Public safety system and method

ABSTRACT

A feedback based public safety method is provided. The method is implemented by a computing device and comprising receiving, from an external device of an individual, identification data of the individual associated with the external device, accessing from one or more databases, by the computing device of the user, ratings data specific to the individual, the ratings data is based on historical interactions of the individual, comparing the ratings data with one or more of a plurality of threshold values, determining, based on the comparing, whether the ratings data satisfies one or more of the plurality of threshold values, and initiating one or more of a plurality of action sets responsive to the ratings data satisfying the one or more of the plurality of threshold values.

CROSS REFERENCE TO RELATED APPLICATION

This application claims priority to U.S. Application Ser. No. 63/142,746filed on Jan. 28, 2021, the entire disclosure of which is herebyincorporated by reference.

TECHNICAL FIELD

The present invention relates to systems and methods for a public safetysystem, and more particularly to a public safety system that assists ininteractions between persons and officials.

BACKGROUND

Americans and other citizens of the world are currently living in an eraof greater division, polarity, extremism and disparities than everbefore. Current events in the news and statistics highlight tensionbetween officials and citizens. This tension can lead to protests afterinteractions with officials and citizens.

During interactions with officials, many individuals feel threatened orin danger. Officials, on the other hand, must try to assess countlesssituations and deescalate tension. Unfortunately, there are interactionsthat do not result in deescalated tension. Such interactions may lead tomental or physical harm, or even death. This harm is all too often,completely avoidable. Further, it is impossible for individuals orofficials to know histories associated with each other during aninteraction.

In some instances, individuals may contact third parties by traditionalmeans, such as dialing an emergency number on a telephone, use of socialmedia to stream interactions, or the like. Further, individuals may needto perform a number of different tasks on different devices to beginrecording interactions, contacting third parties, or otherwise takingsteps to mitigate interactions.

In some systems, a user may initiate a phone call by placing aparticular finger on a scanner of a smart phone. This may triggerautomatic dialing to a predetermined number. This requires theindividual to interact with the person who they are calling, which maybe prohibited by officials.

In addition, there are a variety of potential situations where a threatto the safety of a driver or passenger of a vehicle occurs. Knownsolutions discussed above may be utilized in a vehicle scenario, buthave the same limitations listed above.

Therefore, there is a need for improved public safety systems andmethods that, for example, allow individuals and officials to interact,view information, or otherwise deescalate interactions before meetingface-to-face. Further, there is a need for improved public safetysystems and methods that may allow for feedback on interactions, thirdparty monitoring, or automated monitoring of interactions.

SUMMARY

In one embodiment, a feedback based public safety method is provided.The method is implemented by a computing device and comprisingreceiving, from an external device of an individual, identification dataof the individual associated with the external device, accessing fromone or more databases, by the computing device of the user, ratings dataspecific to the individual, the ratings data is based on historicalinteractions of the individual, comparing the ratings data with one ormore of a plurality of threshold values, determining, based on thecomparing, whether the ratings data satisfies one or more of theplurality of threshold values, and initiating one or more of a pluralityof action sets responsive to the ratings data satisfying the one or moreof the plurality of threshold values.

In another embodiment, a feedback based public safety system isprovided. The system comprises one or more processors included as partof a computing device, and non-transitory computer readable mediumstoring instructions that, when executed by the one or more processors,cause the computing device to receive, from an external device of anindividual, identification data of the individual associated with theexternal device, access, from one or more databases, ratings dataspecific to the individual, the ratings data is based on historicalinteractions of the individual, compare the ratings data with one ormore of a plurality of threshold values, determine, based on thecomparing, whether the ratings data satisfies one or more of theplurality of threshold values, and initiate one or more of a pluralityof action sets responsive to the ratings data satisfying the one or moreof the plurality of threshold values.

These and additional features provided by the embodiments describedherein will be more fully understood in view of the following detaileddescription, in conjunction with the drawings.

DESCRIPTION OF THE DRAWINGS

The present teachings may be better understood by reference to thefollowing detailed description taken in connection with the followingillustrations, wherein:

FIG. 1 is a functional block diagram of a public safety system inaccordance with the present disclosure;

FIG. 2 is a user device rendering a display on an interface inaccordance with the present disclosure;

FIG. 3 is a user device rendering a display providing an official'srating on an interface in accordance with the present disclosure;

FIG. 4 is a user device rendering a display providing emergency actionson an interface in accordance with the present disclosure;

FIG. 5 is a user device rendering a display providing a request for asupervisor on an interface in accordance with the present disclosure;

FIG. 6 is a user device rendering a display providing identification ofsurveillance equipment on an interface in accordance with the presentdisclosure;

FIG. 7 illustrates a user device rendering a display providing legalassistance on an interface in accordance with the present disclosure;

FIG. 8 is a user device rendering a display providing legal assistanceservices on an interface in accordance with the present disclosure;

FIG. 9 is a user device rendering a display providing connectivity toexternal cameras on an interface in accordance with the presentdisclosure;

FIG. 10 is a user device rendering a display providing access tothird-parties on an interface in accordance with the present disclosure;

FIG. 11 is an exemplary flow diagram of a method for providing a publicsafety system in accordance with the present disclosure;

FIG. 12 is an exemplary flow diagram of a method for rating an officialin accordance with the present disclosure;

FIG. 13 is an example network in accordance with the present disclosure;

FIG. 14 is an example operating environment in accordance with thepresent disclosure;

FIG. 15 is a user device rendering a display on an interface of anotherembodiment for linking of text feeds for mobile devices in accordancewith the present disclosure; and

FIG. 16 is a user device rendering of a user device according to theembodiment of FIG. 15 .

The invention may be embodied in several forms without departing fromits spirit or essential characteristics. The scope of the invention isdefined in the appended claims, rather than in the specific descriptionpreceding them. All embodiments that fall within the meaning and rangeof equivalency of the claims are therefore intended to be embraced bythe claims.

DETAILED DESCRIPTION

Reference will now be made in detail to embodiments of the presentteachings, examples of which are illustrated in the accompanyingdrawings. It is to be understood that other embodiments may be utilizedand structural and functional changes may be made without departing fromthe scope of the present teachings. Moreover, features of theembodiments may be combined, switched, or altered without departing fromthe scope of the present teachings, e.g., features of each disclosedembodiment may be combined, switched, or replaced with features of theother disclosed embodiments. As such, the following description ispresented by way of illustration and does not limit the variousalternatives and modifications that may be made to the illustratedembodiments and still be within the spirit and scope of the presentteachings.

As used herein, the words “example” and “exemplary” mean an instance, orillustration. The words “example” or “exemplary” do not indicate a keyor preferred aspect or embodiment. The word “or” is intended to beinclusive rather than exclusive, unless context suggests otherwise. Asan example, the phrase “A employs B or C,” includes any inclusivepermutation (e.g., A employs B; A employs C; or A employs both B and C).As another matter, the articles “a” and “an” are generally intended tomean “one or more” unless context suggests otherwise.

Throughout the specification and claims, the following terms take themeanings explicitly associated herein, unless the context clearlydictates otherwise. The phrase “in one embodiment” as used herein doesnot necessarily refer to the same embodiment, though it may.Furthermore, the phrase “in another embodiment” as used herein does notnecessarily refer to a different embodiment, although it may. Thus, asdescribed below, various embodiments of the invention may be readilycombined, without departing from the scope or spirit of the invention.

