Providing evacuation information during an adverse condition

ABSTRACT

A method begins with identifying a geographic area associated with an adverse condition and identifying a plurality of user devices of a social network potentially associated with the identified geographic area. The method continues with issuing a safety notification to the plurality of user devices. The method continues with receiving a first safety status response from a first user device and a second safety status response from a second user device, where the responses include location information of a first and second safe location. The method continues with issuing evacuation information to at least some of the plurality of user devices based on the location information of the first and second safe locations.

CROSS REFERENCE TO RELATED PATENTS

The present U.S. Utility patent application claims priority pursuant to35 U.S.C. § 120 as a continuation of U.S. Utility application Ser. No.15/831,270, entitled “PROVIDING STATUS OF USER DEVICES DURING AN ADVERSECONDITION,” filed Dec. 4, 2017, issuing as U.S. Pat. No. 10,154,373 onDec. 11, 2018, which is a continuation of U.S. Utility application Ser.No. 15/406,387, entitled “PROVIDING STATUS OF USER DEVICES DURING ANADVERSE CONDITION,” filed Jan. 13, 2017, pending, which is acontinuation of U.S. Utility application Ser. No. 15/145,764, entitled“PROVIDING STATUS OF USER DEVICES DURING AN ADVERSE EVENT,” filed May 3,2016, issued as U.S. Pat. No. 9,549,305 on Jan. 17, 2017, which is acontinuation of U.S. Utility application Ser. No. 13/566,824, entitled“ACQUIRING SAFETY STATUS INFORMATION,” filed Aug. 3, 2012, issued asU.S. Pat. No. 9,363,097 on Jun. 7, 2016, which claims priority pursuantto 35 U.S.C. § 119(e) to U.S. Provisional Application No. 61/521,506,entitled “EMERGENCY PREPAREDNESS STATUS PROCESSING”, filed Aug. 9, 2011,expired, all of which are hereby incorporated herein by reference intheir entirety and made part of the present U.S. Utility patentapplication for all purposes.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

Not Applicable

INCORPORATION-BY-REFERENCE OF MATERIAL SUBMITTED ON A COMPACT DISC

Not Applicable

BACKGROUND OF THE INVENTION Technical Field of the Invention

This invention relates generally to computing systems and moreparticularly to emergency preparedness information processing withinsuch computing systems.

Description of Related Art

Emergencies are known to be associated with direct costs (e.g.,rebuilding), indirect costs (e.g., higher insurance premiums,) andserious loss of life. Such emergencies include man-made emergencies andnatural disasters. Examples of man-made emergencies are known to includetraffic accidents, structure fires, chemical spills, railroad accidents,aircraft accidents, shipping accidents, criminal activities, andterrorism. Examples of natural disasters are known to includehurricanes, typhoons, earthquakes, forest fires, mudslides, floods,droughts, dust storms, hail storms, extreme heat, extreme cold, and snowstorms.

Emergency management is known to address reducing the impact ofemergencies by avoiding risks associated with emergencies and byutilizing more effective practices and tools to respond to emergencies.Emergency management is known to partition such management into phasesincluding a mitigation phase (e.g., to reduce risks, to reduce theeffects of disasters), a preparedness phase (e.g., planning, resourcing,drilling), a response phase (e.g., primary resource activation,secondary resource activation), and a recovery phase (e.g., rebuilding).

Emergency impact may be abated by improving the effectiveness of thepreparedness phase. For example, preparing a resource checklist that isrelevant to a group of individuals and a particular emergency scenariomay improve the effectiveness of a subsequent response phase. In anotherexample, providing a training tutorial that is relevant to the group ofindividuals and the particular emergency scenario may also improve theeffectiveness of the subsequent response phase. In another example,providing a training drill that is relevant to the group of individualsand the particular emergency scenario that utilizes resources from theresource checklist and process steps from the training tutorial may alsoimprove the effectiveness of the subsequent response phase.

Emergency impact may be abated by improving the effectiveness of theresponse phase. For example, effective communications betweenindividuals and groups of individuals affected by (e.g., victims,including individuals, families, co-workers, etc.) or responding to anemergency (e.g., first responders, second responders, aid workers,volunteers, individuals) may improve the effectiveness of the responsephase. In an instance, a first family member communicates with a secondfamily member via a cellular telephone with instructions including whereto go for help. In another instance, a second responder communicateswith a volunteer indicating needed resources at the scene of anemergency.

Computing systems are known to process data into information, storeinformation and communicate information. Such information may includeemergency preparedness information and response phase communicationsinformation. Individuals utilize computing systems to gain access tosuch emergency preparedness information. Despite such access,individuals may not always obtain desired or optimal emergencypreparedness information due to complexities associated with a relevantemergency scenario, resource gaps, chain of command, lack of training,and tension associated with emergency. Individuals utilize publiccomputing systems (e.g., the internet, wireless devices, wirelessnetworks) to communicate response phase communications informationduring an emergency. Despite such utilization, public computing systems(e.g., a commercial wireless carrier network) typically can't sustain ademanded traffic volume of such response phase communicationsinformation when the demanded traffic volume is multiples of a typicalnon-emergency time period. In an instance, a cellular network mayprovide tens of voice call communications paths per cellular tower whenhundreds of voice call resources are in demand. One solution is toutilize text messaging rather than voice telephony to carry outcommunication of the response phase communications information. Forexample, hundreds of individuals can communicate via text messagingutilizing a similar cellular network channel resource that can onlysupport a single voice call. Despite such texting capability, effectiveutilization of texting services is impacted by one more of identifyingother users to communicate with, entering identifiers associated withthe other users, and rapidly exchanging the response phasecommunications information.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING(S)

FIG. 1 is a schematic block diagram of an embodiment of a computingsystem in accordance with the present invention;

FIG. 2 is a schematic block diagram of an embodiment of a user device inaccordance with the present invention;

FIG. 3 is a flowchart illustrating an example of acquiring safety statusinformation associated with a set of user devices in accordance with thepresent invention;

FIG. 4 is a flowchart illustrating an example of providing safety statusinformation in accordance with the present invention;

FIG. 5 is a flowchart illustrating an example of obtaining alertinformation in accordance with the present invention;

FIG. 6 is a flowchart illustrating an example of generating individualalert information in accordance with the present invention; and

FIG. 7 is a flowchart illustrating an example of generating updatedchecklist information in accordance with the present invention.

DETAILED DESCRIPTION OF THE INVENTION

FIG. 1 is a schematic block diagram of an embodiment of a computingsystem 10 that includes a plurality of user devices 12, a wirelesslocation network 14, a wireless communication network 16, an applicationserver 18, a network 20, an information server 22, and a remoteapplication server 24. The wireless location network 14 includes one ormore of a public wireless location system (e.g., global positioningsatellite (GPS), a cellular network) and one or more private wirelesslocation systems (e.g., wireless beacon, a wireless local area network(WLAN)). The wireless location network 14 sends wireless locationsignals 26 to the plurality of user devices 12 to enable determinationof location information.

