Wireless security device and method to place emergency calls

ABSTRACT

A wireless security device and method includes implementing, by a wireless security device, one or more Bluetooth™ wireless protocol profiles for connecting to one or more Bluetooth™ enabled devices. A Bluetooth™ enabled telephony device may be paired with the wireless security device using one or more Bluetooth™ wireless protocol profiles. The wireless security device may send a command to the telephony device over the wirelessly paired Bluetooth™ connection, to the telephony device. The command may cause the telephony device to place a telephone call to an emergency telephone number. Once the telephone call is placed, a prerecorded emergency message may be sent from the wireless security device to the telephony device, causing the telephony device to play the prerecorded emergency message.

RELATED APPLICATION

This application is a continuation of U.S. application Ser. No.12/554,517, filed on 4 Sep. 2009, the contents of which are hereinincorporated by reference in its entirety.

TECHNICAL FIELD

This disclosure relates to security and, more particularly, to wirelesssecurity devices and methods.

BACKGROUND

Bluetooth™ is a wireless protocol for connecting and exchanging databetween electronic devices over short distances. Bluetooth™ wirelesstechnology is used in many ways today. Most countries now require theuse of handsfree systems while driving a motorized vehicle in order toavoid driver distractions on the roads. As a result, almost every phoneproduced today supports the Bluetooth™ Hands-Free and Bluetooth™ Headsetprofile.

Many people use their mobile phones as more than simply a mobiletelephony device. Smart Phones are now becoming extremely prevalent andare the largest growing mobile phone market. These phones are oftenexpensive to replace, and worse yet, they hold information that isimportant to the owner of the mobile phone such as contacts, calendars,applications, photos, and sometimes even critical personal or businessdata.

Similarly, media players have become ubiquitous with many media playersnow supporting Bluetooth™ wireless stereo streaming through the A2DPprofile. A device that protects a mobile phone or media players fromtheft or loss using the Bluetooth™ wireless technology may be useful tohelp protect this valuable data or media. A device that places emergencytelephone calls through a Bluetooth™ mobile phone is also needed. Adevice that includes additional security features may protect a usereven further.

BRIEF SUMMARY OF THE DISCLOSURE

In an embodiment, a wireless security device may include processor, awireless transceiver, a memory; and computer program instructions storedin the memory, which, when executed by the processor, cause the wirelesssecurity device to perform operations. The operations may includeimplementing one or more Bluetooth™ wireless protocol profiles forconnecting to one or more Bluetooth™ enabled devices; wirelesslypairing, via the wireless transceiver, with a Bluetooth™ enabledtelephony device using at least one of the one or more Bluetooth™wireless protocol profiles, thus creating a wirelessly paired Bluetooth™connection between the wireless security device and the telephonydevice; sending a command, over the wirelessly paired Bluetooth™connection, to the telephony device to place a telephone call to anemergency telephone number; and sending a prerecorded emergency messageto the telephony device over the wirelessly paired Bluetooth™connection, causing the telephony device to play the prerecordedemergency message.

One or more of the following features may be included. The Bluetooth™wireless protocol profiles may be a Bluetooth™ hands-free profile, aBluetooth™ headset profile, and/or a Bluetooth™ advanced audiodistribution profile.

The operations may include receiving, over the wirelessly pairedBluetooth™ connection, a location of the Bluetooth™ enabled telephonydevice, and identifying the emergency telephone number based on thelocation. Receiving the location of the Bluetooth™ enabled telephonydevice may include sending a command to: a telephone number of thetelephony device, a telephone network providing service to the telephonydevice, and/or a global positioning system (GPS) location of thetelephony device. A response from the telephony device may include atelephone number of the telephony device, a telephone network providingservice to the telephony device, and/or a GPS location of the telephonydevice. The operations may also include determining a current locationof the telephony device based on one or more of the telephone number,the telephone network, and the GPS location.

Identifying the emergency telephone number may include accessing alookup table stored in the memory. The lookup table may include locationcodes and emergency telephone numbers associated with the locationcodes. The location of the one or more emergency telephone numbers maybe correlated with at least one of the one or more location codes toobtain the location.

The wireless security device may also include a speaker and amicrophone. The operations may further include providing speakerphoneservices such as sending audio data captured by the microphone to thetelephony device via the wireless transceiver, and audibly playing, bythe speaker, audio data received from the telephony device via thewireless transceiver. The wireless security device may also generate apanic alarm by generating an audible sound through the speaker.

The wireless security device may also include a light emitting diode anda vibration motor. The wireless security device may generate anotification when an incoming telephone call is received by thetelephony device. The wireless security device may generate anout-of-range notification when a measurement of a quality parameter ofthe Bluetooth™ wireless connection indicates the quality parameter ofthe Bluetooth™ wireless connection is outside a predetermined qualitythreshold. The out-of-range notification may include generating a uniqueout-of-range notification for each Bluetooth™ enabled device if morethan one Bluetooth™ enabled devices are paired with the wirelesssecurity device. The wireless security device generate a notificationwhen at least one of the one or more Bluetooth™ wireless protocolprofiles is disconnected by a paired Bluetooth™ device. Thenotifications may comprise illuminating the light emitting diode,activating the vibration motor, and/or generating an audible soundthrough the speaker.

The wireless security device may also include a button. In response toan activation of the button, the wireless security device may cause atelephony device to answer or cancel an incoming telephone call. Inresponse to an activation of the button, the wireless security devicemay also cancel a panic alarm.

The processor and/or the wireless security transceiver of the wirelesssecurity device may implement Bluetooth™ low energy technology.

In another embodiment, a method includes implementing, by a wirelesssecurity device, one or more Bluetooth™ wireless protocol profiles forconnecting to one or more Bluetooth™ enabled devices. The method maywirelessly pair, via a wireless transceiver of the wireless securitydevice, with a Bluetooth™ enabled telephony device using at least one ofthe one or more Bluetooth™ wireless protocol profiles, thus creating awirelessly paired Bluetooth™ connection between the wireless securitydevice and the telephony device. The method may cause the wirelesssecurity device to send a command over the wirelessly paired Bluetooth™connection, to the telephony device. The command may cause the telephonydevice to place a telephone call to an emergency telephone number. Oncethe telephone call is placed, the method may send a prerecordedemergency message from the wireless security device to the telephonydevice over the wirelessly paired Bluetooth™ connection, causing thetelephony device to play the prerecorded emergency message.