Moreover, terms such as “access point,” “server,” and the like, areutilized interchangeably, and refer to a network component or appliancethat serves and receives control data, voice, video, sound, or otherdata-stream or signaling-stream. Data and signaling streams may bepacketized or frame-based flows. Furthermore, the terms “user,”“citizen,” “individual,” and the like are employed interchangeablythroughout the subject specification, unless context suggests otherwiseor warrants a particular distinction among the terms. The term“official” generally refers to a user who is appointed or otherwiseprovide with authority to serve in a public capacity, such as lawenforcement officers, politicians, judges, or the like. It is noted thatsuch terms may refer to human entities or automated components supportedthrough artificial intelligence (e.g., a capacity to make inference).

“Logic” refers to any information and/or data that may be applied todirect the operation of a processor. Logic may be formed frominstruction signals stored in a memory (e.g., a non-transitory memory).Software is one example of logic. In another aspect, logic may includehardware, alone or in combination with software. For instance, logic mayinclude digital and/or analog hardware circuits, such as hardwarecircuits comprising logical gates (e.g., AND, OR, XOR, NAND, NOR, andother logical operations). Furthermore, logic may be programmed and/orinclude aspects of various devices and is not limited to a singledevice.

A network typically includes a plurality of elements that host logic. Inpacket-based wide-area networks (WAN), servers (e.g., devices comprisinglogic) may be placed at different points on the network. Servers maycommunicate with other devices and/or databases. In another aspect, aserver may provide access to a user account. The “user account” includesattributes for a particular user and commonly include an ID associatedwith the user. The ID may be associated with a particular mobile deviceand/or vehicle owned by the user. The user account may also includeinformation such as relationships with other users, application usage,location, personal settings, and other information.

Embodiments may utilize substantially any wired or wireless network. Forinstance, embodiments may utilize various radio access network (RAN),e.g., Wi-Fi, global system for mobile communications, universal mobiletelecommunications systems, worldwide interoperability for microwaveaccess, enhanced general packet radio service, third generationpartnership project long term evolution (3G LTE), fourth generation longterm evolution (4G LTE), third generation partnership project 2,BLUETOOTH®, ultra-mobile broadband, high speed packet access, xthgeneration long term evolution, or another IEEE 802.XX technology.Furthermore, embodiments may utilize wired communications.

It is noted that, terms “user equipment,” “user device,” “user equipmentdevice,” “client,” and the like are utilized interchangeably in thesubject application, unless context warrants particular distinction(s)among the terms. Such terms may refer to a network component(s) orappliance(s) that sends or receives data, voice, video, sound, orsubstantially any data-stream or signaling-stream to or from networkcomponents and/or other devices. By way of example, a user equipmentdevice may comprise an electronic device capable of wirelessly sendingand receiving data. A user equipment device may have a processor, amemory, a transceiver, an input, and an output. Examples of such devicesinclude cellular telephones (e.g., smart phones), personal digitalassistants (PDAs), portable computers, tablet computers (tablets), handheld gaming counsels, wearables (e.g., smart watches), desktopcomputers, etc. It is noted that the user device my also be referred toas a computing device and may include an image capturing component,e.g., a internal camera that is built as part of the user device.

In an embodiment, a user device may include a software application or“app.” The app may communicate with various devices, users, databases orthe like. For instance, the app may interact with a user, a vehicle,external camera systems, external sensors, third-parties, other userdevices, databases (including third-party databases), and the like.

It is noted that user equipment devices can communicate with each otherand with other elements via a network, for instance, a wireless network,or a wireline network. A “network” can include broadband wide-areanetworks such as cellular networks, local-area networks, wirelesslocal-area networks (e.g., Wi-Fi), and personal area networks, such asnear-field communication networks including BLUETOOTH®. Communicationacross a network may include packet-based communications, radio andfrequency/amplitude modulations networks, and the like. Communicationmay be enabled by hardware elements called “transceivers”. Transceiversmay be configured for specific networks and a user equipment device mayhave any number of transceivers configured for various networks. Forinstance, a smart phone may include a cellular transceiver, a Wi-Fitransceiver, a BLUETOOTH® transceiver, or may be hardwired. In thoseembodiments in which it is hardwired, any appropriate kind or type ofnetworking cables may be utilized. For example, USB cables, dedicatedwires, coaxial cables, optical fiber cables, twisted pair cables,Ethernet, HDMI and the like.

Disclosed embodiments generally relate to public safety systems andmethods. For instance, embodiments may include a public safety systemcomprising at least one memory device and processor. The memory may beconfigured for storing computer executable applications. The processormay facilitate operation of the computer executable components. It isnoted that while embodiments described a user device as comprising anapp, the app may be comprised of one or more other devices. Forinstance, portions of the app may be comprised of the user device, anexternal camera, a vehicle, in a remote device (e.g., a cloud device),or the like.

In at least one embodiment, the public safety system includes a ratingcomponent and communications component. The ratings component mayretrieve ratings of officials and may render ratings for a user's reviewvia a user device. In another aspect, the ratings component may allow auser to provide user feedback, such as a rating (e.g., numerical rating,number of stars, thumbs up/down, or the like). For example, when a useris driving a car and gets pulled over by an official, the public safetysystem may retrieve ratings of the official from a data store. Thepublic safety system may then alert a user to the ratings of theofficial. The user may then determine an appropriate action to takebased on the ratings. For instance, when the ratings indicate a poor orconfrontational history, the user may determine to begin recording aninteraction, contact legal representatives, request a second official orsupervisor review of the interaction, or the like.

In another example, the user may utilize the communications component tointeract with the official via a secure video conference between theuser device and a user device associated with the official. Suchinteractions may occur before face-to-face interactions. This may allowthe user and the official to establish a relationship and make firstcontact prior to making physical face-to-face contact. The user mayprovide information to the official, such as the user's name,passengers, or the like. In another example, the official may provideinformation to the user, such as reason for being pulled over, name ofthe official, and procedure for the interaction.

As described herein, embodiments may provide for increased safety forusers and officials, increased transparency, increased public confidencein officials, and the like. Moreover, use of the systems and methodsdescribed herein may prevent or greatly reduce the bodily harm andmental harm endured by users through interactions with officials.Likewise, governing organizations (e.g., municipalities, stategovernments, federal governments, etc.) may be able to monitorofficials, assist in interactions, or otherwise provide for safer andless confrontational interactions.

Referring now to FIG. 1 , there depicted is a block diagram of afunctional system 100 that may provide a user with safety tools forinteractions with officials. System 100 may primarily include publicsafety system 106, memory 102, and processor 104. Memory 102 may beconfigured for storing computer executable components such as a ratingscomponent 110, a communications component 120, account component 130,and an emergency actions component 140. Processor 104 may facilitateoperation of the computer executable components. It is noted that system100 may include one or more devices, such as a user device, a vehicle,and an external camera. It is further noted that one or more devices maycomprise, at least in part, the various components. For instance, asingle component of system 100 may be comprised by one or more devices.While shown as separate or distinct components at least for simplicityof explanation, the components of system 100 may be comprised by one ormore components. Moreover, one or more of the components may form anapplication or app. Further, the system 100 may include a plurality ofuser devices that may be linked together through a network. These userdevices may be operatively linked with a server.

The ratings component 110 may allow a user to provide feedback as input114 following an interaction with an official. This rating may be anumerical value, scaled rating (e.g., number of stars out of possiblestars), thumbs up/down, textual review, or the like. It is further notedthat the rating may be divided into particular categories, such asprofessionalism, attitude, aggressiveness, overall score, or the like.The rating may be stored in a memory 102. In an aspect, the publicsafety system may aggregate the rating with other ratings, such ashistorical ratings. It is noted that the rating may be aggregated acrossa global user base, a subset of users, or the like.