The wireless communications network 16 includes one or more of a publicwireless communications system and a private wireless communicationssystem and may operate in accordance with one or more wireless industrystandards including universal mobile telecommunications system (UMTS),global system for mobile communications (GSM), long term evolution(LTE), wideband code division multiplexing (WCDMA), IEEE 802.11, IEEE802.16. The wireless communication network 16 sends wirelesscommunications signals 28 to the plurality of user devices 12 andreceives wireless communications signals 28 from the plurality of userdevices 12 to communicate information and application messages 30.Alternatively, or in addition to, the plurality of user devices 12 maysend and receive the wireless communications signals 28 directly betweentwo or more user devices 12 of the plurality of user devices 12.

The application server 18 includes a processing module and memory tosupport execution of one or more applications (e.g., an emergencypreparedness application). The processing module may be a singleprocessing device or a plurality of processing devices. Such aprocessing device may be implemented with one or more of amicroprocessor, micro-controller, digital signal processor,microcomputer, central processing unit, field programmable gate array,programmable logic device, state machine, logic circuitry, analogcircuitry, digital circuitry, and/or any device that manipulates signals(analog and/or digital) based on hard coding of the circuitry and/oroperational instructions. The processing module may have an associatedmemory and/or memory element, which may be a single memory device, aplurality of memory devices, and/or embedded circuitry of the processingmodule. The memory device may be a read-only memory, random accessmemory, volatile memory, non-volatile memory, static memory, dynamicmemory, flash memory, cache memory, and/or any device that storesdigital information. The processing devices may be centrally located(e.g., directly coupled together via a wired and/or wireless busstructure) when the processing module includes more than one processingdevice, or may be distributedly located (e.g., cloud computing viaindirect coupling via a local area network and/or a wide area network).The memory and/or memory element storing the corresponding operationalinstructions may be embedded within, or external to, the circuitrycomprising the state machine, analog circuitry, digital circuitry,and/or logic circuitry when the processing module implements one or moreof its functions via a state machine, analog circuitry, digitalcircuitry, and/or logic circuitry. The memory element stores hardcodedand/or operational instructions and the processing module executes thehardcoded and/or operational instructions corresponding to at least someof the steps and/or functions illustrated in FIGS. 1-7.

The network 20 may include one or more of wireless and/or wirelinecommunications systems, one or more private communications systems, anda public internet system. The application server 18 communicatesinformation and application messages 30 via the wireless communicationnetwork 16 to the plurality of user devices 12 and via the network 20 tothe information server 22 and the remote application server 24. Theinformation server 22 includes a processing module and memory to supportstorage and retrieval of information (e.g., emergency preparednessinformation) via information messages 32. For example, the informationserver 22 streams emergency preparedness information via the network 20and the wireless communication network 16 to one or more of the userdevices 12. As another example, information server 22 sends emergencypreparedness information to user device 12 in response to receiving arequest for emergency preparedness information from the user device 12.The remote application server 24 includes a processing module and memoryto support execution of one or more applications (e.g., the emergencypreparedness application). For example, the remote application server 24sends an application output response message as an application message34 to the user device 12 in response to receiving an application requestas the application message 34 from the user device 12.

The plurality of user devices 12 may be a portable computing device(e.g., a smart phone, a tablet computer, a laptop a handheld computerand/or any other portable device that includes a computing unit) and/ora fixed computing device (e.g., a desktop computer, a cable televisionset-top box, an application server, an internet television userinterface and/or any other fixed device that includes a computing unit).Such a portable or fixed computing device includes one or more of acomputing unit (e.g., providing processing module functionality), one ormore wireless modems, sensors, and one or more user interfaces. Anembodiment of the user device 12 will be described in greater detailwith reference to FIG. 2.

In general and with respect to emergency preparedness, the system 10supports three primary functions: emergency preparedness planning,emergency preparedness drilling, and response phase emergencycommunications. In accordance with these three primary functions,emergency preparedness plans can be created that are relevant inrelationship to likely emergency scenarios and those affected, theemergency preparedness plans can be exercised by way of drilling andtraining to enable more efficient operations during an emergencyresponse phase, and communications can be provided during an emergencyresponse that is efficient in terms of mitigation resource utilizationand relevant in terms of scope and nature of an associated emergencyscenario.

The first primary function includes the user device determiningemergency preparedness planning information. In an example of operation,the user device 12 determines location information based on receivingthe wireless location signals 26. Next, the user device 12 sends achecklist request message that includes the location information to theapplication server 18 as wireless communications signals 28 via thewireless communications network 16. The application server 18 determinesrecommended checklists based on the location information to producerecommended checklists (e.g., a hurricane checklist, a tornadochecklist, etc.). For instance, the application server 18 determines therecommended checklists to include the hurricane checklist and thetornado checklist when the location information indicates that the userdevice is located in central Florida. As another instance, theapplication server 18 determines the recommended checklists to includean earthquake checklist and a wildfire checklist when the locationinformation indicates that the user device is located in SouthernCalifornia. The application server 18 sends the recommended checkliststo the user device 12. The user device 12 displays the recommendedchecklists and receives user input to produce a selected checklist. Theuser device 12 sends the selected checklist to the application server18. The application server 18 determines selected checklist informationbased on the selected checklist. The application server 18 sends theselected checklist information to the user device 12. The user device 12displays the selected checklist information and receives user input. Theuser device 12 modifies checklist item availability status to producemodified checklist item availability status. The user device 12 storesthe modified checklist item availability status and may send themodified checklist item availability status to the application server 18and/or the information server 22. In addition, the user device 12 mayproduce a checklist item reminder (e.g., a visual and audible alert) inaccordance with a checklist alert schedule when the modified checklistitem availability status compares unfavorably to a checklist itemavailability template. The method of operation to determine emergencypreparedness planning information is discussed in greater detail withreference to FIGS. 3-7.

The second primary function includes the user device 12 participating inemergency preparedness drilling. In an example of operation, the userdevice 12 obtains location information and other context information(e.g., including a drill schedule) to produce a context bundle. The userdevice 12 sends a drill request message to the remote application server24 that includes the context bundle. The remote application server 24determines drill parameters (e.g., a drill scenario) and a drillidentifier (ID) based on the drill request message. For instance, theremote application server 24 determines the drill scenario to be ahurricane drill based on the location information indicating that theuser device 12 is near the Atlantic Ocean. As another instance, theremote application server 24 determines the drill scenario to be anearthquake drill based on the location information indicating that theuser device 12 is near an earthquake fault line. The remote applicationserver 24 sends the drill parameters and the drill ID to the user device12. The remote application server 24 initializes a drill applicationassociated with the drill ID and in accordance with the drillparameters. The remote application server 24 sends a drill updatemessage to the user device 12 that includes drill application outputassociated with the drill application. The user device 12 receives thedrill update message and sends the drill application output to a displayassociated with the user device. The user device 12 receives user inputto produce drill input information. The user device 12 sends a drillinput message to the remote application server 24 that includes thedrill input information. The remote application server 24 receives thedrill input message and provides the drill application with the drillinput information to produce updated drill application output. Theremote application server 24 sends a second drill update message to theuser device 12 that includes the updated drill application output. Theprocess repeats until the application reaches an end point. The methodof operation to participate in drilling is discussed in greater detailwith reference to FIGS. 3-7.

