Method and system for locating a network device in an emergency situation including public location information with device verification

ABSTRACT

A method and system for locating a network device in an emergency situation including public information with device verification. Current physical location information is obtained for a network device every time it registers on a network or moves to a new physical location. When a current physical location is determined for a network device, the determined current physical location is sent back to the network device for verification. The network device has the ability to automatically accept, modify or reject the determined current physical location. The current physical location is sent and received in an encrypted format to and from the network device. When the network device initiates an emergency message (e.g. 911, E911, NG911, text-to-911, 112, etc.) based on an emergency event (e.g., weather, crime, fire, natural disaster, medical, terrorist, military, etc.), the emergency message includes the encrypted current physical location information for the network device. The current physical location information is decrypted. Additional information is collected from one or more public location information sources for the current physical location of the network device. The emergency message with the additional information is routed in real-time to an appropriate Public Safety Answering Point (PSAP). The appropriate PSAP is immediately notified in real-time so emergency responders (e.g., police, fire, medical, etc.) can be dispatched to the current physical location of the network device without having to contact the network device.

CROSS REFERENCES TO RELATED APPLICATIONS

This U.S. utility patent application is a Continuation-In-Part (CIP) ofU.S. Utility patent application Ser. No. 16/792,630, filed on Feb. 17,2020, which is a CIP of Ser. No. 15/914,078, filed on Mar. 7, 2018,which issued as U.S. Pat. No. 10,511,590, on Dec. 17, 2019, which is aCIP of U.S. utility patent application Ser. No. 15/491,608, filed Apr.19, 2017, which is a CIP of U.S. utility patent application Ser. No.14/806,068 filed on Jul. 22, 2015, that issued into U.S. Pat. No.9,935,534, on Apr. 25, 2017, which is a CIP of U.S. utility patentapplication Ser. No. 14/579,760, filed on Dec. 22, 2014, that issued asU.S. Pat. No. 9,094,816, on Jul. 28, 2015, which is a CIP of U.S. patentapplication Ser. No. 14/303,842, filed on Jun. 13, 2014, that issued asU.S. Pat. No. 8,918,075, on Dec. 23, 2014, which is a CIP of U.S.utility patent application Ser. No. 13/831,426, filed Mar. 14, 2013,which issued as U.S. Pat. No. 8,755,767, on Jun. 17, 2014, which is aCIP of U.S. utility patent application Ser. No. 13/098,981, filed May 2,2011, which issued and U.S. Pat. No. 8,442,482 on May 14, 2013, which isa CIP of U.S. utility patent application Ser. No. 11/803,671, filed May15, 2007, which issued as U.S. Pat. No. 7,937,067, on May 3, 2011, whichis an application that claims priority to U.S. Provisional patentapplication Nos. 60/800,774, 60/800,775, 60/800,776, and 60/800,777, allfiled May 16, 2006, U.S. utility patent application Ser. No. 13/831,426,is also a CIP of U.S. utility application Ser. No. 12/844,972 filed Jul.28, 2010, which is an application claiming priority to U.S. Provisionalpatent applications nos. 61/229,414 filed Jul. 29, 2009 and 61/230,154filed Jul. 31, 2009, the contents of all of these cited applications andissued patents are incorporated herein by reference.

FIELD OF INVENTION

This application relates to automatic processing of locationinformation. More specifically, it relates to a method and system forlocating a network device in an emergency situation including publicinformation with device verification.

BACKGROUND OF THE INVENTION

In many emergency situations it is of great importance to be able toquickly and accurately locate individuals. For example, in the event ofa vehicular accident, public safety personnel may need to operate withinan unfamiliar wooded area on short notice, in conditions of poorvisibility due to smoke, flame or darkness. Accurate locationinformation is vital to coordinate rescue operations and ensure thesafety of rescue personnel. Police or military personnel may be facedwith similar circumstances, in which accurate and timely locationinformation can help avoid friendly-fire incidents and coordinate actionagainst a criminal or enemy force.

Individuals faced with an emergency involving immediate danger to lifeor health of themselves or a colleague need to be able to accuratelyprovide their location to emergency/rescue personnel, preferably withouthuman intervention to enable rescue in the case where the individual inneed is incapacitated, or all attention must be devoted to his/herprotection. In all these circumstances, rapid and automated acquisitionof the location of an individual to within a few meters can be criticalin saving lives.

In addition, there are times when an individual or an object is in arural area needs to be located in an emergency. A mobile device anindividual may be carrying may not be able to communicate because ofpoor signal strength to the mobile device in the rural area.

Prior art methods of accomplishing such location do not simultaneouslymeet the requirements of rapid location determination, automation, andaccuracy. Navigation employing conventional maps and visual observationor dead reckoning are not readily automated and thus require time andattention by a human observer. Manual navigation may be vitiated in thecase where visibility is impacted by flame or smoke, or where personnelare under hostile fire and unable to establish their location by patientobservation.

Enhanced 911, (E911) is a location technology that enables mobile, orcellular phones and other mobile device such personal digital/dataassistants (PDAs) to process 911 emergency calls and enable emergencyservices to locate a physical geographic position of the device and thusthe caller. When a person makes a 911 call using a traditional phonewith wires, the call is routed to the appropriate public safetyanswering point (PSAP) that then distributes the emergency call to theproper emergency services. The PSAP receives the caller's phone numberand the exact location of the phone from which the call was made. Priorto 1996, 911 callers using a mobile phone would have to access theirservice providers in order to get verification of subscription servicebefore the call was routed to a PSAP. In 1996 the Federal CommunicationsCommission (FCC) ruled that a 911 call must go directly to the PSAPwithout receiving verification of service from a specific cellularservice provider. The call must be handled by any available servicecarrier even if it is not the cellular phone customer's specificcarrier.

The FCC has rolled out E911 in two phases. In 1998, Phase I requiredthat mobile phone carriers identify the originating call's phone numberand the location of the signal tower, or cell. In 2001, Phase IIrequired that each mobile phone company doing business in the UnitedStates must offer either handset- or network-based location detectioncapability so that the caller's location is determined by the geographiclocation of the cellular phone within 100 meter accuracy and not thelocation of the tower that is transmitting its signal. The FCC refers tothis as Automatic Location Identification (ALI).

In addition to traditional cellular telephones, advances in technologyhave expanded the number and types of devices that are capable ofinitiating an emergency call for service that is routed to theappropriate PSAP based on the caller's location. Devices include, butare not limited to: computer programs that are executed on computingdevices (Soft Phone), cellular telephones that are capable of datacommunications, wearable embedded devices, devices embedded into homeappliances, intelligent building control and monitoring systems, andintelligent roadways. The concept of an “Internet of Things” will allowany connected device to initiate communications with another device,service, or person, including a system within a PSAP.

In the current 9-1-1 operating environment, telecommunication carriersand hosted service providers (i.e., dial tone providers) associate anend point device (e.g., a non-mobile telephone) with a static locationat the time of provisioning. This location is used by the dial toneprovider to determine the location appropriate 9-1-1 call center orPublic Safety Answering Point (PSAP) that is responsible for answeringand handling a 9-1-1 call made from the end point device.

Typically, the dial tone provider will use a third party to route anddeliver both the 9-1-1 call and the associated Automatic LocationInformation (ALI). In the event the end point device is moved from thelocation it was provisioned with (e.g., into a new office, etc.), theend user is responsible to update the static location.

This is accomplished in several manners including submitting a serviceorder to the dial tone provider, accessing and updating the staticlocation through a web portal, or using a client application on thestatic end point device to update the portal. However, the problem withall of these methods is that they are all manual processes. In addition,if the static location of the end point device is not updated, in theevent of any emergency situation, the end point device would not providethe correct emergency location when a 9-1-1 call is made. This endangersthe health and safety of the caller.

As the 9-1-1/text-to-911 operating environment moves away fromstatically located devices such as non-mobile phones and allows usersthe ability to move their mobile end point devices, such as mobilephones, electronic tablets, wearable devices, etc. at will, there is aneed for an associated automatic current physical location discovery and9-1-1 location database update capability to locate such mobile andnon-mobile, but moveable devices when an emergency event occurs.

One problem that occurs is that when a current physical location isdetermined for a network device, the determined current physicallocation may be incorrect of the network device. The network device hasno opportunity to verify or change an incorrect determined currentphysical location.

So it is desirable to try and solve some of the problems associated withverifying a determined current physical location that may be incorrectfor network device.

SUMMARY OF THE INVENTION

In accordance with preferred embodiments of the invention, some of theproblems associated with locating mobile network devices when anemergency call (e.g., 911, E911, text-to-911, 112, etc.) is made areovercome. A method and system to locate a network device in an emergencysituation with device verification is presented.

Current physical location information is obtained for a network deviceevery time it registers on a network or moves to a new physicallocation. When a current physical location is determined for a networkdevice, the determined current physical location is sent back to thenetwork device for verification. The network device has the ability toautomatically accept, modify or reject the determined current physicallocation. The current physical location is sent and received in anencrypted format to and from the network device. When the network deviceinitiates an emergency message (e.g. 911, E911, NG911, text-to-911, 112,etc.) based on an emergency event (e.g., weather, crime, fire, naturaldisaster, medical, terrorist, military, etc.), the emergency messageincludes the encrypted current physical location information for thenetwork device. The current physical location information is decrypted.Additional information is collected from one or more public locationinformation sources for the current physical location of the networkdevice. The emergency message with the additional information is routedin real-time to an appropriate Public Safety Answering Point (PSAP). Theappropriate PSAP is immediately notified in real-time so emergencyresponders (e.g., police, fire, medical, etc.) can be dispatched to thecurrent physical location of the network device without having tocontact the network device.