It is further noted that the rating component 110 may receive input 114from other systems. The input 114 may include information not manuallyentered by a user. For instance, the input 114 may include informationfrom one or more of a biometric monitor (e.g., heart rate monitor,breathing monitor, blood pressure monitor, etc.), an audio device, acamera, or the like. In at least one embodiment, the rating component110 may include logic to identify terms, patterns, a tone of voice, orother information from captured audio. Additionally or alternatively,biometric monitors may provide biometric information associated with theuser, the official, by-standers or the like. The ratings component 110may determine stress levels, anxiety levels, or other indicators basedon the biometric information. Moreover, cameras may capture images andratings component 110 may utilize pattern recognition, motionrecognition, gesture recognition, or the like to identify certainimages, actions, facial expressions or the like associated with theuser, the official, by-standers or the like.

The public safety system 106 may utilize the input 114 from such othersystems and may be utilized with or without a user's input rating. Forexample, the ratings component 110 may determine a rating based onbiometric information, audio information, image information, or thelike. If, for instance, the biometric information indicates a high levelof stress, anxiety, or tension during an interaction, ratings component110 may determine to assign a rating indicative of the high level. Onthe other hand, if the biometric information indicates a low level ofstress, anxiety, or tension during an interaction, ratings component 110may determine to assign a rating indicative of the low level. It isnoted that the biometric information may be weighted based on a user'shistory, history of other user's or the like. Moreover, one or morebaseline markers may be utilized to rate a level of stress. For example,biometric information may be gathered during periods of inactivity orrelaxing activity, periods of intentional physical activity (e.g.,exercise), or the like. Such baselines may be utilized to normalizemeasured biometric information during an interaction. It is furthernoted that the biometric information may come from the user, theofficial, bystanders, or others. In at least some examples, thebiometric information may be utilized with a user's input (e.g.,numerical rating, etc.) to generate a weighted rating for the officialor interaction.

As another example, the ratings component 110 may utilize captured audioto generate or calculate a rating. For instance, the ratings component110 may identify potential triggering words or phrases that may belinked to increased tension or decreased safety. Such terms and phrasesmay be identified based on comparison with a library of stored terms orphrases, analysis of terms of phrases utilized in past encounters, orthe like. For instance, a certain term may be substantially moreprevalent during negatively rated interactions. As such, the term may beidentified and factored into a rating. Other terms may be provided by anadministrator, governing body, public safety or social justiceinstitutions, or the like. Moreover, the ratings component 110 maydetermine tones, volumes, or other vocal markers that may affect aninteraction.

In at least some examples, the ratings component 110 may utilizecaptured imagery (e.g., video, still images, gestures, etc.) to generateor calculate a rating. For instance, the ratings component 110 mayidentify facial expressions, physical actions, or gestures associatedwith one or more of the user, the official, bystanders, or others.Certain facial expressions, physical actions, or gestures may beassociated with different ratings based on, for example, historicalinteractions, stored libraries of images or patterns, or the like.

Similar to the above, audio or video information may be normalizedthrough audio or video gathered during a training period, periods ofcalm, periods of stress, or the like. It is further noted that the audioinformation may come from the user, the official, bystanders, or others.As described herein, the analyzed audio or video may be utilized with orwithout a user's input (e.g., numerical rating, etc.) or other capturedinformation (e.g., biometric information, image information, etc.) togenerate a weighted rating for the official or interaction.

Moreover, other factors may be utilized to generate weighted rankings,such as geographic location, time of day, time of year, weather,lighting, current events, or the like. Such information may be providedby a user, an official, automatically obtained by the system 100,provided by third parties, of the like. In at least some embodiments,user's may opt in to provide demographic information, health history(e.g., medical conditions), or the like.

In embodiments, Account component 130 may provide access to stored userpreferences based on received data, historical data, and the like. In atleast one embodiment, user preferences may be stored in a user account(e.g., via memory 102). The account component 130 may provide for loginprocedures where a user may enter login credentials. It is noted thatthe account component 130 may include or link to a user's accounts onthird party websites or services. For instance, the account component130 may allow for connection to a user's third-party accounts, such associal media accounts, email accounts, or the like. Further, the accountcomponent 130 may allow a user to opt-out of some or all aspects of thesystem 100, such as providing demographics.

In another example, a rating determined after an interaction may beutilized to update or otherwise determine an official's global orhistorical rating. For instance, the ratings component 110 may storehistorical ratings associated with officials. The historical rating maybe displayed to the user before, during, or after an interaction. It isfurther noted that the historical rating may be viewable to theofficial, the public in general, government bodies, social justiceinstitutions, or the like.

It is noted that the historical rating may be based on past user ratingsof the official that may be weighted according to various weightingtechniques (e.g., simple average, weighted averages, etc.) According tosome embodiments, ratings component 110 may communicate with orotherwise access information from public data stores, third-parties, orthe like to generate the historical ratings. For instance, ratingscomponent 110 may receive access to municipality records, courtdocuments, or the like. The records may indicate the presence or absenceof disciplinary events, complaints, awards, or other informationassociated with an official. In embodiments, ratings component 110 mayinclude information from records to determine or generate a weightedranking.

In an aspect, ratings component 110 (as well as other components ofsystem 100) may utilize artificial intelligence, statistical models, orother processes and/or algorithms. In embodiments, ratings component 110may utilize classifiers that map an attribute vector to a confidencethat the attribute belongs to a class. For instance, ratings component110 may input attribute vector, x=(x1, x2, x3, x4, xn) mapped tof(x)=confidence(class). Such classification can employ a probabilisticand/or statistical based analysis (e.g., factoring into the analysisaffinities and ingredient attributes) to infer an action that a userdesires to be automatically performed, likely, or the like. In variousembodiments, ratings component 110 may utilize other directed andundirected model classification approaches include, e.g., naïve Bayes,Bayesian networks, decision trees, neural networks, fuzzy logic models,and probabilistic classification models providing different patterns ofindependence. Classification may also include statistical regressionthat is utilized to develop models of priority.

In accordance with various aspects of the subject specification, anexample embodiment may employ classifiers that are explicitly trained(e.g., via a generic training data) as well as implicitly trained (e.g.,via observing user behavior, user preferences, historical information,receiving extrinsic information). For example, support vector machinesmay be configured via learning or training phase within a classifierconstructor and feature selection module. Thus, the classifier(s) may beused to automatically learn and perform a number of functions, includingbut not limited to determining ratings, suggesting actions, or the like.This learning may be on an individual basis, i.e., based solely on asingle user, or may apply across a set of or the entirety of the userbase. Information from the users may be aggregated and the classifier(s)may be used to automatically learn and perform a number of functionsbased on this aggregated information. The information may be dynamicallydistributed, such as through an automatic update, a notification, or anyother method or means, to the entire user base, a subset thereof or toan individual user.

Ratings component 110 may provide ratings to other systems or users asoutput 112 via communications component 120. For instance, ratingscomponent 110 may provide ratings to government bodies, supervisors,officials, social justice organizations, legal authorities, or the like.Further, ratings may be provided to the user as described here as wellas elsewhere in this disclosure.

According to embodiments, ratings component 110 may receive anidentifier (ID) of an official and may identify a stored or historicalrating of the official. For instance, the ratings component 110 mayaccess memory 102 to determine a stored rating for the official. Onceretrieved, the ratings component 110 may display the rating via aninterface, generate audio or visual alerts, or instruct emergencyactions component 140 to perform one or more actions as described hereand elsewhere in this disclosure.

