institutions 1060C, personal andprofessional service providers (PSPs) 1060D, and other ESPs 1060E. Insome embodiments, the EMS 1030 can use data received from an ESP 1050 toexecute emergency flows (as described above), notification procedures(as described below), and enhanced ESP functionalities (as describedbelow).

In some embodiments, an ESP 1050 transmits an emergency communication tothe EMS 1030 in the form of a request for emergency data regarding anemergency, as described above. In addition to queries for emergencydata, an ESP 1050 can send an emergency communication to the EMS 1030 invarious other forms. For example, in some embodiments, when an ESP 1050(e.g., a PSAP) receives an emergency call, the ESP 1050 can transmit anemergency communication to the EMS 1030 in the form of a notification,informing the EMS 1030 of the emergency call. The emergency notificationmay include an identifier (e.g., the phone number of the emergencycaller) and any other data relevant to the call or the caller'semergency that the ESP 1030 may have access to or gathered, such as theday and time of the emergency call, the nature of the emergency, or thecaller's location. In some embodiments, the emergency communication isan API call received through an API (application programming interface)provided by the EMS 1030. In some embodiments, the emergencycommunication is generated and transmitted to the EMS 1030 through anemergency response application executed on a computing device at the ESP1050. In some embodiments, the emergency response application isprovided by the EMS 1030, as described below. While many of the methodsand processes described herein are initiated by emergency data includedin emergency communications received from ESPs, it is to be understoodthat, in some embodiments, the methods and processes may be initiated byemergency data included in emergency communications received from anyappropriate entity, such as an electronic device capable of producingand transmitting emergency data or a backend computing system capable ofgathering and transmitting emergency data.

Emergency Notification System

FIG. 11 depicts an embodiment of the emergency management system 1130.As described above, in some embodiments, the emergency management system1130 comprises one or more of an operating system 1132, at least onecentral processing unit or processor 1134, a memory unit 1136, acommunication element 1138, and a server application (e.g., an emergencyflow program installed on the emergency flow server 1128). In someembodiments, the emergency management system 1130 comprises one or moredatabases 1135 (e.g., location database 1137, an additional informationdatabase 1139, emergency flow database 1157, user identificationdatabase 1182, notification procedure database 1185, and/or emergencyhistory database 1197). In some embodiments, the emergency managementsystem 1130 may include one or more servers 1148. In some embodiments,an emergency response server 1109 executes an emergency flow when anemergency or emergency-like situation is triggered. In some embodiments,the emergency management system 1130 comprises at least one of alocation database 1137 and an additional information database 1139.

In some embodiments, the emergency flow program comprises at least onesoftware module (not shown) for carrying out one or more instructions.In some embodiments, the emergency management system 1130 housescomponents of the emergency flow management system (EFMS), as describedabove. In some embodiments, the emergency management system 1130comprises an application for assembling and/or configuring emergencyflow scripts. In some embodiments, the emergency management system 1130comprises an application for managing an emergency response to anemergency alert including execution of an emergency flow script. In someembodiments, the emergency management system additionally oralternatively includes the components of an emergency notificationsystem (ENS) 1183. In some embodiments, the emergency notificationsystem includes an emergency notification module 1184 and a notificationprocedure database 1185. In some embodiments, the notification proceduredatabase 1185 is configured to store one or more notificationprocedures. A notification procedure includes instructions to contactone or more contacts in the event of an emergency. In some embodiments,a notification procedure includes a prioritized list of emergencycontacts. In some embodiments, the notification procedure includescontact information for an organizational contact. In some embodiments,notification procedures are associated with one or more user identifiersin the notification procedure database 1185. In some embodiments, anotification procedure includes an emergency flow identifier. In someembodiments, when the EMS receives an emergency communication includinga user identifier from an emergency service provider, the emergencynotification module 1184 is configured to identify a notificationprocedure associated with the user identifier from within thenotification procedure database and execute the notification procedure.In some embodiments, the emergency notification module 1184 isconfigured to employ the emergency flow management system 1140 in orderto execute the notification procedure (e.g., if the notificationprocedure includes an emergency flow identifier).

FIG. 12 depicts a system for receiving emergency communications fromESPs. In some embodiments, the system includes an emergency managementsystem 1230, an emergency service provider 1250, and a communicationdevice 1267. In some embodiments, as depicted in FIG. 12, the emergencymanagement system 1230 includes one or more databases 1235, an emergencyflow management system 1240 (as described above), and a useridentification module 1280. As described above, in some embodiments, theuser identification module 1280 associates user identifiers (e.g., phonenumbers or email addresses) with notification procedures or emergencyflows and stores the user identifiers in a user identification database.In some embodiments, as will be described in greater detail below, anemergency service provider 1250 sends an emergency communication in theform of a query for emergency information regarding an emergency to theemergency management system 1230 after receiving an emergency call froma communication device 1267. In some embodiments, the query includes auser identifier, which the emergency management system 1230 uses toidentify a notification procedure or an emergency flow associated withthe user identifier. In some embodiments, if the emergency managementsystem identifies a notification procedure or emergency flow associatedwith the user identifier, the emergency management system can thenexecute the notification procedure or emergency flow associated with theuser identifier. The EMS 1230 may additionally receive emergency datafrom the communication device 1267 or transmit an emergencycommunication to the communication device 1267, such as a notificationthat the notification procedure or emergency flow has been executed.

In some embodiments, notification procedures may define pathways ofexecution, similar to emergency flows described above. In someembodiments, the pathway of execution of a notification procedure is atleast partly dependent upon input from a recipient of the notificationprocedure. For example, in some embodiments, a notification procedureincludes a list of emergency contacts and dictates an order ofcontacting the emergency contacts, and only proceeds to the next contacton the list if the previous contact did not provide confirmation ofreceipt of the notification. In some embodiments, more highlycustomizable emergency flows can be used for responding to emergency orlikely emergency situations. For example, default or customizedemergency flow scripts provided by the EMS through an emergency flowmanagement system (as described above) allow various functionality(e.g., a social media platform would like to get assistance for apossible suicidal user). For such situations, building and executingemergency flows can provide superior capabilities (e.g., three-wayconference bridge for emergency calling). Table 2 depicts input dataincluding account information (e.g. user information), associatedcontacts (or other optional inputs needed to implement the specificflow) and flow parameters (flow identifier or flow ID).

TABLE 2 Account Data with Flow Information User Parameters UserAssociated Contacts Phone Secondary Work Flow Parameters Number/ UserUser Contact Contact Contact Contact Safety Flow User Acct ID NameContact Name1 Num1 Name2 Num2 Line ID(s) Consent 410- Jane 410- John410- Aunt 410- 678- (1) Share 234- Doe 234- Doe 234- Flo 234- 234-Doe_family_emergency location & 5555 6666 7878 8989 5555 (main flow)additional (2) data with Fleet_Co_emergency John Doe; (work flow) FleetCo. notified if emergency is initiated in a fleet vehicle

On the other hand, simple notification procedures for notifyingemergency contacts are also contemplated. In some cases, there is noneed for significant customization and a simple notification procedureis sufficient to respond to the emergency (e.g., notifying emergencycontacts when the user has been in a vehicular crash). Table 3 depictsan embodiment of input data including account information (e.g., userinformation), emergency contacts (or other optional inputs needed toimplement the specific flow) and flow parameters (flow identifier orflow ID).

TABLE 3 Account Data with Emergency Notification System User ParametersUser Phone Emergency Contacts Notification Procedure Number/ UserAlternate Em. Em. Org. Org. Not. Not. Proxy Acct ID Name ContactContact1 Contact2 Contact1 Contact2 Meth. 1 Meth. 2 Calling 410- Jane410- 410- 410- 678- 678- SMS Email Not 234- Doe 234- 234- 234- 234- 234-Allowed 5555 6666 7878 8989 5555 0000

In an alternate embodiment, a notification procedure can call one ormore emergency flows to be implemented combining the advantages of bothsystems. For example, there may be a simple notification procedure tonotify family members (e.g., see the John Doe example), but acustomizable emergency flow for getting emergency assistance at ahazardous chemical site.

In one example of a notification procedure, referring back to John Doedescribed above with respect to FIG. 1B, John Doe, whose user identifieris a phone number (123) 456-7890, may have a notification procedurecreated for him that includes his family as emergency contacts. Theemergency contacts may be arranged in a prioritized list beginning withhis wife, followed by his oldest child, and finally ending with hisyoungest child. The notification procedure includes contact information(e.g., phone numbers) for each of the emergency contacts. Thenotification may additionally or alternatively include contactinformation for an organizational contact for Wells Fargo, John'semployer. Thus, in this example, if an emergency service provider sendsa query to the emergency management system for emergency informationregarding the phone number (123) 456-7890 (for example, in response toJohn calling 9-1-1 from his cell phone), the emergency notificationsystem can identify the notification procedure associated with the phonenumber (123) 456-7890 in the notification procedure database and executethe notification procedure by attempting to contact John's emergencycontacts (his family), organizational contact (Wells Fargo), or both. Inthis example, the emergency notification system first notifies WellsFargo and John's wife simultaneously before attempting to contact John'schildren.

In some embodiments, the emergency management system executes anotification procedure by transmitting a notification message to anaccount associated with one or more contacts. In some embodiments, thenotification message is an SMS text message or a message in aninternet-based messaging service, such as WhatsApp. In some embodiments,the message is an email. In some embodiments, the message includes oneor more of the user identifier, a name associated with the useridentifier, and a location (e.g., a location associated with the useridentifier). In some embodiments, the notification message additionallyor alternatively includes emergency information, data, or multimediaassociated with the user identifier. For example, in some embodiments,after the emergency management system receives a query including a useridentifier from an emergency service provider, in addition toidentifying an executing a notification procedure associated with theuser identifier, the emergency management system can query an emergencydatabase using the user identifier (or any other identifier associatedwith the user identifier) to find any available emergency information,data, or multimedia associated with the user identifier. For example, insome embodiments, the emergency management system queries an emergencydatabase (e.g., a location information server (LIS)) for a location(e.g., a current location) associated with the user identifier. If alocation is found, the emergency notification system can then includethe location in a notification message sent to a contact according tothe notification procedure.

In some embodiments, the emergency notification system includes aregistration application through which users can submit user identifiersand select or define notification procedures to be associated with theuser identifiers. For example, the registration application may be amobile or web application that provides a graphical user interface thatusers can access on personal electronic devices such as laptops andmobile phones. In some embodiments, through the registrationapplication, users can select a standard notification procedure from aplurality of standard notification procedures provided by theregistration application to be associated with one or more useridentifiers. For example, in some embodiments, a standard notificationprocedure provided by the registration application is sending a messagesimultaneously to every contact listed on a list of contacts notifyingthe contacts that a potential emergency has occurred (hereinafter,“standard notification procedure 1”). In another example, a standardnotification procedure provided by the registration application issending a message including a location to every contact listed on a listof contacts notifying the contacts that a potential emergency hasoccurred and the location of the potential emergency (hereinafter,“standard notification procedure 2”). In another example, a standardnotification procedure provided by the registration application includesemergency flow ID that prompts the emergency flow management system toexecute an emergency flow in which emergency contacts listed on aprioritized list of emergency contacts are called one by one until oneor the emergency contacts answers and selects to connect to 9-1-1(hereinafter, “standard notification procedure 3”). In one example ofsuch an embodiment, referring again to John Doe, John can access theregistration and, through the graphical user interface, submit his useridentifier (phone number (123) 456-7890) and select between standardnotification procedure 1, 2, and 3 to be associated with his useridentifier. In this example, John selects standard notificationprocedure 2 and submits his list of prioritized emergency contacts, asdescribed above. Thus, in this example, if John calls 9-1-1 and reachesa public safety answering point (PSAP), and the PSAP queries theemergency management system for emergency information regarding John'suser identifier (phone number (123) 456-7890), the emergencynotification system can identify that John's phone number has beenassociated with standard notification procedure 2 and automaticallyexecute standard notification procedure 2, notifying each of hisemergency contacts (his wife and two children) that John has beeninvolved in a potential emergency and providing a location of thepotential emergency.

In some embodiments, through the registration application, users candefine customized notification procedures. For example, in someembodiments, a user can access the registration application and submit auser identifier. The user can then define a customized notificationprocedure by submitting one or more contacts and then selecting when andhow each of the one or more contacts is notified when the notificationprocedure is executed by the emergency notification system. For example,referring back to John Doe, John may submit his phone number ((123)456-7890) as his user identifier and then submit his wife and twochildren as contacts. Then, in this example, John selects the first stepof his customized notification procedure to be calling his wife. Heselects to end the notification procedure if the call to his wife isanswered. He then selects the second step of his customized notificationprocedure to be simultaneously delivering an SMS text message includinghis location to his wife and two children if and only if the call to hiswife is unanswered.