The foregoing and other features and advantages of preferred embodimentsof the present invention will be more readily apparent from thefollowing detailed description. The detailed description proceeds withreferences to the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

Preferred embodiments of the present invention are described withreference to the following drawings, wherein:

FIG. 1 is a block diagram illustrating an exemplary emergency locationinformation processing system;

FIG. 2 is a block diagram with illustrating wearable mobile networkdevices;

FIGS. 3A, 3B and 3C are a flow diagram illustrating a method forlocating a network device in an emergency situation;

FIG. 4 is a block diagram graphically illustrating the method of FIG. 3;

FIG. 5 is a block diagram illustrating an exemplary emergency locationinformation table layouts;

FIG. 6 is a block diagram illustrating a graphical emergency locationinformation system graphical display interface;

FIG. 7 is a block diagram visually illustrating a data flow for themethod of FIG. 3;

FIG. 8 is a flow diagram illustrating a method for locating a networkdevice in an emergency situation;

FIGS. 9A, 9B and 9C are a flow diagram illustrating a method forlocating a network device in an emergency situation;

FIG. 10 is a flow diagram illustrating a method for locating a networkdevice in an emergency situation;

FIGS. 11A, 11B, 11C, 11D and 11E are a flow diagram illustrating amethod for locating a network device before an emergency situation;

FIG. 12 is a block diagram visually illustrating a partial data flow forthe method of FIG. 11;

FIG. 13 is a block diagram illustrating location choices on a targetnetwork device for the method of FIG. 11; and

FIG. 14 is a flow diagram illustrating a method for locating a networkdevice before an emergency situation.

DETAILED DESCRIPTION OF THE INVENTION Electronic Emergency LocationInformation Message Processing System

FIG. 1 is a block diagram illustrating an exemplary communicationssystem 10. The exemplary communications system 10 includes, but is notlimited to, one or more target network devices, each with one or moreprocessors and each with a non-transitory computer readable medium. Onlyselected ones of the target network devices are illustrated in thedrawings for simplicity.

The target network devices, include, but are not limited to, mobilephones including smart phones 12, electronic tablets 14, mobilecomputers 16, unmanned aerial vehicles (UAV) 28, commonly known as“drones” and also referred to as “Remotely Piloted Aircraft (RPA),”driverless vehicles 30, vehicles with a driver, aircraft (e.g.,airplane, helicopter, hot air balloon, blimp, etc.) water vehicles,(e.g., ship, boat, barge, raft, canoe, kayak, personal water craft(PWC), etc.), snow machines, Internet of Things (IoT) network devices32, and other target network devices that determine a current physicallocation 34 of a target network device during an emergency event 36′,36″, etc. (e.g., weather event 36′, fire 36″, etc.).

The target network devices further include non-mobile network devicessuch as non-mobile phones, 38, portable gaming platforms (GAMEBOY andDSI by Nintendo, PSP by Sony, etc.), non-portable gaming platforms(e.g., XBOX by Microsoft, Wii by Nintendo, PLAY STATION, by Sony, etc.)non-mobile computers, non-mobile phones, wireless devices, wireddevices, game devices, laptop computers, personal information devices,personal digital/data assistants (PDA), hand-held devices, networkappliances, Internet appliances, cable television set-top boxes,Internet television set-top boxes, Internet television sticks, satellitetelevision boxes, devices embedded into home appliances, intelligentbuilding control and monitoring systems, intelligent roadways, etc.and/or wearable devices 42-50 (e.g., FIG. 2). However, the presentinvention is not limited to these target electronic devices and more,fewer or others types of target electronic devices can also be used.

The target network devices function as client devices in some instancesand server devices in other instances. The target network devicesinclude wireless or wired communications.

In one embodiment the one or more target network devices are “smartdevices.” A “smart device” is aware of its location in three dimensional(X, Y, Z) and/or two-dimensional (X, Y) space.

In another embodiment, the target network device are “dumb devices.” A“dumb device” is not aware of its location. A dumb device is typicallyin contact with proxy server device that is aware of the dumb device'slocation. Proxy servers may serve one or more or an aggregate ofdevices.

In one specific exemplary embodiment, the one or more target networkdevices also include smart phones 12 such as the iPhone by Apple, Inc.,Blackberry Storm and other Blackberry models by Research In Motion, Inc.(RIM), Droid by Motorola, Inc. HTC, Inc. Samsung, Google, other types ofsmart phones, other types of mobile and non-mobile phones, etc. However,the present invention is not limited to such devices, and more, fewer orother types of smart phones can be used to practice the invention.

A “smart phone” is a mobile phone that offers more advanced computingability and connectivity than a contemporary basic feature phone. Smartphones and feature phones may be thought of as handheld computersintegrated with a mobile telephone, but while most feature phones areable to run applications based on platforms such as Java ME, a smartphone usually allows the user to install and run more advancedapplications. Smart phones and/or tablet computers run completeoperating system software providing a platform for applicationdevelopers assessable through a specialized Application ProgrammingInterface (API).

The operating systems include the iPhone OS, Android, Windows, etc.iPhone OS is a proprietary operating system for the Apple iPhone.Android is an open source operating system platform backed by Google,along with major hardware and software developers (such as Intel, HTC,ARM, Motorola and Samsung, etc.), that form the Open Handset Alliance.Windows is an operating system for mobile device by Microsoft.

The one or more target network also include tablet computers 14 such asthe iPad, by Apple, Inc., the HP Tablet, by Hewlett Packard, Inc., thePlaybook, by RIM, Inc., the Tablet, by Sony, Inc., the Surface byMicrosoft, etc.

In a preferred embodiment, the one or more target network devicesinclude Internet of Things (IoT) network devices 32 with one or moreprocessors, one or more sensors and/or one or more actuators and anetwork connection interface.

A “sensor” is an electronic component, module, or subsystem whosepurpose is to detect events or changes in its environment (e.g.,temperature, pressure, altitude, elevation, speed, acceleration,moisture, etc.) and send the information to other electronics and one ormore processors. For example, an environmental sensor may detect events,such as smoke, a fire, a burst water pipe, etc.

An “actuator” is a component of the IoT network device 32 that isresponsible for moving or controlling a mechanism or system.

An actuator requires a control signal and a source of energy. Thecontrol signal is relatively low energy and may be electric voltage orcurrent, pneumatic or hydraulic pressure, or even human power. Thesupplied main energy source may be electric current, hydraulic fluidpressure, pneumatic pressure or other energy source. A sound wave (e.g.,a gunshot, a scream, etc.) or other positive pressure wave may triggeran actuator via a control signal. When the control signal is received,the actuator responds by converting the energy into mechanical motion.

The IoT network devices 32, include but are not limited to, securitycameras, doorbells with real-time video cameras, baby monitors,televisions, set-top boxes, lighting, heating (e.g., smart thermostats,etc.), ventilation, air conditioning (HVAC) systems, and appliances suchas washers, dryers, robotic vacuums, air purifiers, ovens,refrigerators, freezers, toys, game platform controllers, game platformattachments (e.g., guns, googles, sports equipment, etc.), and/or otherIoT devices.

The IoT network devices 32 include plural devices in smart buildings. A“smart building” is any structure that uses automated network devicesand processes to automatically control the building's operationsincluding heating, ventilation, air conditioning, lighting, security,other systems, etc. IoT network devices 32 in smart buildings can beused to determine an exact location of a person, animal, and/or anobject in a smart building using the methods and systems describedherein.

In one embodiment, the target network devices include a locationapplication 26 in communications with an application 26′ on a servernetwork device. In one embodiment, the location application 26 is asoftware application. However, the present invention is not limited tothis embodiment and the location application 26 can be firmware,hardware or a combination thereof. In one embodiment, the locationapplication 26 exists only on the target network devices. In anotherembodiment, application 26′ exists only on server network devices 20,22, 24, each with one or more processors. In another embodiment,emergency location functionality is internal location application 26. Inanother embodiment, the internal emergency location functionalityinternal to the location application 26 is combined with emergencylocation functionality external to the location application 26.

In another embodiment, a portion of the application 26 exists on thetarget network devices and another portion 26′ exists one or more servernetwork devices 20, 22, 24. In another embodiment, application 26/26′includes a portion of a social media application (e.g., FACEBOOK,TWITTER, INSTAGRAM, etc.). However, the present invention is not limitedto these embodiments and other embodiments and other combinations canalso be used to practice the invention.

In one embodiment, the one or more target network devices include aninternal accelerometer. An “accelerometer” is a device that measures anacceleration of the device and a change of velocity of the targetnetwork devices. Many smart phones, digital audio players, wearablemobile devices and personal digital assistants contain accelerometersfor user interface control; often the accelerometer is used to presentlandscape or portrait views of the device's screen, based on the way thedevice is being held. The accelerometer can be used to detectcrash-strength G-forces and automatically translate and provide location3D (X, Y, Z) geo-space and/or 2D (X, Y) geo-space location into acurrent physical location 34 for emergency response personal.

In one embodiment, the one or more target network devices include aninternal hardware temperature sensor that indicates when the device hasexceeded a certain pre-determined temperature. This internal temperaturesensor is used with a corresponding to detect emergency events such asfires, weather (e.g., tornado, hurricane, blizzard, etc.) events, etc.that include a dramatic change in temperature. In one embodiment, thetemperature sensor include and Infrared temperature sensor. However, thepresent invention is not limited to such embodiments and other types ofinternal and external temperature sensors can also be used to practicethe invention.

In one embodiment, the one or more target network devices include abiometric sensor for collecting biometric identifiers. Biometricidentifiers are distinctive, measurable characteristics used to labeland describe individuals. Biometric identifiers include physiologicaland behavioral characteristics of a person. Physiologicalcharacteristics are related to the shape of the body. Examples include,but are not limited to, biometric information, including, but notlimited to, fingerprints, vein patterns, facial recognition, DNA, palmprint, hand geometry, iris recognition, retina recognition, heart rhythmand/or odors, scent. Behavioral characteristics are related to thepattern of behavior of a person, including but not limited to typingrhythm, gait and voice. Some researchers have coined the term“behaviometrics” to describe the latter class of biometrics.

In another embodiment, the one or more target network devices include anexternal device (e.g., one or more sensors and/or actuators, etc.) thatis plugged into the target network device. In one embodiment, the one ormore target network devices include an integration of a variety ofmotion, magnetic, pressure, humidity, moisture, temperature, height,depth (e.g., water, fluid, etc.), air bag deployment, and/or altimetersensors with a processing unit and dedicated smart device applicationsoftware to provide location information when an emergency event isdetected via such sensors.