The ratings component 110 may receive the ID for the official based onmanual user input (e.g., a user entering a badge number, name, licenseplate number, squad car number, or the like). In another example, theratings component 110 may communicate (e.g., via communicationscomponent 120) with a user device associated with the official,information provided by other users of third-parties (e.g., applicationswhich may identify locations of officials on a GPS mapping service), aserver identifying the official, cameras or other devices that may applypattern recognition to identify the official (e.g., facial recognition,badge number, name, license plate number, squad car number, or thelike). According to some embodiments, the user may utilize a first userdevice and the official may utilize a second user device. Upon theofficial initiating a stop or interaction, the official's user devicemay become viewable to the user's user device. The official's userdevice may transmit identifying information to the user's user device.In at least some examples, the official's user device may transmit oneor more of the official's ID, rating, or the like.

In at least one example, the ratings component 110 receives theofficial's ID and acquires a database for a rating of the official. Inother examples, the ratings component 110 receives the official's ID andthe rating for the official directly from the official's user device orfrom a server communicating such the user's user device.

Turning now to FIG. 2 , with reference to FIG. 1 , there is a userdevice 200 that may render user interface 202 that may include aspectsof system 100. As depicted, the user interface 202 may provideinteractive graphical elements that allow a user to access one or morecomponents of system 100. For instance, the user interface 202 maycomprise a rating object 210. A user may provide input to a user inputdevice (e.g., touch screen, audio device, gesture, etc.) of the userdevice 200 to access the rating object 210. The rating object 210 maylaunch or otherwise provide some or all aspects of ratings component 110to the user device 200.

For instance, as shown in FIG. 3 , the user device 200 may render userinterface 302 in response to the user selecting the rating object 210and the ratings component 110 providing information 306 associated withan official. The information 306 may include an image, name, ID, rating,specialty, length of service, or other information.

Turning back to FIG. 1 , as described herein, the ratings component 110may receive the historic rating and other information associated withthe official and may communicate the information with the user orintimate aspects of the emergency actions component 140. By way ofexample, the ratings component 110 may prompt a user for action or mayinitiate one or more actions based on the historic rating falling belowone or more thresholds. For instance, the ratings component 110 mayinitiate a first set of actions if the rating is below a firstthreshold, may initiate a second set of actions if the rating is below asecond threshold, etc. It is noted that the set of actions may be set bya user, predetermined globally or for some subset of users, based on alearning algorithm or artificial intelligence, or the like.

The emergency actions component 140 may provide one or more actions tothe public safety system 106. The emergency actions component 140 mayperform or initiate actions or services automatically (e.g., not basedon user input) or manually (e.g., based on user input).

According to some embodiments, emergency object 240 may be actuatedthrough user input (e.g., voice, touch, etc.) to launch or initiate oneor more aspects of the emergency actions component 140 through onecommand. For instance, when there is a breakdown between a user and anofficial, the user may actuate the emergency object 240 and one or moreaspects may then launch based on the single actuation. As an example,actuation of emergency object 240 may result in one or more of turningall recording devices on (e.g., image cameras, audio, etc.), generateand transmit notifications to user personal contacts through (e.g., textmessages to family and friends, social network notifications), requestthird party interaction or monitoring (e.g., attorney monitoring,supervisor monitoring, social justice institute monitoring, volunteermonitoring, news outlet monitoring, or the like), contact emergencyresponse agencies (e.g., paramedics, fire department, etc.), beingsocial network transmission (e.g., stream videos, post status updates,identify location, identify official, etc.), identify security camerasthat may be able to view the interaction, alert bystanders that may optin to or otherwise have installed on their user device part or all ofthe system 100, provide instructions for responding or interactionthrough identifying user's rights, provide for calming techniques, orthe like.

FIG. 4 illustrates an exemplary illustration of actions 440 that theuser device 200 may launch once the emergency object 240 is actuated orupon a rating of an official being identified as below a threshold.

Referring again to FIG. 2 , the emergency actions component 140 mayinclude actions that may be initiated by a user interacting with one ormore of an attorney request object 242, one or more third partyintervention object 244 (e.g., including news outlet, legal search,ambulance or other emergency services, social justice organizations suchas the American Civil Liberties Union, etc.), police information object246, vehicle recording device object 248, supervisor request object 250,and a surveillance search object 252. It is noted that other ordifferent objects may be provided via the interface 202. Moreover, whileembodiments may describe actions in response to actuation of one or moreobjects, it is noted that some actions may occur upon other triggeringevents. As such, description of one or more aspects of the emergencyactions component 140 may correspond to the objects identified in FIG. 2, other objects, or no objects.

In an example, a user may be driving in a vehicle, walking on a street,or may be in a public or private location. The user may be approached byan official or may otherwise see an official in an area. The user mayutilize a user device (e.g., user device 200) to access the system 100.It is noted that the user may take caution to reach for the user device200 in the event that it is in a pocket or otherwise requires the userto place a hand in a concealed area. As such, the user may utilize voicecommands, gesture commands, or other commands to access system 100. Theuser may instruct the emergency actions component 140 to perform one ormore actions.

According to at least some embodiments, the official may utilize a userdevice or other device to access system 100. For instance, as theofficial approaches an individual or plans to approach an individual,the official may utilize an official's user device to generate a requestfor information or send the user the official's ID, rating, or the like.The official may indicate to the user that the official has initiatedcommunication and may allow the user time to retrieve the user deviceand take any appropriate action. In some embodiments, the official maybe able to receive information from the user, such as anxiety level,medical information, or the like. It is noted that the user maydetermine what information is available to an official.

In an aspect, the emergency actions component 140 may initiate recordingof interactions via one or more devices. For instance, the emergencyactions component 140 may initiate recording by cameras, audio device,or the like. Cameras may include an internal camera of the user device200, external cameras associated with the user (e.g., dash camera,wearable camera, user's body camera, etc.). Audio device may includeinternal audio devices of the user device 200, external audio devices(e.g., dash mounted audio devices, wearable devices with audio recordingcapabilities, etc.). The emergency actions component 140 may recordinformation to local memory storage of the device 200, upload to serversor cloud based memory, stream to social media platforms, or the like. Insome embodiments, emergency actions component 140 may automatically ormanually send recording information to third parties, such as personalcontacts or (e.g., news agencies, government agencies, or the like).

It is noted that the emergency actions component 140 may initiate orrequest access to third party recording devices. In at least oneexample, the emergency actions component 140 may generate requests toother users to record an interaction to capture multiple angles or sothat the user does not need to interact with device 200. For example,the emergency actions component 140 may generate a request to other userdevices identified within a geographical area. Users associated withthose other devices may receive alerts and may authorize use of therecording devices or may control the recording devices in response tothe request. Recordings from other users may be stored on the otherusers' devices, may be stored according to the other users' preferences,or may be stored according to the preferences of the user who is subjectto the request. For instance, a user may indicate the need for emergencyassistance in recording an interaction. Nearby users (e.g., bystanders)may receive a notification of the request and may act to record theinteraction. The bystanders who have recorded the information mayreceive the user's preferences, contacts, or the like and may transmitthe recording according thereto. In some embodiments, the bystanders'devices may provide a feed to the user's device. This may allow therecording to be transmitted to the user's device and then sent to theuser's personal contacts, legal counsel, news outlets of choice, socialjustice organizations, social media accounts, or the like.

The emergency actions component 140 may additionally or alternativelygenerate requests to access an official's recording device, requestconfirmation that the official's recording device is recording theinteraction, or may actuate the official's recording device withoutreceiving recorded content as may be permitted by some jurisdictions.Such recording devices of official's may include one or more of a bodycamera, hood camera, or other recording device of the official.

According to another aspect, the emergency actions component 140 mayinitiate contact with third parties. For instance, communicationcomponent 120 may generate notifications to news outlet, legal search,ambulance or other emergency services, or social justice organizationssuch as the American Civil Liberties Union. The notification may includeidentification of the user, the official, a location, a ratingassociated with the official, or other information. In some embodiments,a user may include a predetermined message in a notification. Someexamples, may allow a user to speak directly with a third party or mayallow the emergency actions component 140 to send video, audio,transcripts, or other information associated with the encounter to thirdparties.