In some embodiments, a user may access the registration application andsubmit multiple user identifiers to be associated with one or morenotification procedures. In some embodiments, a user can submit two ormore user identifiers to be defined as a group within the emergencynotification system. For example, referring again to John Doe, John canaccess the registration application and submit user identifiers (e.g.,phone numbers) for himself, his wife, and both of his two children as agroup, which the registration application can then associate within theemergency notification system. In some embodiments, the registrationapplication provides a standard notification procedure for groups ofuser identifiers submitted through the registration application. Forexample, in some embodiments, if John submits a group of useridentifiers for his family, the registration application canautomatically associate a standard notification procedure with the useridentifiers. In some embodiments, the standard notification procedurefor a group of user identifiers is to notify each other member of thegroup when the emergency management system receives a query includingone of the user identifiers from the group of user identifiers from anemergency service provider. For example, if an emergency serviceprovider sends a query including the user identifier of John's youngestchild, the emergency notification system executes the notificationprocedure by sending a notification message to John, John's wife, andJohn's older child simultaneously. In some embodiments, as mentionedabove, a single user identifier can be associated with multiplenotification procedures. For example, in some embodiments, just as Johnmay submit user identifiers for his nuclear family (wife and twochildren) as a group through the registration application, John's mothermay submit user identifiers for her nuclear family, including John,naturally. In this example, John's user identifier is thereforeassociated with two separate groups and thus associated with twodifferent notification procedures. Or, for example, in some embodiments,an organization may access the registration application and submit useridentifiers to be associated with a notification procedure associatedwith the organization. For example, Wells Fargo (e.g., a Wells Fargoemployee) may access the registration application and submit a pluralityof user identifiers, including John's user identifier (phone number(123) 456-7890), to be associated with Wells Fargo's notificationprocedure. Thus, for example, John's user identifier could be associatedwith a third notification procedure. If the emergency management systemreceives a query including John's user identifier from an emergencyservice provider (e.g., a PSAP), the emergency notification system cansimultaneously execute all three notification procedures associated withJohn's user identifier (as well as any other notification proceduresassociated with John's user identifier), thereby notifying members ofJohn's nuclear family, John's mother's nuclear family, and Wells Fargo.

FIG. 13A and FIG. 13B depict embodiments of systems for managingemergency flows and notifications. As depicted in FIG. 13A, in someembodiments, an emergency call (e.g., 9-1-1) is dialed from acommunication device 1367 and received by an emergency service provider1350 (e.g., a PSAP). The emergency service provider 1350 can then sendan emergency communication (e.g., a query for emergency data) includingthe phone number (e.g., the user identifier) from which the emergencycall was dialed to the emergency management system 1330. The emergencymanagement system 1330 then queries one or more databases (e.g., a useridentification database) to determine if the phone number has beenassociated with an emergency flow. If the phone number has beenassociated with an emergency flow, the emergency management system 1330then employs the emergency flow management system 1340 to execute theemergency flow associated with the phone number, as described above. Asdepicted in FIG. 13B, in some embodiments, an emergency call (e.g.,9-1-1) is dialed from a communication device 1367 and received by anemergency service provider 1350 (e.g., a PSAP). The emergency serviceprovider 1350 can then send an emergency communication (e.g., a queryfor emergency data) including the phone number (e.g., the useridentifier) from which the emergency was dialed to the emergencymanagement system 1330. The emergency management system can then send aquery to one or more database (e.g., a user identification database) todetermine if the phone number has been associated with a notificationprocedure. If the phone number has been associated with a notificationprocedure, the emergency management system 1330 then employs theemergency notification system 1383 to execute the notification procedureassociated with the phone number. Although the emergency response andmanagement processes disclosed herein are often initiated by anemergency call, it is contemplated that an emergency response andmanagement processes may be initiated by any other form of a request foremergency service, such as a text message or a digital notification.

FIG. 14A and FIG. 14B illustrate embodiments of a method for managingemergency flows and notifications. As depicted in FIG. 14A, in someembodiments, an emergency management system (EMS) 1430 for responding toemergencies includes an emergency response server (ERS) 1409, a useridentification module 1480, and an emergency flow management system(EFMS) 1440. In some embodiments, as depicted in FIG. 14A, when a userdials an emergency call (e.g., 9-1-1) from a communication device, theemergency call is received by an emergency service provider (e.g., PSAP1450) with a user identifier (such as a phone number of thecommunication device from which the emergency call was dialed). Theemergency service provider can then send an emergency communication(e.g., a query for emergency data) including the user identifier to theEMS 1430. In some embodiments, as depicted in FIG. 14A, the emergencycommunication is received by the ERS 1409. In some embodiments, asdepicted in FIG. 14A, in response to receiving the emergencycommunication, the EMS 1430 searches one or more databases for emergencydata or emergency information associated with the user identifier andreturns the emergency data or emergency information to the emergencyservice provider 1450, such as through the ERS 1409. In someembodiments, after receiving the emergency communication including theuser identifier from the emergency service provider at the ERS 1409, theEMS 1430 then employs the user identification module 1480 to determineif the user identifier has been associated with an emergency flow (asdiscussed above), such as within a user identification database. If theuser identifier has been associated with an emergency flow (e.g., ifregistered), the user identification module 1480 can return an emergencyflow identifier associated with the user identifier to the ERS 1409,which in turn transmits the emergency flow identifier to the EFMS 1440for execution. The EFMS 1440 can then execute the emergency flowassociated with the user identifier.

As depicted in FIG. 14B, in some embodiments, the EMS 1430 includes alocation information server (LIS), a user identification module 1480,and an emergency flow management system (EFMS) 1440. In someembodiments, as depicted in FIG. 14B, when a user dials an emergencycall (e.g., 9-1-1) from a communication device, the emergency call isreceived by an emergency service provider (e.g., PSAP 1450) with a useridentifier (such as a phone number of the communication device fromwhich the emergency call was dialed). The emergency service provider canthen send a location query (e.g., an emergency communication) includingthe user identifier to the EMS 1430. In some embodiments, the locationquery is received by the EMS 1430 at the location information server(LIS). In some embodiments, in response to receiving the location query,the LIS searches one or more databases for a location associated withthe user identifier. If a location associated with the user identifieris found, the LIS returns the location to the emergency serviceprovider. In some embodiments, after receiving the location queryincluding the user identifier at the LIS, the EMS 1430 then employs theuser identification module 1480 to determine if the user identifier hasbeen associated with an emergency flow (as discussed above), such aswithin a user identification database. If the user identifier has beenassociated with an emergency flow (e.g., if registered), the useridentification module 1480 can return an emergency flow identifierassociated with the user identifier to the LIS, which in turn transmitsthe emergency flow identifier to the EFMS 1440 for execution. The EFMS1440 can then execute the emergency flow associated with the useridentifier.

FIG. 15 illustrates an embodiment of a method for managing emergencynotifications. In some embodiment, the emergency management system (EMS)1530 includes an emergency response server (ERS) 1509, a useridentification module 1580, and an emergency notification system (ENS)1583. In some embodiments, as depicted in FIG. 15, when a user dials anemergency call (e.g., 9-1-1) from a communication device, the emergencycall is received by an emergency service provider (e.g., PSAP 1550) witha user identifier (such as a phone number of the communication devicefrom which the emergency call was dialed). The emergency serviceprovider can then send an emergency communication (e.g., a query foremergency data) including the user identifier to the EMS 1530. In someembodiments, the query is received by the ERS 1509, as depicted in FIG.15. In some embodiments, as depicted in FIG. 15, in response toreceiving the query, the EMS 1530 searches one or more databases foremergency data or emergency information associated with the useridentifier and returns the emergency data or emergency information tothe emergency service provider, such as through the ERS 1509. In someembodiments, after receiving the query including the user identifierfrom the emergency service provider at the ERS 1509, the EMS 1530 thenemploys the user identification module 1580 to determine if the useridentifier has been associated with a notification procedure (asdiscussed above), such as within a user identification database. If theuser identifier has been associated with a notification procedure (e.g.,if registered, such as through a registration application, as describedabove) the user identification module 1580 can return registrationinformation regarding the notification procedure (e.g., a notificationprocedure identifier that identifies the particular notificationprocedure, such as within a notification procedure database) associatedwith the user identifier to the ERS 1509, which in turn transmits theregistration information regarding the notification procedure to the ENS1583 for execution. The ENS 1583 can then execute the notificationprocedure associated with the user identifier. As depicted in FIG. 15,in some embodiments, the ENS 1583 executes the notification procedureassociated with the user identifier by sending notifications to one ormore emergency contacts. In some embodiments, after executing thenotification procedure associated with the user identifier, the ENS 1583can additionally send a notification to the user notifying the user thatthe notification procedure has been executed or indicating a status ofthe execution of the notification procedure.

FIG. 16 illustrates an embodiment of a method for managing emergencyflows. In some embodiments, an emergency management system 1630 forresponding to emergencies includes a location information server (LIS),a user identification module 1680, and an emergency flow managementsystem (EFMS) 1640. As depicted in FIG. 16, in some embodiments, when auser dials an emergency call (e.g., 9-1-1) from a communication device,the emergency call is received by an emergency service provider (e.g.,PSAP 1650) with a user identifier (such as a phone number of thecommunication device from which the emergency call was dialed). In someembodiments, as depicted by FIG. 16, when the emergency call is dialed,the communication device concurrently or subsequently transmits alocation associated with the user identifier to the LIS. After theemergency service provider receives the emergency call, the emergencyservice provider 1650 can then send a location query (e.g., an emergencycommunication) including the user identifier to the EMS 1630. In someembodiments, the location query is received by the EMS at the locationinformation server (LIS). In some embodiments, in response to receivingthe location query, the LIS searches one or more databases for thelocation associated with the user identifier. If the location associatedwith the user identifier is found, the LIS returns the locationassociated with the user identifier to the emergency service provider.In some embodiments, after receiving the location query including theuser identifier from the emergency service provider, the EMS 1630additionally or alternatively employs the user identification module1680 to determine if the user identifier has been associated with anemergency flow (as discussed above), such as within a useridentification database. If the user identifier has been associated withan emergency flow (e.g., if registered), the user identification module1680 can return an emergency flow identifier associated with the useridentifier to the LIS, which in turn transmits the emergency flowidentifier to the EFMS 1640 for execution. The EFMS 1640 can thenexecute the emergency flow associated with the user identifier. In someembodiments, the LIS additionally transmits the location associated withthe user identifier to the EFMS 1640 to be used in the execution of theemergency flow. In some embodiments, during the execution of theemergency flow, the communication device transmits an updated locationassociated with the user identifier to the LIS. In some embodiments,during the execution of the emergency flow, the EFMS 1640 queries theLIS for an updated location associated with the user identifier. If anupdated location associated with the user identifier has beentransmitted to the LIS, the LIS returns the updated location to the EFMS1640 to be incorporated into the execution of the emergency flow.

Location and Additional Data Based Notification Procedures

In some embodiments, after the emergency management system (EMS)receives an emergency communication from an emergency service provider(ESP), in order to determine if an emergency flow or notificationprocedure should be executed or which emergency flow or notificationprocedure should be executed, the EMS must use emergency data receivedfrom the ESP other than a user identifier, such as a location and/or anemergency type. FIG. 17 depicts an embodiment of a geofence system 1770applied to an emergency management system 1730. In some embodiments, thegeofence system 1770 is applied to the EMS 1730 to protect potentiallysensitive emergency data using geospatial analysis. In some embodiments,as will be described in further detail, the geofence system 1770 is usedby the EMS 1730 to trigger the execution of emergency flows ornotification procedures.