One or more of the following features may be included. The Bluetooth™wireless protocol profiles may be a Bluetooth™ hands-free profile, aBluetooth™ headset profile, and/or a Bluetooth™ advanced audiodistribution profile. The method may receive, over the wirelessly pairedBluetooth™ connection, a location of the Bluetooth™ enabled telephonydevice; and may identify the emergency telephone number based on thelocation. Receiving the location of the Bluetooth™ enabled telephonydevice may include sending a command to the telephony device requestinga telephone number of the telephony device, a telephone networkproviding service to the telephony device, and/or a global positioningsystem (GPS) location of the telephony device. The method may alsoinclude receiving a response from the telephony device. The response mayinclude a telephone number of the telephony device, a telephone networkproviding service to the telephony device, and/or a GPS location of thetelephony device. The method may determine a current location of thetelephony device based the telephone number, the telephone network,and/or the GPS location.

Identifying the emergency telephone number may include accessing alookup table stored in the memory. The lookup table may include locationcodes, and emergency telephone numbers associated with the one or morelocation codes. Identifying the emergency telephone number may alsoinclude correlating the location with at least one of the location codesto obtain at least one of the one or more emergency telephone numbers.

The method may also send audio data captured by a microphone of thewireless security device to the telephony device via the wirelesstransceiver, and/or audibly play, by a speaker of the wireless securitydevice, audio data received from the telephony device via the wirelesstransceiver.

The method may cause the wireless security device generate anotification when an incoming telephone call is received by thetelephony device. The method may also cause the wireless security deviceto generate an out-of-range notification when a measurement of a qualityparameter of the Bluetooth™ wireless connection indicates the qualityparameter of the Bluetooth™ wireless connection is outside apredetermined quality threshold. If more than one Bluetooth™ enableddevices are paired with the wireless security device, the out-of-rangenotification may include a unique out-of-range notification for eachBluetooth™ enabled device. The method may also generate a notificationwhen a Bluetooth™ wireless protocol profiles is disconnected by a pairedBluetooth™ device. The notification may include illuminating at leastone light emitting diode of the wireless security device, activating avibration motor of the wireless security device, and/or generating anaudible sound through a speaker of the wireless security device.

In response to an activation of a button of the wireless securitydevice, the method may cause the telephony device to answer or cancel anincoming call received by the telephony device. In response to anactivation of a button of the wireless security device, the method mayalso cause the telephony device to cancel a panic alarm.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is diagrammatic view of a wireless security device and networkinfrastructure.

FIG. 2 is an architectural block diagram of a wireless security device.

FIG. 3 is a flowchart view of a security process.

FIG. 4 is diagrammatic view of a wireless security device paired to atelephony device.

FIG. 5 is diagrammatic view of a wireless security device paired to atelephony device.

FIG. 6 is a data layout view of a lookup table containing geographiclocations and emergency numbers.

FIG. 7 is an architectural block diagram of notification components of awireless security device.

FIG. 8 is an external view of a wireless security device.

Like references in the drawings denote like elements.

DETAILED DESCRIPTION

As will be appreciated by one skilled in the art, the present disclosuremay be embodied as a system, method or computer program product.Accordingly, the present disclosure may take the form of an entirelyhardware embodiment, an entirely software embodiment (includingfirmware, resident software, micro-code, etc.) or an embodimentcombining software and hardware aspects that may all generally bereferred to herein as a “circuit,” “module” or “system.” Furthermore,the present disclosure may take the form of a computer program productembodied in one or more computer-readable (i.e., computer-usable)medium(s) having computer-usable program code embodied thereon.

Any combination of one or more computer-readable medium(s) may beutilized. The computer-readable medium may be a computer readable signalmedium or a computer readable storage medium. A computer-readablestorage medium may be, for example, but not limited to, an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system,apparatus, a device, or any suitable combination of the foregoing. Morespecific examples (a non-exhaustive list) of the computer-readablestorage medium would include the following: an electrical connectionhaving one or more wires, a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), an optical fiber,a portable compact disc read-only memory (CD-ROM), an optical storagedevice, a magnetic storage device, or any suitable combination of theforegoing. Note that the computer-readable storage medium could even bepaper or another suitable medium upon which a program is printed, as theprogram can be electronically captured, via, for instance, opticalscanning of the paper or other medium, then compiled, interpreted, orotherwise processed in a suitable manner, if necessary, and then storedin a computer memory. In the context of this document, acomputer-readable storage medium may be any medium that can contain, orstore a program for use by or in connection with an instructionexecution system, apparatus, or device.

A computer readable signal medium may include a propagated data signalwith computer-usable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electro-magnetic, optical, or any suitable combination thereof, Acomputer readable signal medium may be any computer-readable medium thatcan contain, store, communicate, propagate, or transport a program foruse by or in connection with an instruction execution system, apparatus,or device.

Program code embodied on a computer-readable medium may be transmittedusing any appropriate medium, including but not limited to wireless,wireline, optical fiber cable, RF, etc.

Computer program code for carrying out operations of the presentdisclosure may be written in an object oriented programming languagesuch as Java™, Smalltalk™, C++ or the like. However, the computerprogram code for carrying out operations of the present disclosure mayalso be written in conventional procedural programming languages, suchas the “C” programming language or similar programming languages. Theprogram code may execute entirely on a computing device, such as thewireless security device described below, partly on a computing device,as a stand-alone software package, partly on a remote computer orcomputing device, or entirely on a remote computer or server. In thelatter scenario, the remote computing device may be connected to theuser's computer through a local area network (LAN), a wide area network(WAN), or a personal area network (PAN) (e.g. a Bluetooth™ network), forexample.

The present disclosure is described below with reference to flowchartillustrations and/or block diagrams of methods, apparatus (systems) andcomputer program products according to embodiments of the disclosure. Itwill be understood that each block of the flowchart illustrations and/orblock diagrams, and combinations of blocks in the flowchartillustrations and/or block diagrams, can be implemented by computerprogram instructions. These computer program instructions may beprovided to a processor of a general purpose computer, a wirelessdevice, a special purpose computer, or other programmable dataprocessing apparatus to produce a machine, such that the instructions,which execute via the processor of the computer or other programmabledata processing apparatus, create means for implementing thefunctions/acts specified in the flowchart and/or block diagram block orblocks. Also, it is understood that in practice, embodiments of thedisclosure may implement, execute, or run the elements and/or blocks ofthe flowchart illustrations in any appropriate order, even though theflowchart illustrations may depict a particular embodiment with eachblock in a particular order.

These computer program instructions may also be stored in acomputer-readable memory that can direct a processor or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including instruction meanswhich implement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computingdevice or other programmable data processing apparatus to cause a seriesof operational steps to be performed on the computing device or otherprogrammable apparatus to produce a computer implemented process suchthat the instructions which execute on the computer or otherprogrammable apparatus provide steps for implementing the functions/actsspecified in the flowchart and/or block diagram block or blocks.

