Communication system for use with protected persons

ABSTRACT

A method including a dedicated device for simple, automatic, and immediate communication system for protected persons, who may for short or long term benefit from assistance, with oversight by an administrator, who manages which persons are trusted to communicate with the protected person through the system. In particular, the present invention focuses on pervasive presence, the system does not go to sleep, continually monitoring and measuring objective and subjective aspects of the protected person&#39;s experiences, states, and system states, including health and communication measures, maintains a schedule with reminders, and a series of adaptive prompts, for example, medications and appointments, social activities and engagements, and automatically and in a simple manner, connects the protected person with trusted persons and authorized services and features through an adaptive customizable interface, by a variety of means such as touch, audio and visual. It connects through gateways to many services and content, with accommodation for vision, hearing, mobility, language, and other needs, thus reducing cognitive burden and stress for the protected person while maintaining ease of use and important social connections to promote emotional well-being.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority Provisional Patent Application62/714,810 filed on Aug. 6, 2018, which is hereby incorporated byreference in its entirety.

FIELD OF INVENTION

This present disclosure relates to methods and devices forcommunication, particularly the disclosure relates to securecommunication. More particularly the disclosure relates to methods anddevices for secure communication wherein the communication may involveone person who is under guardianship of another person.

BACKGROUND OF THE INVENTION

People are increasingly relying upon technology to stay connected withloved ones, their peers, healthcare providers, etc. With systems such asemail, text messages, video conferencing, and new media becomingmainstream, formerly conventional methods of correspondence are beingused less frequently. This is in part because technology allows us toconnect more quickly and share more information than customary methods.For example, using technology we can send pictures, audio files, andeven video conference with people at the touch of a button. Even medicalor service providers and benefits may be managed primarily online. Inaddition, these systems are becoming less and less expensive and, inmany cases, let us connect for less than the price of a postage stamp.Moreover, society is becoming more mobile, at times living at a distanceor engaged in work or other activities for long periods of time andreducing access to loved ones.

Unfortunately, not everyone is able to benefit from these technologies.In particular, elderly, those with disabling conditions, children, andothers are often unable to realize technology's potential because of thelearning curve associated with these systems. Either because ofmedication, neurological conditions or natural aging process, the neuralconnections or other biological systems that process and retain newinformation begin to change or deteriorate, making it more difficult tolearn how to use new devices. Because the technological devices requirelearning new and different systems, special populations, those understress, people with medical conditions, and others including the elderlymay struggle to incorporate these devices and all their extendedbenefits into their lives. The barriers to incorporate these benefitsmay result in anxiety, depression, stress, overwhelming the person'sability to learn, paradoxically creating an undesired emotionalexperience. The person may not perceive the usefulness of the engagementwith technology, or they might not be involved in a social or workplacesetting whereas a group technology learning takes place. The effect ofthis is elderly or special populations often feel left behind andisolated from the rest of the world, often with nobody to turn to inorder to bridge the gap. Their family members may live at a distance ormay be busy, their partner, mate or friends may be infirmed or gone, orhave moved away, they may speak a language not shared by those nearby.This experience compounds the situation and the natural process of agingthat may inhibit mobility, senses including hearing and vision,cognitive, and or other elements of health and well-being, and or becomea challenge to independence. Sometimes these experiences are temporaryduring illness or adjustment. Sometimes they can occur when anindividual has a challenging emotional experience, and they maywithdraw. Or they might have special communications needs for a varietyof other reasons. They may become socially and or physically isolated.For some it may compound existing conditions, for others, it may resultin new problems.

As reported by several studies, isolation can have severe negativehealth consequences. Isolation and loneliness are major risks fordepression and have been linked to severe long-term illnesses. Withthis, integration and social engagement of the elderly and specialpopulations are critical for their health, well-being and quality oflife. It is desired to have a method of communication between anindividual that may require oversight or protection (protected person)and another person in a trusted environment (communication with trustedpeople) that is approved by an administrator and is instant, secure,always available and effortlessly.

Patent Application Publication 20140359453 to Mark Palfreeman publishedon Dec. 4, 2014 entitled, “Systems and Methods for Displaying Images onElectronic Picture Frames” discloses a computer-implemented method fordisplaying images. It comprises collecting a plurality of images fromone or more image repositories and generating a slideshow of images fordisplay on an electronic picture frame. Whereas previous systems fordisplaying pictures in frames may be automatically updated, may berobust through power outages and the like, and may be adaptable to theuser's preferences, the present invention may be updated to meet newfunctionality through a server. Therefore, novel services and features,not just updated versions of the picture frame, will be enabled by thecurrent invention. Not only can the present invention display picturesand other features to the user's preferences, it can also customize thepresentation and features to meet the needs of the user through severalmethods of the present invention. The administrative person canconfigure the interface features to meet the sensory, cognitive, orpreferences of the protected person. Also, specialists who understandhow protected persons with health, language, communication, dementia,cognitive issues, or sensory impairments such as vision or hearingissues may benefit from specific configurations of features andinterface presentations can modify the system to simplify interactionsand improve the usefulness of the experience for the protected person.The present invention can be modified to accommodate multiple types ofinput and display necessary for interactions by protected persons,administrative persons, and or trusted persons.

Chinese patent CN201131117Y published on Oct. 8, 2008, discloses anelectronic device for the elderly aimed at solving cultural problems ofan aging population wherein the family may have more elderly membersthan the younger generations. Across the globe many societies are facingchallenges as families are often no longer living near one another; andwhen acute or chronic conditions impact a person's abilities to manageindependently, there are efforts to address the situation withtechnology. In China, as showcased by patent CN201131117Y for example, asolution is provided for monitoring the elder, whose family members aremigrant workers. The system monitors blood pressure, temperature, andother vital signs and reads e-books aloud using speech technology toreduce complexity for seniors with low vision, provides a simplifieduser interface, and enables emergency calling features. However, thesystem does not provide for pervasive presence, customized interface,and simple immediate access for the elder to the family member at adistance, in particular, in response to a trigger, or a simplifiedrequest by the protected person. With the present invention, the userinterface is adapted to the needs of the user and the task at hand toreduce cognitive load. The present invention provides for the pervasivepresence to monitor and then take action based on settings selected bythe administrator, and close the loop of social contacts based on anumber of conditions that may be satisfied in the script of actions. Thepresent invention is also ideally designed to manage updates to all andany features and functions over time. While the system provides agateway to service providers, the administrator can block access to thewider internet content to reduce risks and complexity for the protectedperson. In addition, the present invention simplifies and pre-schedulesand provides triggers for many social interactions to reduce likelihoodof loneliness, isolation, and anxiety which might occur in the life of aperson with an acute or chronic medical condition, or who is aging, orfinds themselves to be in a changed social situation; and can assistwhen a person who has been prescribed medication for a condition, haschallenges managing to maintain orientation to the activities, placesand things in their lives, and the connections with their family,friends, or peers.