The emergency actions component 140 may additionally or alternativelyprovide access to legal counsel. For instance, the emergency actionscomponent 140 may allow a user to request emergency legal counselthrough a search, may request information on rights, view or accessinformation on rights, view or access guides for interaction, or thelike. According to some embodiments, a user may engage with legalcounsel or a legal organization before, during, or after an encounter asmay be permitted by law. For instance, the user may have a preexistingattorney-client relationship with legal counsel. The legal counsel maybe alerted of an emergency through the emergency actions component 140and may receive information pertaining to an interaction. Legal counselmay be given access to live feeds, recorded information, a geographiclocation or the like. In some embodiments, emergency actions component140 may request that legal counsel travel to a location of aninteraction on the client's behalf. The legal counsel may be able todeescalate the situation and provide immediate legal assistance.

In embodiments, the emergency actions component 140 may identifysurveillance equipment or other devices that may have access to aninteraction. For instance, emergency actions component 140 may initiatea search for surveillance equipment that may be within a geographiclocation associated with an interaction, may have passed by or observedan interaction (e.g., cameras of other users, cameras of other vehicles,or the like), or other surveillance equipment that may be identified ashaving potentially observed some or all aspects of an interaction. It isnoted that third parties who control such surveillance equipment may optin to allow identification of such surveillance equipment. According tosome examples, the emergency actions component 140 may direct a user totravel to a particular area that can be observed by such surveillanceequipment or other devices, as long as the user is in compliance withofficial's orders. Moreover, emergency actions component 140 may notifyofficials that actions are under surveillance

As described herein, communications component 120 may interact withemergency actions component 140 and other components to accomplishvarious tasks. Such tasks may include generating messages to keycontacts in the event of an emergency or interaction. The key contactsmay include family, friends, attorneys, or others as specified by theuser. Contact may be made by short-messaging services (SMS), textmessages, social media networks, or other networks as described herein.In examples, communications component 120 may transmit a prerecordmessage, an audio or video clip, information pertaining to aninteraction (e.g., location, official involved, official rating, actionstaken, location of recordings, location of surveillance equipment,etc.).

In another aspect, communications component 120 may allow forcommunication with an official prior to a face-to-face encounter. Forexample, the user or official may request a video, audio, oralphanumerical conversation between the user and the official. Thecommunications component 120 may establish a secure connection between adevice associated with the user and a device associated with theofficial. This may allow the official and the user to provideinformation and gauge the current situation. In some examples, theofficial may be able to identify that the user is under duress, fearsfor the user's safety, or otherwise may require intervention todeescalate the situation. The official may call for backup,supervisions, social workers, counselors, religious leaders, or othersto assist in de-escalation.

Moreover, communications component 120 may utilize bump, near filedcommunications, or other technology to allow the user and official tocommunicate when in proximity to each other. This may provide securityas well as accuracy for the interaction. As another aspect, the userdevice 200 may verify the interaction with a device of the official.This may prevent third parties from providing ratings of an officialwhen the third parties may have never interacted with the official.

FIG. 5 illustrates an interface 502 corresponding to emergency actionscomponent 140 initiating contact of supervisor for the official duringan interaction. In some embodiments, non-supervising officials may becontacted, such as officials having high ratings and within a specifiedproximity of the user.

FIG. 6 illustrates an interface 602 corresponding to emergency actionscomponent 140 initiating a search for surveillance equipment that may bewithin a geographic location associated with an interaction, may havepassed by or observed an interaction (e.g., cameras of other users,cameras of other vehicles, or the like), or other surveillance equipmentthat may be identified as having potentially observed some or allaspects of an interaction.

FIG. 7 illustrates an interface 702 corresponding to emergency actionscomponent 140 initiating a search for legal assistance, legal rights, orfor information on how to proceed with an interaction. In some examples,the interface 702 may include video, audio, textual, or otherinstructions on how to interact with an official

FIG. 8 illustrates an interface 802 corresponding to emergency actionscomponent 140 initiating attorney communications. Such communicationsmay include requests for an attorney to travel to a user's location,video or audio conferencing of an attorney to observe an interaction orinstruct a user's actions, or the like.

FIG. 9 . illustrates an interface 902 corresponding to emergency actionscomponent 140 initiating actuation of one or more external cameras. Asdescribed herein, the external cameras may comprise original equipmentmanufacturer installed cameras on a vehicle, third party cameras (e.g.,dash cameras), cameras of other vehicles of bystanders or the like.

FIG. 10 illustrates an interface 1002 corresponding to emergency actionscomponent 140 initiating contact to third parties including news outlet,legal search, ambulance or other emergency services, social justiceorganizations such as the American Civil Liberties Union, or the like.

In view of the subject matter described herein, methods that may berelated to various embodiments may be better appreciated with referenceto the flowcharts of FIGS. 11-12 . While the methods are shown anddescribed as a series of blocks, it is noted that associated methods orprocesses are not limited by the order of the blocks. It is furthernoted that some blocks and corresponding actions may occur in differentorders or concurrently with other blocks. Moreover, different blocks oractions may be utilized to implement the methods described hereinafter.Various actions may be completed by one or more of users, mechanicalmachines, automated assembly machines (e.g., including one or moreprocessors or computing devices), or the like.

FIG. 11 depicts an exemplary flowchart of non-limiting method 1100associated with a public safety systems, according to various aspects ofthe subject disclosure. As an example, method 1100 may determine ablending process based on contents of a blending device and blendingpreferences. Further, method 1100 may facilitate implementation of someor all parts of described embodiments.

At 1102, a system (e.g., system 100) may determine a rating of anofficial subject to an interaction. For instance, a system may identifythe official and may query a database to identify a rating associatedwith the official. In another example, the system may receive a ratingfrom the official through an official's user device.

At 1104 the system may contact third parties 1104. In an example, thesystem may contact third parties based on user input after reviewing arating or may do so automatically based on the rating being below athreshold.

At 1106, the system may search for nearby equipment. The equipment maybe surveillance equipment, third party equipment, or the like. It isnoted that the system may search for equipment before, during, or afteran interaction.

At 1108, the system may select emergency actions to perform. Suchactions may be selected automatically, according to predeterminepreferences, or manually by a user.

FIG. 12 depicts an exemplary flowchart of non-limiting method 1200associated with public safety systems, according to various aspects ofthe subject disclosure. As an example, method 1200 may determine arating of an official based on an interaction. Further, method 1200 mayfacilitate implementation of some or all parts of described embodiments.

At 1200, a system (e.g., system 100) may identify an official andinteraction details. The official may be identified based on manual orautomatic input. For instance, a user may enter an ID of an official,the official may provide information, or the like. Location informationor other environmental information may also be identified,

At 1204, the system may receive user input regarding a rating, such as auser rating the interaction based on a subjective score (e.g., numericalscore, etc.).

At 1206, the system may receive data associated with the interactionsuch as biometric information, length of interaction, recorded audio orvideo information, or the like. Such information may indicate objectivescoring parameters.

At 1208, the system may determine a weighted rating of the officialbased at least on the user input and input associated with theinteraction. In some embodiments, the weighting may factor in how a userhas rated officials in the past.

At 1210, the system may update a historic rating for an official. Thismay include applying the user's rating from 1208 to an algorithm toupdate a global rating for an official.