The third primary function includes the user device 12 communicatingduring an emergency response phase. In an example of operation, the userdevice 12 obtains location information and other context information(e.g., including a group ID affiliation) to produce the context bundle.The user device 12 obtains local status (e.g., ok, getting help, needhelp, etc.) via a user prompt. Next, the user device 12 sends a statusrequest message to the application server 18 that includes the localstatus and the context bundle. The application server 18 receives thestatus request message and determines a status associated with each userdevice 12 affiliated with the group ID. For instance, the applicationserver 18 sends a status request message to the other user devices 12affiliated with the group ID and receives status response messagesindicating status. The application server 18 sends a status responsemessage that includes status information of the other user devices 12affiliated with the group ID to the user device. The user device 12receives the status response message and displays the status informationin accordance with the context bundle. For instance, the user device 12displays names associated with the other user devices 12 and utilizes acolored icon to indicate status of the other user device (e.g., red fornot okay, green for okay). As another instance, the user device 12displays names associated with the other user devices in a rank orderedlist where the ranking is by relative distance away from the user device12 as determined utilizing status information associated with the otheruser devices 12. As another instance, the user device 12 displays thenames associated with the other user devices 12 on a map where in thecenter of the map is a location associated with the user device 12. Themethod of operation to communicate is discussed in greater detail withreference to FIGS. 3-7.

FIG. 2 is a schematic block diagram of an embodiment of a user device 12that includes a user interface output 40, a user interface input 42, asensor 44, a computing unit 46, a wireless communications modem 48, anda wireless location modem 50. The user interface output 40 may be asingle interface output device or a plurality of interface outputdevices. The user interface output 40 may include one or more of adisplay, a touch screen, a speaker, an earpiece, a motor, an indicatorlight, a transducer, and a digital indicator. For instance, the userinterface output 40 includes a color touch screen display capable ofrendering static images and/or full-motion video. The user interfaceinput 42 may be a single interface input device or a plurality ofinterface input devices. The interface input device includes one or moreof a touch screen sensor array, a keyboard, a microphone, a fingerprintreader, a trackball, a mouse sensor, a pushbutton, and a selectorswitch. For instance, the interface input device includes a touch screensensor array associated with the color touch screen display. The sensor44 may be a single sensor device or a plurality of sensor devices. Thesensor device includes capabilities for sensing one or more of amagnetic field (e.g., a compass), motion, temperature, pressure,altitude, humidity, an image, a stream of images (e.g., capture video),biometrics, proximity, capacitance, gases, radiation, pathogens, lightlevels, and bio hazards.

The wireless communications modem 48 may include a single wirelesstransceiver or a plurality of wireless transceivers. The wirelesstransceiver may operate in accordance with one or more wireless industrystandards including universal mobile telecommunications system (UMTS),global system for mobile communications (GSM), long term evolution(LTE), wideband code division multiplexing (WCDMA), IEEE 802.11, IEEE802.16. The wireless location modem 50 may include one or more of asingle wireless location receiver, a single wireless locationtransceiver, a plurality of wireless location receivers, and a pluralityof wireless location transceivers. The wireless location transceiver andwireless location transceiver may operate in accordance with one or morewireless location technologies including GPS, WiFi, angle of arrival,time difference of arrival, signal strength, and beaconing.

The computing unit 46 includes an application processing module 52, amemory 54 one or more interfaces to one or more of the user interfaceoutput 40, user interface input 42, the sensor 44, the wirelesscommunication modem 48, and the wireless location modem 50. The memory54 may include a single memory device or a plurality of memory devices.The memory device may be a read-only memory, random access memory,volatile memory, non-volatile memory, cache memory, and/or any devicethat stores digital information. Memory device examples include staticrandom access memory (SRAM), dynamic random access memory (DRAM), NANDflash memory, magnetic memory (e.g., a hard disk), and optical memory(e.g., an optical disc).

The application processing module 52 may be a single processing deviceor a plurality of processing devices. The processing device may includeone or more of a microprocessor, micro-controller, digital signalprocessor, microcomputer, central processing unit, field programmablegate array, programmable logic device, state machine, logic circuitry,analog circuitry, digital circuitry, and/or any device that manipulatessignals (analog and/or digital) based on hard coding of the circuitryand/or operational instructions. The application processing module 52may have an associated memory and/or memory element, which may be asingle memory device, a plurality of memory devices, and/or embeddedcircuitry of the application processing module.

The memory 54 include one or more of a read-only memory, random accessmemory, volatile memory, non-volatile memory, static memory, dynamicmemory, flash memory, cache memory, and/or any device that storesdigital information. The processing devices may be centrally located(e.g., directly coupled together via a wired and/or wireless busstructure) when the application processing module includes more than oneprocessing device, or the processing devices may be distributedlylocated (e.g., cloud computing via indirect coupling via a local areanetwork and/or a wide area network). The memory and/or memory elementstoring the corresponding operational instructions may be embeddedwithin, or external to, the circuitry comprising the state machine,analog circuitry, digital circuitry, and/or logic circuitry) when theapplication processing module implements one or more of its functionsvia a state machine, analog circuitry, digital circuitry, and/or logiccircuitry. The memory element stores hard coded and/or operationalinstructions and the application processing module executes the hardcoded and/or operational instructions corresponding to at least some ofthe steps and/or functions illustrated in FIGS. 3-7.

FIG. 3 is a flowchart illustrating an example of acquiring safety statusinformation associated with a set of user devices. The method begins atstep 60 where a processing module (e.g., of a requesting entity) obtainsa set of identifiers (IDs) corresponding to a set of user devices. Eachuser device of the set of user devices is associated with acorresponding safety status level. The set of identifiers includes atleast one of at least one mobile phone number corresponding to at leastone user device, at least one user device serial number corresponding tothe at least one user device, at least one user device media accesscontrol (MAC) address corresponding to the at least one user device, atleast one user internet protocol (IP) address corresponding to the atleast one user device, at least one user device international mobileequipment identities (IMEI) corresponding to the at least one userdevice, at least one variable ID corresponding to the at least one userdevice, at least one assignable ID corresponding to the at least oneuser device, at least one social network contact name corresponding tothe least one user device, and at least one user name corresponding tothe at least one user device.

The safety status level includes at least one of a safety status leveltext string generated by a user device (e.g., safe/not safe), a safetystatus text string generated by the one user device (e.g., I'm at themall, send help), location information generated by the one user device(e.g., global positioning satellite (GPS) coordinates, an address, alocation description), a timestamp corresponding to when the socialnetwork server received the safety status response, a timestampcorresponding to when the one user device generated the safety statusresponse, and a timestamp corresponding to when the safety statusresponse was received.

The obtaining the set of IDs corresponding to the set of user devicesincludes at least one of a variety of approaches. In a first approach,the processing module retrieves the set of IDs from a list. In a secondapproach, the processing module outputs a query and receives a response.In a third approach, the processing module accesses a group affiliation.A group affiliation includes a commonality factor amongst a group ofusers of a group of user devices. The commonality factor includes one ormore of a common neighborhood, common family members, common friends,common coworkers, common classmates, common club members, common socialnetworking friends, common interests, common questions, and common webbrowser history.

In a fourth approach of obtaining the set of IDs, the processing moduleobtains the set of IDs from social networking information associatedwith at least one user device of the set of user devices. The socialnetworking information includes one or more of a life social networkingstream, content of one or more social networking postings, socialnetworking registration information, social networking substructureinformation, purchases associated with social networking, purchasersassociated with social networking, a friend identifier, a friend of afriend identifier, and a new friend entry. For example, the processingmodule obtains one or more IDs of the set of IDs from a live socialnetworking stream (e.g., Twitter). As another example, the processingmodule obtains one or more IDs of the set of IDs from a socialnetworking subscriber list (e.g., a Facebook friend list).