Generally, a geofence is a virtual perimeter representing a real-wordgeographic area. A geofence can be dynamically generated—as in a radiusaround a point location—or a geofence can be a predefined set ofboundaries (such as school zones or neighborhood boundaries). The use ofa geofence is called geofencing. For emergency response, an emergencyservice provider (public or private entities) may be givenjurisdictional authority to a certain geographical region orjurisdiction (also referred to as “authoritative regions”). In thecontext of emergency services, one or more geofences may correspond tothe authoritative region of an ESP. In many cases, the ESP is a publicentity such as a public safety answering point (PSAP), a policedepartment, a fire department, a federal disaster management agency,national highway police, etc., which has jurisdictional authority over adesignated area (sometimes, overlapping areas). Geofences can be used todefine an ESP's jurisdictional authority by various methods and invarious Geographic Information System (GIS) formats. In someembodiments, geofences only represent authoritative regions if thegeofence has been assigned or verified by a local, state, or federalgovernment. In some embodiments, geofences represent assignedjurisdictions that are not necessarily authoritative regions. Forexample, in some embodiments, a geofence is unilaterally created by itsassociated ESP without verification or assignment by a local, state, orfederal government.

Geofences can be defined in various ways. For example, in someembodiments, a geofence comprises one or more of the following: a countyboundary, a state boundary, a collection of postal/zip codes, acollection of cell sectors, simple shapes, complex polygons, or othershapes or areas. In some embodiments, geofences comprise approximationswhere the “approximated” geofence encloses an approximation of theauthoritative region. Updates to geofences may be required over timebecause the authoritative regions may change over time. Geofences maychange over time (e.g., a new sub-division has cropped up) and requireupdates. In some embodiments, the systems and methods described hereinallow geofences to be updated (e.g., an ESP administrator can uploadupdated geofence GIS shapefiles to the EMS).

In some embodiments, as described above, the EMS 1730 provides andmaintains a clearinghouse for receiving, storing, and sharing emergencydata. In some embodiments, the clearinghouse includes one or moreingestion modules 1758, one or more databases 1757, and one or moreretrieval modules 1759. As depicted in FIG. 17, in some embodiments, ageofence system 1770 can be applied to the EMS 1730 (or theclearinghouse). In some embodiments, the geofence system 1770 includesan ingestion geofence module 1774 (also referred to as an “ingressfilter”). In some embodiments, the geofence system 1770 includes aretrieval geofence module 1772 (also referred to as an “egress filter”).In some embodiments, the geofence system 1770 includes a geofencedatabase (not shown) that stores a plurality of geofences associatedwith a plurality of entities.

In some embodiments, when an ESP 1750 transmits an emergencycommunication to the EMS 1730, the emergency communication includes alocation (e.g., a location associated with an emergency), and thelocation is filtered or processed by the geofence system 1770 (such asby the ingress filter 1774) before or after any emergency data includedin the emergency communication is stored within the emergency datadatabase 1757. In processing the location received in the emergencycommunication from the ESP 1750, the geofence system 1770 retrieves aset of geofences associated with a set if accounts from the geofencedatabase and determines if the location received in the emergencycommunication falls within any geofences within the set of geofences. Ifthe location does fall within one or more of the geofences within theset of geofences, the EMS 1730 can then identify one or more accountsassociated with the one or more geofences that the location fell within,identify one or more emergency flows or notification proceduresassociated with the one or more accounts (as described above), andexecute the one or more emergency flows or notification procedures (asdescribed above). In some embodiments, executing the one or moreemergency flows or notification procedures includes transmittingemergency data to one or more upstream data recipients 1760. In someembodiments, before transmitting emergency data to an upstream datarecipient 1760, the EMS 1730 employs the geofence system 1770 to confirmthat that upstream data recipient 1760 is associated with a geofencethat the location received in the emergency communication falls withinby using the egress filter 1772.

For example, FIG. 18 illustrates examples of locations and geofencesused by the EMS and geofence system. In this example, ESP location 1802is the location of a public safety answering point (PSAP), which has anESP geofence 1810. All of the space contained within ESP geofence 1810is under the jurisdictional authority of the PSAP. In one example,institution location 1804A is the location of an office building, whichfalls within ESP geofence 1810. In this example, an administrator of theoffice building has registered with the EMS and provided institutiongeofence 1806A as associated with the office building. In anotherexample, institution location 1804B is the location of a high school,which also falls within ESP geofence 1810. In this example, anadministrator of the high school has registered with the EMS andprovided institution geofence 1806B as associated with the high school.In a third example, institution location 1804C is the location of aprivate bank, which also falls within ESP geofence 1810. In thisexample, an administrator of the private bank has registered with theEMS and provided institution geofence 1806C as associated with theprivate bank. Each of the three institutions (the office building, thehigh school, and the private bank) have also signed up with the EMS fornotification procedures that notify their respective administrators whenan emergency occurs within their respective institution geofences. Insome embodiments, if the PSAP receives an emergency call with anassociated location at emergency location 1808A and transmits anemergency communication to the EMS including emergency location 1808A,the EMS can retrieve the institution geofences 1806 for each of theoffice building, the high school, and the private bank and determine ifthe emergency location 1808A falls within any of the institutiongeofences 1806. In this example, the EMS determines that emergencylocation 1808A falls within the institution geofence 1806B associatedwith the high school, and executes the notification procedure associatedwith the high school, thereby notifying the administrator of the highschool that an emergency has occurred within the institution geofence1806B associated with the high school. However, if the PSAP receives anemergency call with an associated location at emergency location 1808Band transmits an emergency communication to the EMS including emergencylocation 1808B, the EMS can retrieve the institution geofences 1806 anddetermine that emergency location 1808B does not fall within any of theinstitution geofences 1806. In such a case, the EMS would not executeany of the notification procedures associated with the office building,high school, or private bank.

In another example, each of the institution locations 1804 representlocations of other emergency service providers. In this example,institution location 1804A is the location of a police station,institution location 1804B is the location of a fire station, andinstitution location 1804C is the location of a hospital. As illustratedin FIG. 18, all three institution locations 1804 of the police station,the fire station, and the hospital fall within the authoritativejurisdiction of the PSAP (ESP geofence 1810). In this example, if thePSAP receives an emergency call associated a location at emergencylocation 1808A and transmits an emergency communication to the EMSincluding emergency location 1808A, the EMS can retrieve the institutiongeofences 1806 for each of the police station, fire station, andhospital and determine if emergency location 1808A falls within any ofthe institution geofences 1806. In this example, the EMS determines thatemergency location 1808A falls within the institution geofence 1806Bassociated with the fire station and execute a notification procedureassociated with the fire station, which could include notifying the firestation of the emergency occurring at emergency location 1808A and/ortransmitting any emergency data regarding the emergency to the firestation.

In some embodiments, the EMS uses additional data to determine if anemergency flow or notification procedure should be executed in responseto an emergency communication received from an ESP. For example, in someembodiments, the emergency communication received from the ESP includesan emergency type (e.g., fire, medical, police, burglary, activeshooter, natural disaster, etc.) in addition to a user identifier or anemergency location. After the EMS identifies an emergency flow ornotification procedure associated with the user identifier or an accounthaving a geofence that encompasses the emergency location, the EMS cancheck the emergency flow or notification procedure for any additionalconditions necessary or required for the emergency flow or notificationprocedure's execution. In some embodiments, an emergency flow ornotification procedure may require that the emergency be a certain type.For example, referring back to the high school having the institutiongeofence 1806B, the notification procedure associated with the highschool may require that the emergency for which the notificationprocedure is to be executed be one of a fire, natural disaster, oractive shooter (excluding other types of emergencies, such as medialemergencies and burglaries). In this example, if the PSAP at ESPlocation 1802 receives an emergency call for a burglary with anassociated location at emergency location 1808A and transmits anemergency communication to the EMS including emergency location 1808Aand an indication that the emergency is a burglary emergency type, theEMS can determine that emergency location 1808A falls within theinstitution geofence 1806B associated with the high school but forgoexecuting the notification procedure associated with the high school.However, if the emergency communication includes an indication that theemergency is an active shooter emergency type, the EMS can execute thenotification procedure associated with the high school. Or, for example,referring back to the fire station having the institution geofence1806B, the notification procedure associated with the fire station mayrequire that the emergency for which the notification procedure is to beexecuted is a fire.

Personal and Professional Service Providers (PSPs)

In some embodiments, after receiving an emergency communicationregarding an emergency from an emergency service provider (ESP), the EMScan execute a notification procedure to transmit emergency dataassociated with the emergency to one or more personal or professionalservice providers (PSPs). In some embodiments, a PSP is a company ororganization that provides services to individuals or consumers. Forexample, in some embodiments, a PSP is a roadside assistance provider(e.g., the American Automobile Association, or AAA), a medical insuranceprovider (e.g., Blue Cross Blue Shield), or a private security company.In some embodiments, a PSP can register with the EMS by selecting orcreating a notification procedure or emergency flow to be associatedwith the PSP and providing the EMS with a list of user identifiers to beassociated with the PSP and the notification procedure or emergencyflow. Then, if the EMS receives an emergency communication regarding anemergency (e.g., a query for emergency data from an ESP) including auser identifier included on the list of user identifiers provided by thePSP, the EMS can execute the notification procedure or emergency flowassociated with the PSP to notify the PSP of the emergency potentiallyinvolving one of their customers or take appropriate emergency actions.

Consent & User Preferences

In some embodiments, consent is required for a user identifier to beused in a notification procedure or emergency flow. For example, in someembodiments, when a user identifier is submitted to the emergencynotification system to be associated with a notification procedure, theemergency notification system sends a confirmation message to the useridentifier or an account associated with the user identifier. In someembodiments, a user can provide consent by replying to the confirmationmessage. In some embodiments, the confirmation message includes aconfirmation code that a user can user to provide consent through theregistration application. For example, if the user identifier is a phonenumber, the emergency notification system can send a confirmationmessage to the phone number in the form of an SMS text message. In someembodiments, the user can provide consent by replying to the SMS textmessage in the affirmative. In some embodiments, the SMS text messageincludes a confirmation code that the user must submit through theregistration application in order to provide consent. In anotherexample, if the user identifier is an email address, the emergencynotification system can send a confirmation message to the email addressin the form of an email. In some embodiments, the email includes aconfirmation link, and the user can provide consent by selecting theconfirmation link. In some embodiments, the email includes aconfirmation code that the user must submit through the registrationapplication in order to provide consent. In some embodiments, theemergency notification system will recognize a user identifier only ifconsent has been provided for the user identifier. Requiring consent ofa user identifier can provide additional security and prevent abuse ofthe emergency notification system.

Enhanced ESP Functionality

In some embodiments, as mentioned above, the emergency management system(EMS) can use emergency data received from an emergency service provider(ESP) to provide the ESP with additional or enhanced functionality. Forexample, in some embodiments, the EMS can facilitate the transmission ofemergency data from one ESP to another ESP. FIG. 19 illustrates anembodiment of an emergency response application. In some embodiments,the emergency response application 1990 is used to visualize or displayemergency data transmitted from the EMS to an ESP. In some embodiments,the emergency response application 1990 is a web application or desktopsoftware provided by the EMS. In some embodiments, the emergencyresponse application is a web application or desktop software notprovided by the EMS. As depicted in FIG. 19, in some embodiments, theemergency response application 1990 includes a list of emergency events1905 corresponding to emergency calls received by an ESP and map 1920that displays emergency locations 1924 corresponding to emergency events1912 on the list of emergency events 1905. In this example, theemergency response application 1990 is being accessed and used by apublic safety answering point (PSAP A) at ESP location 1902A, which hasan ESP geofence 1910A. PSAP A has received three emergency calls,represented by emergency events 1912A, 1912B, and 1912C. PSAP A hasreceived emergency locations for each of the three emergency calls,emergency locations 1924A, 1924B, and 1924C, respectively. In thisexample, PSAP A is neighbored by a second public safety answering point(PSAP B) at ESP location 1902B, which has an ESP geofence 1910B. PSAP Bhas also received three emergency calls and an emergency location forreach of the three emergency calls, emergency locations 1924D, 1924E,and 1924F. In this example, both PSAP A and PSAP B have integrated withthe EMS such that both ESPs transmit an emergency communicationincluding a user identifier (e.g., a phone number) and an emergencylocation for each emergency call that the ESPs receive. The EMS can thenshare relevant emergency data from one of the ESPs to the other. In thisexample, the EMS has determined that emergency locations 1924D and 1924E(received in separate emergency communications from PSAP B) are within athreshold distance (e.g., one mile, five miles, ten miles, etc.) of PSAPA's associated geofence, ESP geofence 1910A. In response to making thisdetermination, the EMS can transmit emergency data regarding the twoemergencies represented by emergency location 1924D and 1924E (e.g.,associated user identifiers and the time at which the respectiveemergency calls were received) to PSAP A and display the emergency datawithin the emergency response application 1990. In this example,emergency data regarding the emergencies represented by emergencylocation 1924D and 1924E are displayed within the list of emergencyevents 1905 under “Neighboring Calls.” The EMS may share any and allrelevant emergency data between ESPs, including, but not limited to,user identifiers, emergency location, emergency day and time, emergencytype, contact info, demographic data, and medical data.