US Patent Publication 2016/0098759 to Andre et al. published on Apr. 20,2006, entitled, “System And Method For Enabling Efficient DigitalMarketing On Portable Wireless Devices For Parties With LowCapabilities,” discloses a system and method provided for managingdigital marketing to a multiplicity of consumers by way of portablewireless digital devices. This and other types of technology providemethods of presenting information to elderly in an easier way andprovides access to other online features and services in the manner usedby the general population. Whereas, the present invention providessecure access, adaptive interfaces, and restricts wide access, therebyproviding protection from complexity, predatory sites, and othercircumstances as deemed appropriate by the administrator. In addition,the present invention provides for simplified means and methods tocustomize the interface to meet the special requirements of theindividual, in particular, given the task flow, the abilities of theprotected person, goals of the services being provided, and includingand considering objective and subjective measures gathered duringinteractions and use of the device, sensor information, plan, etc. Inaddition, the present invention provides for a pervasive presence andcompanion to the individual, even when the administrator and trustedpeople are unavailable. The present invention maintains an engagingdialogue and connection with the protected person including schedules,upcoming events, pictures of familiar people, places, and things, etc.as well as programming.

U.S. Pat. No. 9,020,476 issued on Apr. 28, 2015 to Leipez et al.entitled “System and method for remote care and monitoring using amobile device,” discloses a system and method for remote care andmonitoring of the user of a mobile device. Whereas other systems, suchas the system described in U.S. Pat. No. 9,020,476, provide formonitoring elders for events and alerts, and provide for one-clickdialing in the event of emergencies, and they provide for automaticdialing in certain conditions, for example, a sensor detecting a fall,these systems do not provide flexible interface options for those withlimited abilities, language, cognitive challenges, sensory, emotional,and other issues. In addition, they fail to provide for pervasivecompanion to promote simple social engagement. The present inventionprovides for dialog that maintains a diverse and more holistic record ofprompts including social interactions and responses from the protectedperson as well as objective measures as a means to determine thecondition and status of the protected person. Status trends indicate thelikelihood of events happening in the future, services and featuresneeded, indicators of depression and or anxiety, health, wellness, andquality of life.

The Patent Application Publication 20140359453 to Mark Palfreemanpublished on Dec. 4, 2014, the US Patent Publication 2016/0098759 toAndre et al published on Apr. 20, 2006, and the U.S. Pat. No. 9,020,476issued on Apr. 28, 2015 to Leipez et al. are each hereby incorporated byreference in their entireties.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 is an illustration of the device showing a typical main screen ofthe program as seen from the perspective of the protected person.

FIG. 2 is an illustration of the device showing a typical schedulingscreen of the program as seen from the perspective of the protectedperson.

FIG. 3 is a schematic of the functions of the device as they might bepresented to a protected person.

FIG. 4 is an illustration of the device showing a typical communicationscreen of the program as seen from the perspective of the protectedperson.

FIG. 5 is an illustration of the device showing a typical main screen ofthe program as seen from the perspective of the administrative person.

FIG. 6 is an illustration of the device showing a typical communicationscreen of the program as seen from the perspective of the trustedperson.

FIG. 7 is a flow chart showing the steps conducted when a person isattempting to communicate with the protected person.

FIG. 8 is a flow chart showing the steps conducted when a person isattempting to communicate with the protected person and is using a PINto demonstrate trustworthiness.

FIG. 9 is a flow chart showing the steps conducted when an administratoris configuring the device for use with a protected person.

FIG. 10 is a flow chart showing the steps conducted when anadministrator creating a group of trusted persons.

FIG. 11 is an illustration of the device showing an example ofemotionally reflective companion feature.

SUMMARY OF THE INVENTION

Herein is presented a method of communication between persons whichcomprises communication between at least two entities. In the conductionof this communication there is a first person, one or more secondpersons and one or more third persons. The actual communication occursbetween the first person and one third person. More than one thirdperson can participate in the communication. Each person involved in theconduction of this communication has a unique identity. The secondpersons and the third persons are distinct from the first person.However, the identity of the second person can be the same identity ofthe third person. Before communication can proceed with a minimum of onesecond person must know the identity of the third person and havegranted approval for that third person to participate in communicatingwith the first person. The communication is conducted by a first devicethat is coupled to a second device by electronic means; wherein thefirst device is in the presence of the first person and the seconddevice is in the presence of the third person. Furthermore, the firstdevice is always active when it is in the presence of the first person.

The communication can be vocal. In this embodiment, the device isequipped with a microphone capable of transducing sound and a speakercapable of transmitting sound. The communication can be visual. In thisembodiment, the device is equipped with a camera capable of transducingimages and a display capable of displaying transmitted images. Thecommunication can involve touch. In this embodiment, the device isequipped with touch-sensitive display capable of displaying images andtransducing touch.

The first person of the above embodiment can be a child. The firstperson of the above embodiment can also be a person over the age of 65.The first person of the above embodiment can be a person who has beenlegally determined to incompetent. The first person of the aboveembodiment can be a person who has been medically determined to havediminished mental functions.

In another preferred embodiment, the device is configured to recognize aPIN as a code by which the second person can grant approval for a thirdperson to communicate with the first person. In a particularly preferredembodiment, the third person communicates a PIN to the device to confirmthe third person has granted approval for communication with the firstperson.

DETAILED DESCRIPTION OF THE INVENTION

Herein is presented a method of communication between persons whichcomprises communication between at least two entities.

The device can be useful when not being actively used for communication.FIG. 1 shows a representative image of the device configured in a mainscreen. Here the device displays information that is both instructive tothe protected person and informational that stimulates an emotionalresponse. In FIG. 1 as a representative example, a daughter andgranddaughter are presented.

Similarly as an illustrative example, FIG. 2 depicts the deviceconfigured to display useful information to the protected person, suchas a reminder of their name, the local weather, time of day, etc. FIG. 2also shows that the device can be configured to encourage interactionwhen the protected person is capable of such interaction. In thisillustrative example the device is enticing the protected person tostart a video.

FIG. 3 shows a schematic of how the device could be configured topresent layers of information. The default screen is the Main Screen 160with the calendar, weather and time. The Picture Slide Show 161 ispresented on top of it, and it appears when the device is inactive. Whena video comes a new overlay appears on top like Playing Static Video162, or a Video Visit 163 and subsequently, any new feature would appearas a new overlay 163 that is presented automatically or by the touch ofa visible button or a voice-activated command. There is no use of pinch,zoom, scroll or swipe, or use of menus to navigate or use of keyboard.