In a fifth approach of obtaining the set of IDs, the processing modulereceives the set of IDs (e.g., from another associated user device, froma social network and server). In a sixth approach, the processing moduleobtains a user selection of the set of IDs. The obtaining the userselection of the set of IDs includes a sequence of steps. In a firststep, the processing module indicates a group of usernames correspondingto a group of user devices. In a second step, the processing moduleobtains a set of username selections from the group of usernames. In athird step, for each username, the processing module obtains an IDassociated with the username when the username is associated with amobile phone number and updates the set of IDs to include the ID. Forexample, the processing module receives the user selection from a userinterface input.

As an example of obtaining the set of IDs, the processing moduledisplays a prompt, wherein the prompt includes a portion of a contactlist, and receives a selection of “Sally” via a user device inputcorresponding to a contact of the contact list. As another example, theprocessing module obtains a contact “Bob” when a location indicatorindicates that a user device associated with Bob is within a proximalrange of the requesting entity. As yet another example, the processingmodule obtains a contact “George” when a timestamp indicates 6 PM and aselection schedule lookup indicates that the contact George is to beobtained after 6 PM on a daily basis. As a further example, theprocessing module obtains a contact “Christopher” when a locationindicator associated with the processing module indicates that a userdevice associated with the processing module is within a proximaldistance to a high crime area and a table lookup indicates to addChristopher whenever the user device is within a proximal distance to ahigh crime area.

For each identifier (ID) of the set of IDs, the method continues at step62 where the processing module generates a safety status request thatincludes the ID. The generating the safety status request includesgenerating at least one of an instant message, a short message service(SMS) message, an email message, and a data message. When generating theat least one of the instant message, the SMS message, the email message,and the data message, the processing module generates the at least oneof the instant message, the SMS message, the email message, and the datamessage to include at least one of the ID, a mobile phone numbercorresponding to the ID, the set of IDs, a requesting entity ID, asocial networking posting request (e.g., a most recent posting, a set ofpostings, a posting pertaining to a search term and/or cloud tag), asafety status request code, and a safety status request text string(e.g., “please respond to this message with your current status”). Forexample, the processing module generates a safety status request toinclude ID 312-555-1234 of the set of IDs, requesting entity ID312-555-4321, and a status request code text string of “please respondto this message with your current status.”

The method continues at step 64 where the processing module outputs thesafety status request to a user device of the set of user devices thatcorresponds to the ID. The outputting the safety status request to theuser device includes the processing module facilitating at least one ofa variety of approaches. In a first approach, the processing modulefacilitates transmitting the safety status request on a control channelof a wireless communication network (e.g., as a wireless communicationsignal). In a second approach, the processing module facilitatestransmitting the safety status request on a data channel of the wirelesscommunication network (e.g., as the wireless communication signal). In athird approach, the processing module facilitates transmitting thesafety status request directly to the user device utilizing the wirelesscommunication signals. In a fourth approach, the processing modulefacilitates sending the safety status request to the user device via atleast one of the wireless communication network and a wirelinecommunication network (e.g., internet, telephony network, fiber, cable,twisted-pair, local area network, wide area network. In a fifthapproach, the processing module facilitates sending the safety statusrequest to an application server via at least one of the wirelesscommunication network and the wireline communication network. In a sixapproach, the processing module facilitates sending the safety statusrequest to a social network server.

The method continues at step 66 where the processing module receives asafety status response of a set of safety status responses. The safetystatus response includes a corresponding safety status level of one userdevice of the set of user devices. The receiving the safety statusresponse includes a processing module facilitating at least one of avariety of approaches. In a first approach, the processing modulefacilitates receiving the safety status response on the control channelof the wireless communication network. In a second approach, theprocessing module facilitates receiving the safety status response onthe data channel of the wireless communication network. In a thirdapproach, the processing module facilitates receiving the safety statusresponse from the social network server. In a fourth approach, theprocessing module facilitates receiving the safety status response fromthe one user device via at least one of the wireless communicationnetwork and the wireline communication network. In a fifth approach, theprocessing module facilitates receiving the safety status response fromthe application server via at least one of the wireless communicationnetwork and the wireline communication network.

The method continues at step 68 where the processing module indicatesthe safety status level of the safety status response when an ID of thesafety status response compares favorably to at least one ID of the setof IDs. For example, the processing module determines that a contactselection is associated with a mobile ID when the processing moduleaccesses a contact list entry corresponding to the contact selection of“Sally” and accesses the mobile ID field that includes a mobile phonenumber corresponding to Sally. The indicating the safety status level ofthe safety status response includes at least one of a variety ofapproaches. In the first approach, the processing module identifies thesafety status level of the safety status response when the ID of thesafety status response compares favorably to the at least one ID of theset of IDs. In a second approach, the processing module interprets thesafety status level text string to produce a safety status condition(e.g., safe/not safe). In a third approach, the processing moduleselects an indicator icon based at least one of the safety status leveland the safety status condition (e.g., a red X corresponding to a notsafe safety status condition, a green dot corresponding to a safe safetystatus condition).

In a fourth approach of indicating the safety status level of the safetystatus response, the processing module facilitates displaying of one ormore of the safety status level, the safety status condition, theindicator icon, the safety status level text string, the locationinformation, and the timestamp (e.g., displaying includes visual and/oraudible, along with other social network info). For example, theprocessing module displays a username of “John” that corresponds to theuser device of ID 312-555-1234, a text message of “safe, at home”,location information of an address of 111 W. Main St, Home Town, Calif.,and a timestamp of 2011-07-30 19:36:22 GMT+0. As another example, theprocessing module displays a username of “Michelle” that corresponds toa user device of ID 312-555-1222, a text message of “not safe, in stormpath, need a pick up at school”, location information of an address of326 W. First St, Home Town, Calif., and a timestamp of 2011-07-3019:37:52 GMT+0.

FIG. 4 is a flowchart illustrating an example of providing safety statusinformation. The method begins at step 70 where a processing module(e.g., of a responding user device, of an application server, of asocial network server) receives a safety status request for a safetystatus level associated with a user device. The safety status levelincludes at least one of a safety status level text string generated bythe user device, a safety status text string generated by the userdevice, a safety status text string generated by the social networkserver (e.g., interpreting one or more postings), location informationassociated with the user device, a timestamp corresponding to generationof the safety status response, and a timestamp estimate corresponding towhen the safety status response is expected to be received (e.g.,received by a requesting entity, received by the social network server).

The method continues at step 72 where the processing module determineswhether to generate a safety status response. The determining whether togenerate the safety status response includes a sequence of steps. In afirst step, the processing module identifies allowable requestingentities based on at least one of a social network contact list, socialnetwork sub-contact list (e.g., friends list), a group affiliation, asocial network information stream (e.g., Twitter feed, Facebookmessage), accessing an auto-respond to all requesters indicator,accessing an allowable requesting entity list, accessing a set ofidentifiers (IDs) corresponding to a set of user devices associated withthe user device, and receiving a user input. In a second step togenerate the safety status response, the processing module determines togenerate the safety status response when a requesting entity identifierof the safety status request compares favorably to the identifiedallowable requesting entities (e.g., auto-respond to all requestersindicator indicates to enable auto-respond to all requesters, therequesting entity ID is substantially the same as an ID of one of theidentified allowable requesting entities).