FIG. 1 depicts a computing infrastructure within which security process10 may reside. FIG. 1 shows personal area network 12. Personal areanetwork 12 may be a wireless network used to communicate among computerdevices over a relatively short range. As an example, personal areanetwork 12 may be a Bluetooth™ network. As is known in the art,Bluetooth™ is a wireless protocol for connecting and exchanging databetween electronic devices over short distances.

Various devices may be part of personal area network 12. For example,FIG. 1 shows wireless security device 14 connected to telephony device16, 18 and media player 20, as shown by network connections 22, 24, 26.Telephony devices 16, 18 may be devices capable of placing a telephonecall over a wireless or wired telephone network. For example, telephonydevices 16, 18 may be cellular telephones, smart phones, modems,personal digital assistants, wired telephones, or other telephone orcomputing devices capable of placing a telephone call. Telephony devices16, 18 may also be capable of performing other functions. For example,Telephony devices 16, 18 may include a processor (not shown) and amemory (not shown). Telephony devices 16, 18 may also include softwareinstructions stored in the memory, which, when executed by theprocessor, cause telephony devices 16, 18 to perform operations such asexecuting a software application, executing an operating system, andcommunicating over a WAN network, for example. Telephony devices 16, 18may also be capable of playing media files, such as audio or videofiles.

Media player 20 may be a device capable of playing media files, such asaudio or video files. Media player 20 may also include a processor (notshown) and a memory (not shown). Media player 20 may also includessoftware instructions, stored in the memory, which, when executed by theprocessor, cause media player 20 to perform operations such as executinga software application, executing an operating system, and communicatingover a WAN network, for example. Examples of media player 20 mayinclude, but are not limited to, an iPod™ and a Zune™ media player, forexample. In some cases, media player 20 may not be able to performtelephony device functions, such as placing or receiving a phone call.

Wireless security device 14 may also be connected to computer 28 vianetwork connection 30. Computer 28 may be a general purpose computersuch as a workstation or a server computer, a laptop computer, a desktopcomputer, a netbook computer, or any other type of computer or computingdevice.

Wireless security device 14 is also shown connected to routing device 32through network connection 34. Routing device 32 may be a routing devicefor communication between two or more networks. As shown, routing deviceis also connected to network 36. Network 36 may be a wide area network,a local area network, a personal area network, a cellular network, orany other type of network. Wireless security device may communicate withnetwork 36 via routing device 34, for example. Wireless security device14 may also communicate with network 36 through various othercommunication paths. As shown in FIG. 1., wireless security device 14may also communicate with network 36 through network connection 30 andcomputer 28, for example. In general, wireless security device 14 mayalso communication with network 36 (or other networks) through anyavailable network communication path including but not limited to any ofthe telephony devices 16 and 18, or any media player 20.

The various computing devices (i.e. wireless security device 14,telephony devices 16, 18, media player 20, computer 28, and routingdevice 32) may be Bluetooth™ enabled devices. In other words, thevarious computing devices may implement and/or comply with theBluetooth™ wireless protocol. As is known in the art, Bluetooth™ is awireless networking protocol that allows devices to communicate overwireless connections. If the various computing devices are Bluetooth™enabled devices, then network connections 22, 24, 26, and/or 30 may beBluetooth™ network connections.

FIG. 2 shows an architectural block diagram of wireless security device14. As shown, wireless security device 14 may include processor 202 andmemory 204. Memory 204 may be any type of computer readable storagemedium, including, but not limited to, a hard drive, a CD, a DVD, arandom access memory (RAM), a read only memory (ROM), a FLASH memory, orany other type of computer readable storage medium capable of storingprogram instructions.

In an embodiment, processor 202 may be processor specific to Bluetooth™applications. However, processor 202 may also be a general purposeprocessor programmed with software instructions to perform operationsspecific to a Bluetooth™ application. Processor 202 may be programmedwith software instructions to perform the operations of security process10 (which will be discussed below), and/or programmed with softwareinstructions to perform any other operations defined and/or implementedby the software instructions. Processor 202 may be a single processor,or may be a series of processors. Processor 202 may also be a chipsetcomprising multiple processors, computer chips, and or computer chipdies. Processor 202 may include input and output interface lines tocommunicate with, take input from, and/or provide output to otherdevices or elements. For example, processor 202 may include a memoryinterface/bus for communicating with memory 204, a communicationinterface/bus for communicating with wireless transceiver 208, an audiointerface/bus for communicating with speaker 210 and/or microphone 212,and a general purpose 10 interface for communicating with andcontrolling vibration motor 214 and/or LED bank 216.

Wireless security device 14 may also include wireless transceiver 206and antenna 208. Wireless transceiver 206 and antenna 208 may provideconnectivity to a wireless network, such as personal area network 12,which may include sending and receiving wireless signals from thevarious devices that comprise personal area network 12, for example.Although shown as separate from processor 202, wireless transceiver 206and or antenna 208 may be, in some embodiments, incorporated intoprocessor 202. For example, wireless transceiver 206 and/or antenna 208may be part of the same computer chip as processor 202, and/or may bepart of the same chipset as processor 202.

Wireless transceiver 206 may be a Bluetooth™ wireless transceiver, forexample, configured to provide connectivity via the Bluetooth™ wirelessprotocol. Similarly, antenna 208 may be configured or optimized toprovide communication over a Bluetooth™ wireless connection. Antenna 208may be any type of antenna, including but not limited to: a patchantenna, a wire antenna, a dipole antenna, a microwave antenna, aslotted cylinder antenna, a helical antenna, or any other type ofantenna for providing wireless communication.

Wireless security device 14 may also comprise various input, output,and/or feedback elements, as shown in FIG. 2. Wireless security device14 may include speaker 210 and/or microphone 212, for example. Speaker210 may be an audio speaker, a piezo element, or series of speakers,which may provide audible and/or inaudible sounds. As shown in FIG. 2,speaker 210 is coupled to processor 202. Accordingly, processor 202and/or software executed by processor 202 may control the audio soundsmade by speaker 210. However, it is not necessary for speaker 210 to bedirectly coupled to processor 202, as shown in FIG. 2. For example,speaker 210 may be directly coupled to an audio driver circuit (notshown) that is coupled either directly or indirectly to processor 202.

Microphone 212 may be an audio microphone, or series of microphones,which may allow wireless security device to capture and/or recordaudible and/or inaudible sounds. As shown in FIG. 2, microphone 212 iscoupled to processor 202. Accordingly, processor 202 and/or softwareexecuted by processor 202 may control microphone 212. However, it is notnecessary for microphone 212 to be directly coupled to processor 202, asshown in FIG. 2. For example, microphone 212 may be directly coupled toan audio driver circuit (not shown) that is coupled either directly orindirectly to processor 202.