FIG. 4 illustrates the status of device when it is being used forcommunication. In the instance depicted by FIG. 4 a video call betweenthe protected person and their daughter and granddaughter is takingplace. In the conduction of this communication, there is a protectedperson (a mother as depicted in FIG. 4), one or more trusted persons(two trusted people: a daughter and granddaughter depicted in FIG. 4)and one or more administrators (the daughter in the example of FIG. 4not depicted). The actual communication occurs between the protectedperson and one or more trusted persons. More than one trusted person canparticipate in the communication, as shown in FIG. 4. Each personinvolved in the conduction of this communication has a unique identity.The trusted persons and the administrators are distinct from the firstperson. However, the identity of a trusted person can be the sameidentity of the administrator: one person can be both a trusted personand an administrator at the same time. For instance, the daughter isboth a trusted person and an administrator in the example depicted inFIG. 4.

Before communication can proceed, a minimum of one administrator mustknow the identity of the trusted person and must have granted approvalfor that trusted person to participate in communicating with theprotected person. In the example depicted in FIG. 4, the daughterapproved both the granddaughter and herself as trusted persons (see FIG.5). The communication is conducted by a first device (the device of FIG.4) that is coupled by electronic means to a second device (the devicedepicted in FIG. 6). The first device is in the presence of theprotected person and the second device is in the presence of the trustedperson. Furthermore, the first device is always active when it is in thepresence of the protected person, see Pervasive Presence.

FIG. 7 depicts a flow chart which shows the process for verifying that apotential communicator is, in fact, a trusted person. Communication isattempted. In order to verify the communicator is a trusted person, theidentity of the communicator ought to be revealed. This is the firstdecision of the flowchart of FIG. 7. If the identity is blocked the callis blocked. If the identity if known the second decision is to determineif a second person or administrator has approved the communicator as atrusted person. If the communicator is confirmed as a trusted person thecommunication proceeds. If the communicator is not confirmed as atrusted person the communication is blocked.

Depicted in FIG. 8 it is another embodiment of the invention where a PINconfirms the person is a trusted person. The device is configured torecognize a PIN as a code by which the second person can grant approvalfor a third person to communicate with the first person. In a thisembodiment, the third person communicates a PIN to the device to confirmthe third person has granted approval for communication with the firstperson.

Dedicated Device

The dedicated device, pervasive presence, and its adaptive features andfunctions become a safe and secure emotional companion device for theprotected person, with oversight by the administrator. The protectedperson can rely on an ongoing and continued dialogue with the dedicateddevice in an easy and automatic way, because the device does not go tosleep. The dedicated device presents a view on screen or by alternativemeans and methods of the state of the protected person, and options thatare available to the protected person, for example, an adapted interfacemight provide pictures of the loved ones for the protected person totouch to initiate communications, through video visits, or by sending amessage, for example, provides a safe gateway to other features andservices, and for other purposes. The dedicated device presents theemotional and health state of the protected person, and solicitsengagement by the protected person, as a companion would, provideshelpful information, simplified access to communication, reminders,schedules, healthcare monitoring and management, and is updatedautomatically without intervention by the protected person. Thededicated device is a method to manage communication, monitor,articulate, and verify the protected person's state, and adapt orpromote actions to improve emotional valence and social interaction, toreduce isolation, stress, and loneliness, to reduce complexity, and forthe best health outcomes.

Second Device

This is a generic device that provides access to trusted person orpersons, and it may be used by the administrator to manage features,functions, access, interface, and oversight of the protected person. Thesecond device is used by the administrator to establish or to checksettings, to review statistics, to order and review reports, and more.The second device, learning, and features of the server together providemethods to configure and render the interface for the protected personto conduct a variety of tasks that are made accessible through thededicated device.

Configurable Interface

For protected persons, a configurable interface adapts in considerationof measurable objective and subjective skills, aspects of memory andconcentration, mobility, time of day, medications, and other aspectsthat impact the protected person's ability to interact with thededicated device, and perform any and all of the functions required,desired, etc. The state of the protected person is assessed andmonitored, the state of the system is monitored, the schedule and tasksare compared with the basic and range of skills of the protected person.An important aspect of the present invention is to be able to easily andconveniently be able to provide for appropriate interface designs formany protected persons; methods of the present invention includeanalysis of each task to be conducted by the users. Once the task hasbeen documented and the system functions and features are madeavailable, then these system functions are configured to optimize theskills of the individuals who will use the system to complete the tasks.For example, a protected person might have difficulty locating acontacts list, scrolling through, or searching by name, and finding thenumber of her daughter. Therefore, in the configuration of the interfacefor this protected person, a picture of the daughter's face might be anideal means to present the number for the protected person who only hasto touch the face of her daughter to connect a video visit. Therefore,the task flow adapted to the abilities of the protected person, and ameans of monitoring success is an important aspect of the presentinvention. Since these abilities may vary over time, it is crucial totrack them as they evolve in order to anticipate and recommendappropriate interface strategies for that protected person. For example,for some persons, there are times when they may be very capable ofreading from a screen and recognizing their family members' names andfaces; yet later in the day, or when the medications are particularlyoverwhelming, the same person may have difficulty with memory,orientation, and identification of the people, places, and things theyordinarily enjoy. The adaptive interface is able to detect thesevariables and recommend interface options that will meet the changingrequirements of the individual. The dedicated device and pervasivepresence detects abilities and changes in the abilities of the protectedperson, and offers a new configuration for the interface involvingalternative input and display methods to meet the needs of thatprotected person at that particular state, and for that specific systemstate. These configurations can be short or long term, or they can beidentified as no longer serving the needs of the protected person byobserving statistics and determining the protected person is notresponding, engaging, or another measure is being missed. In that case,a new assessment can be conducted for a new configuration to beestablished. A significant aspect of the invention and in particular,the configurable interface, provides for a collection of age progressionimages of people known to the protected person. If the protected persondoes not recognize her daughter from a recent photograph, but insteadrecognizes a photograph from childhood, then a sequence of photographscan be presented, with additional media and memories, to create anorientation for the protected person to reduce anxiety, and extend thesocial connectedness to loved ones. In this manner and in other ways,the present invention can be easily used with its Configurable Interfaceto display individual media or sequences, whether images, videos, soundfiles, textural, links to webcams of loved places, artwork, or other,that maintain important social connections and orientation to people,places, and things that are relevant to the protected person.