In one embodiment of the invention, the application 26 is a smartapplication for a smart phone. A smart network device applicationincludes interactions with an operating system on a smart phone. Inanother embodiment, the application 26 is a smart application for thetablet computer. The interactions for the application 26 are typicallycompleted through an Application Programming Interface (API).

The one or more target network devices are in communications with one ormore communications networks 18. The communications networks 18 include,but are not limited to, the Internet, an intranet, a wired Local AreaNetwork (LAN), a wireless LAN (WiLAN), a Wide Area Network (WAN), aMetropolitan Area Network (MAN), Public Switched Telephone Network(PSTN), mesh networks, Bluetooth networks, cloud and/or other types andcombinations of wired and wireless communications networks providingvoice, video and data communications with wired or wirelesscommunication protocols.

In one embodiment, the communications network 18 includes a cloudcommunications network 18′ comprising plural different cloud componentnetworks, a public (e.g. Internet, PSTN, etc.), private (e.g., LAN, WAN,etc.), hybrid (e.g., Internet plus private LAN, etc.), community (e.g.,Internet plus, private LAN, plus PSTN, etc.) and/or emergency (e.g.,911, E911, NG911, 112, etc.) networks.

“Cloud computing” is a model for enabling, on-demand network access to ashared pool of configurable computing resources (e.g., public andprivate networks, servers, storage, applications, and services) that areshared, rapidly provisioned and released with minimal management effortor service provider interaction. The cloud communications network 18′provides emergency location of mobile network devices and automatedvehicles as cloud services.

This exemplary cloud computing model for emergency location informationservices promotes availability for shared resources and comprises: (1)cloud computing essential characteristics; (2) cloud computing servicemodels; and (3) cloud computing deployment models. However, the presentinvention is not limited to this cloud computing model and other cloudcomputing models can also be used to practice the invention.

Exemplary cloud computing essential characteristics appear in Table 1.However, the present invention is not limited to these essentialcharacteristics and more, fewer or other characteristics can also beused to practice the invention.

TABLE 1 1. On-demand emergency location services. Emergency locationservers 20, 22, 24 can unilaterally provision computing capabilities,such as server time and network storage, as needed automatically withoutrequiring human interaction with each network server on the cloudcommunications network 18′. 2. Broadband network access. Emergencylocation service capabilities are available over plural broadbandcommunications networks and accessed through standard mechanisms thatpromote use by heterogeneous thin or thick client platforms 26, 26′(e.g., mobile phones/smart phones 12, tablet computers 14, laptops 16,UAVs 28, automated vehicles 30, IoT network devices, 32, wearabledevices, 42-50, etc.). The broadband network access includes high speednetwork access such as 3G and/or 4G and/or 5G wireless and/or wired andbroadband and/or ultra-broad band (e.g., WiMAX, etc.) network access. 3.Resource pooling. Emergency location computing resources are pooled toserve multiple target network device requesters, using a multi-tenantmodel, with different physical and virtual resources dynamicallyassigned and reassigned according to emergency location demand. There islocation independence in that a requester of emergency location serviceshas no control and/or knowledge over the exact location of the providedby the emergency location resources but may be able to specify locationat a higher level of abstraction (e.g., country, state, or data center).Examples of pooled resources include storage, processing, memory,network bandwidth, virtual server network device and virtual targetnetwork devices. 4. Rapid elasticity. Capabilities can be rapidly andelastically provisioned, in some cases automatically, to quickly scaleout and rapidly released to quickly scale for emergency locationservices during a large emergency event (e.g., terrorist attack, weatherevent, natural disaster, etc.) To the emergency location systemproviders, the emergency location service capabilities available forprovisioning appear to be unlimited and can be used in any quantity atany time. 5. Measured Services. Cloud computing systems automaticallycontrol and optimize resource use by leveraging a metering capability atsome level of abstraction appropriate to the type of emergency locationservice (e.g., storage, processing, bandwidth, custom emergency locationapplications 26, 26′, etc.). Emergency location service usage ismonitored, controlled, and reported providing transparency for both theemergency location service providers 20, 22, 24, 25 and emergencylocation requesters from target network device of the utilized emergencylocation service.

Exemplary cloud computing service models appear in Table 2. However, thepresent invention is not limited to these service models and more, feweror other service models can also be used to practice the invention.

TABLE 2 1. Cloud Computing Software Applications for Emergency LocationInformation Services (CCSA). The capability to use the provider'sapplications 26, 26′ running on a cloud infrastructure 18′. The cloudcomputing applications, are accessible from the emergency locationserver network device 22 from various target devices through a thinclient interface 26 such a thin application and/or a web browser, etc.The user does not manage or control the underlying cloud infrastructureincluding network, servers, operating systems, storage, or evenindividual application 26, 26′ capabilities, with the possible exceptionof limited user-specific application configuration settings. 2. CloudComputing Infrastructure for Emergency Location Information Services(CCI). The capability provided to the user is to provision processing,storage and retrieval, networks and other fundamental computingresources where the user is able to deploy and run arbitrary software,which can include operating systems and applications 26, 26′. The userdoes not manage or control the underlying cloud infrastructure but hascontrol over operating systems, storage, deployed applications, andpossibly limited control of select networking components (e.g., hostfirewalls, etc.). 3. Cloud Computing Platform for Emergency LocationInformation Services (CCP). The capability provided to the user todeploy onto the cloud infrastructure created or acquired applicationscreated using programming languages and tools supported servers 20, 22,24, 25 etc. The user not manage or control the underlying cloudinfrastructure including network, servers, operating systems, orstorage, but has control over the deployed applications 26, 26′ andpossibly application hosting environment configurations.

In one exemplary embodiment, the application 26′, offers cloud servicesproviding emergency location information. The application 26′ offers thecloud computing Infrastructure as a Service (IaaS), including a cloudsoftware infrastructure service, a cloud Platform as a Service (PaaS)including a cloud software platform service and/or offers Specific cloudsoftware services as a Service (SaaS) including a specific cloudsoftware service for providing emergency location information. The IaaS,PaaS and SaaS include one or more of cloud services comprisingnetworking, storage, server network device, virtualization, operatingsystem, middleware, run-time, data and/or application services, orplural combinations thereof, on the cloud communications network 18′.

Plural server network devices 20, 22, 24, 25 (only four of which areillustrated) each with one or more processors, each with anon-transitory computer readable medium and include one or moreassociated databases 20′, 22′, 24′, 25′. The one or more databasesinclude relational databases and/or non-relational databases. The pluralserver network devices 20, 22, 24, 25 are in communications with the oneor more target network devices via the communications network 18. Theplural server network devices 20, 22, 24, 25 include, but are notlimited to, wireless or wired or data communications servers, wirelessaccess points, proxy servers and other types of server devices. Selectedones of the server network devices (e.g., 25, etc.) include PublicSafety Answering Point (PSAP) servers, legacy 911 servers, E911 servers,25, and/or other types of emergency servers. etc.

The communications network 18 may include one or more gateways, routers,bridges, switches. A gateway connects computer networks using differentnetwork protocols and/or operating at different transmission capacities.A router receives transmitted messages and forwards them to theircorrect destinations over the most efficient available route. A bridgeis a device that connects networks using the same communicationsprotocols so that information can be passed from one network device toanother. A switch is a device that filters and forwards packets betweennetwork segments. Switches typically operate at the data link layer andsometimes the network layer and therefore support virtually any packetprotocol.

In one embodiment, the target network devices and the server networkdevices 20, 22, 24, 25 include an emergency location application 26, 26′with plural software modules. The multiple software modules may beimplemented in firmware, hardware or any combination thereof. In oneembodiment, the target network devices may include a plug-in for abrowser with plural software modules. In another embodiment, the pluraltarget network devices and plural server devices 20, 22, 24, 25 do notinclude the emergency location application or browser plug-in.

The one or more target network devices and one or more server networkdevices 20, 22, 24, 25 communicate with each other and other networkdevices with near field communications (NFC) and/or machine-to-machine(M2M) communications.

“Near field communication (NFC)” is a set of standards for smartphonesand similar devices to establish radio communication with each other bytouching them together or bringing them into close proximity, usually nomore than a few centimeters. Present include contactless transactions,data exchange, and simplified setup of more complex communications suchas Wi-Fi. Communication is also possible between an NFC device and anunpowered NFC chip, called a “tag” including radio frequency identifier(RFID) tags.

NFC standards cover communications protocols and data exchange formats,and are based on existing radio-frequency identification (RFID)standards including ISO/IEC 14443 and FeliCa. These standards includeISO/IEC 1809 and those defined by the NFC Forum, all of which areincorporated by reference.

“Machine to machine (M2M)” refers to technologies that allow bothwireless and wired systems to communicate with other devices of the sameability. M2M uses a device to capture an event (such as option purchase,etc.), which is relayed through a network (wireless, wired cloud, etc.)to an application (software program), that translates the captured eventinto meaningful information. Such communication was originallyaccomplished by having a remote network of machines relay informationback to a central hub for analysis, which would then be rerouted into asystem like a personal computer.

However, modern M2M communication has expanded beyond a one-to-oneconnection and changed into a system of networks that transmits datamany-to-one and many-to-many to plural different types of devices andappliances. The expansion of IP networks across the world has made itfar easier for M2M communication to take place and has lessened theamount of power and time necessary for information to be communicatedbetween machines.

The communications network 18 also includes a Public Safety AnsweringPoint (PSAP) to Automatic Location Identification (ALI) (PAM) interface.A PAM interface is an interface that uses a proprietary protocol toretrieve the caller's Automatic Network Identification (ANI) and/orAutomatic Location Identification (ALI) from another ALI system or froma Dynamic ANI/ALI Provider for display at the appropriate PSAP upon theanswer of a 911/E911 call.

The communications network 18 also includes a Common Alerting Protocol(CAP). CAP is an eXtensible Markup Language (XML)-based data format forexchanging public warnings and emergencies between alertingtechnologies. CAP allows a warning message to be consistentlydisseminated simultaneously over many warning systems to manyapplications. CAP increases warning effectiveness and simplifies thetask of activating a warning for responsible officials.