Wireless security device 14 may also include vibration motor 214.Vibration motor 214 may be a vibration motor which, when activated,causes wireless security device 14 to vibrate. If vibration motor 214 isactivated, vibration motor 214 may cause wireless security device 14 tovibrate. The vibration may provide an alert to a user (either visually,audibly, or through tactile feedback). As shown in FIG. 2, vibrationmotor 214 may be coupled to processor 202. Accordingly, processor 202and/or software executed by processor 202 may control vibration motor214. However, it is not necessary for vibration motor 214 to be directlycoupled to processor 202, as shown in FIG. 2. For example, vibrationmotor 214 may be directly coupled to and a motor driver circuit (notshown) that is coupled either directly or indirectly to processor 202.

Wireless security device 14 may also include a visual indicator (LED)bank 216. LED bank 216 may include one or more light emitting diodes(LEDs) or other visual indicators or lights. As shown in FIG. 2, LEDbank 216 is coupled to processor 202. Accordingly, processor 202 and/orsoftware executed by processor 202 may control any LEDs within LED bank216. However, it is not necessary for LED bank 216 to be directlycoupled to processor 202, as shown in FIG. 2. For example, LED bank 216may be directly coupled to an display, strobe, or LED driver circuit(not shown) that is coupled either directly or indirectly to processor202.

Wireless security device 14 may also include button 218. Button 218 maybe a single button or switch, or a series of buttons and/or switches.Button 218 may be any type of button or switch that allows a user ofwireless security device 14 to provide input to wireless security device14. For example, button 218 may be a button or switch including, but notlimited to: a pushbutton, a toggle button, a toggle switch, a selectorswitch, a momentary button, etc. A user may be able to momentarilyactivate button 14 (i.e. a momentary button), permanently activatebutton 14 (i.e. a toggle button). Momentarily activating button 14 mayinclude activating button 14 for a short period of time (e.g. less thanone second), multiple times (e.g. a double button press), or a longerperiod of time (e.g. more than one second).

As shown in FIG. 2, button 218 is coupled to processor 202. Accordingly,processor 202 and/or software executed by processor 202 may controland/or monitor button 218. Monitoring button 218 may include monitoringactivation of button 218, and/or monitoring the duration of activationof button 218. It is not necessary for button 218 to be directly coupledto processor 202, as shown in FIG. 2. For example, button 218 may bedirectly coupled to a button driver circuit (not shown) that is coupledeither directly or indirectly to processor 202.

Wireless security device 14 may also include power supply 220. Powersupply 220 may provide power to security device 14 and/or the componentsand circuits of security device 14. Power supply 220 may include adisposable battery, a rechargeable battery, a solar cell, asuper-capacitor, a power harvesting circuit, a recharge circuit, or anyother power source for providing power to security device 14. In oneimplementation, processor 202, wireless transceiver 206, and or securitydevice 14 may implement Bluetooth™ low energy technology. Accordingly,in an embodiment, power supply 220 may be configured to provide power toa Bluetooth™ low energy technology compliant device.

As discussed, security process 10 may reside in memory 204, and may beexecuted by processor 202. Turning to FIG. 3, security process 10 mayimplement one or more Bluetooth™ wireless protocol profiles forconnecting to one or more Bluetooth™ enabled devices. A Bluetooth™wireless protocol profile may be an interface that allows Bluetooth™enabled devices to communicate with each other within a set of definedparameters. For example, Bluetooth™ wireless protocol profiles mayinclude a hands-free profile, a headset profile, and/or an advancedaudio distribution profile, as well as other types of Bluetooth™wireless protocol profiles, for example.

A hands-free profile may provide services and features over a Bluetooth™wireless connection that allow hands-free kits to communicate withmobile phones. For example, if wireless security device 14 implements aheadset or hands-free profile, the headset or hands-free profile mayallow security device 14 to re-route audio from a telephone callreceived by telephony device 16, 18 through speaker 210 and/ormicrophone 212. The headset or hands-free profile may also allowwireless security device 14 to send commands to telephony devices 16,18. The commands may include AT commands, modem commands, or othercommands for controlling features and functions of telephony devices 16,18. For example, the headset or hands-free profile may also allowwireless security device 14 to cause telephony devices 16, 18 to place acall, answer a call, dial a phone number, or retrieve network-specificdata, or GPS data, etc.

A headset profile may provide services or functions over a Bluetooth™network connection that allow wireless security device 14 to act as amobile telephone headset. For example, the headset profile may allow auser to answer a telephone call received on telephony devices 16, 18 bypressing or holding button 218, for example. The headset profile mayalso allow a user of wireless security device to hear audio from thetelephone call through speaker 210 coupled to wireless security device14, and/or provide audio for the telephone call through microphone 212coupled to wireless security device 14.

An advanced audio distribution profile (A2DP) may provide services orfunctions over a Bluetooth™ network connection that allow wirelesssecurity device 14 to stream audio. For example, if security process 10implements 302 an A2DP, wireless security device 14 may be able tostream audio to/from telephony device 16, 18, media player 20, and/orcomputer 28, for example.

Security process 10 may wirelessly pair 304 with one or more telephonydevices, such as telephony devices 16, 18. Wirelessly pairing mayinclude establishing a wireless connection with telephony devices 16,18, or any other Bluetooth™ enabled device. During pairing, wirelesssecurity device 14 and telephony devices 16, 18 may agree to communicatewith each other and establish a connection. As is known in the art, thepairing process may include handshaking processes, authenticationprocesses, and/or the sharing of a security passkey. Once paired,wireless security device 14 and telephony devices 16, 18 may communicatewith each other and use any functions, services, or features provided byone or more Bluetooth™ protocol profiles that wireless security device14 and telephony devices 16, 18 share. Also, once paired, wirelesssecurity device 14 and telephony devices 16, 18 may retain their pairedstatus regardless of whether wireless security device 14 and telephonydevices 16, 18 are turned off. For example, if wireless security device14 is powered off, wireless security device 14 and telephony devices 16,18 may retain their paired status so that, when wireless security device14 is powered back on, wireless security device 14 and/or telephonydevices 16, 18 may continue to communicate without the need tore-establish a paired connection. FIG. 4 depicts wireless securitydevice 14 and telephony device 16 sharing a paired wireless Bluetooth™connection.

Security process 10 may provide features that allow a user to dial anemergency phone number. For example, security process 10 may receive 306a location of a telephony device (e.g. telephony devices 16, 18), mayidentify 308 a location of the telephony device, and may identify 308 anappropriate emergency phone number based on the location of thetelephony device. Security process 10 may also send 310 a command to thetelephony device to place a telephone call to the identified 308emergency phone number. Once the telephone call is connected, securityprocess 10 may send 312 a prerecorded message to the telephony device.The prerecorded message may contain data and/or audio helpful foridentifying the nature of the emergency. If the prerecorded messagecomprises audio, the telephony device may play the prerecorded messageover the connected emergency phone call. Additionally/alternatively, ifthe prerecorded message contains data and/or text, the telephony devicemay send the data and/or text to an emergency service center as a dataor text message, or through the connected emergency phone call.