Adaptive Features

For a protected person, one might anticipate that variables measured bythe system and the pervasive presence will not remain constant.Therefore, it is an important aspect of the present invention to monitorthe protected person, the environment, social interactions, and otherimportant measures to determine for example, the state of the protectedperson, the prescribed and scheduled activities and features of thesystem, and infer and or determine health, emotional valence,performance in Activities of Daily Living, Instrumental Activities ofDaily Living, and more. The pervasive presence might, for example, useheart rate to conduct an analysis to determine heart rate variability,and from that measure, determine emotional condition. Alternatively, thesystem might use pressure sensors in the furniture to determine howsedentary the protected person has been and if there is a trend. Thesystem might also use cameras, or gyroscopes to measure exercise andrehabilitation compliance, for example, and determine the state of theprotected person. An important aspect of the invention, the AdaptiveFeatures, use measures from the system to determine or infer the statesof interest, then recommend a new action. For example, when thePervasive Presence determines that the protected person has not left thesofa for three hours, and the heart rate variability has determinedthere is an emotional valence indicating sadness or stress, then thesystem can select from a library of features an appropriate action totake to reach the individual on the sofa, and engage that person inactivities, or social dialog. An important aspect of the inventioninvolves the Pervasive Presence determining that the protected person isstill lingering in the bed well into the morning. Emotional valencemeasures are indicating stress and sadness. Upon looking back at othermeasures, the Pervasive Presence determines that this protected personwho suffers from Asthma, is having a very difficult time sleeping. Lackof sleep can lead to symptoms of depression and dementia. The system ofthis invention will send messages and recommendations to administrators,healthcare providers, and adapt to engage the protected person in sleepassistance, wake notifications and assistance, appropriate levels andtypes of exercise, additional emotional support features such as socialinteractions, and appropriate media.

The pervasive presence monitors complex activities, and adapts to thechanges taking place in the state of the protected person. Depending onthe progression of these abilities, the system can also recommendappropriate adaptation to support the protected person in theseactivities, providing dignity, and through increased support, the systemis reducing stress and anxiety. The present invention is particularlyhelpful to protected persons living in the community, because of theseadaptive features. One is expected to be performing a few moreindependent activities of daily living when in the community. They maybe complex, and memory can fail. But giving up on these joyfulexperiences can be isolating and depressing. Therefore, the adaptivefeatures of the present invention can be used to create monitors andreminders of those cherished activities, such as caring for a pet,shopping and obtaining medications, learning safety procedures, managingmoney, maintenance, managing communication, scheduling importantactivities, and more. The adaptive interface can identify when theadministrator will be needed for exception conditions, for example.

Accessibility Features

The invention is a system for real-time, instant, scheduled, practical,and very simple communication for the protected individuals or group ofprotected individuals, for example, the elderly, those with disablingconditions, the infirmed, students, children, residents of a communityor members of an organization, those in rehabilitation, and others.Managed through a dedicated device, the protected individuals can stayconnected and engaged with their loved ones, providers, and communitywithout having to struggle with cumbersome issues that often occur withtechnology, and or without risking security, and or providingsupervision, monitoring, and surveillances, and while also maintainingappropriate levels of independence, dignity, and privacy.

One embodiment of the invention is a dedicated device that isconfigurable, interoperable, connected, access point, links to sensorsand actuators, and the like. Such a device features a touch screen withat least one front-facing camera, speakers, microphone, connectivity,internet access. In one embodiment of the invention, the size isconfigured to assure visibility for the protected individuals. In thisembodiment, the display is more readily readable for text and moreappreciated for images than a typical smartphone hand-held device andnot as unwieldy as a tablet device for a protected person with limitedvision. The invention is adaptable to the needs of the protectedindividuals, or group of protected individuals, with regard tovisibility, audibility, special interface devices, actuators, sensors,etc. The dedicated devices are configured with a suitable operatingsystem capable of installing and running the application that allows theprotected individuals to communicate. The dedicated device is connectedto a communication network provides a pervasive presence. The dedicateddevice can be configured to be always standing by and or active, withcontrollable and varying levels of monitoring, assessment, security, andprivacy. Various accessories may be connected easily to the dedicateddevice. For example, such accessories can be configured to accommodatespecial needs. Such needs include but are not limited to, straw input,gesture recognition system, eye tracker, pressure mats, and others. Inaddition, a variety of resources may be connected including sensors,monitors, actuators, robots, and other devices.

The ideal embodiment provides a means to update and control thededicated device on behalf of a protected individual or group ofprotected individuals, locally or remotely, in real time, on a schedule,as needed, by a trusted agent, professional, and or service provider,and that means to update may be enabled through a list of enabledauthorized agents, and may also be enabled through a PIN or password.The trusted agent can engage in a virtual visit to the location of theprotected individual through a pervasive system, by camera, microphone,logs, sensors, in real time and by review, also see the presentationexperienced by the protected individual or group, in real time or inreview, and drive the system, and or create an experience to bedelivered to the individual or group at a set time, by schedule, or ondemand.

The ideal embodiment provides a pervasive presence and managestransactions involving remotely controlling or updating software andfeatures on behalf of the protected individual or group of protectedindividuals and therefore security is an important part of the systemprovided through premise software and features, the network server,devices, and methods.

Communication

The devices and methods described herein assist and/or allow forcommunication between two or more people, wherein one person is aprotected person. Traditionally communication is considered to be voicecommunication, often supported by video. However, it is understood thatcommunication can occur in many forms. It is understood thatcommunication can occur with voice alone, or by text, with alternativemedia, a robot or similar device, with the assistance of sensors,actuators, or through specialized communications techniques for example,symbols, Braille or similar tactile means, specialized methods includingspeech to text to graphically generated sign language, through a relayoperator or person acting in that capacity, captioning, or sign languageon a video display.

It is also understood that a TDD system can be used; TDD systems arealso known as teletypewriter, TTY, textphone, and minicom, MCM,Def-tone, DTS, each of these terms are used interchangeably herein.

Communication can also be through touch. This is particularly useful forsome protected people for whom traditional communication by voice ortext is intimidating. In one configuration software allows a person toselect an image using a touch screen menu to convey thoughts oremotions. The image may be directly communicated to the recipient it mayalso be converted to another form of communication including voice ortext. For instance, a protected person might hear their daughter's voiceand select a smiley face image, or another emotional image or media toconvey a sentiment or message, on the touch screen. Upon that theselection of that image, the device can be configured to say to thedaughter, “I am safe and happy.” In some embodiments this voice is acomputer-generated voice. In other embodiments, the voice ispre-recorded by the protected person. In still other embodiments, thedevice is configured to synthesize a voice to sound like the protectedperson having derived the protected person's voice from collectedrecordings.