The IoT devices 32 include Emergency Position Indicating Radio Beacon(EPIRBs), personal locator beacon (PLB), emergency locator beacon (ELB),and emergency locator transmitter (ELT) sensors and/or actuators.

Individuals can receive standardized alerts from many sources andconfigure their applications to process and respond to the alerts, asdesired. Alerts from the Department of Homeland Security, the Departmentof the Interior's United States Geological Survey, and the Department ofCommerce's National Oceanic and Atmospheric Administration (NOAA),Cospas-Sarsat and state and local government agencies can all bereceived in the same format, by the same application. That applicationcan, for example, sound different alarms based on the informationreceived.

By normalizing alert data across threats, jurisdictions, and warningsystems, CAP also can be used to detect trends and patterns in warningactivity, such as trends that might indicate an undetected hazard orhostile act. From a procedural perspective, CAP reinforces aresearch-based template for effective warning message content andstructure.

The CAP data structure is backward-compatible with existing alertformats including the Specific Area Message Encoding (SAME) used inWeather radio and the broadcast Emergency Alert System as well as newtechnology such as the Commercial Mobile Alert System (CMAS).

ERIBs are tracking transmitters which aid in the detection and locationof boats, aircraft, and people in distress. A personal locator beacon(PLB) is particular type of EPIRB that is typically smaller, has ashorter battery life and unlike a proper EPIRB is registered to a personrather than a vessel. The terms emergency locator beacon (ELB) andemergency locator transmitter (ELT) are used interchangeably with EPIRBonly when used on aircraft.

EPIRB are radio beacons many of which interface with worldwide offeredservice of Cospas-Sarsat, the international satellite system for searchand rescue (SAR). Transmitters broadcasting on 406 MHz are recognized.When manually activated, or automatically activated upon immersion orimpact, such beacons send out a distress signal. The signals aremonitored worldwide and the location of the distress is detected bynon-geostationary satellites using the Doppler effect for trilateration,and in more recent EPIRBs also by Global Positioning System (GPS).

The communications network 18 also includes a Wireless Emergency ServiceProtocol E2 Interface for interoperable operation of the E2 interfaceover Transmission Control Protocol (TCP)/Internet Protocol (IP)(TCP/IP). This interface is between the Mobile Positioning Center(MPC)/Global Mobile Location Center (GMLC) and the Emergency ManagementSystems (EMSE) as defined in R45.2's TIA/EIA/J-STD-036-A.

The communications network 18 includes one or more servers or accesspoints (AP) including wired and wireless access points (WiAP).

The communications network 18 includes data networks using theTransmission Control Protocol (TCP), User Datagram Protocol (UDP),Internet Protocol (IP) and other data protocols.

The communications network 18 includes wired interfaces connectingportions of a PSTN or cable television network that connect the targetnetwork devices via the Public Switched Telephone Network (PSTN) or acable television network (CATV) including high definition television(HDTV) that connect the target network devices via one or more twistedpairs of copper wires, digital subscriber lines (e.g. DSL, ADSL, VDSL,etc.) coaxial cable, fiber optic cable, other connection media or otherconnection interfaces. The PSTN is any public switched telephone networkprovided by AT&T, CenturyLink, FairPoint, Frontier, Sprint, Verizon, andother Local Exchange Carriers, etc.

The communications network 18 includes digital and analog cellularservices, Commercial Mobile Radio Services (CMRS), including, mobileradio, paging and other wireless services. The communications network 18includes a cellular telephone network, Personal Communications Servicesnetwork (PCS), Packet Cellular Network (PCN), Global System for MobileCommunications, (GSM), Generic Packet Radio Services (GPRS), CellularDigital Packet Data (CDPD). The communications network 18 includes aWireless Application Protocol (WAP) or Digital Audio Broadcasting (DAB),802.xx.xx, Global Positioning System (GPS) and GPS map, Digital GPS(DGPS) or other type of wireless network.

The wireless network includes, but is not limited to, Code DivisionMultiple Access (CDMA), Time Division Multiple Access (TDMA), 3G, 4G,5G, 6G, LTE and/or other switched wireless technologies.

PCS networks include network that cover a range of wireless, digitalcommunications technologies and services, including cordless phones,mobile phones, voice mail, paging, faxing, mobile personal PDAs, etc.PCS devices are typically divided into narrowband and broadbandcategories.

Narrowband devices which operate in the 900 MHz band of frequencies,typically provide paging, data messaging, faxing, and one- and two-wayelectronic messaging capabilities. Broadband devices, which operate inthe 1850 MHz to 1990 MHz range typically provide two-way voice, data,and video communications. Other wireless technologies such as GSM, CDMAand TDMA are typically included in the PCS category.

GSM is another type of digital wireless technology widely usedthroughout Europe, in Australia, India, Africa, Asia, and the MiddleEast. GSM use is growing in the U.S. GSM is a wireless platform based onTDMA to digitize data. GSM includes not only telephony and Short MessageServices (SMS) but also voice mail, call forwarding, fax, caller ID,Internet access, and e-mail.

However, present invention is not limited to the frequencies and/orbandwidths described and slower, faster and other frequencies and/orbandwidths currently known or to be developed later, can be used topractice the invention.

SMS or “text messaging” is type of communications service that enables auser to allow private message communications with another user. GSMtypically operates at three frequency ranges: 900 MHz (GSM 900) inEurope, Asia and most of the rest of the world; 1800 MHz (GSM 1800 orDCS 1800 or DCS) in a few European countries; and 1900 MHz (GSM 1900also called PCS 1900 or PCS) in the United States. GSM also operates ina dual-band mode including 900/1800 MHz and a tri-band mode include900/1800/1900 Mhz.

Short Message Service (SMS) is a text messaging service component ofphone, Web, or mobile communication systems. It uses standardizedcommunications protocols to allow fixed line or mobile phone or wearablemobile devices to exchange short text messages.

SMS as used on modern handsets originated from radio telegraphy in radiomemo pagers using standardized phone protocols. These were defined in1985 as part of the GSM series of standards as a means of sendingmessages of up to 160 characters to and from GSM mobile handsets. Thoughmost SMS messages are mobile-to-mobile text messages, support for theservice has expanded to include other mobile technologies, such as CDMAnetworks, as well as satellite and landline networks.

GPRS is a standard for wireless communications, which runs at speeds upto 150 kilo-bits-per-second (kbit/s). GPRS, which supports a wide rangeof bandwidths is an efficient use of limited bandwidth and isparticularly suited for sending and receiving small bursts of data suchas e-mail and Web browsing, as well as large volumes of data.

CDPD is a wireless standard providing two-way, 19.2-Kbps or higherpacket data transmission over existing cellular telephone channels. APacket Cellular Network (PCN) includes various types of packetizedcellular data.

The communications network 18 includes a “mesh network” or a “meshsensor network.” A mesh network is a self-organizing networks built fromplural nodes that may spontaneously create an impromptu network,assemble the network themselves, dynamically adapt to device failure anddegradation, manage movement of nodes, and react to changes in task andnetwork requirements. The plural nodes are reconfigurable smart sensornodes that are self-aware, self-reconfigurable and autonomous.

A “mesh network” is a network that employs one of two connectionarrangements, full mesh topology or partial mesh topology. In the fullmesh topology, each node is connected directly to each of the others. Inthe partial mesh topology, nodes are connected to only some, not all, ofthe other nodes. A mesh network is a network where the nodes are inclose proximity (e.g., about few feet to about 100 feet, or about 1meter to about 30 meters, etc.).

Preferred embodiments of the present invention include network devicesand interfaces that are compliant with all or part of standards proposedby the Institute of Electrical and Electronic Engineers (IEEE),International Telecommunications Union-Telecommunication StandardizationSector (ITU), European Telecommunications Standards Institute (ETSI),Internet Engineering Task Force (IETF), U.S. National Institute ofSecurity Technology (NIST), American National Standard Institute (ANSI),Wireless Application Protocol (WAP) Forum, Data Over Cable ServiceInterface Specification (DOCSIS) Forum, Bluetooth Forum, the ADSL Forum,the Federal Communications Commission (FCC), the 3rd GenerationPartnership Project (3GPP), and 3GPP Project 2, (3GPP2) and Open MobileAlliance (OMA). However, network devices based on other standards couldalso be used.

An operating environment for network devices and interfaces of thepresent invention include a processing system with one or more highspeed Central Processing Unit(s) (CPU) or other types of processors anda memory, including, but not limited to, a non-transitory computerreadable medium. In accordance with the practices of persons skilled inthe art of computer programming, the present invention is describedbelow with reference to acts and symbolic representations of operationsor instructions that are performed by the processing system, unlessindicated otherwise. Such acts and operations or instructions arereferred to as being “computer-executed,” “CPU executed” or “processorexecuted.”

It will be appreciated that acts and symbolically represented operationsor instructions include the manipulation of electrical signals by theCPU. An electrical system represents data bits which cause a resultingtransformation or reduction of the electrical signals, and themaintenance of data bits at memory locations in a memory system tothereby reconfigure or otherwise alter the CPU's operation, as well asother processing of signals. The memory locations where data bits aremaintained are physical locations that have particular electrical,magnetic, optical, or organic properties corresponding to the data bits.

The data bits are maintained on a non-transitory computer readablemedium including magnetic disks, optical disks, organic memory, and anyother volatile (e.g., Random Access Memory (RAM)) or non-volatile (e.g.,Read-Only Memory (ROM)) mass storage system readable by the CPU. Thenon-transitory computer readable medium includes standalone orcooperating or interconnected non-transitory computer readable medium,which exist exclusively on the processing system or be distributed amongmultiple interconnected processing systems that may be local or remoteto the processing system. In one embodiment, the data bits are storedwith one or more encryption and/or security methods described herein.