What has been described above may be further understood with referenceto the following figures. FIGS. 13 and 14 provide exemplary operatingenvironments or systems capable of implementing one or more systems,apparatuses, or processes described above. FIGS. 13 and 14 are notintended to limit the scope of such systems, apparatuses, or processes.By way of example, computing environment 1300 may refer to one or moreembodiment of the various embodiments described with reference to theabove figures. However, variations to computing environment 1300 may beobvious to achieve aspects or processes described herein.

FIG. 13 is a schematic diagram of a computing environment 1300 inaccordance with various disclosed aspects. It is noted that computingenvironment 1300 may include various other components or aspects. Asdepicted, computing environment 1300 may include one or more client(s)1302, one or more server(s) 1304, one or more client data store(s) 1320,one or more server data store(s) 1310, and a communication framework1306.

While depicted as a desktop computer(s), client(s) 1302 may includevarious other devices that may comprise hardware and/or software (e.g.,program threads, processes, computer processors, non-transitory memorydevices, etc.). In an example, client(s) 1302 may include laptopcomputers, smart phones, tablet computers, wearables, etc. The client(s)1302 may include or employ various aspects disclosed herein. Forexample, client(s) 1302 may include or employ all or part of varioussystems and processes disclosed herein.

Likewise, server(s) 1304 may include various devices that may comprisehardware and/or software (e.g., program threads, processes, computerprocessors, non-transitory memory devices, etc.). Server(s) 1304 mayinclude or employ various aspects disclosed herein. For example,server(s) 1304 may include or employ all or part of various systems andprocesses disclosed herein. It is noted that server(s) 1304 andclient(s) 1302 may communicate via communication framework 1306. In anexemplary communication, client(s) 1302 and server(s) 1304 may utilizepacketed data (e.g., data packets) adapted to be transmitted between twoor more computers. For instance, data packets may include codedinformation associated with printing requests, orders, availableprinters, parameters associated with print-receptive media, or the like.

Communication framework 1306 may comprise various network devices (e.g.,access points, routers, base stations, etc.) that may facilitatecommunication between client(s) 1302 and server(s) 1304. It is notedthat various forms of communications may be utilized, such as wired(e.g., optical fiber, twisted copper wire, etc.) and/or wireless (e.g.,cellular, Wi-Fi, NFC, etc.) communications.

In various embodiments, client(s) 1302 and server(s) 1304 mayrespectively include or communicate with one or more client datastore(s) 1320 or one or more server data store(s) 1310. The data storesmay store data local to client(s) 1302 or server(s) 1304.

In at least one embodiment, a client of client(s) 1302 may transfer datadescribing a print order, user account data, printer device data, or thelike to a server of server(s) 1304. The server may store the data and/oremploy processes to alter the data. For example, the server may transmitthe data to other clients of client(s) 1302.

FIG. 14 is a block diagram of a computer system 1400 that may beemployed to execute various disclosed embodiments. It is noted thatvarious components may be implemented in combination withcomputer-executable instructions, hardware devices, and/or combinationsof hardware and software devices that may be performed by computersystem 1400.

Computer system 1400 may include various components, hardware devices,software, software in execution, and the like. In embodiments, computersystem 1400 may include computer 1402. Computer 1402 may include asystem bus 1408 that couples various system components. Such componentsmay include a processing unit(s) 1404, system memory device(s) 1406,disk storage device(s) 1414, sensor(s) 1435, output adapter(s) 1434,interface port(s) 1430, and communication connection(s) 1444. One ormore of the various components may be employed to perform aspects orembodiments disclosed herein. In an aspect, the computer system 1400 may“learn,” such as described above user preferences based uponmodifications of workout routines by users, through the rating ofworkout routine both positively and negatively. For example, thecomputer system 1400 may modify a particular workout routine (or a setthereof) as the majority of users or supermajority thereof havedisapproved of the workout routine (such as for strength, speed,cardiovascular challenge, length of time, or a variety of thesefactors). The computer system 1400 may dynamically push out the revisedworkout routine or receive the revised workout routine as applicable.

The processing unit(s) 1404 may comprise various hardware processingdevices, such as single-core or multi-core processing devices. Moreover,processing unit(s) 1404 may refer to a “processor”, “controller”,“computing processing unit (CPU)”, or the like. Such terms generallyrelate to a hardware device. Additionally, processing unit(s) 1404 mayinclude an integrated circuit, an application specific integratedcircuit (ASIC), a digital signal processor (DSP), a field-programmablegate array (FPGA), a programmable logic controller (PLC), a complexprogrammable logic device (CPLD), a discrete gate or transistor logic,discrete hardware components, or the like.

System memory 1406 may include one or more types of memory, suchvolatile memory 1410 (e.g., random access memory (RAM)) and non-volatilememory 1412 (e.g., read-only memory (ROM)). ROM may include erasableprogrammable ROM (EPROM), electrically erasable programmable ROM(EEPROM). In various embodiments, processing unit(s) 1404 may executecomputer executable instructions stored in system memory 1406, such asoperating system instructions and the like.

Computer 1402 may also include one or more hard drive(s) 1414 (e.g.,EIDE, SATA). While hard drive(s) 1414 are depicted as internal tocomputer 1402, it is noted that hard drive(s) 1414 may be externaland/or coupled to computer 1402 via remote connections. Moreover, inputport(s) 1430 may include interfaces for coupling to input device(s)1428, such as disk drives. Disk drives may include components configuredto receive, read and/or write to various types of memory devices, suchas magnetic disks, optical disks (e.g., compact disks and/or otheroptical media), flash memory, zip drives, magnetic tapes, and the like.

It is noted that hard drive(s) 1414 and/or other disk drives (ornon-transitory memory devices in general) may store data and/orcomputer-executable instructions according to various describedembodiments. Such memory devices may also include computer-executableinstructions associated with various other programs or modules. Forinstance, hard drives(s) 1414 may include operating system modules,application program modules, and the like. Moreover, aspects disclosedherein are not limited to a particular operating system, such as acommercially available operating system.

Input device(s) 1428 may also include various user interface devices orother input devices, such as sensors (e.g., microphones, pressuresensors, light sensors, etc.), scales, cameras, scanners, facsimilemachines, and the like. A user interface device may generateinstructions associated with user commands. Such instructions may bereceived by computer 1402. Examples of such interface devices include akeyboard, mouse (e.g., pointing device), joystick, remote controller,gaming controller, touch screen, stylus, and the like. Input port(s)1430 may provide connections for the input device(s) 1428, such as viauniversal serial ports USB ports), infrared (IR) sensors, serial ports,parallel ports, wireless connections, specialized ports, and the like.

Output adapter(s) 1434 may include various devices and/or programs thatinterface with output device(s) 1436. Such output device(s) 1436 mayinclude LEDs, computer monitors, touch screens, televisions, projectors,audio devices, printing devices, or the like.

In embodiments, computer 1402 may be utilized as a client and/or aserver device. As such, computer 1402 may include communicationconnection(s) 1444 for connecting to a communication framework 1442.Communication connection(s) 1444 may include devices or componentscapable of connecting to a network. For instance, communicationconnection(s) 1444 may include cellular antennas, wireless antennas,wired connections, and the like. Such communication connection(s) 1444may connect to networks via communication framework 1442. The networksmay include wide area networks, local area networks, facility orenterprise-wide networks (e.g., intranet), global networks (e.g.,Internet), satellite networks, and the like. Some examples of wirelessnetworks include Wi-Fi, Wi-Fi direct, BLUETOOTH™, Zigbee, and other802.XX wireless technologies. It is noted that communication framework1442 may include multiple networks connected together. For instance, aWi-Fi network may be connected to a wired Ethernet network.