Electronic Means

By the term “electronic means” it is meant end to end wired, wireless,radio transmission, and others, inclusive of campus environments such asa closed system (i.e. hospitals), including specialized means such asinductive coupling (e.g. methods of data transfer between implantedmedical devices and external systems), near field communications indevices of close proximity (NFC), optical, infrared, scanners, acoustictransmission of data gathered by microphones, and many other means andmethods in use to enable connectivity for devices and services. Thefield of networking is experiencing tremendous growth anddiversification, with useful implementations for all aspects ofconnectivity including traditional wired and wireless communicationsinfrastructure, with additions for simple and secure networking as wellas self-configuring ad hoc networking. Over time, some are more abundantand preferred in a given environment such as a medical environment,while others are prevalent because of simplicity, cost, size, safety,embedded infrastructure, practical nature of the method of transmission,etc. Some come with regulatory issues (such as medical devices), othersare compliant with standards including Wi-Fi and Bluetooth, and others.Some are more ideally integrated into solutions because of therequirements of the application associated with the power supply,environmental interference issues, and more. The present inventionadvantages not only the existing internet worldwide communicationinfrastructure, wired and wireless, as well as campus systems typicallyfound at hospitals, schools, in homes, and elsewhere, but also includesdevice to device communication, and newly emerging techniques andenablements as needed.

Electronically Cluttered Environment

There are many situations when multiple devices and data transmissiontechniques are in the same location creating an electronically clutteredenvironment. This situation can easily occur in a medical setting,rehabilitation situation, assisted living, campuses, schools, and thelike. Compounding the situation, in some medical environments, forexample, there might be rooms and areas that are inaccessible towireless communication, or where the wireless communication is blocked.In addition, many wireless communications methods are not designed forcluttered environments affecting the data transmission and causing poorperformance or failure of the applications and features. In these andother circumstances, electronic means of communication may advantagealternative methods. Other methods might include but are not limited to,acoustic data transmitted over the air to a receiver such as amicrophone or specialized sensor, or a single microphone with areflective surface to re-create three dimensional sound information fordirection, and other information, etc. Devices that may be used with theinvention include, but are not limited to, IR or optical sensorcollecting data from a display, LED, IR transmitter, screen, etc. Thesystem accounts for short distance, mid-range, and long distancecommunications through a variety of methods, and anticipates andaccommodates for a variety of issues associated with each type ofcommunication.

Protected Person

The devices and methods described herein assist and/or allow forcommunication between two or more people, wherein one person is aprotected person. By protected person is it meant a person who is beingcared for by another person, wherein the other person is actively makingimportant decisions for the protected person. For the purpose of thisdisclosure, the protected person is relying on another person to makedecisions, at a minimum, about the other people the protected personcommunicates with and when that communication is allowed to beconducted.

In some situations, the protected person is of diminished capacity. Insome situations, a physician, hospital or clinic has determined that theperson lacks capacity to make decisions. In some situations, a court hasdetermined that the person's mental functions are diminished orimpaired. In some situations, the court determination is statutory; forinstance, a parent or guardian has legal control for their child orward, at least until the protected person is of legal age. In manysituations, the protected person has knowingly volunteered to defercontrol of their communication to another person for any one of avariety of personal reasons. The status of the protected person may beeither permanent or temporary.

Administrative Person

The devices and methods described herein assist and/or allow forcommunication between two or more people, wherein that communication hasbeen authorized by one or more authorized person. The authorized personis a person who has been entrusted with determining the people with whomthe protected person is allowed to communicate. Optionally, theadministrative person(s) may determine the times when communication ispossible or the maximum duration of communication.

The authorized person is empowered to make decisions for the protectedperson. At a minimum, the authorized person is empowered to control thecommunication of the protected person. The authorized person may beempowered by the courts either by an order or by a statutoryrelationship. For instance, the authorized person could be the parent orguardian of a child, the courts recognize the statutory right of aparent to control the communications of their child. Similarly, theauthorized person may be empowered by a doctor or hospital to makedecisions on behalf of a protected person. Naturally, the protectedperson being of sound mind may voluntarily request that the authorizedperson take control of with whom they communicate.

The authorized person exercises their authority by instructing thedevice the person with whom the protected person is allowed tocommunicate; these people are referred to herein as trusted persons. Thedevice does not need for the authorized person to be present for thecommunication to proceed. The authorized person does not need to knowthat communication is taking place. The authorized person identifies oneor more trusted persons to the device. When communication is initiatedfrom a person the device verifies that the communication is from atrusted person before allowed the communication to proceed with theprotected person.

Optionally, the authorized person can provide times when communicationis either allowed or prevented. Any time-related schedule forcommunication is permitted by the device. For instance, the authorizedperson may block communication during evening hours so that theprotected person can sleep. Similarly, the authorized person madeblocked communication on a particular day of the week. For instance,communication may be blocked for all people on the Sabbath. Such timeperiods for communication may be specific to an individual trustedperson. Any such limited blocking of communication by individuals or bygroups is permitted and possible with the use of the devices and methodsdescribed herein.

The duration of communication can also be controlled by the authorizedperson. For instance, certain persons may be blocked from communicatingfor more than fifteen minutes with a protected person. Also, the totalamount of communication that the protected person is allowed to engagein may be limited. For instance, the authorized person may determinethat more than four hours of communication can be detrimental to theprotected person's health. Therefore, the total amount of communicationtime may be permitted limited to just four hours per day.

The devices and methods described herein are capable of allowing formore than one authorized person. The device and methods can beconfigured for many different hierarchies of determining authorizationwhen more than one authorized person is involved. For instance, it maybe agreed that unanimity of authorized persons is required forcommunication to proceed. Alternatively, it may be determined that anyauthorized person is able to make the decision to allow participation ofa trusted person. Also, it may be agreed that a democratic system isbest for determining who is a trusted person. In this system, theauthorized persons will be surveyed for their opinion on the status of aperson. In some democratic systems, a particular authorized person maybea tiebreaker to determine the outcome when there is not a majority rule.Also, there may be a requirement for more than fifty percent of theauthorized persons to agree in order to designate a person a trustedperson. The device and methods described herein can be configured foralmost any agreed-upon system for determining trusted people when thereis a group of authorized persons.

It can be readily understood from FIG. 9 the steps conducted when anadministrator wished to configure the device for use with a protectedperson.

It can be readily understood from FIG. 10 the steps conducted when anadministrator desires to create a group of trusted persons.