FIG. 20 depicts an embodiment of a system for providing enhancedfunctionalities to an emergency service provider (ESP) by an emergencymanagement system (EMS). In some embodiments, the EMS 2030 serves as aninterconnect between an ESP 2050 and a commercial service provider(CSP). A CSP is a commercial entity that manages physical ornon-physical assets 2069 that can be leveraged for emergency responses.In some embodiments, a method for providing enhanced functionality to anESP by an EMS comprises: a) receiving an electronic communication froman ESP, wherein the electronic communication is associated with anemergency alert received by the ESP and comprises a first set of datacomprising a location associated with the emergency alert; b) retrievinga set of geofences associated with a set of assets managed by acommercial service provider (CSP); c) determining that the locationassociated with the emergency alert falls within a geofence associatedwith an asset managed by the CSP; d) in response to determining that thelocation associated with the emergency alert falls within the geofenceassociated with the asset managed by the CSP, displaying access controlsto the asset within a graphical user interface (GUI) of an emergencyresponse application executed on a computing device at the ESP; e)receiving selection of the access controls from the ESP; and f)transmitting a request to the CSP to activate the asset according to theselection of the access controls.

In one example, a commercial service provider (CSP A) manages connectedsmart buildings assets, allowing users to remotely access and controlvarious systems within a building, such as locking and unlocking doors,lighting, and video feeds from surveillance cameras. In this example,CSP A can register a building 2069A managed by CSP A with the EMS byproviding the EMS with a geofence 2010A of the building 2069A. If an ESP2050 transmits an emergency communication regarding an emergency thatincludes an associated emergency location 2024A, the EMS 2030 candetermine that emergency location 2024A falls within the geofence 2010Aof the building 2069A. In response, the EMS 2030 can provide a graphicaluser interface (GUI) to the ESP 2050 through an emergency responseapplication that the ESP 2050 can use to remotely control the building2069A. In some embodiments, the GUI includes one or more access controlsfor controlling the asset. For example, a call taker at ESP 2050 coulduse the access controls within the GUI to select to view a feed from asurveillance camera within the building, and, if the call taker sees aperson with a weapon within the building, the call taker can use theaccess controls within the GUI to put the building 2069A in lockdown(e.g., locking hallway doors and sounding an alarm). In someembodiments, after receiving selection(s) of the access controls throughthe GUI, the EMS 2030 can directly activate the asset(s) according tothe selection(s) of the access controls. In some embodiments, inresponse receiving selection(s) of the access controls through the GUI,the EMS 2030 can then transmit a request to CSP A to activate thesystems within the smart building 2069A according to the selection(s) ofthe access controls made by the ESP 2050 through the GUI. In someembodiments, an ESP 2050 provides consent for the EMS 2030 to share datagenerated by the ESP 2050 with a CSP by selecting the access controlspresented within the GUI. In some embodiments, an ESP 2050 selects aconsent button within the GUI to provide consent for the EMS 2030 toshare data generated by the ESP 2050 with a CSP before the EMS 2030 ispermitted to transmit a request to activate an asset to the CSP.

In another example, a commercial service provider (CSP B) manages drone(e.g., unmanned aerial vehicles) assets that carry automated externaldefibrillators (AEDs). AEDs can be used to diagnose and treat cardiacarrhythmias (e.g., irregular heartbeats) through defibrillation, whereinan electrical current is passed through the body to reset the heart. Thechance of survival for a person in cardiac arrest can drop by as much asten percent for each minute the person goes without successfuldefibrillation. Accordingly, it is imperative during such an emergencythat a person receives an AED as quickly as possible. In this example,CSP B can register a drone 2069B and an associated AED 2069C managed byCSP B by providing the EMS with a geofence 2010B of a region serviced bythe drone 2069B. If an ESP 2050 transmits an emergency communicationregarding an emergency that includes an associated emergency location2024B, the EMS 2030 can determine that emergency location 2024B fallswithin the geofence 2010B of the region serviced by the drone 2069B. Inresponse, the EMS 2030 can provide a graphical user interface (GUI) tothe ESP 2050 through an emergency response application that the ESP 2050can use to remotely activate the drone 2069B. In some embodiments, theGUI includes one or more access controls for controlling the asset(e.g., the drone 2069B or the AED 2069C). For example, if a call takerat ESP 2050 determines that the emergency caller is suffering fromcardiac arrest or is calling on behalf of a person suffering fromcardiac arrest, the call taker can use the access controls within theGUI to dispatch the drone 2069B carrying the AED 2069C to the emergencylocation 2024B. In some embodiments, after receiving selection(s) of theaccess controls through the GUI, the EMS 2030 can directly activate theasset(s) (e.g., the drone 2069B or AED 2069C) according to theselection(s) of the access controls. In some embodiments, in response toreceiving selection(s) of the access controls through the GUI, the EMS2030 can then transmit a request to CSP B to activate the drone 2069Band AED 2069C according to the selection(s) of the access controls madeby the ESP 2050 through the GUI.

Digital Processing Device

In some embodiments, the platforms, media, methods and applicationsdescribed herein include a digital processing device, a processor, oruse of the same. In further embodiments, the digital processing deviceincludes one or more hardware central processing units (CPU) that carryout the device's functions. In still further embodiments, the digitalprocessing device further comprises an operating system configured toperform executable instructions. In some embodiments, the digitalprocessing device is optionally connected a computer network. In furtherembodiments, the digital processing device is optionally connected tothe Internet such that it accesses the World Wide Web. In still furtherembodiments, the digital processing device is optionally connected to acloud computing infrastructure. In other embodiments, the digitalprocessing device is optionally connected to an intranet. In otherembodiments, the digital processing device is optionally connected to adata storage device.

In accordance with the description herein, suitable digital processingdevices include, by way of non-limiting examples, server computers,desktop computers, laptop computers, notebook computers, handheldcomputers, Internet appliances, mobile smartphones, tablet computers,personal digital assistants, video game consoles, and vehicles. Those ofskill in the art will recognize that many smartphones are suitable foruse in the system described herein. Those of skill in the art will alsorecognize that select televisions, video players, and digital musicplayers with optional computer network connectivity are suitable for usein the system described herein. Suitable tablet computers include thosewith booklet, slate, and convertible configurations, known to those ofskill in the art.

In some embodiments, the digital processing device includes an operatingsystem configured to perform executable instructions. The operatingsystem is, for example, software, including programs and data, whichmanages the device's hardware and provides services for execution ofapplications. Those of skill in the art will recognize that suitableserver operating systems include, by way of non-limiting examples,FreeBSD, OpenBSD, NetBSD®, Linux, Apple® Mac OS X Server®, Oracle®Solaris®, Windows Server®, and Novell® NetWare®. Those of skill in theart will recognize that suitable personal computer operating systemsinclude, by way of non-limiting examples, Microsoft® Windows®, Apple®Mac OS X®, UNIX®, and UNIX-like operating systems such as GNU/Linux. Insome embodiments, the operating system is provided by cloud computing.Those of skill in the art will also recognize that suitable mobile smartphone operating systems include, by way of non-limiting examples, Nokia®Symbian® OS, Apple® iOS®, Research In Motion® BlackBerry OS®, Google®Android®, Microsoft® Windows Phone® OS, Microsoft® Windows Mobile® OS,Linux®, and Palm® WebOS®.

In some embodiments, the device includes a storage and/or memory device.The storage and/or memory device is one or more physical apparatusesused to store data or programs on a temporary or permanent basis. Insome embodiments, the device is volatile memory and requires power tomaintain stored information. In some embodiments, the device isnon-volatile memory and retains stored information when the digitalprocessing device is not powered. In further embodiments, thenon-volatile memory comprises flash memory. In some embodiments, thenon-volatile memory comprises dynamic random-access memory (DRAM). Insome embodiments, the non-volatile memory comprises ferroelectric randomaccess memory (FRAM). In some embodiments, the non-volatile memorycomprises phase-change random access memory (PRAM). In some embodiments,the non-volatile memory comprises magnetoresistive random-access memory(MRAM). In other embodiments, the device is a storage device including,by way of non-limiting examples, CD-ROMs, DVDs, flash memory devices,magnetic disk drives, magnetic tapes drives, optical disk drives, andcloud computing-based storage. In further embodiments, the storageand/or memory device is a combination of devices such as those disclosedherein.

In some embodiments, the digital processing device includes a display tosend visual information to a subject. In some embodiments, the displayis a cathode ray tube (CRT). In some embodiments, the display is aliquid crystal display (LCD). In further embodiments, the display is athin film transistor liquid crystal display (TFT-LCD). In someembodiments, the display is an organic light emitting diode (OLED)display. In various further embodiments, on OLED display is apassive-matrix OLED (PMOLED) or active-matrix OLED (AMOLED) display. Insome embodiments, the display is a plasma display. In some embodiments,the display is E-paper or E ink. In other embodiments, the display is avideo projector. In still further embodiments, the display is acombination of devices such as those disclosed herein.

In some embodiments, the digital processing device includes an inputdevice to receive information from a subject. In some embodiments, theinput device is a keyboard. In some embodiments, the input device is apointing device including, by way of non-limiting examples, a mouse,trackball, track pad, joystick, game controller, or stylus. In someembodiments, the input device is a touch screen or a multi-touch screen.In other embodiments, the input device is a microphone to capture voiceor other sound input. In other embodiments, the input device is a videocamera or other sensor to capture motion or visual input. In furtherembodiments, the input device is a Kinect, Leap Motion, or the like. Instill further embodiments, the input device is a combination of devicessuch as those disclosed herein.

Non-Transitory Computer Readable Storage Medium

In some embodiments, the platforms, media, methods and applicationsdescribed herein include one or more non-transitory computer readablestorage media encoded with a program including instructions executableby the operating system of an optionally networked digital processingdevice. In further embodiments, a computer readable storage medium is atangible component of a digital processing device. In still furtherembodiments, a computer readable storage medium is optionally removablefrom a digital processing device. In some embodiments, a computerreadable storage medium includes, by way of non-limiting examples,CD-ROMs, DVDs, flash memory devices, solid state memory, magnetic diskdrives, magnetic tape drives, optical disk drives, cloud computingsystems and services, and the like. In some cases, the program andinstructions are permanently, substantially permanently,semi-permanently, or non-transitorily encoded on the media.

Computer Program

In some embodiments, the platforms, media, methods and applicationsdescribed herein include at least one computer program, or use of thesame. A computer program includes a sequence of instructions, executablein the digital processing device's CPU, written to perform a specifiedtask. Computer readable instructions may be implemented as programmodules, such as functions, objects, Application Programming Interfaces(APIs), data structures, and the like, that perform particular tasks orimplement particular abstract data types. In light of the disclosureprovided herein, those of skill in the art will recognize that acomputer program may be written in various versions of variouslanguages.

The functionality of the computer readable instructions may be combinedor distributed as desired in various environments. In some embodiments,a computer program comprises one sequence of instructions. In someembodiments, a computer program comprises a plurality of sequences ofinstructions. In some embodiments, a computer program is provided fromone location. In other embodiments, a computer program is provided froma plurality of locations. In various embodiments, a computer programincludes one or more software modules. In various embodiments, acomputer program includes, in part or in whole, one or more webapplications, one or more mobile applications, one or more standaloneapplications, one or more web browser plug-ins, extensions, add-ins, oradd-ons, or combinations thereof.