When generating a safety status response, the method continues at step74 where the processing module obtains the safety status levelassociated with the user device. The obtaining the safety status levelassociated with the user device includes at least one of a variety ofapproaches. A first approach includes querying social network server. Asecond approach includes accessing a predetermined safety status level(e.g., pre-stored by a user of the user device). A third approachincludes querying the user device. A fourth approach includes receivingthe safety status level from the user device. A fifth approach includesreceiving a safe/not-safe indicator. A sixth approach includes receivinga safety status text string associated with the safety status level. Aseventh approach includes generating the safety status text string basedon the location schedule (e.g., scheduled to be at school, a scheduleadherence deviation indicator). An eighth approach includes interpretinga schedule adherence deviation indicator (e.g., string indicates Johnnyis not at school when a calendar indicates that Johnny should be atschool and a current location indicates that Johnny is not at school). Aninth approach includes obtaining a user input. A 10th approach includesobtaining accelerometer information associated with the user device(e.g., speed, acceleration, movement versus time, speed exceeds a postedspeed limit). An 11th approach includes obtaining a picture associatedwith the user device (e.g., from current location, always or only whennot safe).

A 12th approach to obtain the safety status level associated with theuser device includes receiving at least one of a radio frequencyidentifier (RFID), a near field communication (NFC) signal, and abarcode scanner value. A 13th approach includes obtaining a timestamp. A14th approach includes obtaining geographic location alert informationwith regards to a comparison of a real-time geographic location to apredetermined geographic location (e.g., geo-fence). A 15th approachincludes generating a safety status level text string to include anot-safe indication when the comparison of the real-time geographiclocation to the predetermined geographic location is unfavorable (e.g.,outside of the geo-fence). A 16th approach includes generating thesafety status level text string to include the not-safe indication whena comparison of the real-time geographic location to a geographiclocation associated with the safety status text string is unfavorable(e.g., schedule is to be at school but real-time location is not atschool).

As an example of obtaining the safety status level, the processingmodule retrieves the predetermined safety status level indicating a textstring of “safe, at home.” As another example, the processing modulereceives a user input text string of “not safe, can't start my car atthe mall.” As yet another example, the processing module retrieves auser device camera sensor picture file when a current location indicatorindicates an unfavorable location (e.g., a variation from adherence to aschedule, outside of a geo-fence, within a known area of concern, withina forecasted storm path). Alternatively, or in addition to, theprocessing module may display the user device safety status level via auser interface output.

The method continues at step 76 where the processing module determineswhether to include location information in the safety status response.The determining whether to include the location information in thesafety status response includes at least one of a variety ofalternatives. A first alternative includes receiving a user input. Asecond alternative includes querying a social network server. A thirdalternative includes receiving a request for location information from amember of a social network group, wherein the user device is affiliatedwith the social network group. A fourth alternative includesinterpreting a schedule adherence deviation indicator (e.g., includelocation information when the deviation indicator indicates adeviation). A fifth alternative includes obtaining a user preferencewith regards to including the location information in the safety statusresponse (e.g., privacy setting). A sixth alternative includesindicating to include location information in the safety status responsewhen the safety status request includes an indicator to always includethe location information in the safety status response. The methodbranches to step 82 when the processing module determines to include thelocation information in the safety status response. The method continuesto step 78 when the processing module determines not to include locationinformation in the safety status response. When not including thelocation information, the method continues at step 78 where theprocessing module generates the safety status response to include thesafety status level. The method branches to step 90.

When including the location information, the method continues at step 82where the processing module obtains location coordinates correspondingto the user device. The location coordinates includes at least one of alongitude value, a latitude value, an elevation value, a speed value, anacceleration value, and a location quality indicator. The obtaininglocation coordinates corresponding to the user device includes at leastone of a variety of approaches. A first approach includes receiving thelocation coordinates from at least one location sensor associated withthe user device (e.g., accelerometer, electronic compass, globalpositioning system (GPS) receiver). A second approach includes receivingthe location coordinates from a wireless location modem associated withthe user device (e.g., time of arrival receiver, cell site, timedifference of arrival, signal strength, angle of arrival, GPS receiver,WiFi site ID, etc.). A third approach includes querying the user deviceto obtain the location coordinates (e.g., from a server). A fourthapproach includes querying an internet protocol (IP) address to locationcoordinates table based on an identified IP address (e.g., IP addressassociated with user device). A fifth approach includes querying asocial network server to obtain the location coordinates. A sixthapproach includes accessing last known location coordinates when alocation quality level associated with the location coordinates comparesunfavorably to a location quality level threshold (e.g., locationcoordinates unobtainable, location coordinates too old, locationcoordinates not accurate enough, indoor location unknown).

The method continues at step 84 where the processing module obtainsstreet address location information based on the location coordinates.The obtaining the street address location information includes at leastone of a variety of alternatives. A first alternative includes accessinga location coordinates to street address location table based on thelocation coordinates to produce the street address location information.A second alternative includes querying a location server based on thelocation coordinates. A third alternative includes querying another userdevice associated with a social network group, wherein the socialnetwork group includes the user device. A fourth alternative includesaccessing an internet protocol (IP) address to street address locationtable utilizing an identified IP address (e.g., an IP address associatedwith user device). A fifth alternative includes accessing a wirelesscommunication network access device identifier (ID) to street addresslocation table utilizing an identified wireless communication networkaccess device ID. A sixth alternative includes receiving the streetaddress location information from the location server. A seventhalternative includes accessing a last known street address location whena location quality level associated with the location coordinatescompares unfavorably to a location quality level threshold.

The method continues at step 86 where the processing module generatesthe location information based on the location coordinates and thestreet address location information. For example, the processing modulegenerates the location information to include the location coordinatesand the street address location information. As another example, theprocessing module generates a web link to a location server thatincludes the location coordinates and includes a web link in thelocation information. The web link may be subsequently utilized by arequesting entity to retrieve a geographic map representing a locationof the user device.

The method continues at step 88 where the processing module generatesthe safety status response to include the safety status level and thelocation information. The generating the safety status response includesgenerating at least one of an instant message, a short message service(SMS) message, an email message, and a data message. When generating theat least one of the instant message, the SMS message, the email message,and the data message, the processing module generates the at least oneof the instant message, the SMS message, the email message, and the datamessage to include at least one of a mobile phone number correspondingto the user device, an identifier associated with the user device, asocial networking posting associated with the user device, a requestingentity ID associated with the requesting entity, the safety statuslevel, a timestamp corresponding to transmission of the safety statusresponse, the location information, and a safety status response code.

A method continues at step 90 where the processing module outputs thesafety status response to the requesting entity. The outputting thesafety status response to the requesting entity includes a processingmodule facilitating at least one of a variety of approaches. A firstapproach includes transmitting the safety status response on a controlchannel of a wireless communication network. A second approach includestransmitting the safety status response on a data channel of thewireless communication network. A third approach includes outputting thesafety status response to a social network server for distribution(e.g., to the requesting entity or others in a social networking group).A fourth approach includes transmitting the safety status response tothe requesting entity via at least one of the wireless communicationnetwork and the wireline communication network. A fifth approachincludes transmitting the safety status response to an applicationserver via at least one of the wireless communication network and thewireline communication network.