Trusted Person

A trusted person is any person who authorized person, or group ofauthorized persons, has determined is acceptable to communicate with theprotected person. The trusted status of an individual is revocable atthe discretion of the authorized person, or group of authorized persons.The trusted status may also be limited by duration, time of day, day ofthe week, date, or any other factor that is determined to be necessaryby the authorized person, or group of authorized persons. Authorizationmay even be limited to the location of the trusted person. By using theGPS information, IP address or any other location determining data, thedevice can temporarily withdraw the trusted status based on location.For instance, a grand-daughter may be permitted to communicate with aprotected person but not when she is in the home of a not trustedperson.

The character of the voice of the communicator can be a factor fortemporarily withdrawing trusted status. The authorized person mayempower the device to detect harsh tones in a conversation and permitthe device to end the communication if harsh tones are detected.Likewise, the device can be configured to detect slurred speech. Thedevice may be enabled to end communication with trusted person whenslurred speech is detected. Likewise, offensive or triggering words canbe detected by the device and used as a criterion for endingcommunication. For instance the device can be enabled to blockcommunication when the name of a deceased loved one is mentioned.

The devices and methods described herein can determine the identity of acommunicator by a variety of methods to determine if they are a trustedperson. Such identifying mechanisms include the ID of the device beingused to communicate, the location from which the communication isoriginating, the voice signature of the person who is communicating anda password given by the person attempting to communicate. A combinationof these mechanisms and other conceivable factors can be used indetermining the identity of a communicator and verifying that thatperson is a trusted person.

Pin

It is recognized that there may be reasons when trusted status shouldand can be conferred to another person. In these situations, onemechanism for transferring trusted status is the use of a PIN, orpersonal identification number, or another code or identifier used forsecurity, or as a unique identification, that may be assigned using asecurity system, or an administrator, or might be a biological measuresuch as a fingerprint, retina scan, voice, word, or another means, forexample. For instance it may be necessary or convenient to allow anurse, for example, to communicate with the protected person however theidentity of the nurse on duty at the time may be not known; therefore,the methods and devices described herein can be configured to recognizea PIN as conveying trusted status to an unknown person by recognizingthat person as a trusted person.

Pervasive Presence

The methods and devices described herein can be configured so that thedevice is always active and alert in the presence of the protectedperson. The device can be configured to recognize the presence of theprotected person in the vicinity of the device. Likewise, the device canbe configured to recognize the lack of the protected person in thevicinity of the device.

The pervasive presence monitors the protected person, other people,sensors, environment, system applications, responses, communications,schedule, and more to determine when to trigger additional functionalityand features, and to maintain an ongoing assessment of the condition ofthe protected person, circumstances, and more, conduct analysis,determine the state of the protected person, the system and potentialactions to be taken, and engage the action or actions, to conductoversight, reporting, and exception functions. There are a variety ofsensors and monitors connected to the dedicated device as elements ofthe pervasive presence including one or more cameras, for one or morepurposes integral to the pervasive presence such as facial recognition,measuring distances, integral to directing rehabilitation, monitoringpeople, objects, activities including rehabilitation and activities ofdaily living, gathering data, to measure stride and or gait, locatepersons and or objects in the environment, monitor rehabilitationactivities, sensors attached to the body to monitor vital signs andcompute heart rate variability, one or more microphones to detect voice,sounds, locations of sound-emitting elements, to gather data transmittedby the system elements, connections to the network, to detectinterference, efficiency, and impact of electronic connections onperformance of the pervasive presence and system, etc. The pervasivepresence bridges the gap between sensors in the environment, state ofthe protected person, state of the system, and prescribed interventions,as well as, and importantly, social interventions to maintain ahigh-quality life experience for the protected person in a simple,immediate, and automatic manner. The pervasive presence in thisinvention is also useful to provide data and information for analysis,objective data, subjective data, vital signs measures, medical records,journals, logs of calls, statistics including extent of social network,frequency, duration of calls, number of contacts, nature ofcommunications, etc. to infer the state of the protected person, trustedpersons, and to assist in formulating action plans and or interventionsto be engaged through notifications, connections, prescriptions,additional social activities, etc.

EXAMPLES

The present invention is further defined in the following Examples. Itshould be understood that these Examples while indicating preferredembodiments of the invention, are given by way of illustration only.From the above discussion and these Examples, one skilled in the art canascertain the essential characteristics of this invention, and withoutdeparting from the spirit and scope thereof, can make various changesand modifications of the invention to adapt it to various uses andconditions.

Example 1

In a recent situation using the invention, the protected person who is alady who speaks only Polish fell ill while visiting her family in anEnglish speaking country, on the east coast of the United States,requiring her to reside in a rehabilitation facility where she was notable to communicate with anyone else in the community including herprofessional caregivers. This was a very distressing situation for her,for her family, and also for her professional caregivers. Her son, hertrusted person, was thousands of miles away in California. By virtue ofthis invention, he was able to administer a very secure set of servicesand activities, and the invention was configured as a companion toreduce the burden of technology complexity. He was able to use thesystem's secure video visits to communicate with his mother on a regularbasis, keeping her company and interacting with the professionalcaregivers. In this manner, he was able to use the system to provide hismother with the companionship of her family. In addition, he was able tovirtually visit with the professional caregivers, learning about theirplan and his mother's progress in rehabilitation. He was able totranslate information for his mother, so she could communicate and learnfrom the professional caregivers. Since the invention provides aconnection that is a pervasive presence and automatic, which is animportant aspect of the invention, the son was able to visit with hismother frequently. From his mother's point of view, and because withinthe security of the system her son was a trusted person, he justappeared on the screen. The protected person, the mother, didn't need topush any button in order to see her son and talk with him. This reducedcognitive burden and complexity for him and for her. The device became acompanion for her, and she was no longer alone. The steps involved witha high technology experience were greatly simplified, managed by theinvention, addressing her specific needs and abilities, and the anxietyof interacting with a sophisticated high technology communicationssystem was eliminated for the lady.

Example 2

In another implementation of the invention, a senior citizen withdementia residing in an assisted living home was simply not able to usea jitterbug or flip phone. The interface did not meet his needs, andposed a significant cognitive burden preventing him from reaching out tothose he loved. He was unable to plan and then to initiate the multiplesteps required to engage with the phone, such as to search through atext-based contact list, locate a telephone number stored in the phone,and then initiate a telephone call. However, with the present invention,he became a protected person on a secure system with a customizedinterface meeting his special needs, which included reducing cognitiveburden, providing a specialized interface, and enabling picture touchvideo calling. The gentleman is now able to communicate with herdaughter, a trusted person, through secure video visits that he caninitiate himself on the special dedicated screen by touching an image ofher daughter's face. Once he touches the screen, the system launches avideo call, and his daughter just appears on the screen in one stepwithout any perceived effort on the part of the protected person. Thecomplexity of the task has been significantly reduced to meet the needsof the individual, given the skills he has, and the device becomes acompanion to the protected person. The present invention settings havebeen configured to provide easy access for the protected person to imagevideo calling. Language and reading are complex processes for thisprotected person, and therefore, the invention enables pictures to beused for accessing and initiating a communication or other process,feature, or function. The video visits provided much-needed support andinformation to him and to his family whereas he would have been isolatedand unable to interact at all with others. In particular, he would havebeen helpless. He would have been unable to act autonomously, he wouldhave been completely unable to initiate contact, unable to reach out onher own to contact her loved ones. The system was extremely simple forhim and his family to use which reduced stress and complexity in the useof technology.