Web Application

In some embodiments, a computer program includes a web application. Inlight of the disclosure provided herein, those of skill in the art willrecognize that a web application, in various embodiments, utilizes oneor more software frameworks and one or more database systems. In someembodiments, a web application is created upon a software framework suchas Microsoft® .NET or Ruby on Rails (RoR). In some embodiments, a webapplication utilizes one or more database systems including, by way ofnon-limiting examples, relational, non-relational, object oriented,associative, and XML database systems. In further embodiments, suitablerelational database systems include, by way of non-limiting examples,Microsoft® SQL Server, mySQL™, and Oracle®. Those of skill in the artwill also recognize that a web application, in various embodiments, iswritten in one or more versions of one or more languages. A webapplication may be written in one or more markup languages, presentationdefinition languages, client-side scripting languages, server-sidecoding languages, database query languages, or combinations thereof. Insome embodiments, a web application is written to some extent in amarkup language such as Hypertext Markup Language (HTML), ExtensibleHypertext Markup Language (XHTML), or eXtensible Markup Language (XML).In some embodiments, a web application is written to some extent in apresentation definition language such as Cascading Style Sheets (CSS).In some embodiments, a web application is written to some extent in aclient-side scripting language such as Asynchronous Javascript and XML(AJAX), Flash® Actionscript, Javascript, or Silverlight. In someembodiments, a web application is written to some extent in aserver-side coding language such as Active Server Pages (ASP),ColdFusion®, Perl, Java™, JavaServer Pages (JSP), Hypertext Preprocessor(PHP), Python™, Ruby, Tcl, Smalltalk, WebDNA®, or Groovy. In someembodiments, a web application is written to some extent in a databasequery language such as Structured Query Language (SQL). In someembodiments, a web application integrates enterprise server productssuch as IBM® Lotus Domino®. In some embodiments, a web applicationincludes a media player element. In various further embodiments, a mediaplayer element utilizes one or more of many suitable multimediatechnologies including, by way of non-limiting examples, Adobe® Flash®,HTML 5, Apple® QuickTime®, Microsoft® Silverlight®, Java™, and Unity®.

Mobile Application

In some embodiments, a computer program includes a mobile applicationprovided to a mobile digital processing device. In some embodiments, themobile application is provided to a mobile digital processing device atthe time it is manufactured. In other embodiments, the mobileapplication is provided to a mobile digital processing device via thecomputer network described herein.

In view of the disclosure provided herein, a mobile application iscreated by techniques known to those of skill in the art using hardware,languages, and development environments known to the art. Those of skillin the art will recognize that mobile applications are written inseveral languages. Suitable programming languages include, by way ofnon-limiting examples, C, C++, C#, Objective-C, Java™, Javascript,Pascal, Object Pascal, Python™, Ruby, VB.NET, WML, and XHTML/HTML withor without CSS, or combinations thereof.

Suitable mobile application development environments are available fromseveral sources. Commercially available development environmentsinclude, by way of non-limiting examples, AirplaySDK, alcheMo,Appcelerator®, Celsius, Bedrock, Flash Lite, .NET Compact Framework,Rhomobile, and WorkLight Mobile Platform. Other development environmentsare available without cost including, by way of non-limiting examples,Lazarus, MobiFlex, MoSync, and Phonegap. Also, mobile devicemanufacturers distribute software developer kits including, by way ofnon-limiting examples, iPhone and iPad (iOS) SDK, Android™ SDK,BlackBerry® SDK, BREW SDK, Palm® OS SDK, Symbian SDK, webOS SDK, andWindows® Mobile SDK.

Those of skill in the art will recognize that several commercial forumsare available for distribution of mobile applications including, by wayof non-limiting examples, Apple® App Store, Android™ Market, BlackBerry®App World, App Store for Palm devices, App Catalog for webOS, Windows®Marketplace for Mobile, Ovi Store for Nokia® devices, Samsung® Apps, andNintendo® DSi Shop.

Standalone Application

In some embodiments, a computer program includes a standaloneapplication, which is a program that is run as an independent computerprocess, not an add-on to an existing process, e.g., not a plug-in.Those of skill in the art will recognize that standalone applicationsare often compiled. A compiler is a computer program(s) that transformssource code written in a programming language into binary object codesuch as assembly language or machine code. Suitable compiled programminglanguages include, by way of non-limiting examples, C, C++, Objective-C,COBOL, Delphi, Eiffel, Java™, Lisp, Python™, Visual Basic, and VB .NET,or combinations thereof. Compilation is often performed, at least inpart, to create an executable program. In some embodiments, a computerprogram includes one or more executable complied applications.

Software Modules

In some embodiments, the platforms, media, methods and applicationsdescribed herein include software, server, and/or database modules, oruse of the same. In view of the disclosure provided herein, softwaremodules are created by techniques known to those of skill in the artusing machines, software, and languages known to the art. The softwaremodules disclosed herein are implemented in a multitude of ways. Invarious embodiments, a software module comprises a file, a section ofcode, a programming object, a programming structure, or combinationsthereof. In further various embodiments, a software module comprises aplurality of files, a plurality of sections of code, a plurality ofprogramming objects, a plurality of programming structures, orcombinations thereof. In various embodiments, the one or more softwaremodules comprise, by way of non-limiting examples, a web application, amobile application, and a standalone application. In some embodiments,software modules are in one computer program or application. In otherembodiments, software modules are in more than one computer program orapplication. In some embodiments, software modules are hosted on onemachine. In other embodiments, software modules are hosted on more thanone machine. In further embodiments, software modules are hosted oncloud computing platforms. In some embodiments, software modules arehosted on one or more machines in one location. In other embodiments,software modules are hosted on one or more machines in more than onelocation.

Databases

In some embodiments, the platforms, systems, media, and methodsdisclosed herein include one or more databases, or use of the same. Inview of the disclosure provided herein, those of skill in the art willrecognize that many databases are suitable for storage and retrieval ofbarcode, route, parcel, subject, or network information. In variousembodiments, suitable databases include, by way of non-limitingexamples, relational databases, non-relational databases, objectoriented databases, object databases, entity-relationship modeldatabases, associative databases, and XML databases. In someembodiments, a database is internet-based. In further embodiments, adatabase is web-based. In still further embodiments, a database is cloudcomputing-based. In other embodiments, a database is based on one ormore local computer storage devices.

Web Browser Plug-in

In some embodiments, the computer program includes a web browserplug-in. In computing, a plug-in is one or more software components thatadd specific functionality to a larger software application. Makers ofsoftware applications support plug-ins to enable third-party developersto create abilities which extend an application, to support easilyadding new features, and to reduce the size of an application. Whensupported, plug-ins enable customizing the functionality of a softwareapplication. For example, plug-ins are commonly used in web browsers toplay video, generate interactivity, scan for viruses, and displayparticular file types. Those of skill in the art will be familiar withseveral web browser plug-ins including, Adobe® Flash® Player, Microsoft®Silverlight®, and Apple® QuickTime®. In some embodiments, the toolbarcomprises one or more web browser extensions, add-ins, or add-ons. Insome embodiments, the toolbar comprises one or more explorer bars, toolbands, or desk bands.

In view of the disclosure provided herein, those of skill in the artwill recognize that several plug-in frameworks are available that enabledevelopment of plug-ins in various programming languages, including, byway of non-limiting examples, C++, Delphi, Java™, PHP, Python™, and VB.NET, or combinations thereof.

Web browsers (also called Internet browsers) are software applications,designed for use with network-connected digital processing devices, forretrieving, presenting, and traversing information resources on theWorld Wide Web. Suitable web browsers include, by way of non-limitingexamples, Microsoft® Internet Explorer®, Mozilla® Firefox, Google®Chrome, Apple® Safari®, Opera Software® Opera®, and KDE Konqueror. Insome embodiments, the web browser is a mobile web browser. Mobile webbrowsers (also called microbrowsers, mini-browsers, and wirelessbrowsers) are designed for use on mobile digital processing devicesincluding, by way of non-limiting examples, handheld computers, tabletcomputers, netbook computers, subnotebook computers, smartphones, musicplayers, personal digital assistants (PDAs), and handheld video gamesystems. Suitable mobile web browsers include, by way of non-limitingexamples, Google® Android® browser, RIM BlackBerry® Browser, Apple®Safari®, Palm® Blazer, Palm® WebOS® Browser, Mozilla® Firefox® formobile, Microsoft® Internet Explorer® Mobile, Amazon® Kindle® Basic Web,Nokia® Browser, Opera Software® Opera® Mobile, and Sony® PSP™ browser.

Certain Terminologies

Unless otherwise defined, all technical terms used herein have the samemeaning as commonly understood by one of ordinary skill in the art towhich this invention belongs. As used in this specification and theappended claims, the singular forms “a,” “an,” and “the” include pluralreferences unless the context clearly dictates otherwise. Any referenceto “or” herein is intended to encompass “and/or” unless otherwisestated.

As used herein, a “device” is a digital processing device designed withone or more functionality. A “triggering device” refers to acommunication device with a communication component, which will allow itto send and receive information over a wireless channel, a wiredchannel, or any combination thereof (e.g., sending/receiving informationover the Internet). Examples of triggering devices include a mobilephone (e.g., a smartphone), a laptop, a desktop, a tablet, a radio(e.g., a two-way radio), and a vehicular communication system. In someembodiments, a triggering device includes a car security system (e.g.,OnStar®), a home security system, or a home control system (e.g., anetworked control system for providing network controlled and/or smarttemperature control such as a Wi-Fi smart thermostat, lighting,entertainment, and/or door control, such as Nest®). In some embodiments,a triggering device is an Internet of Things (IoT) device. In someembodiments, the triggering device is a sensor for sensing environmentalor health indicators. In some embodiments, the sensor may include asensing component and a communication component. In some embodiments,the triggering device is a sensor in a sensor network or a device thatcontrols a sensor network.

In some embodiments, a triggering device is a wearable device (e.g., acommunication device worn by a user). In some embodiments, a triggeringdevice (e.g., a wearable device) comprises one or more sensors. As usedherein, a “mobile wireless device” refers to a device that is portableand communicates wirelessly. In some embodiments, a user wears orcarries the mobile wireless device on the user's person or in the user'svehicle. Examples of mobile wireless devices include mobile or cellularphones, wearable devices (e.g., smart watch, fitness tracker, wearablesensor, smart glasses, etc.).

As used herein, Internet of Things (IoT) refers to a network of physicaldevices, buildings, vehicles, and other objects that feature an IPaddress for internet network connectivity for exchanging data. In manycases, IoT devices are embedded with electronics, software, one or moresensors, and network connectivity. As used herein, a IoT device can be adevice that includes sensing and/or control functionality as well as aWiFi™ transceiver radio or interface, a Bluetooth™ transceiver radio orinterface, a Zigbee™ transceiver radio or interface, an Ultra-Wideband(UWB) transceiver radio or interface, a WiFi-Direct transceiver radio orinterface, a Bluetooth™ Low Energy (BLE) transceiver radio or interface,and/or any other wireless network transceiver radio or interface thatallows the IoT device to communicate with a wide area network and withone or more other devices. In some embodiments, IoT devices feature anIP address for internet connectivity. In addition to an IP address, theIoT device can be associated with a MAC address or an SSID. In someembodiments, IoT devices connect with other devices through Wi-Fi,Blue-Tooth®, a Zigbee™ transceiver radio or interface, an Ultra-Wideband(UWB) transceiver radio or interface, a WiFi-Direct transceiver radio orinterface, a Bluetooth™ Low Energy (BLE) transceiver radio or interface,or other technologies which allow for transfer of data. In someembodiments, IoT devices form a mesh network allowing information to beefficiently routed between the devices. Examples of IoT devices includea home thermostat, intelligent home monitors, baby monitors, smoke orcarbon monoxide detectors, home security camera systems, and othernetwork-enabled devices. In some embodiments, a triggering device is anIoT device (e.g., a Nest® device).

As an example, a vehicular on-board console is triggered upon detectionof an emergency. In some embodiments, the console contains a built-inmicrophone and uses the car speakers. In some embodiments, the consoleis connected to a Device Communication & Interface Module (DCIM), whichuses an antenna to connect to the cellular network. When the car is in acrash, sensors can transmit information to the Sensing Diagnostic Module(SDM). In some embodiments, the SDM comprises an accelerometer, whichmeasures the severity of the event based on gravitational force. The SDMsends this information to the DCIM, which uses the cellular antenna tosend the emergency alert.

As used herein, an “account” refers to contact information for a user,including emergency contacts of the user. In some embodiments, theaccount is registered by the user to include a list of contactinformation for the user such as, for example, a list of associateddevices. Examples of contact information on an account include phonenumber, email address, home address, work address, emergency contacts(e.g., name, phone number, email, etc.), and associated devices (e.g.,other communication devices of the user aside from the device ortriggering device sending an emergency alert). In some embodiments, theaccount includes contact information for organizational representatives.For example, in some cases, a social media application installed on theuser's electronic device is used to send an emergency alert. Thecommunication session can be established with the user/user device,emergency service provider personnel, and an organizationalrepresentative for the social media entity. This scenario can occur whenanalysis of the user's social media activity indicates a possibleemergency situation such as, for example, a suicide attempt by the user.In response, the social media application on the user device sends anemergency alert to an emergency management system. Since the user didnot choose to request help, a representative of the social media entityis connected to the 3-way communication session to help explain theemergency situation to the emergency service provider.