FIG. 5 is a flowchart illustrating an example of obtaining alertinformation, which includes similar steps to FIG. 4. The method beginswith step 82 of FIG. 4 where a processing module (e.g., of a userdevice) obtains location coordinates. The location coordinates includesat least one of current location coordinates and last known locationcoordinates when current location coordinates are not available. Themethod continues at step 94 where the processing module obtains ageographic designator based on the location coordinates. The geographicdesignator includes at least one of a landmark identifier (ID), abuilding ID, a street address, a block ID, a neighborhood ID, a city ID,a village ID, a postal delivery code, a county ID, a parish ID, a stateID, a country ID, and a governmental level ID. The obtaining may bebased on one or more of the local table lookup, a query to aninformation server, obtaining a route associated with user device,obtaining current location coordinates associated with at least oneother user device associated with the user device (e.g., members asocial network group), a query to the user device, and a query toanother user device. For example, the processing module obtains a routethat includes a first county ID and a second county ID, wherein thefirst county ID is associated with current location coordinates and thesecond county ID is associated with an expected next locationcoordinates (e.g., along a path of travel of the route)

The method continues at step 96 where the processing module displays thegeographic designator. The display and includes at least one ofdisplaying the geographic designator via a user interface output andsending the geographic designator to the user device. For example,processing module displays the first county ID and the second county ID.The method continues at step 98 where the processing module obtainsalert information based on the geographic designator. The alertinformation includes at least one of weather information, emergencyinformation, drill information, natural disaster information, Homelandsecurity information, building evacuation information, city evacuationinformation, Amber alert information, citizen information, and businesscontinuity information. The obtaining may be based on one or more of aquery to an information server, a query to a social network server, anda query to a user device. For example, the processing module sends analert information request that includes the geographic designator and/orthe location coordinates to the information server and receives thealert information in response.

The method continues at step 100 where the processing module displaysthe alert information. The display and includes at least one of sendingthe alert information to a user interface output, sending the alertinformation to one or more user devices (e.g., a set of user deviceIDs), and sending the alert information to another user device, whereinthe other user device is selected based on the location coordinates(e.g., close proximity). For example, processing module displays alertinformation associated with each of the first county ID, the secondcounty ID, and a third county ID associated with another user device ofa social network group that includes the user device.

The method continues at step 102 where the processing module determineswhether to refresh the alert information. The determination may be basedon one or more of the alert information, the location coordinates, thegeographic designator, a time period threshold, and a time period sincea last obtaining of the alert information. For example, the processingmodule determines to refresh the alert information when 10 minutes haspassed since last obtaining alert information and a fixed time periodthreshold is 9 minutes. As another example, the processing moduledetermines to refresh the alert information when 3 minutes has passedsince last obtaining alert information and a variable time periodthreshold is 2 minutes based on the alert information indicating atornado warning. As yet another example, the processing moduledetermines to refresh the alert information when receiving a change inlocation cornets associated with the other user device. The methodbranches to step 104 when the processing module determines to notrefresh the alert information. The method loops back to step 98 when theprocessing module determines to refresh the alert information.

The method continues at step 104 where the processing module determineswhether to refresh the geographic designator. The determination may bebased on one or more of the alert information, the location coordinates,the geographic designator, the location coordinates history, a variablegeographic designator time period threshold, a time period since lastrefreshing the alert information, receiving updated location coordinatesassociated with the other user device, and a time period since lastrefreshing the geographic designator. For example, the processing moduledetermines a geographic designator time period threshold to be 1 minutewhen the location coordinates history indicates user device movement. Asanother example, the processing module determines a geographicdesignator time period threshold to be 10 minutes when the locationcoordinates history indicates no user device movement. The methodrepeats back to step 82 of FIG. 4 when the processing module determinesto refresh the geographic designator. The method loops back to step 102when the processing module determines not to refresh the geographicdesignator.

FIG. 6 is a flowchart illustrating an example of generating individualalert information, which includes similar steps to FIG. 5. The methodbegins at step 106 where a processing module (e.g., of an informationserver, of a social network server, of an application server) obtainsuser device location information and user device status corresponding toa user device. The user device location information includes at leastone of location coordinates, a geographic designator, directioninformation, speed information, heading information, altitudeinformation, direction history information, a route, and a navigationpath. The obtaining may be based on one or more of a query of the userdevice, a lookup, a predetermination, interpreting previous locationinformation of the user device, and receiving a message. The methodcontinues with step 98 of FIG. 5 where the processing module obtainsalert information based on the location information.

The method continues at step 110 where the processing module modifiesthe alert information based on at least one of the user device statusand the location information to produce individual alert information.For example, the processing module includes alert informationcorresponding to an adjacent geographic designator based on the locationinformation and the heading information. For instance, the processingmodule includes weather alert information corresponding to a next countyon an interstate Highway that is aligned with a direction of travel.

The method continues at step 112 where the processing module facilitatessending the individual alert information to the user device. Thefacilitation includes at least one of transmitting the individual alertinformation to the user device, transmitting the individual alertinformation to another user device associated with substantially thesame user device location information and user device status, storingthe individual alert information, and responding to a subsequent queryfrom a user device.

FIG. 7 is a flowchart illustrating an example of generating updatedchecklist information. The checklist information includes at least oneof a list of a plurality of items associated with emergency preparedness(e.g., a flashlight, matches, a blanket, water, food, etc.) and anavailability indicator utilized to indicate whether a particular item ofthe plurality of items has been obtained. The method begins at step 114where a processing module (e.g., of a user device) obtains the checklistinformation. The obtaining includes at least one of querying a userdevice, a lookup, predetermination, receiving a message, and receivingthe checklist information. The method continues at step 116 where theprocessing module obtains alert information. The obtaining includes atleast one of querying a user device, querying an information server, apredetermination, and receiving a message.

The method continues at step 118 where the processing module modifiesthe checklist information based on the alert information to produceupdated checklist information. The modifying is based on one or more ofa checklist modification to alert information table lookup and when achecklist entry compares unfavorably to a checklist entry associatedwith at least a portion of the alert information. The modifying includesone or more of highlighting one or more entries of the checklist,modifying a quantity associated with at least one entry the checklist,adding a new entry to the checklist, and deleting a previous entry fromthe checklist. For example, the processing module adds a new entry tothe checklist that includes a flashlight when the alert informationincludes a likely power outage warning. As another example, theprocessing module modifies a quantity associated with flashlightbatteries from 6 to 12 when the alert information includes the likelypower outage warning. The method continues at step 120 where theprocessing module displays the updated checklist information. Thedisplaying includes at least one of displaying the updated checklistinformation via a user interface output and sending the updatedchecklist information to one or more other user devices (e.g., of asocial network group that includes the user device) for displaying(e.g., to a set of user IDs).