Turning to FIG. 15 , there is an interface 1500 for an application tool1502 that merges messaging streams from a first contact to a secondcontact. For instance, the application tool 1502 may take an existingthread associated with the second contact with a messaging stream (e.g.,text messaging, email messaging, media messaging, or the like) andrelease the first contact. As an example, when a user receives anupdated contact, such as a new cellular number, the message streamsbetween the user and other users does not carry over with the user'supdated contact. Thus, any correspondence between the user and otherusers creates a new message stream. This may result in inefficiencies,loss of message streams, and confusion for users.

Interface 1500, which may be controlled by an application tool 1502installed as software or an “app” on a user's mobile device or computingdevice, may merge messaging streams without loss of messaging content.For instance, a user may identify a new or working contact at 1504. Theuser may then identify one or more other or old contacts at 1508. Theuser may select to merge the messaging streams and the application tool1502 may automatically merge the messaging stream such that the user'sconversation with the other or old contacts 1508 is now within amessaging stream for the new contact 1504.

According to some embodiments, the application tool 1502 mayautomatically identify the new or working contact 1504 and the one ormore other or old contacts 1508 based on a machine learning orprobabilistic analysis algorithm. For example, the application tool 1502may identify contact information sent in a message, analyze content of amessage to determine patterns (e.g., common phrases, use of emojis, useof media content, image recognition of faces, etc.), or the like toidentify that the new or working contact 1504 is associated with thesame user of the one or more other or old contacts 1508. It is notedthat the application tool 1502 may identify the relationship between thecontacts 1504, 1508 based on determining a likelihood that that theusers are the same user.

Turning to FIG. 16 , there is an exemplary interface 1600 of a contactidentifying other or old contacts 1508 and a new or working contact1504. In examples, the contact information may be store or updated to auser's device, a cloud, shared with others within a network, or thelike.

The terms “component,” “module,” “system,” “interface,” “platform,”“service,” “framework”, “connector”, “controller”, or the like aregenerally intended to refer to a computer-related entity. Such terms mayrefer to at least one of hardware, software, or software in execution.For example, a component may include a computer-process running on aprocessor, a processor, a device, a process, a computer thread, or thelike. In another aspect, such terms may include both an applicationrunning on a processor and a processor. Moreover, such terms may belocalized to one computer and/or may be distributed across multiplecomputers.

What has been described above includes examples of the presentspecification. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing the present specification, but one of ordinary skill in theart may recognize that many further combinations and permutations of thepresent specification are possible. Each of the components describedabove may be combined or added together in any permutation to defineembodiments disclosed herein. Accordingly, the present specification isintended to embrace all such alterations, modifications and variationsthat fall within the spirit and scope of the appended claims.Furthermore, to the extent that the term “includes” is used in eitherthe detailed description or the claims, such term is intended to beinclusive in a manner similar to the term “comprising” as “comprising”is interpreted when employed as a transitional word in a claim.

Aspects Listing

Aspect 1. A method implemented by a computing device of a user maycomprise receiving, from an external device of an individual,identification data of the individual associated with the externaldevice, accessing from one or more databases, by the computing device ofthe user, ratings data specific to the individual, the ratings data isbased on historical interactions of the individual, comparing theratings data with one or more of a plurality of threshold values,determining, based on the comparing, whether the ratings data satisfiesone or more of the plurality of threshold values, and initiating one ormore of a plurality of action sets responsive to the ratings datasatisfying the one or more of the plurality of threshold values.

Aspect 2. The method of Aspect 1, further comprising activating,responsive to receiving the data identifying the individual, a softwareapplication operating on the computing device of the user, andoutputting, on a display of the computing device, the data identifyingthe individual associated with the external device using the softwareapplication.

Aspect 3. The method of Aspect 1, further comprising identifying acamera at a location within a vicinity of the computing device of theuser.

Aspect 4. The method of Aspect 3, further comprising generatinginstructions informing the user to travel to the location of the camera,and outputting the instructions on a display of the computing device.

Aspect 5. The method of Aspect 1, wherein the initiating of the one ormore of the plurality of action sets responsive to the ratings datasatisfying the one or more of the plurality of threshold valuesincludes: activating, responsive to an input from the user, an audiorecording component that is included as part of the computing device ofthe user, and activating, responsive to an additional input from theuser, an image capturing component that is included as part of thecomputing device of the user.

Aspect 6. The method of Aspect 1, wherein the initiating of the one ormore of the plurality of action sets responsive to the ratings datasatisfying the one or more of the plurality of threshold values includestransmitting, responsive to an input from the user, text messages totarget devices that are external to and independent of the computingdevice.

Aspect 7. The method of Aspect 1, wherein the initiating of the one ormore of the plurality of action sets responsive to the ratings datasatisfying the one or more of the plurality of threshold valuesincludes: automatically activating an audio recording component that isincluded as part of the computing device of the user, automaticallyactivating an image capturing component that is included as part of thecomputing device of the user, and automatically transmitting textmessages to target devices that are external to and independent of thecomputing device.

Aspect 8. The method of Aspect 1, further comprising activating,responsive to receiving the data identifying the individual, a softwareapplication operating on the computing device of the user, and receivingin real time, from the external device, a request for a video conferencewith the user.

Aspect 9. The method of Aspect 8, further comprising accepting in realtime, by the computing device, the request for the video conferencebased on an input from the user, establishing, by the computing deviceusing the software application, a secure connection between thecomputing device and the external device the video conference, andperforming the video conference via a display of the computing deviceand an additional display included as part of the external device, thevideo conference including the user and the individual.

Aspect 10. The method of Aspect 9, further comprising receiving,responsive to an additional input from the user via the softwareapplication, an input of a new rating specific to the individual, theinput of the new rating is based on the video conference that includesthe user and the individual, and updating the ratings data specific tothe individual to include the new rating.

Aspect 11. A system comprises one or more processors included as part ofa computing device, and non-transitory computer readable medium storinginstructions that, when executed by the one or more processors, causethe computing device to receive, from an external device of anindividual, identification data of the individual associated with theexternal device, access, from one or more databases, ratings dataspecific to the individual, the ratings data is based on historicalinteractions of the individual, compare the ratings data with one ormore of a plurality of threshold values, determine, based on thecomparing, whether the ratings data satisfies one or more of theplurality of threshold values, and initiate one or more of a pluralityof action sets responsive to the ratings data satisfying the one or moreof the plurality of threshold values.

Aspect 12. The system of Aspect 11, wherein the non-transitory computerreadable medium storing instructions that, when executed by the one ormore processors, further cause the computing device to activate,responsive to receiving the data identifying the individual, a softwareapplication operating on the computing device of the user, and output,on a display of the computing device, the data identifying theindividual associated with the external device using the softwareapplication.

Aspect 13. The system of Aspect 11, wherein the non-transitory computerreadable medium storing instructions that, when executed by the one ormore processors, further cause the computing device to identify a cameraat a location within a vicinity of the computing device of the user.

Aspect 14. The system of Aspect 13, wherein the non-transitory computerreadable medium storing instructions that, when executed by the one ormore processors, further cause the computing device to generateinstructions informing the user to travel to the location of the camera,and outputting the instructions on a display of the computing device.

Aspect 15. The system of Aspect 11, wherein the non-transitory computerreadable medium storing instructions that, when executed by the one ormore processors, further cause the computing device to activate,responsive to an input from the user, an audio recording component thatis included as part of the computing device of the user, and activate,responsive to an additional input from the user, an image capturingcomponent that is included as part of the computing device of the user.

Aspect 16. The system of Aspect 11, wherein the non-transitory computerreadable medium storing instructions that, when executed by the one ormore processors, causes the computing device to initiate the one or moreof the plurality of action sets responsive to the ratings datasatisfying the one or more of the plurality of threshold values bytransmitting, responsive to an input from the user, text messages totarget devices that are external to and independent of the computingdevice.