As used herein, an “associated device” refers to a communication devicethat is associated with the triggering device. For example, a user maybe using several communication devices such as a mobile phone, awearable, a home security system, a car computer. The user may haveregistered these devices with his or her account and linked thesedevices with a user name, user number(s), email address(es), home orother physical address(es). In some embodiments, associated devices mayinclude communication devices of a second user who is associated withuser, e.g., a husband and wife, a father and son, a patient and doctor,friends, work colleagues, etc. In some cases, the user may have addedthe second user as an emergency contact, a member of a group, etc. Insome cases, user may have agreed to share location and other data withthe second user. In some embodiments, the second user may be someone whois frequently contacted by the user and the communication deviceidentifies the second user from the “Recently called” or “Frequentlycalled” list. In some embodiments, the associated devices may be devicesthat are proximal or near-by to the triggering device such as obtainedthrough a Wi-fi scan. In some embodiments, an associated device isproximal to the triggering device when the location of the associateddevice is within 1, 5, 10, 15, 20, 25, 30, 35, 40, 45, 50, 60, 70, 80,90, 100, 200, 300, 400, or 500 meters of the location of the triggeringdevice.

As used herein, the “list of associated devices” refers to a list ofcommunication devices that are associated with the user or thetriggering device (e.g., a second resident in a smart home). The list ofassociated devices may be listed by user name, phone number, emailaddress, physical address, coordinates etc. The device entry in the listmay include phone number, email address, physical address, coordinates,BSSID, SSID or MAC address. The list may be user defined or generated bythe device or the EMS.

As used herein, a “request for assistance” refers to a request ormessage sent to a recipient asking for help. In some embodiments, arequest for assistance is an emergency request for assistance (e.g., therequest is associated with an emergency situation) such as, for example,an emergency alert. In some embodiments, an emergency alert comprises arequest for assistance. In some embodiments, a request for assistance isassociated with an emergency situation. In some embodiments, a requestfor assistance comprises an emergency indication. In furtherembodiments, an emergency indication is selected from one or more of thegroup consisting of traffic accident, police emergency, medicalemergency, and fire emergency. In some embodiments, a request forassistance is associated with a non-emergency situation (e.g., requestfor a tow truck after car breaks down). In some embodiments, a requestfor assistance is associated with a device sending the request. In otherembodiments, a request for assistance is associated with a device notsending the request (e.g., a proxy request on behalf of a second deviceand/or a member device in a group of devices). As used herein, a requestis “associated” with a device or user when the request relates to anemergency or non-emergency situation involving the device or user. Insome embodiments, a request comprises data associated with a device (oruser thereof). In some embodiments, a request comprises a data setassociated with a device. For example, in some embodiments, a requestcomprises a data set associated with a device, wherein the data setcomprises current location data. In other embodiments, a request forassistance is sent and/or received separately from data associated witha device. For example, in some embodiments, a request is sent first, andthe recipient subsequently queries the device that sent the request fordata or a data set associated with the emergency and/or device or userinvolved in the emergency. Alternatively, in some embodiments, a requestis sent first, and the recipient subsequently queries the deviceassociated with the emergency for data or a data set associated with theemergency and/or device or user involved in the emergency.

As used herein, a “emergency responder” refers to any person or personsresponsible for addressing an emergency situation. In some embodiments,an emergency responder refers to government personnel responsible foraddressing an emergency situation. In some embodiments, an emergencyresponder is responsible for a particular jurisdiction (e.g., amunicipality, a township, a county, etc.). In some embodiments, anemergency responder is assigned to an emergency by an emergency dispatchcenter. In some embodiments, an emergency responder responds to arequest for emergency assistance placed by a user via a usercommunication device. In some embodiments, an emergency responderincludes one or more fire fighters, police officers, emergency medicalpersonnel, community volunteers, private security, security personnel ata university, or other persons employed to protect and serve the publicand/or certain subsets of the population.

As used herein, an “emergency service provider” (ESP) is a public orprivate organization or institution responsible for providing emergencyservices. For example, in some embodiments, an EDC (e.g., a publicsafety answering point (PSAP)), a fire department, a police department,and a hospital may all be considered emergency service providers. Insome embodiments, an emergency responder is a member of an ESP. In someembodiments, an ESP personnel is a person who works at an ESP. Forexample, an ESP personnel may be a call-taker at a PSAP or a firstresponder at a fire department.

As used herein, a “recipient” refers to one or more persons, services,or systems that receive a request for assistance (e.g., an emergencyalert). The recipient varies depending on the type of request. In someembodiments, a recipient is an emergency service. In some embodiments, arecipient is an emergency service when the request for assistancepertains to an emergency (e.g., a tier 2 emergency). In someembodiments, a recipient is an emergency management system. In someembodiments, a recipient is an emergency dispatch center. In someembodiments, a recipient is an emergency dispatch center, wherein therequest is first routed through an emergency management system (e.g.,request is sent to the EMS, but ultimately is sent to an EDC). In someembodiments, a recipient is a first responder (e.g., a communicationdevice of a first responder). In some embodiments, a recipient is anon-emergency service or personnel, for example, a relative or friend.In such situations, a user of a communication device (or member deviceor second device) does not require emergency assistance, but does needhelp. As an example, a user of a member device in a group of devices isa child who is lost in a theme park. The parent of the child has acommunication device in the same group of devices as the child's memberdevice. The parent uses the communication device to send a request forassistance on behalf of the child's member device to theme park securityguards who are closer to the child than the parent. Security is thenable to pick up the child quickly using the data set associated with themember device, which they are given authorization to access by theparent's communication device.

As used herein, a “user” refers to one or more person or personsassociated with a device (e.g., communication device, member device,second device, device of a first responder, etc.). In some embodiments,a user utilizes a device to place a request for assistance. In someembodiments, user refers to one or more persons who are paid subscribersof a network access service, for example, cellular service subscribers.In some embodiments, a user refers to anyone who gains access to anetwork via a router, for example, a Wi-Fi router, and is not a paidsubscriber of any access service. In some embodiments, a deviceassociated with a user is a device carried or worn on the person of theuser (e.g., a phone or wearable device). In some embodiments, a deviceassociated with a user is not carried or worn on the person of the user(e.g., a home security sensor or camera installed in the home of theuser, a vehicle tracking system installed in a vehicle of the user,etc.).

As used herein, “data” refers to a collection of information about oneor more entities (e.g., user of a user communication device) and/or anenvironment that pertains to characteristics of the one or moreentities. In some embodiments, an entity is a person. In someembodiments, an entity is a thing (e.g., a house). For example, in someembodiments, data comprises sensor data from home sensors associatedwith a house. In this example, the data is also associated with one ormore persons (e.g., the homeowner(s) and/or inhabitant(s)). In someembodiments, data refers to meta-data. In some embodiments, datacomprises health information about the user of a communication device.In some embodiments, data comprises information about the surroundingenvironment of the user of the user communication device (e.g.,surrounding temperature, location, elevation, barometric pressure,ambient noise level, ambient light level, surrounding geography, etc.).In some embodiments, data comprises information about other users thatis pre-stored in a device or in a database (e.g., a database within agroup of devices who are related to the user of the user communicationdevice as predefined by the user). In some embodiments, the data setcomprises information from two or more users of user communicationdevices, wherein each user is affected by the current emergencysituation. As an example, two unrelated users are involved in avehicular collision, and each user sends a separate emergency request(for traffic accident) using his/her communication device. In thisexample, the separate emergency requests are associated (e.g., by anemergency management system and/or emergency dispatch center) with thesame emergency based on the proximity of time, location, and emergencyindication of the emergency requests. As a result, the data set for thisaccident comprises information from both user communication devices. Inthis example, the data set comprises location information from bothdevices (e.g., GPS coordinates), biosensor data for one or both devices(e.g., biosensor data such as heart rate and blood pressure can beimportant in case of injury), and information about the vehicle drivenby each user (e.g., make, model, and year of manufacture informationstored on the device). In some embodiments, data comprises current data.In further embodiments, current data comprises information that is equalto or less than 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16,17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 35, 40, 45, 50,55, or 60 minutes old. In further embodiments, current data comprisesinformation that equal to or less than 1, 2, 3, 4, 5, 6, 7, 8, 9, 10,11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, or 24 hours old. Insome embodiments, data comprises historical data. In furtherembodiments, historical data comprises information that is equal to ormore than 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18,19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 35, 40, 45, 50, 55, or60 minutes old. In further embodiments, historical data comprisesinformation that equal to or more than 1, 2, 3, 4, 5, 6, 7, 8, 9, 10,11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, or 24 hours old. Insome embodiments, the age of information is calculated from the date theinformation is first collected (e.g., when a sensor first detects asensed parameter such as, for example, heart rate).

As used herein, “health data” refers to medical information associatedwith a user of a device. In some embodiments, health data comprisesmedical history such as, for example, past illnesses, surgery, foodand/or drug allergies, diseases, disorders, medical diagnosticinformation (e.g., genetic profile screen), or any combination thereof.In some embodiments, health data comprises family medical history (e.g.,family history of breast cancer). In some embodiments, health datacomprises current health information such as, for example, currentsymptoms, current medications, and/or current illnesses or diseases. Insome embodiments, health data comprises user age, height, weight, bloodtype, and/or other biometrics. In some embodiments, medical historycomprises medical information that is equal to or more than 1, 2, 3, 4,5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23,or 24 hours old. In some embodiments, medical history comprises medicalinformation that is equal to or more than 1, 2, 3, 4, 5, 6, 7, 8, 9, 10,11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28,29, or 30 days old. In some embodiments, current health informationcomprises information that is equal to or less than 1, 2, 3, 4, 5, 6, 7,8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, or 24hours old. In some embodiments, current health information comprisesmedical information that is equal to or less than 1, 2, 3, 4, 5, 6, 7,8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,26, 27, 28, 29, or 30 days old.

As used herein, “user data” refers to general information associatedwith a user of a device. In some embodiments, user data comprises useridentity, user name, height, weight, eye color, hair color, ethnicity,national origin, religion, language(s) spoken, vision (e.g., whetheruser needs corrective lenses), home address, work address, occupation,family information, user contact information, emergency contactinformation, social security number, alien registration number, driver'slicense number, vehicle VIN, organ donor (e.g., whether user is an organdonor), or any combination thereof. In some embodiments, user data isobtained via user input.

As used herein, “sensor data” refers to information obtained or providedby one or more sensors. In some instances, a sensor is associated with adevice (e.g., user has a communication device with a data link viaBluetooth with a wearable sensor, such as, for example, a heart ratemonitor or a pedometer). Accordingly, in some embodiments, the deviceobtains sensor data from the sensor (e.g., heart rate from the heartrate monitor or distance traveled from the pedometer). In someinstances, the sensor data is relevant to an emergency situation (e.g.,heart rate during a cardiac emergency event). In some embodiments, asensor and/or sensor device comprises an acoustic sensor, abreathalyzer, a carbon dioxide sensor, a carbon monoxide sensor, aninfrared sensor, an oxygen sensor, an ozone monitor, a pH sensor, asmoke detector, a current sensor (e.g., detects electric current in awire), a magnetometer, a metal detector, a radio direction finder, avoltage detector, an air flow meter, an anemometer, a flow sensor, a gasmeter, a water meter, a Geiger counter, an altimeter, an air speedindicator, a depth gauge, a gyroscope, a compass, an odometer, a shockdetector (e.g., on a football helmet to measure impact), a barometer, apressure gauge, a thermometer, a proximity sensor, a motion detector(e.g., in a home security system), an occupancy sensor, or anycombination thereof, and in some embodiments, sensor data comprisesinformation obtained from any of the preceding sensors. In someembodiments, one or more sensors are physically separate from a userdevice. In further embodiments, the one or more sensors authorize theuser device to obtain sensor data. In further embodiments, the one ormore sensors provide or send sensor data to the user deviceautonomously. In some embodiments, the user device and the one or moresensors belong to the same group of devices, wherein member devices areauthorized to share data. In some embodiments, a user device comprisesone or more sensors (e.g., user device is a wearable device having asensor or sensing component).