Receiving 306 the location of a telephony device (e.g. telephony device16, 18) may include sending 312 a command to the telephony devicerequesting the location of the telephony device. Once the command issent 312, security process 10 may receive 314 a response from thetelephony device that includes the telephony devices location, orincludes information that may be used to identify the telephony device'slocation. Security process 10 may then determine 316 the location of thetelephony device based on the received 314 response. The command may bea request for the telephone number of the telephony device, a requestfor the identification of a telephone service that is providing cellularor data service to the telephony device, and/or a global positionalsystem (GPS) location of the telephony device, for example. Similarly,the received 314 response may include the telephone number of thetelephony device, an identification of the telephone service that isproviding cellular or data service to the telephony device, and or a GPSlocation of the telephony device, for example.

FIG. 5 is a diagram depicting receiving 306 the location of a telephonydevice. Wireless security device 14 may send 312 request 502 totelephony device 16. If request 502 includes a request for telephonydevice 16's telephone number, telephony device 16 may send data 504 backto wireless security device 14. In this case, data 504 may includetelephony device 16's phone number. If request 502 includes a requestfor the identification of a network providing service to telephonydevice 16, then telephony device may contact telephony device's serviceprovider to acquire the identification. Telephony device 16 may thensend data 504, which may include the identification of the network, towireless security device 14. A request 502 for the identification of thenetwork may include the AT+COPS command, an AT modem command that canidentify all available networks, for example. For example, wirelesssecurity device 14 may send 312 an AT command, such as the AT+COPScommand, to telephony device 16. Telephony device 16 may then respond towireless security device by sending data 504, which may include thetelephony device 16's network information, the telephony device 16'slocation, or information relating to telephony device 16's location, asdiscussed above.

Telephony device may also include a GPS receiver (not shown). If request502 includes a request for a GPS location of telephony device 16,telephony device may communicate with GPS satellite to determine a GPSlocation. Once telephony device 16 determines a GPS location, telephonydevice may send data 504, which may include the GPS location, towireless security device 14. A request 502 for the GPS location of thetelephony device may include the AT+CMOLRG command, an AT modem commandthat requests a GPS location of the telephony device, for example. Forexample, wireless security device 14 may send 312 an AT command, such asthe AT+CMOLRG command, to telephony device 16. Telephony device 16 maythen respond to wireless security device by sending data 504, which mayinclude telephony device 16's GPS location.

Security process 10 may identify 308 an emergency phone number based, atleast in part, upon the received 306 location of a telephony device(e.g. telephony device 16, 18). For example, if the received locationindicates that telephony device is in the United States, securityprocess 10 may identify the emergency phone number “911” as anappropriate emergency phone number to call, or may identify anappropriate national emergency service “800” number.

Security process 10 may identify 308 the emergency phone number based onthe location information received 306 from telephony device 16. If thelocation information includes the telephony device's telephone number,security process 10 may use the telephone number to identify thetelephony device's location and an appropriate telephone number. Forexample, if the location information contains the telephone number“617-555-5555,” security process 10 may recognize that telephoneextension “617” is associated with a geographical location in easternMassachusetts. Accordingly, security process 10 may identify 308 theemergency phone number “911” (the emergency phone number for the UnitedStates) as the appropriate emergency phone number to call, or mayidentify an appropriate national emergency service “800” number.Similarly, if the location information includes a telephone number witha country code, security process 10 may use the country code to identify308 the emergency phone number. For example, if the telephone numberincludes the country code “44” (the country code for Great Britain),security process 10 may identify emergency phone number “112” (theemergency phone number for Great Britain and/or Europe) as theappropriate emergency phone number.

If the location information includes and identifier of the telephonydevice's network provider, security process 10 may use the identifier toidentify the telephony device's location and an appropriate telephonenumber. For example, if the network provider is located in Japan,security process 10 may identify 308 the emergency telephone number“110” (the emergency police number in Japan) as the appropriateemergency telephone number.

If the location information contains GPS coordinates, security process10 may use the GPS coordinates to identify 308 an appropriate telephonenumber. For example, if the GPS coordinates are 13° 06′ north latitudeand 59° 37′ west longitude (i.e. GPS coordinates that fall within theboundaries of Bridgetown, Barbados), then security process 10 mayidentify 308 the emergency telephone number “211” (the emergency policenumber in Barbados), as the appropriate emergency telephone number.

Security process 10 may identify 308 the emergency phone number byaccessing 320 a lookup table that associates location information withemergency phone numbers. Security process 10 may use the lookup table tocorrelate the received 306 location with an appropriate emergencytelephone number. FIG. 6 includes lookup table 600, which is an exampleof a lookup table that may be used to identify 308 an emergency phonenumber. Lookup table 600 may be a data table or data structure stored,for example, in memory 204. As shown in FIG. 6, lookup table 600 mayhave two columns: a left column contains countries, and a right columncontains emergency telephone numbers associated with the countries inthe left column. Of course, lookup table 600 may have additional columnswith additional information.

Once security process 10 receives 306 the location of the telephonydevice, security process 10 can correlate 320 the location to theappropriate emergency phone number in lookup table 600. For example, ifsecurity process 10 determines 316 that telephony device is in theUnited States, security process 10 can find the entry “USA” withinlookup table 600 and determine that emergency phone number “911” is theappropriate emergency phone number for the location, or may identify anappropriate national emergency service “800” number. Although thisexample shows lookup table 600 having entries based on countries, one ofordinary skill in the art will recognize that other type of data may beused to locate entries in lookup table 600. For example, instead of, orin addition to, having entries based on particular countries, lookuptable 600 may include entries based on countries, states, country codes,area codes, GPS locations, ranges of latitude and longitude, and/or anyother type of entry associated with a geographic location. Lookup table600 may include emergency telephone numbers for any type of geographiclocation identifier. Although not shown, lookup table 600 may also haveentries based on latitudinal and longitudinal ranges. For example, anentry in lookup table 600 may be a range of latitudinal and longitudinalcoordinates that define the boundaries of Barbados. Lookup table 600 mayassociate the ranges that define Barbados with emergency phone number211—the emergency number for Barbados. Thus, if the location informationreceived from telephony device 16 includes GPS coordinates that fallwithin the range for Barbados, security process 10 may identify 308 theappropriate emergency phone number for Barbados by finding the entrythat contains the appropriate range of latitudinal and longitudinalcoordinates in lookup table 600.