As may be used herein, the terms “substantially” and “approximately”provides an industry-accepted tolerance for its corresponding termand/or relativity between items. Such an industry-accepted toleranceranges from less than one percent to fifty percent and corresponds to,but is not limited to, component values, integrated circuit processvariations, temperature variations, rise and fall times, and/or thermalnoise. Such relativity between items ranges from a difference of a fewpercent to magnitude differences. As may also be used herein, theterm(s) “operably coupled to”, “coupled to”, and/or “coupling” includesdirect coupling between items and/or indirect coupling between items viaan intervening item (e.g., an item includes, but is not limited to, acomponent, an element, a circuit, and/or a module) where, for indirectcoupling, the intervening item does not modify the information of asignal but may adjust its current level, voltage level, and/or powerlevel. As may further be used herein, inferred coupling (i.e., where oneelement is coupled to another element by inference) includes direct andindirect coupling between two items in the same manner as “coupled to”.As may even further be used herein, the term “operable to” or “operablycoupled to” indicates that an item includes one or more of powerconnections, input(s), output(s), etc., to perform, when activated, oneor more its corresponding functions and may further include inferredcoupling to one or more other items. As may still further be usedherein, the term “associated with”, includes direct and/or indirectcoupling of separate items and/or one item being embedded within anotheritem. As may be used herein, the term “compares favorably”, indicatesthat a comparison between two or more items, signals, etc., provides adesired relationship. For example, when the desired relationship is thatsignal 1 has a greater magnitude than signal 2, a favorable comparisonmay be achieved when the magnitude of signal 1 is greater than that ofsignal 2 or when the magnitude of signal 2 is less than that of signal1.

As may also be used herein, the terms “processing module”, “module”,“processing circuit”, and/or “processing unit” may be a singleprocessing device or a plurality of processing devices. Such aprocessing device may be a microprocessor, micro-controller, digitalsignal processor, microcomputer, central processing unit, fieldprogrammable gate array, programmable logic device, state machine, logiccircuitry, analog circuitry, digital circuitry, and/or any device thatmanipulates signals (analog and/or digital) based on hard coding of thecircuitry and/or operational instructions. The processing module,module, processing circuit, and/or processing unit may have anassociated memory and/or an integrated memory element, which may be asingle memory device, a plurality of memory devices, and/or embeddedcircuitry of the processing module, module, processing circuit, and/orprocessing unit. Such a memory device may be a read-only memory, randomaccess memory, volatile memory, non-volatile memory, static memory,dynamic memory, flash memory, cache memory, and/or any device thatstores digital information. Note that if the processing module, module,processing circuit, and/or processing unit includes more than oneprocessing device, the processing devices may be centrally located(e.g., directly coupled together via a wired and/or wireless busstructure) or may be distributedly located (e.g., cloud computing viaindirect coupling via a local area network and/or a wide area network).Further note that if the processing module, module, processing circuit,and/or processing unit implements one or more of its functions via astate machine, analog circuitry, digital circuitry, and/or logiccircuitry, the memory and/or memory element storing the correspondingoperational instructions may be embedded within, or external to, thecircuitry comprising the state machine, analog circuitry, digitalcircuitry, and/or logic circuitry. Still further note that, the memoryelement may store, and the processing module, module, processingcircuit, and/or processing unit executes, hard coded and/or operationalinstructions corresponding to at least some of the steps and/orfunctions illustrated in one or more of the Figures. Such a memorydevice or memory element can be included in an article of manufacture.

The present invention has been described above with the aid of methodsteps illustrating the performance of specified functions andrelationships thereof. The boundaries and sequence of these functionalbuilding blocks and method steps have been arbitrarily defined hereinfor convenience of description. Alternate boundaries and sequences canbe defined so long as the specified functions and relationships areappropriately performed. Any such alternate boundaries or sequences arethus within the scope and spirit of the claimed invention. Further, theboundaries of these functional building blocks have been arbitrarilydefined for convenience of description. Alternate boundaries could bedefined as long as the certain significant functions are appropriatelyperformed. Similarly, flow diagram blocks may also have been arbitrarilydefined herein to illustrate certain significant functionality. To theextent used, the flow diagram block boundaries and sequence could havebeen defined otherwise and still perform the certain significantfunctionality. Such alternate definitions of both functional buildingblocks and flow diagram blocks and sequences are thus within the scopeand spirit of the claimed invention. One of average skill in the artwill also recognize that the functional building blocks, and otherillustrative blocks, modules and components herein, can be implementedas illustrated or by discrete components, application specificintegrated circuits, processors executing appropriate software and thelike or any combination thereof.

The present invention may have also been described, at least in part, interms of one or more embodiments. An embodiment of the present inventionis used herein to illustrate the present invention, an aspect thereof, afeature thereof, a concept thereof, and/or an example thereof. Aphysical embodiment of an apparatus, an article of manufacture, amachine, and/or of a process that embodies the present invention mayinclude one or more of the aspects, features, concepts, examples, etc.described with reference to one or more of the embodiments discussedherein. Further, from figure to figure, the embodiments may incorporatethe same or similarly named functions, steps, modules, etc. that may usethe same or different reference numbers and, as such, the functions,steps, modules, etc. may be the same or similar functions, steps,modules, etc. or different ones.

While the transistors in the above described figure(s) is/are shown asfield effect transistors (FETs), as one of ordinary skill in the artwill appreciate, the transistors may be implemented using any type oftransistor structure including, but not limited to, bipolar, metal oxidesemiconductor field effect transistors (MOSFET), N-well transistors,P-well transistors, enhancement mode, depletion mode, and zero voltagethreshold (VT) transistors.

Unless specifically stated to the contra, signals to, from, and/orbetween elements in a figure of any of the figures presented herein maybe analog or digital, continuous time or discrete time, and single-endedor differential. For instance, if a signal path is shown as asingle-ended path, it also represents a differential signal path.Similarly, if a signal path is shown as a differential path, it alsorepresents a single-ended signal path. While one or more particulararchitectures are described herein, other architectures can likewise beimplemented that use one or more data buses not expressly shown, directconnectivity between elements, and/or indirect coupling between otherelements as recognized by one of average skill in the art.

The term “module” is used in the description of the various embodimentsof the present invention. A module includes a functional block that isimplemented via hardware to perform one or module functions such as theprocessing of one or more input signals to produce one or more outputsignals. The hardware that implements the module may itself operate inconjunction software, and/or firmware. As used herein, a module maycontain one or more sub-modules that themselves are modules.

While particular combinations of various functions and features of thepresent invention have been expressly described herein, othercombinations of these features and functions are likewise possible. Thepresent invention is not limited by the particular examples disclosedherein and expressly incorporates these other combinations.