The Open Systems Interconnection (OSI) reference model is a layeredarchitecture that standardizes levels of service and types ofinteraction for network devices exchanging information through acommunications network. The OSI reference model separates networkdevice-to-network device communications into seven protocol layers, orlevels, each building- and relying-upon the standards contained in thelevels below it. The OSI reference model includes fromlowest-to-highest, from Level 1 to Level 7, a physical, data link,network, transport, session, presentation and application layer. Thelowest of the seven layers deals solely with hardware links; the highestdeals with software interactions at the application-program level.

The Internet Protocol (IP) reference model is a layered architecturethat standardizes levels of service for the Internet Protocol suite ofprotocols. The Internet Protocol reference model comprises in generalfrom lowest-to-highest, a link, network, transport and applicationlayer.

In one embodiment of the present invention, the wireless and/or wiredinterfaces used for the plural target network devices include but arenot limited to, an IEEE 802.11a, 802.11ac, 802.11b, 802.11g, 802.11n,Wireless Fidelity (Wi-Fi), Wi-Fi Aware, Worldwide Interoperability forMicrowave Access (WiMAX), ETSI High Performance Radio Metropolitan AreaNetwork (HIPERMAN), Zigbee, Bluetooth, Infrared, Industrial, Scientificand Medical (ISM), a Radio Frequency Identifier (RFID), Real-Time Text(RTT), or other long range or short range wireless and/or wiredinterfaces may be used to practice the invention.

802.11b defines a short-range wireless network interface. The IEEE802.11b standard defines wireless interfaces that provide up to 11 Mbpswireless data transmission to and from wireless devices over shortranges. 802.11a is an extension of the 802.11b and can deliver speeds upto 54 M bps. 802.11g deliver speeds on par with 802.11a. However, other802.11xx interfaces can also be used and the present invention is notlimited to the 802.11 protocols defined. The IEEE 802.11a, 802.11an,802.11b, 802.11g and 802.11n standards are incorporated herein byreference.

Wi-Fi is another type of 802.11xx interface, whether 802.11b, 802.11a,dual-band, etc. Wi-Fi devices include an RF interfaces such as 2.4 GHzfor 802.11b or 802.11g and 5 GHz for 802.11a or 802.11n. The presentinvention is not limited to these Wi-Fi standards or frequencies.

Wi-Fi Aware is a new capability for energy-efficient, proximity-basedservice discovery among Wi-Fi capable devices. The technology in Wi-FiAware enables network devices to discover other devices, applications,and information nearby before making a Wi-Fi connection. Wi-Fi Awaremakes contextual awareness more immediate and useful, enablingpersonalized applications (e.g., 26, 26′, etc.) that continuously scansurroundings, anticipate actions, and notify of services and selectedpreferences. Wi-Fi Aware devices go through a process of discovery andsynchronization, establishing a common “heartbeat” that enables verypower efficient operation. Devices form clusters and exchange smallmessages about services available nearby, enabling immediate discovery.Wi-Fi Aware's ability to send and receive tiny messages beforeestablishing a network 18, 18′ connection further enables a two-wayconversation among network devices in emergency and non-emergencysituations whose current physical geographic locations and/or 2D/3Dgeo-space information may be known and available. This capability notonly enables a network device to discover nearby information andservices, but request additional information, such as emergency locationinformation—all without establishing, an Internet, PSTN, or othernetwork connections 18, 18′. The Wi-Fi Aware reference document, isincorporated herein by reference.

In one embodiment, the applications 26, 26′ include Wi-Fi Awarecapabilities. In one embodiment the wireless interfaces include Wi-FiAware wireless interface capabilities. However, the present invention isnot limited to these embodiments and the invention can be practicedwithout Wi-Fi Aware capabilities.

WiMAX is an industry trade organization formed by communicationscomponent and equipment companies to promote and certify compatibilityand interoperability of broadband wireless access equipment thatconforms to the IEEE 802.16xx and ETSI HIPERMAN. HIPERMAN is theEuropean standard for MANs.

The IEEE The 802.16a, 802.16c, 802.16d 802.16e and 802.16g standards arewireless MAN technology standard that provides a wireless alternative tocable, DSL and T1/E1 for last mile broadband access. It is also used ascomplimentary technology to connect IEEE 802.11xx hot spots to theInternet.

The IEEE 802.16a standard for 2-11 GHz is a wireless MAN technology thatprovides broadband wireless connectivity to fixed, portable and nomadicdevices. It provides up to 50-kilometers of service area range, allowsusers to get broadband connectivity without needing direct line of sightwith the base station, and provides total data rates of up to 280 Mbpsper base station, which is enough bandwidth to simultaneously supporthundreds of businesses with T1/E1-type connectivity and thousands ofhomes with DSL-type connectivity with a single base station. The IEEE802.16g provides up to 100 Mbps.

The IEEE 802.16e standard is an extension to the approved IEEE802.16/16a/16g standard. The purpose of 802.16e is to add limitedmobility to the current standard which is designed for fixed operation.

The ESTI HIPERMAN standard is an interoperable broadband fixed wirelessaccess standard for systems operating at radio frequencies between 2 GHzand 11 GHz.

The IEEE 802.16a, 802.16d, 802.16e and 802.16g standards areincorporated herein by reference. WiMAX can be used to provide awireless local loop (WLP).

The ETSI HIPERMAN standards TR 101 031, TR 101 475, TR 101 493-1 throughTR 101 493-3, TR 101 761-1 through TR 101 761-4, TR 101 762, TR 101763-1 through TR 101 763-3 and TR 101 957 are incorporated herein byreference.

IEEE 802.15.4 (Zigbee) is low data rate network standard used for meshnetwork devices such as sensors, interactive toys, smart badges, remotecontrols, and home automation. The 802.15.4 standard provides data ratesof 250 kbps, 40 kbps, and 20 kbps., two addressing modes; 16-bit shortand 64-bit IEEE addressing, support for critical latency devices, suchas joysticks, Carrier Sense Multiple Access/Collision Avoidance,(CSMA-CA) channel access, automatic network establishment by acoordinator, fully hand-shaked protocol for transfer reliability, powermanagement to ensure low power consumption for multi-month to multi-yearbattery usage and up to 16 channels in the 2.4 GHz ISM band (Worldwide),10 channels in the 915 MHz (US) and one channel in the 868 MHz band(Europe). The IEEE 802.15.4-2003 standard is incorporated herein byreference.

Bluetooth (IEEE 802.15.1a) is a short-range radio frequency technologyaimed at simplifying communications among network devices and betweennetwork devices. Bluetooth wireless technology supports both short-rangepoint-to-point and point-to-multipoint connections. The BluetoothSpecification, GL 11r02, March 2005, prepared by the Bluetooth SIG, Inc.and the IEEE 802.15.1a standard are incorporated herein by reference.

Infra data association (IrDA) is a short-range radio wireless Bluetoothor wireless infrared communications. Industrial, Scientific and Medical(ISM) are short-range radio wireless communications interfaces operatingat 400 MHz, 800 MHz, and 900 Mhz. ISM sensors may be used to providewireless information to practice the invention.

An RFID is an automatic identification method, relying on storing andremotely retrieving data using devices called RFID tags or transponders.An RFID tag is a small object that can be attached to or incorporatedinto a product, animal, or person. RFID tags contain antennas to enablethem to receive and respond to radio-frequency queries from an RFIDtransceiver. Passive tags require no internal power source, whereasactive tags require a power source. RFID sensors and/or RFID tags areused to provide wireless information to practice the invention.

Passive tags are powered by received radiation from a reading device andrequire no internal source of power; thus, they can be manufactured atvery low cost and require no ongoing maintenance as long as they are notremoved or physically damaged. Passive tags can only be read by a readerdevice in close proximity to the tag, which is an advantage inRFID-based in-building location services.

RFID Passive tags can be manufactured in a sticker-like form factor andheld in place by adhesive, providing very low installation cost;however, such an arrangement is not heat-resistant, and conventionalmechanical mounting employing screws or cover plates is advisable for atleast a minimal subset of all installed tags.

RFID Passive tags are typically capable of providing a 96-bit number toa tag reader: 96 bits allow 2⁹⁶=10²⁹ (100 billion billion billion)possible codes, ample to allow unique identification of everysignificant location within a building.

RFID active tags are employed for location awareness. Active tags havelonger range and can include more sophisticated functionality. In thecontext of this invention, active tags may be programmed to validatetheir location from time to time, either by reference to GlobalPositioning System (GPS) signals using very long integration times, orby interrogation of other RFID tags in their vicinity.

A RFID tag which finds itself in an incorrect or unverified location isprogrammed to turn itself off, thus avoiding spurious location databeing provided to a user; responses to incorrect location includeemitting a distress signal which can be detected by a reader duringbuilding maintenance, or contacting a central location by directwireless communications or mesh networking employing the multiplicity ofcompanion ID tags, in order to induce maintenance personnel to diagnoseand repair the problem with the subject tag.

RFID Active tags are also deployed in a mesh network that would allowinformation to pass from tag to tag. This type of network would allowtag and reader information to be passed from location to location andpossibly from floor to floor to move the information to a centrallocation or to the building wall ultimately making it easier to access.Active tag networks have significant functional advantages, but arerelatively expensive and maintenance-intensive compared to passive tags.

Real-Time Text (RTT) is text transmitted instantly as it is being typedor created. Recipients can immediately read the message while it isbeing written, without waiting. Real-time text is used forconversational text, in collaboration, and in live captioning. RTTtechnologies include TDD/TTY devices for the deaf, live captioning forTV, a feature enhancement in instant messaging, captioning fortelephony/video teleconferencing, telecommunications relay servicesincluding Internet Protocol-relay, transcription services includingRemote CART, TypeWell, collaborative text editing, streaming textapplications, and next-generation 9-1-1/1-1-2 emergency services.

In one embodiment, the current physical location 34 includestwo-dimensional (2D) (e.g., X, Y) and/or three-dimensional (3D) (X, Y,Z), Global Positioning System (GPS) information, Cartesian coordinateinformation, Euclidean space information, geo-space coordinateinformation, geographic information and/or types of physical locationinformation. The present invention is not limited to the type of currentphysical location information described and other types of physicallocation information can be used to practice the invention.