Example 3

In another use of the invention, a lady in Florida who was experiencingmobility issues—difficulty walking, and reduced vision, had difficultyleaving the house. At that point, it became too much for her to continuewith her usual activities. In addition, she was also struggling withtechnology solutions that might have benefited others, to the pointwhere she was even unable to use the telephone. Complicating thesituation, her family was located at a great distance, and they residedin a number of other countries and so she was socially isolated. Thenshe became a protected person, and this invention, with the securepervasive companion system, enabled her to reach out to her family in asimple manner, meeting her special needs for initiating the connection.The interface was configured to match her specific skills and needs. Thesecure system enabled her trusted persons, her family, to reach her fromall the various locations where they reside. Now her administrativeperson, a family member, has enabled her trusted persons, members of herfamily, to connect easily with her from anywhere in the world. She getsupdates regularly from the family, including pictures and informationabout the new babies, even from as far away as Israel. She is no longerso far away. She is happily connected with those she loves.

Example 4

In another ideal use of the invention, a lady who resides in an assistedliving facility was having difficulty remembering that there wereinteresting activities going on right in her facility. She had problemswith her memory, and she was not getting out nor interacting very muchwith others. She became isolated. With the invention however, shereceives reminders and alerts informing her of the activities happeningin the assisted living facility, many of which are activities in whichshe shows interest. With the invention, she receives notifications aboutthese interesting activities, right on her device, automatically, andwithout her having to search or inquire. She is promoted automatically,reminding her when to prepare and go to the activities. As a result, shehas shown an increased level of participation which occurred only withthe use of this invention. In addition to increased participation, sheis keeping her connection with her community, which is essential tomaintaining quality of life, reducing risk for depression and anxiety,and which encourages her to participate in exercise, keeping her engagedwith others. Importantly, she doesn't have to rely on her own memory, orabilities with technology, or record-keeping, or reviewing calendars onher own, in order to find the activities, prepare, and attend. She hasmany occasions to look forward to, engaging her socially, keeping herfit, and she is able to prepare and attend the activities withoutstressful interactions with complex technologies.

Example 5

In another use of the invention, a trusted person, who is a daughter ofa protected person is able to send alerts to her mother and to advantagethe automatic reminders of the system. She is able to personalize themessages to her mother; in this way, she is able to put a human touch onthe reminders in the system as any loved one would like, and this drawsthe two closer together even though they are far apart. The daughter isable to remind her mother to be careful when leaving the house and toprovide a number of personalized and helpful reminders; she is able tolet her mother know when it is raining, and that she should prepare bytaking her umbrella and raincoat, which is very helpful to her motherand provides a means for the closeness of family. The daughter alsopersonalizes the routine reminders and alerts including medicationsnotifications and activities such as exercise. In this way, thecustomization of the system becomes a very personalized companion,bringing the loved ones close together in everyday activities which isimportant for quality of life, companionship, and a sense of socialconnection. The system enables a customized dialog with guidance by thetrusted person and acknowledgments, regular wellness checks through thedialog and through all the activities of daily living, an importantmeasure of wellness.

Example 6

Another implementation of this system addresses the needs of seniors whohave health challenges that may lead to disorientation and anxiety. Aprotected person, who is a senior with health issues, was becomingdisoriented and anxious. Through the device, an interface was configuredand the administrative person, a daughter, was able to provide apervasive presence, to display dates and times of important events, withimages and familiar pictures. In this manner, the protected person wasable to remain more oriented to date, time, events, and important peoplein his life, thereby reducing anxiety and improving orientation. Thiswas achieved by bringing the protected person a sense of familiaritythrough the pictures and the trusted person's regular video visits. Whena person is in a healthcare or rehabilitation facility, the environmentmight be somewhat disconnected from cues of the environment includingday, time, location, seasons, and more. People can become sodisconnected that it impacts their sense of well-being. They can becomeisolated not only from people but from places and their regularperception of the world. They can be far from the views and perspectivesthey hold dear. Reminders of routine real-world status such as time,date, and weather were presented visually to improve orientation forthis and other protected persons to improve the sense of well-being andconnection to the world they enjoy.

Example 7

Knowledge is power, and this invention connects people with people,places, and things in a simple and instant way with pervasive presence.Not everyone experiences their illness or infirmity at the same time.However, there are many common experiences people share and a bit ofknowledge can reduce anxiety and improve the protected person's abilityto act on their own behalf. With the use of the pictures and videos, thepervasive presence of the protected system organizes content throughtrusted providers to improve health literacy, personal care for theprotected person and their trusted persons, adapted to the needs of theindividual and conditions of importance. In addition to connecting withtrusted providers, gateways, libraries, and existing resources, theinvention provides unique original content to educate protected personsand seniors with chronic conditions and to schedule updates oninformation about their personal health and prevention, updates to learnbest practices and care for their conditions and prevention, questionsto detect issues and what to look for and notifications, nutrition andhow to eat healthy, and fitness, rehabilitation, and the exercises thatthey should do, and more. These models of disease management can beupdated and expanded and are customizable.

Example 8

The important features of this invention provide a means to engageprotected persons in easy connections to reduce isolation and lonelinessknown to lead to depression, anxiety, and poor outcomes. In addition,the ideal implementation of the system coordinates healthful activitieswith social connections. Therefore, it is an important aspect of theinvention to provide for socialization and exercise, linked through thepervasive companion device with an easy to use customized interface. Theinvention incorporates live streaming of exercise classes and relatededucation for the protected person to watch on the device at home or intheir rooms at residencies. Since the streaming exercise classes areattended by live instructors and other participants, there is an easyconnection to social engagement with others. All of this is provided ina secure connection, and without risk of revealing personal informationwith unknown service providers or others.