What is claimed is:
 1. A method for execution by one or more processingmodules of one or more computing devices of a social network, the methodcomprises: identifying a geographic area associated with an adversecondition; identifying a plurality of user devices of the social networkpotentially associated with the identified geographic area; issuing asafety notification to the plurality of user devices, wherein the safetynotification includes one or more of the identified geographic area anda safety status request; receiving, from a first user device of theplurality of user devices, a first safety status response that includesfirst location information generated by the first user device, whereinthe first location information includes location information of a firstsafe location; receiving, from a second user device of the plurality ofuser devices, a second safety status response that includes secondlocation information generated by the second user device, wherein thesecond location information includes location information of a secondsafe location; and issuing evacuation information to at least some ofthe plurality of user devices, wherein the evacuation information isbased on the location information of the first safe location and thelocation information of the second safe location.
 2. The method of claim1, wherein the identifying the geographic area associated with theadverse condition comprises at least one of: interpreting a locationfrom an emergency management phase plan to produce the identifiedgeographic area; interpreting communications associated with an activeemergency management phase to produce the identified geographic area;and when at least some of the plurality of user devices are activelyaffiliated with a social network group of the social network: detectingthat communications associated with the social network group pertain tothe adverse condition; and identifying an area that corresponds to thecommunications associated with the social network group that pertains tothe adverse condition to produce the identified geographic area.
 3. Themethod of claim 1, wherein the identifying the plurality of user devicesassociated with the identified geographic area comprises at least oneof: indicating that the plurality of user devices is associated with theidentified geographic area based on a location lookup of the pluralityof user devices, wherein the location lookup produces a current locationof the plurality of user devices that is within a proximal distance ofthe identified geographic area; indicating that the plurality of userdevices is associated with the identified geographic area based on anaddress lookup of the plurality of user devices, wherein the addresslookup produces, for each user device of the plurality of user devices,a corresponding last known street address location that is within theproximal distance of the identified geographic area; indicating that theplurality of user devices is associated with the identified geographicarea when Internet access of the plurality of user devices is withinanother proximal distance of the identified geographic area; andindicating that the plurality of user devices is associated with theidentified geographic area when one or more identified wireless locationnetworks utilized by the plurality of user devices are within yetanother proximal distance of the identified geographic area.
 4. Themethod of claim 1, wherein the first location information furthercomprises at least one of: location coordinates of the first userdevice; location coordinates of the first safe location; a navigationpath to the first safe location; an indication that the locationcoordinates of the first user device is with the geographic areaassociated with an adverse condition; location coordinates of a thirduser device of the plurality of user devices, wherein the third userdevice and the first user device are actively affiliated with a socialnetwork group of the social network; an indication that the first userdevice is outside of the identified geographic area; another indicationthat the third user device is outside of the identified geographic area;a safety status level text string generated by the first user device; asafety status text string generated by the first user device; atimestamp corresponding to when a social network server received thefirst safety status response; and another timestamp corresponding towhen the first user device generated the first safety status response.5. The method of claim 1, wherein the second location informationfurther comprises at least one of: location coordinates of the seconduser device; location coordinates of the second safe location; anavigation path to the second safe location; an indication that thelocation coordinates of the second user device is with the geographicarea associated with an adverse condition; location coordinates of athird user device of the plurality of user devices, wherein the thirduser device and the second user device are actively affiliated with asocial network group of the social network; an indication that thesecond user device is outside of the identified geographic area; anotherindication that the third user device is outside of the identifiedgeographic area; a safety status level text string generated by thesecond user device; a safety status text string generated by the seconduser device; a timestamp corresponding to when a social network serverreceived the second safety status response; and another timestampcorresponding to when the second user device generated the first safetystatus response.
 6. The method of claim 1, wherein the issuing of theevacuation information to the at least some of the plurality of userdevices comprises: generating the evacuation information to include oneor more of: the location information of the first safe location; thelocation information of the second safe location; location coordinatesof the first safe location; location coordinates of the second safelocation; location coordinates of a third safe location based on thefirst safe location and the second safe location; a navigation path tothe first safe location; a navigation path to the second safe location;and a navigation path to the third safe location; and sending theevacuation information to the at least some of the plurality of userdevices.
 7. A computing device comprises: an interface; memory; and aprocessing module operably coupled to the interface and to the memory,wherein the memory stores operational instructions that, when executedby the processing module, causes the computing device to: identify ageographic area associated with an adverse condition; identify aplurality of user devices of a social network potentially associatedwith the identified geographic area; issue, via the interface, a safetynotification to the plurality of user devices, wherein the safetynotification includes one or more of the identified geographic area anda safety status request; receive, via the interface from a first userdevice of the plurality of user devices, a first safety status responsethat includes first location information generated by the first userdevice, wherein the first location information includes locationinformation of a first safe location; receive, via the interface from asecond user device of the plurality of user devices, a second safetystatus response that includes second location information generated bythe second user device, wherein the second location information includeslocation information of a second safe location; and issue, via theinterface, evacuation information to at least some of the plurality ofuser devices, wherein the evacuation information is based on thelocation information of the first safe location and the locationinformation of the second safe location.
 8. The computing device ofclaim 7, wherein the processing module functions to identify thegeographic area associated with the adverse condition by at least oneof: interpreting a location from an emergency management phase plan toproduce the identified geographic area; interpreting communicationsassociated with an active emergency management phase to produce theidentified geographic area; and when at least some of the plurality ofuser devices are actively affiliated with a social network group of thesocial network: detecting that communications associated with the socialnetwork group pertain to the adverse condition; and identifying an areathat corresponds to the communications associated with the socialnetwork group that pertains to the adverse condition to produce theidentified geographic area.
 9. The computing device of claim 7, whereinthe processing module functions to identify the plurality of userdevices associated with the identified geographic area by at least oneof: indicating that the plurality of user devices is associated with theidentified geographic area based on a location lookup of the pluralityof user devices, wherein the location lookup produces a current locationof the plurality of user devices that is within a proximal distance ofthe identified geographic area; indicating that the plurality of userdevices is associated with the identified geographic area based on anaddress lookup of the plurality of user devices, wherein the addresslookup produces, for each user device of the plurality of user devices,a corresponding last known street address location that is within theproximal distance of the identified geographic area; indicating that theplurality of user devices is associated with the identified geographicarea when Internet access of the plurality of user devices is withinanother proximal distance of the identified geographic area; andindicating that the plurality of user devices is associated with theidentified geographic area when one or more identified wireless locationnetworks utilized by the plurality of user devices are within yetanother proximal distance of the identified geographic area.
 10. Thecomputing device of claim 7, wherein the first location informationfurther comprises at least one of: location coordinates of the firstuser device; location coordinates of the first safe location; anavigation path to the first safe location; an indication that thelocation coordinates of the first user device is with the geographicarea associated with an adverse condition; location coordinates of athird user device of the plurality of user devices, wherein the thirduser device and the first user device are actively affiliated with asocial network group of the social network; an indication that the firstuser device is outside of the identified geographic area; anotherindication that the third user device is outside of the identifiedgeographic area; a safety status level text string generated by thefirst user device; a safety status text string generated by the firstuser device; a timestamp corresponding to when a social network serverreceived the first safety status response; and another timestampcorresponding to when the first user device generated the first safetystatus response.
 11. The computing device of claim 7, wherein the secondlocation information further comprises at least one of: locationcoordinates of the second user device; location coordinates of thesecond safe location; a navigation path to the second safe location; anindication that the location coordinates of the second user device iswith the geographic area associated with an adverse condition; locationcoordinates of a third user device of the plurality of user devices,wherein the third user device and the second user device are activelyaffiliated with a social network group of the social network; anindication that the second user device is outside of the identifiedgeographic area; another indication that the third user device isoutside of the identified geographic area; a safety status level textstring generated by the second user device; a safety status text stringgenerated by the second user device; a timestamp corresponding to when asocial network server received the second safety status response; andanother timestamp corresponding to when the second user device generatedthe first safety status response.
 12. The computing device of claim 7,wherein the processing module functions to issue the evacuationinformation to the at least some of the plurality of user devices by:generating the evacuation information to include one or more of: thelocation information of the first safe location; the locationinformation of the second safe location; location coordinates of thefirst safe location; location coordinates of the second safe location;location coordinates of a third safe location based on the first safelocation and the second safe location; a navigation path to the firstsafe location; a navigation path to the second safe location; and anavigation path to the third safe location; and sending, via theinterface, the evacuation information to the at least some of theplurality of user devices.