The Global Positioning System (GPS) is a space-based global navigationsatellite system (GNSS) that provides reliable location and timeinformation in all weather and at all times and anywhere on or near theEarth. A GPS receiver calculates its position by precisely timingsignals sent by GPS satellites. A GPS receiver uses the messages itreceives to determine a transit time of each message and computes adistance to each GPS satellite. These distances along with thesatellites' locations are used with the possible aid of triangulation,depending on which algorithm is used, to compute a current physicalposition of the GPS receiver. This position is then displayed, perhapswith a moving map display (e.g., at a street level, etc.) and/orlatitude and longitude (X, Y) and/or elevation and/or speed, height,depth, acceleration, de-acceleration, velocity, temperature, barometricpressure information, other pressure information and/other informationfor the (Z) coordinate may also be included. Many GPS units also showderived information such as travel direction and speed, calculated fromposition changes. The GPS coordinates include standard GPS, GPS map,Digital GPS (DGPS) and/or other types of GPS information.

In one embodiment, (Z) component of the 3D current physical locationinformation includes, but is not limited to, temperature, pressure,height, floor, depth, altitude, elevation, speed, accelerationinformation. For example, a target network device may be located atlatitude and longitude (X, Y) and at with a temperature, pressure,depth, altitude, elevation, speed, and/or acceleration of (Z), etc.

There is a new FCC requirement for emergency Z-Axis informationincluding heights which requires emergency Z-axis height informationinclude at least a three meter (i.e., about 9.8 feet) E911 accuratevertical location information to support public safety emergencylocation for first responders for E911 emergency services in the onehundred twenty five largest cellular market areas (CMAs) by April of2021.

In one embodiment, the (Z) component of the 3D current physical locationinformation includes, but is not limited to, enhanced Z-componentinformation including the new FCC Z-axis height/elevation informationand/or other enhanced elevation and/or enhanced height data from newother public information sources (e.g., satellite, low earth orbit (LEO)satellite, carrier network infrastructure, etc.) and/or privateinformation (e.g., satellite, low earth orbit (LEO) satellite, carriernetwork infrastructure, etc.) sources.

A Low Earth Orbit (LEO) satellite is a satellite with an Earth-centeredorbit with an altitude of about 500 kilometers (kin) (about 310 miles)to about 2,000 km (about 1,200 miles) or less, approximately one-thirdof the radius of Earth.

LEO satellites operate at lower altitudes above the Earth's surface thengeostationary satellites which operate at about 36,000 km (about 22,000miles) altitude, the traditional altitude of communications satellites.The main advantage of the LEO satellites is lower latency for datacommunications.

Latency is the delay, usually measured in milliseconds, that occurs in around-trip data transmission. Geostationary satellite systems have amedian latency of about 600 milliseconds, while LEO satellites have amedian latency of about 32 seconds.

A “Cartesian coordinate” system is a coordinate system that specifieseach point uniquely in a plane by a pair of numerical coordinates, whichare the signed distances to the point from two fixed perpendiculardirected lines, measured in the same unit of length. Each reference lineis called a coordinate axis or just axis (plural axes) of the system,and the point where they meet is its origin, at ordered pair (zero,zero). The coordinates can also be defined as the positions of theperpendicular projections of the point onto the two axes, expressed assigned distances from the origin.

The Cartesian coordinate system can be used to specify the position ofany point in three-dimensional (3D) space by three Cartesiancoordinates, its signed distances to three mutually perpendicular planes(or, equivalently, by its perpendicular projection onto three mutuallyperpendicular lines). In general, n Cartesian coordinates (an element ofreal n-space) specify the point in an n-dimensional Euclidean space forany dimension n. These coordinates are equal, up to sign, to distancesfrom the point to n mutually perpendicular hyperplanes.

“Euclidean space information” includes a 2D or 3D dimensional space inwhich the axioms and postulates of Euclidean geometry apply. Euclideanspace is a space in any finite number of dimensions, in which points aredesignated by coordinates (one for each dimension, e.g., 3D (X, Y, Z),etc.) and the distance between two points is given by a distanceformula.

“Geo-space” information includes 2D (X, Y) and/or 3D (X, Y, Z) whereinthe (X), (Y) and (Z) coordinates include, but are not limited to,latitude, longitude, altitude, elevation, speed, height, depth,acceleration, de-acceleration, velocity, temperature, barometricpressure information, other pressure information, magnetic information,and/other information.

The “geographic information” includes, but is not limited to, streetaddress information for an urban area, fire district identifiers orother location information for rural areas, a desk, cubicle, room,suite, unit, apartment, building floor, a building floor in a building,a building on a street, enterprise, campus, university, school, village,town, city, state, country or continent or other global region, etc.

The present invention is not limited to the type of current physicallocation information described and other types of current physicallocation information can be used to practice the invention.

The target network devices include a protocol stack with multiple layersbased on the Internet Protocol or OSI reference model. The protocolstack is used for, but not limited to, data networking. The protocolstack includes, but is not limited to, TCP, UDP, IP, Hypertext TransferProtocol (HTTP), Simple Mail Transfer Protocol (SMTP), Post OfficeProtocol version 3 (POP3), Internet Mail Access Protocol (IMAP),Voice-Over-IP (VoIP), Session Initiation Protocol (SIP), ServiceLocation Protocol (SLP), Session Description Protocol (SDP), Real-timeProtocol (RTP), H.323, H.324, Domain Name System (DNS), AuthenticationAuthorization and Accounting (AAA), instant-messaging (IM), Text-over-IP(ToIP), Internet Protocol version 4 (IPv4), Internet Protocol Version 6(IPv6), Hybrid dual-stack IPv6/IPv4, Simple Network Management Protocol(SNMP), (Hyper Text Transfer Protocol (HTTP) Enabled Location Delivery)(HELD) Protocol, HELD+ (HELD Plus) Protocol and/or other protocols.

TCP provides a connection-oriented, end-to-end reliable protocoldesigned to fit into a layered hierarchy of protocols that supportmulti-network applications. For more information on TCP 58 see IETFRFC-793, incorporated herein by reference.

UDP provides a connectionless mode of communications with datagrams inan interconnected set of networks. For more information on UDP see ITEFRFC-768, incorporated herein by reference.

IP is an addressing protocol designed to route traffic within a networkor between networks. For more information on IP 54 see IETF RFC-791,incorporated herein by reference. An IP address includes four sets ofnumbers divided by period (e.g., x.x.x.x) in the range of zero to 255.An IP address is a unique string of numbers that identifies a device onan IP based network.

HTTP is a standard protocol for communications on the World Wide Web.For more information on HTTP, see IETF RFC-2616, incorporated herein byreference.

SMTP is a protocol for sending e-mail messages between devices includinge-mail servers. For more information on SMTP, see IETF RFC-821 andRFC-2821, incorporated herein by reference.

POP3 is a protocol for a protocol used to retrieve e-mail from a mailserver. For more information on POP3, see IETF RFC-1939, incorporatedherein by reference.

IMAP is a protocol for retrieving e-mail messages from a server. Formore information on IMAP, see IETF RFC-1730, incorporated herein byreference.

Media Access Control (MAC) is a data link layer (e.g., Layer 2)protocol. A MAC address is a physical address of a device connected to acommunications network, expressed as a 48-bit hexadecimal number. A MACaddress is permanently assigned to each unit of most types of networkinghardware, such as network interface cards (NICs) (e.g., Ethernet cards,etc.) by manufacturers at the factory.

VoIP is a set of facilities for managing the delivery of voiceinformation using IP packets. In general, VoIP is used to send voiceinformation in digital form in discrete data packets (i.e., IP packets)over data networks 18 rather than using traditional circuit-switchedprotocols used on the PSTN. VoIP is used on both wireless and wired datanetworks.

VoIP typically comprises several applications (e.g., SIP, SLP, SDP,H.323, H.324, DNS, AAA, etc.) that convert a voice signal into a streamof packets (e.g., IP packets) on a packet network and back again. VoIPallows voice signals to travel over a stream of data packets over acommunications network 18.

SIP supports user mobility by proxying and re-directing requests to amobile node's current location. Mobile nodes can register their currentlocation. SIP is not tied to any particular conference control protocol.SIP is designed to be independent of a lower-layer transport protocoland can be extended. For more information on SIP, see IETF RFC-2543 andIETF 3261, the contents of both of which are incorporated herein byreference.

SLP provides a scalable framework for the discovery and selection ofnetwork services. Using SLP, network devices using the Internet needlittle or no static configuration of network services for network basedapplications. For more information on SLP see IETF RFC-2608,incorporated herein by reference.

SDP is a protocol for describing multimedia sessions for the purposes ofsession announcement, session invitation, and other forms of multimediasession initiation. For more information on SDP, see IETF RFC-2327,incorporated herein by reference.

RTP is a protocol for end-to-end network transport functions suitablefor applications transmitting real-time data, such as audio, video orsimulation data, over multicast or unicast network services. For moreinformation on RTP, see IETF RFC-1889, incorporated herein by reference.

H.323 is one of main family of video conferencing recommendations for IPnetworks. The ITU-T H.323 standards entitled “Packet-based multimediacommunications systems” dated 02/98, 09/99, 11/00 and 07/03 areincorporated herein by reference.

H.324 is a video conferencing recommendation using Plain Old TelephoneService (POTS) lines. The ITU-T H.324 standards entitled “Terminal forlow bit-rate multimedia communication” dated 02/98 and 03/02 areincorporated herein by reference.

A Domain Name System (DNS) provides replicated distributed securehierarchical databases that hierarchically store resource records underdomain names. For more information on the DNS see IETF RFC-1034,RFC-1035, RFC-1591, RFC-2606 and RFC-2929, the contents of all of whichare incorporated herein by reference.

Authentication Authorization and Accounting (AAA) includes aclassification scheme and exchange format for accounting data records(e.g., for call billing, etc.). For more information on AAAapplications, see, IETF RFC-2924, the contents of which are incorporatedherein by reference.