Aspect 17. The system of Aspect 11, wherein the non-transitory computerreadable medium storing instructions that, when executed by the one ormore processors, causes the computing device to initiate the one or moreof the plurality of action sets responsive to the ratings datasatisfying the one or more of the plurality of threshold values byautomatically activating an audio recording device that is included aspart of the computing device of the user, automatically activating animage capturing device that is included as part of the computing deviceof the user, and automatically transmitting text messages to targetdevices that are external to and independent of the computing device.

Aspect 18. The system of Aspect 11, wherein the non-transitory computerreadable medium storing instructions that, when executed by the one ormore processors, further cause the computing device to activate,responsive to receiving the data identifying the individual, a softwareapplication operating on the computing device of the user, and receivein real time, from the external device, a request for a video conferencewith the user.

Aspect 19. The system of Aspect 18, wherein the non-transitory computerreadable medium storing instructions that, when executed by the one ormore processors, further cause the computing device to accept in realtime, by the computing device, the request for the video conferencebased on an input from the user, establish, by the computing deviceusing the software application, a secure connection between thecomputing device and the external device the video conference, andperform the video conference via a display of the computing device andan additional display included as part of the external device, the videoconference including the user and the individual.

Aspect 20. The system of Aspect 19, wherein the non-transitory computerreadable medium storing instructions that, when executed by the one ormore processors, further cause the computing device to receive,responsive to an additional input from the user via the softwareapplication, a new rating specific to the individual, the input of thenew rating is based on the video conference that includes the user andthe individual, and update the ratings data specific to the individualto include the new rating.

What is claimed is:
 1. A method implemented by a computing device of auser, the method comprising: receiving, from an external device of anindividual, identification data of the individual associated with theexternal device; identifying a camera at a location within a vicinity ofthe computing device of the user; generating instructions informing theuser to travel to the location of the camera; outputting theinstructions on a display of the computing device; accessing from one ormore databases, by the computing device of the user, ratings dataspecific to the individual, the ratings data is based on historicalinteractions of the individual with one or more other users; comparingthe ratings data with one or more of a plurality of threshold values;determining, based on the comparing, whether the ratings data satisfiesone or more of the plurality of threshold values; and initiating one ormore of a plurality of action sets responsive to the ratings datasatisfying the one or more of the plurality of threshold values.
 2. Themethod of claim 1, further comprising: activating, responsive toreceiving the data identifying the individual, a software applicationoperating on the computing device of the user; and outputting, on adisplay of the computing device, the data identifying the individualassociated with the external device using the software application. 3.The method of claim 1, wherein the initiating of the one or more of theplurality of action sets responsive to the ratings data satisfying theone or more of the plurality of threshold values includes: activating,responsive to an input from the user, an audio recording component thatis included as part of the computing device of the user; and activating,responsive to an additional input from the user, an image capturingcomponent that is included as part of the computing device of the user.4. The method of claim 1, wherein the initiating of the one or more ofthe plurality of action sets responsive to the ratings data satisfyingthe one or more of the plurality of threshold values includestransmitting, responsive to an input from the user, text messages totarget devices that are external to and independent of the computingdevice.
 5. The method of claim 1, wherein the initiating of the one ormore of the plurality of action sets responsive to the ratings datasatisfying the one or more of the plurality of threshold valuesincludes: automatically activating an audio recording component that isincluded as part of the computing device of the user; automaticallyactivating an image capturing component that is included as part of thecomputing device of the user; and automatically transmitting textmessages to target devices that are external to and independent of thecomputing device.
 6. The method of claim 1, further comprising:activating, responsive to receiving the data identifying the individual,a software application operating on the computing device of the user;and receiving in real time, from the external device, a request for avideo conference with the user.
 7. The method of claim 6, furthercomprising: accepting in real time, by the computing device, the requestfor the video conference based on an input from the user; establishing,by the computing device using the software application, a secureconnection between the computing device and the external device thevideo conference; and performing the video conference via a display ofthe computing device and an additional display included as part of theexternal device, the video conference including the user and theindividual.
 8. The method of claim 7, further comprising: receiving,responsive to an additional input from the user via the softwareapplication, an input of a new rating specific to the individual, theinput of the new rating is based on the video conference that includesthe user and the individual; and updating the ratings data specific tothe individual to include the new rating.
 9. The method of claim 1,wherein the ratings data based on historical interactions of theindividual with one or more other users comprises at least one of:ratings data based on user feedback provided by the one or more otherusers; or ratings data based on information generated by one or moresensors during the historical interactions of the individual with one ormore other users, wherein the one or more sensors comprise at least oneof a biometric sensor, an audio sensor, or an image sensor.
 10. A systemcomprises: one or more processors included as part of a computing deviceof a user; and non-transitory computer readable medium storinginstructions that, when executed by the one or more processors, causethe computing device to: receive, from an external device of anindividual, identification data of the individual associated with theexternal device; identify a camera at a location within a vicinity ofthe computing device of; generate instructions informing the user totravel to the location of the camera; output the instructions on adisplay of the computing device; access, from one or more databases,ratings data specific to the individual, the ratings data is based onhistorical interactions of the individual with one or more other users;compare the ratings data with one or more of a plurality of thresholdvalues; determine, based on the comparing, whether the ratings datasatisfies one or more of the plurality of threshold values; and initiateone or more of a plurality of action sets responsive to the ratings datasatisfying the one or more of the plurality of threshold values.
 11. Thesystem of claim 10, wherein the non-transitory computer readable mediumstoring instructions that, when executed by the one or more processors,further cause the computing device to: activate, responsive to receivingthe data identifying the individual, a software application operating onthe computing device of the user; and output, on a display of thecomputing device, the data identifying the individual associated withthe external device using the software application.
 12. The system ofclaim 10, wherein the non-transitory computer readable medium storinginstructions that, when executed by the one or more processors, furthercause the computing device to: activate, responsive to an input from theuser, an audio recording component that is included as part of thecomputing device of the user; and activate, responsive to an additionalinput from the user, an image capturing component that is included aspart of the computing device of the user.
 13. The system of claim 10,wherein the non-transitory computer readable medium storing instructionsthat, when executed by the one or more processors, causes the computingdevice to initiate the one or more of the plurality of action setsresponsive to the ratings data satisfying the one or more of theplurality of threshold values by transmitting, responsive to an inputfrom the user, text messages to target devices that are external to andindependent of the computing device.
 14. The system of claim 10, whereinthe non-transitory computer readable medium storing instructions that,when executed by the one or more processors, causes the computing deviceto initiate the one or more of the plurality of action sets responsiveto the ratings data satisfying the one or more of the plurality ofthreshold values by: automatically activating an audio recording devicethat is included as part of the computing device of the user;automatically activating an image capturing device that is included aspart of the computing device of the user; and automatically transmittingtext messages to target devices that are external to and independent ofthe computing device.
 15. The system of claim 10, wherein thenon-transitory computer readable medium storing instructions that, whenexecuted by the one or more processors, further cause the computingdevice to: activate, responsive to receiving the data identifying theindividual, a software application operating on the computing device ofthe user; and receive in real time, from the external device, a requestfor a video conference with the user.
 16. The system of claim 15,wherein the non-transitory computer readable medium storing instructionsthat, when executed by the one or more processors, further cause thecomputing device to: accept in real time, by the computing device, therequest for the video conference based on an input from the user;establish, by the computing device using the software application, asecure connection between the computing device and the external devicethe video conference; and perform the video conference via a display ofthe computing device and an additional display included as part of theexternal device, the video conference including the user and theindividual.