Lookup table 600 may be a table and/or data structure stored in memory204, for example. Lookup table 600 may be an array, a database, ahashtable, a class, a data structure, an XML file, and/or any other typeof table or data structure that may associate geographic locations withemergency telephone numbers, for example.

Once security process 10 identifies 308 the emergency phone number,security process 10 may send 310 a command to the telephony device (e.g.telephony device 16, 18) to place an emergency telephone call to theidentified 308 emergency phone number. The command may be a Bluetooth™command, and/or AT and/or modem command that instructs the telephonydevice to place a call to the emergency telephone number.

When the telephony device places the emergency telephone number,security process 10 may send 312 a prerecorded message to the telephonydevice and instruct the telephony device to deliver the prerecordedmessage to the emergency service or other party on the other end of theemergency telephone call. The prerecorded message may include importantinformation about the emergency, such as the name and address of theowner of wireless security device 14, for example. The prerecordedmessage may include other information, such as the received 306 locationof the telephony device. Thus, by providing the prerecorded message andor the received location information, security process 10 may facilitatethe emergency service in quickly and efficiently sending the appropriatehelp to locate the device, especially if the owner of wireless securitydevice 14 is unable speak or otherwise provide information to theemergency service his/herself.

The prerecorded message may be an audio message and/or a data message.If the prerecorded message is an audio message, security process 10 mayuse the hands-free and/or headset Bluetooth™ profile to play the audiomessage through the telephony device, so a listener (e.g. an emergencytechnician) on the other end of the telephone call can hear theprerecorded message. If the prerecorded message is a data message,security process 10 may send the message as a text message or other typeof data message so a listener (e.g. an emergency technician) on theother end of the telephone call can view the data in the prerecordedmessage. For example, security process 10 may send one or more ATcommands to telephony device 16 that cause telephony device 16 to sendan SMS text message to the listener. The AT commands may be sent throughone or more of the Bluetooth™ wireless profile interfaces, and mayinclude AT commands such as AT+CMGF, which may set a modem into textmode in order to send an SMS text message. The text message may includeemergency information that allows the listener/receiver of the textmessage to ascertain the identity of a user, the location of a user, thenature of the emergency, and other information important to identify theemergency and send the appropriate help. Also, telephony device 16 mayexecute an application (not shown) that facilitates creation of the textmessage.

Security process 10 may also provide 322 speakerphone services. Forexample, if the telephony device places a telephone call, securityprocess 10 may use the hands-free and/or headset Bluetooth™ protocolprofile to send audio/voice to and/or receive audio/voice data from thetelephony device. Wireless security device 14 may use speaker 210 toplay the audio/voice data from the telephone call, and/or may usemicrophone 212 to capture audio/voice data for the telephone call.Security process 10 may provide 322 speakerphone services for normaltelephone calls placed or received by the telephony device, and/or forthe emergency telephone call described above.

Security process 10 may also generate different kinds of notificationsfor various scenarios. As shown in FIG. 7, security process 10 maygenerate a notification by playing a sound through speaker 210 (e.g. abeep or an audio media file), activating vibration motor 214, and/orilluminate one or more indicators in LED bank 216. One skilled in theart will recognize that wireless security device 14 may include anymanner of electronic visual indicator, including, but not limited to:LEDs, LCD displays, or other visual indicators. The sound, tactilefeedback, and visual feedback generated by wireless security device 14may alert a user that an event has occurred. Wireless security device 14may generate a notification through any combination of activation anddeactivation of speaker 210, vibration motor 214, and/or LED bank 216.Security process 10 may generate different notifications for variousdifferent scenarios.

For example, if a telephony device wirelessly connected to wirelesssecurity device 14 receives a telephone call, wireless security device14 may receive notification of the telephone call through features ofthe hands-free and/or headset Bluetooth™ protocol profiles, for example.Wireless security device 14 may then generate 324 a telephone callnotification to alert a user that there is an incoming call.

If any device wirelessly connected to wireless security device goesbeyond a certain range, wireless security device may generate 326 anout-of-range notification so that a user can keep track of his/herwirelessly connected devices. For example, if telephony device 16 andwireless security device 14 become separated physically, wirelesssecurity device 14 may generate an out-of-range notification to alert auser that telephony device 16 is no longer nearby. Security process 10may determine that telephony device 16 is out of range by monitoring aquality parameter of the wireless connection between wireless securitydevice 14 and telephony device 14 (or any other wirelessly connecteddevice). If the quality parameter falls below a predetermined threshold,security process 10 may generate a notification.

For example, as wireless security device 14 and telephony device 16become separated, the quality of the wireless connection betweenwireless security device 14 and telephony device 16 may degrade.Security process 10 may monitor and measure the quality of the wirelessconnection. Security process 10 may periodically measure and/or monitora received signal strength indication (RSSI) of the wireless connection,or may measure and/or monitor a number of digital data errors receivedover the wireless connection. As wireless security device 14 andtelephony device 16 become separated, the value of the RSSI measurementmay decrease and/or the number of digital data errors may increase. Ifthe RSSI falls below a predetermined minimum threshold, it may indicatethat telephony device 16 is distant from wireless security device 14.Similarly, if the digital data error measurement falls above apredetermined maximum, it may indicate that telephony device 16 isdistant from wireless security device 14. Accordingly, wireless securitydevice may generate 324 an out of range notification.

A user may use the out of range notification as a warning that thewirelessly connected device has been left behind or stolen. For example,a user may attach wireless security device 14 to his/her keychain. If auser walks away from telephony device 16 after leaving telephony device14 in a taxi-cab, for example, wireless security device 14, attached tothe user's keychain, may generate a notification warning the user thathe/she has left telephony device 16 behind.

Security process 10 may escalate the out-of-range notification astelephony device 16 moves further away from wireless security device 14.Security process 10 may include, for example, multiple wirelessconnection quality thresholds. As telephony device 16 moves away fromwireless security device 14, the measurement of the quality of thewireless connection may continue to degrade. As the measurement degradesfurther, it may pass a second threshold. When the measurement passes thesecond threshold, security process 10 may escalate the notification by,for example, playing a sound through speaker 210, activating vibrationmotor 214, and/or illuminating LED bank 216. Security process 10 mayescalate the notification in various ways, such as raising the volume ofspeaker 210, changing a pattern of beeps played by speaker 210,providing more power to vibration motor 216, and flashing the LEDs ofLED bank 216, for example. Of course, security process 10 may includemultiple quality thresholds and multiple escalations of thenotification.