As used herein, “communication link” refers to a communication pathwayfrom a device (e.g., communication device) to another device or to anintermediate device (e.g., a router) on a network. In some embodiments,the communication device establishes a communication link with anotherdevice or an intermediate device to transfer information (e.g., alocation of the device) or to obtain information from a recipient suchas, for example, location of a first responder assigned to a request forassistance associated with the communication device (e.g., device offirst responder). A communication link refers to the point-to-pointcommunication channels, point-to-point and end-to-end data sessions, andthe physical hardware facilitating the communication channel(s) (e.g.,antennas used to communicate/transmit information). In some embodiments,a data session comprises session parameters and the network route takenfrom one device to another device.

As used herein, a “data channel” refers to a communication sessionbetween two devices wherein data packets are exchanged between thedevices. In some embodiments, a data session is setup using exchange ofcertain data packets, also called as “handshake signals,” which are ableto define the capabilities of the data session. For example, in someembodiments, the data session “handshake” provides for the ability totransfer multi-media data, voice data, and other data via the datasession. In some embodiments, the data session is setup without the useof handshake signals, wherein the two devices involved share datapackets according to a predefined protocol (e.g., a previously agreedupon protocol). In some embodiments, the data session is routed throughan EMS, which stores the multi-media, voice, and/or other data from anyof the devices that are part of the data session. In furtherembodiments, the EMS shares the data from the data session with theother device (e.g., device of a first responder). In some embodiments,the EMS manages the data session.

As used herein, a “Received Signal Strength Indicator (RSSI)” refers toa measurement of the power present in a received radio signal. In someembodiments, the RSSI refers to a number assigned to the signal levels(e.g., power level) of packets as detected by a device receiving thepackets from a device sending the packets. For example, an RSSI valuemay be a number within an arbitrary range such as from 0 to 100. In someembodiments, the RSSI refers to the decibel level of the power of thereceived data packets. In other embodiments, the RSSI refers to theactual power, for example measured in mW, as detected by the receiver.In some embodiments, RSSI is replaced with received channel powerindicator (RCPI), which is a measure of the received radio signal powerin a selected channel over the preamble and the entire received frame.

As used herein, “voice or speech recognition software” refers tocomputer programs that can recognize a person's speech to identifytrigger phrases (e.g., iListen, Voice Navigator, Google Now, LilySpeech,etc.). In some embodiments, the software may be able to recognize theidentity of the speaker. As used herein, “voice command” refers to wordsor phrases that a user may use to give command to the triggering device.The trigger phrases may be user-defined or may be from a library ofphrases on the trigger device or at a remote server.

As used herein, “sound detection software” refers to computer programsfor detecting trigger sounds in and around the triggering device. Thetrigger sounds may be user-defined or may be from a library of phraseson the trigger device or at a remote server. The trigger sounds may besounds (alarms, breakage, gunshots, explosion, fire, car crash, etc.) orabsence of sound (e.g., no heartbeat, etc.). For example, a glass breakdetector software may use the microphone in the trigger device tomonitor any noise or vibrations to detect burglaries in a smart home. Ifthe vibrations exceed a baseline, they may be analyzed by the software.The software may analyze frequencies typical of glass shattering andtrigger an emergency alert if the sound is above a trigger threshold. Insome cases, the software may compare detected sounds with glass-breakprofiles analysis and trigger an alert if the amplitude threshold and/orstatistically expressed similarity threshold are breached. In someembodiments, an emergency is detected or triggered when a trigger soundexceeds a threshold. In some embodiments, a trigger sound threshold isabout 50, 55, 60, 65, 70, 75, 80, 85, 90, 95, 100, 110, 120, 130, 140,150, 160, 170, 180, 190, or 200 decibels. In some embodiments, a triggersound threshold is at least about 50, 55, 60, 65, 70, 75, 80, 85, 90,95, 100, 110, 120, 130, 140, 150, 160, 170, 180, 190, or 200 decibels.In some embodiments, a trigger sound threshold is no more than about 50,55, 60, 65, 70, 75, 80, 85, 90, 95, 100, 110, 120, 130, 140, 150, 160,170, 180, 190, or 200 decibels.

In some embodiments, voice recognition and speech recognition userecordings of the human voice, but differ in approach. Speechrecognition strips out the personal differences between speakers todetect the words. Voice recognition typically disregards the languageand meaning to detect the physical person behind the speech. Speechrecognition is language dependent, while voice recognition isindependent of language. In essence, voice biometrics provides speakerrecognition rather than speech recognition. In some embodiments, speechrecognition is the inter-disciplinary sub-field of computationallinguistics that develops methodologies and technologies that enablesthe recognition and translation of spoken language into text bycomputers. It is also known as “automatic speech recognition” (ASR),“computer speech recognition”, or “speech to text” (STT). In someembodiments, some speech recognition systems require “training” (alsocalled “enrollment”) where an individual speaker reads a text orisolated vocabulary into the system. The system analyzes the person'sspecific voice and uses it to fine-tune the recognition of that person'sspeech, resulting in increased accuracy. Systems that do not usetraining are called “speaker independent” systems. Systems that usetraining are called “speaker dependent”. In some embodiments, speechrecognition applications include voice user interfaces such as voicedialing (e.g., “Call home”), call routing (e.g., “I would like to make acollect call”), domotic (e.g., home automation) appliance control,search (e.g., find a podcast where particular words were spoken), simpledata entry (e.g., entering a credit card number), preparation ofstructured documents (e.g., a radiology report), speech-to-textprocessing (e.g., word processors or emails), and aircraft (usuallytermed direct voice input).

In some embodiments, speech recognition systems use powerful andcomplicated statistical modeling systems. These systems use probabilityand mathematical functions (e.g., Hidden Markov Model and neuralnetworks) to determine the most likely outcome.

As used herein, the term “voice recognition” or “speaker identification”refers to identifying the speaker, rather than what they are saying.Recognizing the speaker can simplify the task of translating speech insystems that have been trained on a specific person's voice or it can beused to authenticate or verify the identity of a speaker as part of asecurity process. In some embodiments, to convert speech to on-screentext or a computer command, a computer or device has to go throughseveral complex steps.

As used herein, an “audio detector” refers to a device that can detectaudio inputs (e.g., voice commands, trigger sounds). In some cases, theaudio detector is a separate device (e.g., a smart speaker). In somecases, the audio detector is a component of another device (e.g.,microphone inside of a smart phone). In some embodiments, sound may bedetected “sound sensors”, “sound detectors” or microphones. For example,a sound is a board that combines a microphone and some processingcircuitry. The sound detector provides an audio output, but also abinary indication of the presence of sound, and an analog representationof its amplitude. In some embodiments, the microphone turns sound energyinto electrical energy. When a user speaks, sound waves created by auser's voice carry energy toward the microphone. Inside the microphone,the diaphragm and coil move back and forth upon contact with the soundwaves. A permanent magnet produces a magnetic field that cuts throughthe coil and an electric current is produced. The electric current flowsout from the microphone to an amplifier on the sound recording device.

While preferred embodiments of the present invention have been shown anddescribed herein, it will be obvious to those skilled in the art thatsuch embodiments are provided by way of example only. Numerousvariations, changes, and substitutions will now occur to those skilledin the art without departing from the invention. It should be understoodthat various alternatives to the embodiments of the invention describedherein may be employed in practicing the invention. It is intended thatthe following claims define the scope of the invention and that methodsand structures within the scope of these claims and their equivalents becovered thereby.

EXAMPLES

The following illustrative examples are representative of embodiments ofthe subject matter described herein and are not meant to be limiting inany way.

Example 1—Wearables & Parallel Flows

John, an elderly man, lives in a nursing home. He suffers from a medicalcondition that makes him susceptible to falls and is given a smartwatchby the nursing home to provide health monitoring and to allow him torequest help in case of an accident. Other residents of the nursing homeare also assigned various similar devices (panic buttons, smartphones,etc.). The nursing home administrator has used an emergency flow editorsoftware to create an emergency flow script for handling emergencyalerts sent by the various smartwatches and other devices used by thenursing home. The editor software provides a graphic user interface withan interactive space that allows the administrator (an authorized user)to select graphical representations of emergency flow building blocksand drag them over to a desired location within the interactive space.The administrator is easily able to generate the customized emergencyflow script by dragging and dropping the building blocks and connectingthem. Although the editor software provides some standard pre-madebuilding block templates, the administrator is able to customize andconfigure selected building block templates. In this case, theadministrator adds a building block that sorts emergency alerts based onthe type of device sending the alert. The building block is connected tomultiple downstream emergency flows, which are executed based on thedevice type that is identified. In this case, a downstream emergencyflow associated with smartwatches has building blocks that open a textand/or chat-based communication channel with an operator at the nursinghome. The downstream emergency flow includes a first parallel emergencyflow that obtains data from the smartwatch, including heart rate sensordata and current location data (either received through the emergencyalert or by querying the smartwatch). The downstream emergency flow alsoincludes a second parallel emergency flow that has a building block thatdetermines whether the emergency is a personal emergency (e.g., healthemergency such as a heart attack) or an environmental emergency (e.g.,fire, earthquake), and responsive to detecting an environmentalemergency, obtains sensor data from any sensors (e.g., fire alarmsand/or temperature sensors) that are in the vicinity of the smartwatch(in this case, within 10 meters). In addition, the administrator setsthe second parallel emergency flow to attempt detection of anenvironmental emergency by obtaining sensor data in vicinity of thesmartwatch even in the case of a personal emergency. Once the emergencyflow script has been finished, the administrator assigns the script toan emergency flow identifier for the nursing home. This identifier isprogrammed into the smartwatches and other nursing home devices.Finally, the administrator activates the server software that runs theemergency response server application.

A week later, John is getting out of bed when he falls and breaks hiship. John immediately presses a panic button on his smartwatch, whichsends an emergency alert (which contains the emergency flow identifier)over the Wi-Fi network to the emergency response server application. Theserver application detects the emergency alert, extracts the emergencyflow identifier, and queries the identifier against a database storingemergency flow scripts and corresponding emergency flow identifiers toidentify the emergency flow script to execute in response to thisemergency alert. The server application then executes the emergency flowscript setup by the administrator a week earlier. The script executesinstructions of the initial emergency flow building block to determinethe source of the emergency alert. Upon identifying the smartwatch asthe source of the emergency alert, the initial building block thenbranches off to a smartwatch downstream emergency flow. This downstreamemergency flow has a series of building blocks forming a parallel flowfor obtaining location and sensor data from the smartwatch (this customflow takes advantage of the enhanced sensor functionality ofsmartwatches) by transmitting data requests to the smartwatch over theWi-Fi network. A second parallel data flow is activated as part of thisscript that determines whether the emergency alert pertains to apersonal or environmental emergency. In this case, the emergency alertis sent when John pressed a panic button for a personal medicalemergency. Accordingly, an initial building block of the second paralleldata flow determines based on the emergency alert that this is apersonal emergency. However, this second parallel data flow includes abuilding block for assessing sensor data throughout the nursing home todetermine the possibility of an environmental emergency. In this case,the building block queries thermometers and smoke/CO₂/CO detectorslocated throughout the nursing home that communicate with the serverover the Wi-Fi network. The sensor data from these thermometers anddetectors indicates no abnormal readings. This result causes the secondparallel data flow to terminate since there is no need to provideenvironmental sensor data associated with the emergency request whenthere is no indication of an environmental emergency. In parallel, themain emergency flow calls a smartphone belonging to John and bridges thecall with an operator for the nursing home. Although the smartphone isout of John's reach, it is paired with John's smartwatch via Bluetooth.John is able to answer the call by pressing a button on his smartwatch.The operator asks John the nature of his medical emergency, and Johnindicates that he has fallen and cannot get up. The emergency flowscript provides an interactive element that bridges the communicationsession with a local public safety answering point when the operatorinteracts with the interactive element. In this case, the operatorrealizes that John needs urgent medical attention and presses theinteractive element. This activates a building block in the emergencyflow script that calls the PSAP and bridges the call with thecommunication session between the nursing home operator and John (e.g.,creating a conference call including the PSAP dispatcher, nursing homeoperator, and John). John is in great pain and is unable to coherentlyrespond to the PSAP dispatcher's questions. Thankfully, the nursing homeoperator has medical information and sensor data for John and is able torelay this information to the PSAP dispatcher. In addition, theemergency flow script executes a parallel emergency flow that transmitsthe location data, medical information, and sensor data to the PSAP(since the administrator customized the emergency flow script to takeadvantage of the fact that this local PSAP is equipped with thetechnology to receive enhanced data/meta-data). The PSAP dispatcher isable to assign first responders (EMTs from the local hospital) to John'slocation based on the location data received. In this scenario, the PSAPdispatcher does not have authorization to view John's medicalinformation but has the ability to forward medical and sensor data tothe first responders to keep them apprised of John's current medicalcondition. In the meantime, orderlies working at the nursing home havereached John and kept him stable and still while waiting for the EMTs toarrive.