VoIP services typically need to be able to connect to traditionalcircuit-switched voice networks such as those provided by the PSTN.Thus, VoIP is typically used with the H.323 protocol and othermultimedia protocols. H.323 and H.324 terminals such as multimediacomputers, handheld devices, PDAs or other devices such as non-mobileand mobile phones connect to existing wired and wireless communicationsnetworks 18 as well as private wired and wireless networks.

H.323 and H.324 terminals implement voice transmission functions andtypically include at least one voice codec (e.g., ITU-T CODECS, G.711,G.723, G.726, G.728, G.729, GSM, etc.) that sends and receivespacketized voice data and typically at least one video codec (e.g.,MPEG, etc.) that sends and receives packetized video data).

An Instant Message (IM) is a “short,” real-time or near-real-timemessage that is sent between two or more end user devices such(computers, personal digital/data assistants (PDAs) mobile phones, etc.)running IM client applications. An IM is typically a short textualmessage. Examples of IM messages include America Online's Instant (AIM)messaging service, Microsoft Network (MSN) Messenger, Yahoo Messenger,and Lycos ICQ Instant Messenger, IM services provided by telecomproviders such as T-Mobile, Verizon, Sprint, and others that provide IMservices via the Internet and other wired and wireless communicationsnetworks. In one embodiment of the present invention, the IM protocolsused meet the requirements of Internet Engineering Task Force (IETF)Request For Comments (RFC)-2779, entitled “Instant Messaging/PresenceProtocol Requirements.” However, the present invention is not limited tosuch an embodiment and other IM protocols not compliant with IETF RFC2779 may also be used.

Text-over-IP (ToIP) is defined IETF RFC 5194, the contents of which areincorporated herein by reference. ToIP is a framework for implementationof all required functions based on the Session Initiation Protocol (SIP)and the Real-Time Transport Protocol (RTP. This ToIP framework isspecifically designed to be compatible with Voice-over-IP (VoIP),Video-over-IP, and Multimedia-over-IP (MoIP) environments. This ToIPframework also builds upon, and is compatible with, the high-level userrequirements of deaf, hard-of-hearing and speech-impaired users asdescribed in IETF RFC 3351. It also meets real-time text requirements ofmainstream users. ToIP also offers an IP equivalent of analog texttelephony services as used by deaf, hard-of-hearing, speech-impaired,and mainstream users. The Session Initiation Protocol (SIP) is theprotocol of choice for all the necessary control and signaling requiredfor the ToIP framework.

Internet Protocol version 6 (IPv6) is the latest version of the InternetProtocol (IP), the communications protocol that provides anidentification and location system for computers on networks and routestraffic across the Internet. IPv6 was developed by the IETF to deal withthe long-anticipated problem of IPv4 address exhaustion. IPv6 isdescribed in IETF RFC 2460, incorporated herein by reference. IPv6 usesa 128-bit address, allowing 2¹²⁸, or approximately 3.4×10³⁸ addresses,or more than 7.9×10²⁸ times as many as IPv4, which uses 32-bitaddresses. IPv4 provides approximately 4.3 billion addresses.

Internet Protocol Version 4 (IPv4) was the first publicly used versionof the Internet Protocol. IPv4 was developed as a research project bythe Defense Advanced Research Projects Agency (DARPA), a United StatesDepartment of Defense agency, before becoming the foundation for theInternet and the World Wide Web. It is currently described by IETFpublication RFC 791 (September 1981), the contents of which isincorporated by reference, which replaced an earlier definition (RFC760, January 1980). IPv4 included an addressing system that usednumerical identifiers consisting of 32 bits.

Hybrid dual-stack IPv6/IPv4 implementations recognize a special class ofaddresses, the IPv4-mapped IPv6 addresses. In these addresses, the first80 bits are zero, the next 16 bits are one, and the remaining 32 bitsare the IPv4 address.

Simple Network Management Protocol (SNMP) is a protocol for networkmanagement. It is used for collecting information from, and configuring,network devices, such as target network devices, servers, printers,hubs, switches, and routers on an Internet Protocol (IP) network. Formore information on SNMP, see IETF RFC-1157, incorporated herein byreference.

(Hyper Text Transfer Protocol (HTTP) Enabled Location Delivery) (HELD)is a protocol to retrieve a location of a network device either directlyin the form of a Presence Information Data Format Location Object(PIDF-LO) document (by value) or indirectly as a location UniformResource Identifier (URI) (by reference). For more information on HELD,see IETF RFC-5985, incorporated herein by reference.

HELD+ is an extension of the HELD protocol that adds additionalemergency location information features. See IETF RFC-7480, andRFC-7852, both of which are incorporated by reference. In oneembodiment, the HELD+ extensions to the HELD protocol are defined inIETF RFCs. In another embodiment, the HELD+ extensions to the HELDprotocol are defined and used by individual companies providingemergency location services including, but limited to those extensionsillustrated in Tables 3-5. However, the present invention is not limitedto this embodiment and other embodiments, with other types of HELD+extensions can be used to practice the invention.

The number 112 is a common emergency telephone number used outside ofthe United States in most countries in Europe that can be dialed free ofcharge from most mobile telephones and fixed telephones in order toreach emergency services (ambulance, fire and rescue, police). The 112number is a part of the GSM standard and all GSM-compatible telephonehandsets are able to dial 112 even when locked or, in some countries,with no Subscriber Identification Module (SIM) card present. It is alsothe common emergency number in India and in nearly all member states ofthe European Union as well as several other countries of Europe and theworld. However, in some countries, calls to 112 are not connecteddirectly but forwarded by the GSM network to local emergency numbers(e.g., 911 in North America or 000 in Australia, etc.). There are otheremergency numbers that are used for emergencies, including, but notlimited to the number 112, inside and outside of the United States.

Television Services

In one embodiment, the application 26, 26′ provides emergency locationservices from television services via the communications network 18,18′. These television services include digital television services,including, but not limited to, cable television, satellite television,high-definition television, three-dimensional, televisions and othertypes of network devices.

In one embodiment, the television services include NextGen TV ASTC 3.0.The ASTC 3.0 standard, commonly known as “NextGen TV” is the first majorupgrade in broadcast TV since the transition to digital broadcasting(DTV) in 2009. NextGen TV is an Internet Protocol (IP) based system,which means it can carry Internet content and services alongside thetraditional over-the-air broadcast signal. The standard will enablenever-before-available interactive features like video-on-demand andadvanced emergency alerts for broadcast TV, all delivered free with anover-the-air antenna. NextGen TV signals will be stronger and willtransmit over greater distances and deeper into buildings, withhigher-quality picture and better sound. However, the present inventionis not limited to this embodiment and other television services can beused to practice the invention.

However, the present invention is not limited to such televisionservices and more, fewer and/or other television services can be used topractice the invention.

Internet Television Services

In one embodiment, the application 26, 26′ provides emergency locationservices from various Internet based television services via thecommunications network 18, 18′. The television services include Internettelevision, Web-TV, and/or Internet Protocol Television (IPTV) and/orother broadcast television services.

“Internet television” allows users to choose a program or the televisionshow they want to watch from an archive of programs or from a channeldirectory. The two forms of viewing Internet television are streamingcontent directly to a media player or simply downloading a program to aviewer's set-top box, game console, computer, Internet television stick(e.g., AMAZON FIRE stick, GOOGLE TV stick, etc.) and/or other meshnetwork device.

“Web-TV” delivers digital content via non-mesh broadband and mobilenetworks. The digital content is streamed to a viewer's set-top box,game console, computer, or other mesh network device.

“Internet Protocol television (IPTV)” is a system through which Internettelevision services are delivered using the architecture and networkingmethods of the Internet Protocol Suite over a packet-switched networkinfrastructure, e.g., the Internet and broadband Internet accessnetworks, instead of being delivered through traditional radio frequencybroadcast, satellite signal, and/or cable television formats.

However, the present invention is not limited to such InternetTelevision services and more, fewer and/or other Internet Televisionservices can be used to practice the invention.

Social Networking Services

In one embodiment, the application 26, 26′ provides emergency locationservices from various social network services via the communicationsnetwork 18, 18′ to/from one or more social networking web-sites and/orapplications (e.g., FACEBOOK, LINKEDIN, SNAPCHAT, YOUTUBE, TWITTER,MY-SPACE, MATCH.COM, E-HARMONY, GROUPON, SOCIAL LIVING, PINTREST,INSTAGRAM, etc.). The social networking web-sites also include, but arenot limited to, social couponing sites, dating web-sites, blogs, RSSfeeds, and other types of information web-sites in which messages can beleft or posted for a variety of social activities. Such socialnetworking sites include plural different proprietary and public socialnetworking communications protocols for communications between a userand the social networking sites. Such social networking protocols may beused to send emergency messages.

However, the present invention is not limited to the social networkingservices described and other public and private social networkingservices can also be used to practice the invention.

Security and Encryption

Devices and interfaces of the present invention may include security andencryption for secure communications. Wireless Encryption Protocol (WEP)(also called “Wired Equivalent Privacy) is a security protocol forWiLANs defined in the IEEE 802.11b standard. WEP is cryptographicprivacy algorithm, based on the Rivest Cipher 4 (RC4) encryption engine,used to provide confidentiality for 802.11b wireless data.

RC4 is cipher designed by RSA Data Security, Inc. of Bedford, Mass.,which can accept encryption keys of arbitrary length, and is essentiallya pseudo random number generator with an output of the generator beingXORed with a data stream to produce encrypted data.

One problem with WEP is that it is used at the two lowest layers of theOSI model, the physical layer and the data link layer, therefore, itdoes not offer end-to-end security. One another problem with WEP is thatits encryption keys are static rather than dynamic. To update WEPencryption keys, an individual has to manually update a WEP key. WEPalso typically uses 40-bit static keys for encryption and thus provides“weak encryption,” making a WEP device a target of hackers.

The IEEE 802.11 Working Group is working on a security upgrade for the802.11 standard called “802.11i.” This supplemental draft standard isintended to improve WiLAN security. It describes the encryptedtransmission of data between systems 802.11X WiLANs. It also defines newencryption key protocols including the Temporal Key Integrity Protocol(TKIP). The IEEE 802.11i draft standard, version 4, completed Jun. 6,2003, is incorporated herein by reference.