A user may cancel the out-of-range notification by pressing button 218.Additionally/alternatively, if telephony device 16 and wireless securitydevice 14 come back into range of each other, or if they re-connect byre-establishing a Bluetooth™ connection with each other, securityprocess 10 may cancel the out-of range notification.Additionally/alternatively, security process 10 may de-escalate anout-of-range notification as wireless security device 14 and telephonydevice 16 come into closer range of each other. For example, securityprocess 10 may measure the quality of the wireless connection betweensecurity device 14 and telephony device 16 and, as the measurement ofthe quality improves, security process 10 may de-escalate anout-of-range notification.

Security process 10 may generate 326 a unique out of range notificationfor each device wirelessly connected to wireless security device 14. Forexample, FIG. 1 shows wireless security device coupled to at leasttelephony devices 16, 18, and media player 20. If telephony device 16begins to go out of range, security process 10 may generate 326 aparticular out of range notification that may consist of a particularseries of sounds, vibrations, and/or flashing of indicators. However, ifmedia player 20 or telephony device 18 begin to go out of range,security process 10 may generate 326 a different out of rangenotification that may consist of a different series of sounds,vibrations, and/or flashing indicators. Security process 10 may generate326 a different and unique out of range notification for each devicewirelessly connected to wireless security device 14.

Security process 10 may generate 328 an out of range notification bysending a command to a wirelessly connected device. For example, iftelephony device 16 begins to go out of range, security process 10 maysend a command to telephony device 16 that causes telephony device 16 tobeep, or make some other noise or alert to notify a user that telephonydevice 16 and wireless security device 14 are far apart. In oneembodiment, telephony device 16 may include a preexisting command which,when received, will cause telephony device 16 to beep or make a noise.In this case, wireless security device 14 may send the preexistingcommand to telephony device. In another embodiment, telephony device 16may execute a custom software application (not shown) that provides acustom interface. The custom software application and/or custominterface may accept the command from wireless security device 14 andmay cause telephony device 16 to generate 328 the out of rangenotification.

Security process 10 may also generate 328 a disconnect notification ifsomeone tries to disconnect the wireless connection through a userinterface of a wirelessly connected device. For example, many cellulartelephones have user interfaces that allow a user to disconnect a pairedBluetooth™ device. If telephony device 16 is paired to wireless securitydevice 16, and someone accesses a user interface of telephony device 16,he/she may be able disconnect wireless security device 14 from telephonydevice 16 by removing the pairing. If someone attempts to or succeeds inremoving the pairing between wireless security device 14 from telephonydevice 16, wireless security device 14 may generate 328 a disconnectnotification.

If telephony device 16 and wireless security device 14 becomedisconnected, and then become reconnected, the security process 10 mayalso cancel the notification to the user. In this way, wireless securitydevice 14 may inform the user that telephony device 16 and/or wirelesssecurity device 14 have become reconnected and/or have reentered theuser's proximity. Upon reconnecting to the telephony device 16, thesecurity device 14 may also send a command to telephony device 16 tocancel a disconnect or out-of-range notification on telephony device 16.

Security process 10 may also cause 330 a telephony device to answer anincoming call, or cause 332 a telephony device to cancel or ignore anincoming call. If telephony device receives an incoming call, wirelesssecurity device 14 may generate 324 a telephone call notification, asdescribed above. A user of wireless security device may then activatebutton 218, by pushing button 218, for example. Activating button 218may cause wireless access device 14 to send a command to the telephonydevice, instructing the telephony device to answer the call. If the useractivates button 218 in a different way, by double-pushing button 218,for example, wireless security device may send a command to thetelephony device, instructing the telephony device to cancel or ignorethe call, for example.

Security process 10 may also generate 334 a panic alarm in response toactivation of button 218. If a user presses and holds button 218, forexample, security process 10 may cause wireless security device 14 togenerate 334 a panic alarm. The panic alarm may be a loud, audiblealarm, whistle, beep, and/or warning played through speaker 210. Thewarning may be an audio file (such as an MP3) that loudly recites thewords “Warning, Emergency,” or provides some other message indicating anemergency. The panic alarm may be loud enough to alert passers-by thatsomeone may be in trouble. The panic alarm may also be loud enough towarn or scare a perpetrator who may be thinking of causing harm.Security process 10 may cancel 336 the panic alarm in response to a useractivating the button, for example, or in response to other input, suchas a command from the telephony device, etc.

Button 218 may provide a primary user interface to wireless securitydevice 14. Button 218 may be a multi-function button that providesvarious features and functions depending upon how a user pushes button218. For example, if a user presses and holds button 218, wirelesssecurity device 16 may initiate an emergency telephone call, asdescribed above. If the user continues to hold button 218 for a longertime, for example, wireless security device may generate 334 a panicalarm, as described above. If a user single-presses or double-pressesbutton 218, wireless security device may cause a telephony device toanswer or cancel a call, as described above. One skilled in the art willrecognize that different patterns of activation, and durations ofactivation, of button 218 may cause wireless security device 16 and/orsecurity process 10 to perform various functions, or may vary the orderby which the functions are performed.

FIG. 8 shows an exterior view of an embodiment of wireless securitydevice 14. In the embodiment shown in FIG. 8, wireless security devicemay include light rings 802, which may be a light ring or light pipethat illuminates when one or more LEDs are activated. Wireless securitydevice 14 may also include a display (e.g. an LCD display) or othermechanism which may illuminate or provide visual feedback. Wirelesssecurity device may also include keyring attachment 804, which may be acut out portion of the outer casing of wireless security device 14.Keyring attachment 804 may allow a user to attach wireless securitydevice 14 to a keyring, purse, article of clothing, or other article.

A number of implementations have been described. Nevertheless, it willbe understood that various modifications may be made. Accordingly, otherimplementations and other uses are within the scope of the followingclaims.