Finally, the EMTs arrive and transport John to the local hospital fortreatment. Upon their arrival, John uses his smartwatch to hang up onthe phone call. The nursing home operator and the PSAP dispatcher alsoterminate their connections to the emergency communication session, thusterminating the session. Meanwhile, the emergency flow script hasfinished executing and terminates. Fortunately, John makes a fullrecovery thanks to the prompt emergency response.

Example 2—Social Media Suicide Prevention

Jane, a freshman as a top tier university, is finishing up her firstsemester. Jane has been struggling to fit in socially on-campus and isexperiencing problems with her roommate. Moreover, Jane is doublemajoring in analytical chemistry and computer science and is feelingoverwhelmed by the course load. For the past month, Jane has fallen intoa deep depression as finals week approached. She is not alone, andadministrators have been cognizant of the rise of mental health problemsin the student body. In response, the university has launched a digitalcampaign to detect and head off mental health crises. The universitypartnered with a popular social media platform to monitor publiclyavailable user postings for early detection of mental health crises suchas suicide attempts. In this case, mental health crises are detected bydynamic web analysis of user postings for all university students usingkeywords indicative of suicidal thoughts or tendencies. In this case,Jane posts on the social media platform that she is saying farewell toher friends and is ready to end it all tonight. This post is analyzedand leads to detection of a mental health crisis. Next, an emergencyalert is sent to an emergency response server along with an emergencyflow identifier associated with the emergency flow script for theuniversity's mental health emergency management campaign. The emergencyflow identifier is used to determine the customized emergency flowscript comprising various building blocks for managing emergencycommunications between all entities in this particular emergency flow.In this case, the emergency flow script is executed by the emergencyresponse server. A first building block attempts to locate contactinformation for Jane associated with the mental health crisis byquerying the university server database storing student information. Thefirst building block retrieves a cell phone number, which is passed ontoa second building block that calls the number. Jane does not pick up.The second building block passes on the “no pickup” output to a thirdbuilding block that attempts to locate Jane's roommate Mary who doespick up her phone. Upon successfully reaching Mary, a fourth buildingblock initiates a call to a university dispatcher and bridges the callswith Mary and the dispatcher to enable two-way communications. A fifthbuilding block running parallel to the fourth building block providesthe emergency alert to the dispatcher via a data connection to thedispatcher's computer console. The dispatcher than speaks with Mary toexplain the situation and asks for Jane's whereabouts. Mary has not seenJane all night. Fortunately, another parallel building block isattempting to locate Jane's whereabouts by searching university Wi-Firouters to determine if any Jane's cell phone is connected to any ofthose routers. This building block successfully identifies two routersin the basement of the library as having detected Jane's cell phoneWi-Fi signal in the past 20 minutes and provides this output to thedispatcher. The university dispatcher then connects to campus securityand requests a guard to be sent to investigate. Upon connection to thecampus security, another building block is activated that transfers allcollected information pertaining to this emergency to a cell phone ofthe security guard (which is running a mobile application incommunication with the emergency response server). The guard is able toenter the router location information into a campus map application onhis phone and soon finds Jane sleeping on the couch in the librarybasement. The guard wakes up Jane and assesses her condition. Sheinsists she is okay but agrees to meet with the school counselor for amental health checkup.

Example 3—Emergency Calling Using On-Board Console in a Smart Vehicle

Lisa, while driving home during a snowstorm, gets hit from behind by atruck. Lisa is badly injured and is not able to move her hands to make acall for emergency help. Lisa is in a smart car with an intelligenton-board console capable of receiving voice command and making cellularcalls. Lisa does not remember the trigger words, but says “Please callemergency . . . Hmmm . . . Please help . . . ”. Because Lisa's voiceinstructions were not clear and her voice was low, the console promptsLisa to confirm that she would like to make an emergency call, but shehas become unresponsive.

Fortunately, the event data recorder in the smart vehicle has beenactivated due to the crash. The event data recorder system in theon-board console includes four components: various sensors (camera,RADARs and LIDARs), the SDM (which includes the event data recorder),the DCIM and the cellular antenna. When Lisa's car got hit, the air bagsdeploy, and the sensors are activated. The sensors transmit the data tothe SDM, which measures the severity of the accident using anaccelerometer. The SDM's assessment is sent to the DCIM, which uses thecellular antenna to send an alert (attaching Lisa's voice command andthe assessment of the severity of the accident) to a private callcenter.

When a customer service representative at the call center receives thecall, she uses the built-in GPS to find the vehicle's location (or get alocation through the cellular network) and calls the car to check-inwith Lisa. Since Lisa is unresponsive and reviewing the severity of theaccident, the representative calls 9-1-1 makes a proxy call on behalf ofLisa using the Lisa's location. Fortunately, paramedics are sent to thescene immediately and Lisa is taken to the hospital for treating herinjuries.

Example 4—PSAP Trigger Example

Just In Time, an emergency response company, aids emergency serviceproviders (such as public safety answering points, or “PSAPs”) bygathering emergency data from a variety of sources and delivering thedata to the emergency service providers. Traditionally, PSAPs are onlytechnologically capable of receiving telephone calls (e.g., 9-1-1emergency calls) with no additional data. Thus, when an emergency callis made to a PSAP from a mobile phone (with a dynamic and uncertainlocation), PSAP operators or call-takers must speak directly to thecaller to determine the caller's location and the nature of the caller'semergency. Unfortunately, many people involved in emergency situationsare unable to articulate their location or may not even know—and even ifthey do, the time spent articulating their location to the PSAP operatorcan often be the difference between life and death. Similarly, PSAPoperators are forced to respond to emergencies with little or noinformation about the persons involved (e.g., health data or medicalhistories) or context of the emergencies (e.g., type of emergency,audio/video of the surroundings, etc.). Just In Time knows just howcritical it is to quickly and accurately provide locations andsituational/contextual information during emergencies to emergencyservice providers.

To aid emergency service providers (hereinafter, “ESPs”), Just In Timemaintains and provides an emergency management system (hereinafter,“EMS”) that receives and stores data, information, and multimedia from aplurality of sources, such as mobile phones and mobile applications,internet of things (IoT) devices, intelligent vehicle systems, and otherelectronic devices before and during emergencies. In many places aroundthe world, when a person experiences an emergency they can call anemergency number (e.g., an emergency call) to be connected to anemergency service provider. For example, in the United States, a personcan call 9-1-1 to be connected to a PSAP. In many cases, when anemergency service provider receives an emergency call, the emergencyservice provider also receives a phone number from which the emergencycall was placed. The emergency service provider can then send a queryincluding the phone number to the EMS for emergency information, whichcan then search its databases for emergency data or informationassociated with the phone number.

Elise, a thirtysomething professional living in San Francisco has twoelderly grandparents that live alone in Oakland. Concerned about them,she accesses Just In Time's registration website and signs up for anotification procedure for her grandparents. She submits both of hergrandparents' cell phone numbers as well as their home phone number (alandline) as user identifiers to be associated with the notificationprocedure. Elise then submits herself and both of her parents (alongwith their cell phone numbers) as emergency contacts. As part of theregistration process, the EMS sends an SMS text message to Elise, herparents, and her grandparents' cell phones to confirm the registration.All of them respond to the text message in the affirmative.Additionally, the EMS delivers an interactive call to Elise'sgrandparents' home phone number that verbally requests verbalconfirmation, which her grandparents provide, thus completing theregistration process.

A week later, Elise's grandfather forgets to turn off the stove afterpreparing his breakfast and a fire ignites in the kitchen. In response,Elise's grandmother calls 9-1-1 from their landline home phone and isconnected to a local PSAP. After receiving the emergency call, the PSAPsends a query including the home phone number to the EMS for emergencyinformation. In response to receiving the query including the home phonenumber, the EMS checks if the home phone number has been associated witha notification procedure. The EMS determines that the home phone numberhas indeed been associated with the notification procedure that Eliseregistered for and, accordingly, executes the notification procedure bysending an SMS text message to Elise and her parents that an emergencycall has been made from Elise's grandparents' home phone. Elise's motheris then able to drive to the grandparents' house immediately and checkon her parents.

1.-20. (canceled)
 21. A method for notifying one or more recipients ofan emergency by an emergency management system (EMS), the methodcomprising: detecting an emergency associated with a user identifier;obtaining emergency data associated with the emergency; determining anappropriate notification procedure to be executed for the emergencybased on the emergency data, wherein the notification procedure definesa pathway of execution based at least in part upon input received fromthe one or more recipients; and executing the appropriate notificationprocedure to initiate communication with the one or more recipients. 22.The method of claim 21, further comprising: receiving a definition ofthe notification procedure, wherein the notification procedure definesthe one or more recipients and an order of contacting the one or morerecipients; associating the notification procedure with the useridentifier; and storing the notification procedure in a notificationprocedure database.
 23. The method of claim 22, wherein the one or morerecipients are contacted simultaneously.
 24. The method of claim 22,wherein the definition of the notification procedure is received througha graphical user interface of a registration application provided by theEMS.
 25. The method of claim 24, wherein the registration applicationcomprises a plurality of standard notification procedures and whereinreceiving the definition of the notification procedure comprisesreceiving selection of a first standard notification procedure from theplurality of standard notification procedures.
 26. The method of claim22, wherein receiving the definition of the notification procedurecomprises receiving definition of a customized notification procedure.27. The method of claim 22, wherein determining the appropriatenotification procedure using the set of emergency data comprisesidentifying the notification procedure as associated with the useridentifier from the notification procedure database.
 28. The method ofclaim 21, wherein the one or more recipients are specified by thenotification procedure.
 29. The method of claim 21, wherein theelectronic communication generated by an electronic device in responseto an emergency call being made from the electronic device.
 30. Themethod of claim 21, wherein the electronic communication is received inthe form of an application programming interface (API) call.
 31. Themethod of claim 21, wherein the appropriate notification procedure isdetermined using at least one of the user identifier, a locationassociated with the emergency, or an emergency type associated with theemergency comprised within the set of emergency data associated with theemergency.
 32. The method of claim 21, wherein the set of emergency datacomprises a location associated with the emergency; and whereindetermining the appropriate notification procedure using the set ofemergency data comprises: accessing a set of geofences associated with aplurality of third-party accounts; determining that the location iswithin a geofence associated with a first third-party account from theplurality of third-party accounts; and identifying the appropriatenotification procedure as associated with the first third-party account.33. An emergency management system for notifying one or more recipientsof an emergency, comprising a processor operative to: detect anemergency associated with a user identifier; obtain emergency dataassociated with the emergency; determine an appropriate notificationprocedure to be executed for the emergency based on the emergency data,wherein the appropriate notification procedure defines a pathway ofexecution based at least in part upon input received from the one ormore recipients; and execute the appropriate notification procedure toinitiate communication with the one or more recipients.
 34. The systemof claim 33, wherein the processor is further operative to: receive adefinition of the notification procedure, wherein the notificationprocedure defines the one or more recipients and an order of contactingthe one or more recipients; associate the notification procedure withthe user identifier; and store the notification procedure in anotification procedure database.
 35. The system of claim 34, wherein theone or more recipients are contacted simultaneously.
 36. The system ofclaim 34, wherein the definition of the notification procedure isreceived through a graphical user interface of a registrationapplication provided by the EMS.
 37. The system of claim 36, wherein theregistration application comprises a plurality of standard notificationprocedures and wherein receiving the definition of the notificationprocedure comprises receiving selection of a first standard notificationprocedure from the plurality of standard notification procedures. 38.The system of claim 33, wherein determining the appropriate notificationprocedure using the set of emergency data comprises identifying thenotification procedure as associated with the user identifier from thenotification procedure database.
 39. The system of claim 33, wherein theappropriate notification procedure is determined using at least one ofthe user identifier, a location associated with the emergency, or anemergency type associated with the emergency comprised within the set ofemergency data associated with the emergency.
 40. The system of claim33, wherein the set of emergency data comprises a location associatedwith the emergency; and wherein the processor is operative to: access aset of geofences associated with a plurality of third-party accounts;determine that the location is within a geofence associated with a firstthird-party account from the plurality of third-party accounts; andidentify a notification procedure associated with the first third-partyaccount.