Example 9

In one use of the invention, the device is configured to display photosof the trusted person with whom the protected person is speaking. Thedevice is configured to recognize the trusted person by comparing thetelephone number of the connected device to a database of information ofthe trusted persons. Similarly, other information of the connecteddevice can also be used to identify the trusted person. In this example,the photos displayed start in order with the earliest photographs fromas closest to the time of the start of the relationship between thetrusted person and the protected person. Photographs are displayed insequence in an order depending on usefulness to the protected person,or, for example, from the earliest to the most recent, for example, orin another order, etc. This age progression is effective in groundingthe memory of the trusted person to the present appearance of thetrusted person. Often some protected persons have trouble recognizing acurrent photograph of a loved one but can readily identify the sameloved one in an older photograph. The device displaying an ageprogression of photographs is a tool to assist protected person who hasdifficulty recognizing the current appearance of their loved ones.

Example 10

Typically, a bar code scanner would be used to scan the patient'sidentification band, and then scan the medicine drawer to open thedrawer, then the medicine label would be scanned to verify the medicineand the patient are matched. However, as we can see in the presentinvention, use of the camera, which is an integral part of the system,can extend the usefulness of the camera beyond merely observing a scene.For example, by integrating an image recognition system, the patient,the medication or any other object in the scene can be identifiedautomatically. One can see how the present invention uses anarchitecture of electronic connectivity, and its flexibility, to enablefeatures important to the usefulness of the invention, and to extendusefulness to new techniques and technologies through hardware,standards, software, and oversight by the invention's server. Electronicconnectivity on all scales and levels facilitates the smoothinteractions that represent the pervasive presence; in fact, thatelectronic connectivity is integral to the social connections, and iskey to the decision making brought to the situation of the protectedperson, by the present invention in order to determine the state of theprotected person, the state from among many potential states of thesystem, to create and process the recommendations, and to deliver andengage the actions to be taken. There are many known methods oftransferring data that are integrated into the invention, and updates toinclude newly emerging methods are enabled easily by virtue of theinvention, as may be seen in the Figures.

Example 11

The ideal embodiment of this invention involves determining the stateand mood of the protected person and providing appropriate andsupplemental social engagements to improve emotional experiences. Thesystem characterizes emotional states and responds to them in a varietyof ways. Thus, the pervasive presence is actively providing stimulationto ensure the protected person is not at risk for depression, anxiety,and other sentiments that might impair quality of life. The displaymight optimally illustrate a happy face, or a smile, or a pet, orphotograph of a pleasant reminiscence, or a sound that evokes happiness,etc, see FIG. 11. The display might reflect the sum and analysis ofobjective and subjective measures, for example, heart rate variability,or image analysis of protected person's semblance, and depending on theassessment, then the pervasive presence initiates an appropriateactivity, for example, scheduling social outings, virtual visits,reports to the administrator, and or others, to provide uplifting socialexperiences. In some cases, displaying pictures and inspirationalmessages might be useful to elicit a positive response from theprotected person; in others, different mechanisms may need to be used.Based on the captured measurements, the most effective intervention forthe particular individual will be employed, on an adaptive interface.Through these and other methods, the pervasive presence evolves into acompanion for the protected person, and at times takes on an embodiedidentity through the displays, sounds, media, and other mechanisms.

Example 12

This example shows a general design principle for user interface ondedicated device application. The below description refers FIG. 2 andFIG. 3. FIG. 2 presents an elegant view of the general design principle,whereas FIG. 3 presents a technical presentation.

The Design Principle of the User Interface for the Dedicated DeviceApplication 120 running on the First Device 102 is to overlay screenswith different functionality. These screens appear automatically and areusually associated with the message sent, for instance, a photo or videoor video visit, to mention a few, or the screen is retrieved throughtouching the screen in a specific location. There is no use of pinch,zoom, scroll or swipe, or use of menus to navigate or use of keyboard.

The default screen is the Main Screen 160 with the calendar, weather andtime. The Picture Slide Show 161 is presented on top of it, and itappears when there is no interaction with the device. When a video comesa new overlay appears on top like Playing Static Video 162, or a VideoVisit 163 and subsequently, any new feature would appear as a newoverlay 163 that is presented automatically or by the touch of a visiblebutton or a voice-activated command.

We claim:
 1. A method of communication between persons comprising acommunication between at least two entities; wherein there is a firstperson, there is at least one second person and there is at least onethird person; wherein the communication is between the first person andat least one third person; Wherein the first person has a uniqueidentity; And wherein the first person's unique identity can be verifiedby at least one known identifiable characteristic Wherein all secondpersons each have a unique identity; and wherein all second persons'identities are different from the first person's identity; Wherein allthird persons each have a unique identity and wherein all third persons'identities are different from the first person's identity; Wherein atleast one second person knows the identity of a third person and hasgranted approval for that third person to participate in communicatingwith the first person prior to the initiation of communication with thefirst person; Wherein communication is conducted by the first person tothe third person through a first device that is coupled to a seconddevice by electronic means Wherein the first device is electronicallycoupled to at least one sensor capable of identifying the uniqueidentity of the first person by recognizing at least one physicalcharacteristic of the first person by electronic means and Wherein thefirst device is always active and connected electronically to a serverwhen it is in the presence of the first person.
 2. The method of claim1, wherein the first device comprises a microphone capable oftransducing sound; Wherein the first device comprises a speaker capableof transmitting sound; and, Wherein the communication between the firstperson and the third person is vocal.
 3. The method of claim 1, whereinthe first device comprises a camera capable of transducing images;Wherein the first device comprises a display capable of displayingtransmitted images; and, wherein the communication between the firstperson and the third person is video.
 4. The method of claim 1, whereinthe first device comprises a touch-sensitive display capable ofdisplaying images and transducing touch; and wherein the communicationbetween the first person and the third person through the first persontouching the touch-sensitive display.
 5. The method of claim 1, whereinthe first person is a child.
 6. The method of claim 1, wherein the firstperson is a person over the age of
 65. 7. The method of claim 1, whereinthe first person is a person who has been legally determined to beincompetent.
 8. The method of claim 1, wherein the first person is aperson who has been medically determined to have diminished mentalfunctions.
 9. The method of claim 1, wherein the device is configured torecognize a PIN as a code transmitted by the second person asconfirmation that the second person has granted approval for the thirdperson to communicate with the first person.
 10. The method of claim 9,wherein the second person has entered a PIN into the second device to betransmitted the first device.
 11. The method of claim 1, wherein thesensor capable of identifying the unique identity of the first person byrecognizing at least one physical characteristic of the first person byelectronic means is a digital camera.
 12. The method of claim 11,wherein the camera is capturing infrared light.
 13. The method of claim1, wherein the sensor capable of identifying the unique identity of thefirst person by recognizing at least one physical characteristic of thefirst person by electronic means is a microphone.