What is claimed is:
 1. A computing device including a processor and amemory configured to perform operations comprising: creating awirelessly paired connection between a wireless security device andtelephony device; identifying, over the wirelessly paired connection, alocation of the telephony device based upon, at least in part, at leastone of a telephone number of the telephony device, a telephone networkproviding service to the telephony device, and a global positioningsystem (GPS) location of the telephony device; identifying an emergencytelephone number based on, at least in part, the location of thetelephony device; sending a command, over the wirelessly pairedconnection, to the telephony device to place a telephone call to theemergency telephone number identified based on the location of thetelephony device; and after the telephone call is placed, sending aprerecorded emergency message to the telephony device over thewirelessly paired connection to a recipient of the telephone call. 2.The computing device of claim 1 further comprising implementing one ormore wireless protocol profiles for connecting wireless security deviceto the telephony device wherein the one or more wireless protocolprofiles include at least one of a hands-free profile, a headsetprofile, and an advanced audio distribution profile.
 3. The computingdevice of claim 1 wherein identifying the location of the telephonydevice includes: sending a command to the telephony device requestingone or more of: the telephone number of the telephony device; thetelephone network providing service to the telephony device; and the GPSlocation of the telephony device; and receiving a response from thetelephony device including one or more of: the telephone number of thetelephony device; the telephone network providing service to thetelephony device; and the GPS location of the telephony device.
 4. Thecomputing device of claim 1 wherein identifying the emergency telephonenumber includes: accessing a lookup table stored in the memory includingone or more location codes and one or more emergency telephone numbersassociated with the one or more location codes; and correlating thelocation with at least one of the one or more location codes to obtainat least one of the one or more emergency telephone numbers.
 5. Thecomputing device of claim 1 further comprising: providing speakerphoneservices; sending audio data captured by a microphone of the wirelesssecurity device to the telephony device; and after the telephone call isplaced, audibly playing, by a speaker of the wireless security device,the audio data from the telephony device.
 6. The computing device ofclaim 1 further comprising: generating an out-of-range notification whena measurement of a quality parameter of the wirelessly paired connectionis outside a predetermined quality threshold, the notification includingone or more of: illuminating a light of the wireless security device;vibrating the wireless security device; and generating an audible soundthrough a speaker of the wireless security device.
 7. The computingdevice of claim 1 wherein further comprising: generating a notificationwhen the wirelessly paired connection between the wireless securitydevice and the telephony device is disconnected, the notificationincluding one or more of: illuminating a light of the wireless securitydevice; vibrating the wireless security device; and generating anaudible sound through a speaker of the wireless security device.
 8. Acomputing system including a processor and a memory configured toperform operations comprising: creating a wirelessly paired connectionbetween a wireless security device and telephony device; identifying,over the wirelessly paired connection, a location of the telephonydevice based upon, at least in part, at least one of a telephone numberof the telephony device, a telephone network providing service to thetelephony device, and a global positioning system (GPS) location of thetelephony device; identifying an emergency telephone number based on, atleast in part, the location of the telephony device; sending a command,over the wirelessly paired connection, to the telephony device to placea telephone call to the emergency telephone number identified based onthe location of the telephony device; and after the telephone call isplaced, sending a prerecorded emergency message to the telephony deviceover the wirelessly paired connection to a recipient of the telephonecall.
 9. The computing system of claim 8 further comprising implementingone or more wireless protocol profiles for connecting wireless securitydevice to the telephony device wherein the one or more wireless protocolprofiles include at least one of a hands-free profile, a headsetprofile, and an advanced audio distribution profile.
 10. The computingsystem of claim 8 wherein identifying the location of the telephonydevice includes: sending a command to the telephony device requestingone or more of: the telephone number of the telephony device; thetelephone network providing service to the telephony device; and the GPSlocation of the telephony device; and receiving a response from thetelephony device including one or more of: the telephone number of thetelephony device; the telephone network providing service to thetelephony device; and the GPS location of the telephony device.
 11. Thecomputing system of claim 8 wherein identifying the emergency telephonenumber includes: accessing a lookup table stored in the memory includingone or more location codes and one or more emergency telephone numbersassociated with the one or more location codes; and correlating thelocation with at least one of the one or more location codes to obtainat least one of the one or more emergency telephone numbers.
 12. Thecomputing system of claim 8 further comprising: providing speakerphoneservices; sending audio data captured by a microphone of the wirelesssecurity device to the telephony device; and after the telephone call isplaced, audibly playing, by a speaker of the wireless security device,the audio data from the telephony device.
 13. The computing system ofclaim 8 further comprising: generating an out-of-range notification whena measurement of a quality parameter of the wirelessly paired connectionis outside a predetermined quality threshold, the notification includingone or more of: illuminating a light of the wireless security device;vibrating the wireless security device; and generating an audible soundthrough a speaker of the wireless security device.
 14. The computingsystem of claim 8 wherein further comprising: generating a notificationwhen the wirelessly paired connection between the wireless securitydevice and the telephony device is disconnected, the notificationincluding one or more of: illuminating a light of the wireless securitydevice; vibrating the wireless security device; and generating anaudible sound through a speaker of the wireless security device.
 15. Acomputer program product residing on a computer readable storage mediumhaving a plurality of instructions stored thereon which, when executedby a processor, cause the processor to perform operations comprising:creating a wirelessly paired connection between a wireless securitydevice and telephony device; identifying, over the wirelessly pairedconnection, a location of the telephony device based upon, at least inpart, at least one of a telephone number of the telephony device, atelephone network providing service to the telephony device, and aglobal positioning system (GPS) location of the telephony device;identifying an emergency telephone number based on, at least in part,the location of the telephony device; sending a command, over thewirelessly paired connection, to the telephony device to place atelephone call to the emergency telephone number identified based on thelocation of the telephony device; and after the telephone call isplaced, sending a prerecorded emergency message to the telephony deviceover the wirelessly paired connection to a recipient of the telephonecall.
 16. The computer program product of claim 15 further comprisingimplementing one or more wireless protocol profiles for connectingwireless security device to the telephony device wherein the one or morewireless protocol profiles include at least one of a hands-free profile,a headset profile, and an advanced audio distribution profile.
 17. Thecomputer program product of claim 15 wherein identifying the location ofthe telephony device includes: sending a command to the telephony devicerequesting one or more of: the telephone number of the telephony device;the telephone network providing service to the telephony device; and theGPS location of the telephony device; and receiving a response from thetelephony device including one or more of: the telephone number of thetelephony device; the telephone network providing service to thetelephony device; and the GPS location of the telephony device.
 18. Thecomputer program product of claim 15 wherein identifying the emergencytelephone number includes: accessing a lookup table stored in the memoryincluding one or more location codes and one or more emergency telephonenumbers associated with the one or more location codes; and correlatingthe location with at least one of the one or more location codes toobtain at least one of the one or more emergency telephone numbers. 19.The computer program product of claim 15 further comprising: providingspeakerphone services; sending audio data captured by a microphone ofthe wireless security device to the telephony device; and after thetelephone call is placed, audibly playing, by a speaker of the wirelesssecurity device, the audio data from the telephony device.
 20. Thecomputer program product of claim 15 further comprising: generating anout-of-range notification when a measurement of a quality parameter ofthe wirelessly paired connection is outside a predetermined qualitythreshold, the notification including one or more of: illuminating alight of the wireless security device; vibrating the wireless securitydevice; and generating an audible sound through a speaker of thewireless security device.
 21. The computer program product of claim 15wherein further comprising: generating a notification when thewirelessly paired connection between the wireless security device andthe telephony device is disconnected, the notification including one ormore of: illuminating a light of the wireless security device; vibratingthe wireless security device; and generating an audible sound through aspeaker of the wireless security device.