The 802.11i is based on 802.1x port-based authentication for user anddevice authentication. The 802.11i standard includes two maindevelopments: Wi-Fi Protected Access (WPA) and Robust Security Network(RSN).

WPA uses the same RC4 underlying encryption algorithm as WEP. However,WPA uses TKIP to improve security of keys used with WEP. WPA keys arederived and rotated more often than WEP keys and thus provide additionalsecurity. WPA also adds a message-integrity-check function to preventpacket forgeries.

RSN uses dynamic negotiation of authentication and selectable encryptionalgorithms between wireless access points and wireless devices. Theauthentication schemes proposed in the draft standard include ExtensibleAuthentication Protocol (EAP). One proposed encryption algorithm is anAdvanced Encryption Standard (AES) encryption algorithm.

Dynamic negotiation of authentication and encryption algorithms lets RSNevolve with the state of the art in security, adding algorithms toaddress new threats and continuing to provide the security necessary toprotect information that WiLANs carry.

The NIST developed a new encryption standard, the Advanced EncryptionStandard (AES) to keep government information secure. AES is intended tobe a stronger, more efficient successor to Triple Data EncryptionStandard (3DES). More information on NIST AES can be found at the URL“www.nist.gov/aes.”

DES is a popular symmetric-key encryption method developed in 1975 andstandardized by ANSI in 1981 as ANSI X.3.92, the contents of which areincorporated herein by reference. 3DES is the encrypt-decrypt-encrypt(EDE) mode of the DES cipher algorithm 3DES is defined in the ANSIstandard, ANSI X9.52-1998, the contents of which are incorporated hereinby reference. DES modes of operation are used in conjunction with theNIST Federal Information Processing Standard (FIPS) for data encryption(FIPS 46-3, October 1999), the contents of which are incorporated hereinby reference.

The NIST approved a FIPS for the AES, FIPS-197. This standard specified“Rijndael” encryption as a FIPS-approved symmetric encryption algorithmthat may be used by U.S. Government organizations (and others) toprotect sensitive information. The NIST FIPS-197 standard (AES FIPS PUB197, November 2001) is incorporated herein by reference.

The NIST approved a FIPS for U.S. Federal Government requirements forinformation technology products for sensitive but unclassified (SBU)communications. The NIST FIPS Security Requirements for CryptographicModules (FIPS PUB 140-2, May 2001) is incorporated herein by reference.

RSA is a public key encryption system which can be used both forencrypting messages and making digital signatures. The letters RSA standfor the names of the inventors: Rivest, Shamir and Adleman. For moreinformation on RSA, see U.S. Pat. No. 4,405,829, now expired andincorporated herein by reference.

“Hashing” is the transformation of a string of characters into a usuallyshorter fixed-length value or key that represents the original string.Hashing is used to index and retrieve items in a database because it isfaster to find the item using the shorter hashed key than to find itusing the original value. It is also used in many encryption algorithms.

Secure Hash Algorithm (SHA), is used for computing a secure condensedrepresentation of a data message or a data file. When a message of anylength <2⁶⁴ bits is input, the SHA-1 produces a 160-bit output called a“message digest.” The message digest can then be input to other securitytechniques such as encryption, a Digital Signature Algorithm (DSA) andothers which generates or verifies a security mechanism for the message.SHA-512 outputs a 512-bit message digest. The Secure Hash Standard, FIPSPUB 180-1, Apr. 17, 1995, is incorporated herein by reference.

Message Digest-5 (MD-5) takes as input a message of arbitrary length andproduces as output a 128-bit “message digest” of the input. The MD5algorithm is intended for digital signature applications, where a largefile must be “compressed” in a secure manner before being encrypted witha private (secret) key under a public-key cryptosystem such as RSA. TheIETF RFC-1321, entitled “The MD5 Message-Digest Algorithm” isincorporated here by reference.

Providing a way to check the integrity of information transmitted overor stored in an unreliable medium such as a wireless network is a primenecessity in the world of open computing and communications. Mechanismsthat provide such integrity check based on a secret key are called“message authentication codes” (MAC). Typically, message authenticationcodes are used between two parties that share a secret key in order tovalidate information transmitted between these parties.

Keyed Hashing for Message Authentication Codes (HMAC), is a mechanismfor message authentication using cryptographic hash functions. HMAC isused with any iterative cryptographic hash function, e.g., MD5, SHA-1,SHA-512, etc. in combination with a secret shared key. The cryptographicstrength of HMAC depends on the properties of the underlying hashfunction. The IETF RFC-2101, entitled “HMAC: Keyed-Hashing for MessageAuthentication” is incorporated here by reference.

An Electronic Code Book (ECB) is a mode of operation for a “blockcipher,” with the characteristic that each possible block of plaintexthas a defined corresponding cipher text value and vice versa. In otherwords, the same plaintext value will always result in the same ciphertext value. Electronic Code Book is used when a volume of plaintext isseparated into several blocks of data, each of which is then encryptedindependently of other blocks. The Electronic Code Book has the abilityto support a separate encryption key for each block type.

Diffie and Hellman (DH) describe several different group methods for twoparties to agree upon a shared secret in such a way that the secret willbe unavailable to eavesdroppers. This shared secret is then convertedinto various types of cryptographic keys. A large number of the variantsof the DH method exist including ANSI X9.42. The IETF RFC-2631, entitled“Diffie-Hellman Key Agreement Method” is incorporated here by reference.

However, the present invention is not limited to the security orencryption techniques described and other security or encryptiontechniques can also be used.

The HyperText Transport Protocol (HTTP) Secure (HTTPs or HTTPS), is astandard for encrypted communications on the World Wide Web. HTTPs isactually just HTTP over a Secure Sockets Layer (SSL). For moreinformation on HTTP, see IETF RFC-2616 incorporated herein by reference.

The SSL protocol is a protocol layer which may be placed between areliable connection-oriented network layer protocol (e.g. TCP/IP) andthe application protocol layer (e.g. HTTP). SSL provides for securecommunication between a source and destination by allowing mutualauthentication, the use of digital signatures for integrity, andencryption for privacy.

The SSL protocol is designed to support a range of choices for specificsecurity methods used for cryptography, message digests, and digitalsignatures. The security method are negotiated between the source anddestination at the start of establishing a protocol session. The SSL 2.0protocol specification, by Kipp E. B. Hickman, 1995, is incorporatedherein by reference

Transport Layer Security (TLS) provides communications privacy over theInternet and other networks. This encryption security protocol allowsclient/server applications to communicate over a transport layer (e.g.,TCP) in a way that is designed to prevent eavesdropping, tampering, ormessage forgery. For more information on TLS see IETF RFCs 2246, and6753, incorporated herein by reference.

Wearable Network Devices

“Wearable mobile technology” and/or “wearable devices” are clothing andaccessories incorporating computer and advanced electronic technologies.Wearable mobile network devices provide several advantages including,but not limited to: (1) Quicker access to notifications. Importantand/or summary notifications are sent to alert a user to view a wholenew message. (2) Heads-up information. Digital eye wear allows users todisplay relevant information like directions without having toconstantly glance down; (3) Always-on Searches. Wearable devices providealways-on, hands-free searches; and (4) Recorded data and feedback.Wearable devices also take telemetric data recordings and providinguseful feedback for users for exercise, health, fitness, activities etc.

Digital eyewear, such as GOOGLE Glass, Smart watches by SONY, NIKE,GARMIN, SAMSUNG, APPLE, wrist bands and/or fitness bands by LG, NIKE,FITBIT, etc. and others are examples of wearable mobile devices. Justlike mobile and non-mobiles phones, a current physical location 34 ofsuch wearable mobile devices must be determine in an emergencysituation.

The emergency situations, include, but are not limited to, accident,crime, fire, military, marine, natural disaster (e.g., earthquake,volcano, flood, landslide, etc.), medical, police, terrorist, military,marine, weather (e.g., hurricane, tornado, etc.), and/or other types ofemergency situations. However, the present invention is not limited tothis list of emergency situations, and more, fewer or other emergencysituations can be used to practice the invention.

The wearable device clothing 160 includes “smart clothing,” includingbut not limited to (1) smart tops; (2) smart bottoms; (3) smart swimsuits; (4) smart medical clothing; (5) smart socks; (6) smart hats; (7)smart underwear; (8) smart shoes; and/or (9) smart suits. “Smartclothing” may consist of materials that have embedded sensors, embeddeddetection capabilities, or embedded devices.

The “smart tops” include for example, smart compression shirts and othertypes of smart shirts or tops with a heart rate capture point sensors ona front and and/or a pocket on the back for a GPS sensor, that tracksmotion and heart rate metrics in real-time. The smart shirts allowbroadcast of live training data allowing athletes and coaches to monitorconditioning and fitness levels. Other smart tops include micro-EMGsensors that detect which muscles are working and transfer this workoutdata to a smartphone via a Bluetooth core. Muscle effort, heart rate andbreathing are all tracked.

Other smart tops include “smart jackets” including touch and gesturesensitive areas on jacket sleeves. Users interact with a variety ofservices including music and GPS map apps provided a smart phoneincluded in a jacket pocket. A user will also be able to answer anddismiss phone calls, select music or get directions all without reachingfor attached smart phone.

The “smart bottoms” includes for example, smart running shorts andrunning tights, sweat pants and with including sensors that monitors ahost of metrics including GPS location information, cadence, groundcontact time, pelvic rotation and stride length. The smart bottomssupport real-time coaching with feedback sent through to wirelessheadphones to help improve running form and reduce the chances ofinjury.

The “smart swimsuits” includes for example, Swimsuits equipped with aremovable medallion-style waterproof sensor that aims to prevent aperson from staying too long in the sun. The smart swimsuits allow auser to enter a skin type in a companion application 26 (e.g., APPLE orANDROID smartphone app, etc.) the application will continuously monitorthe temperature throughout the day and will send out warnings when it'stime to apply some more sunscreen or get into the shade.

The “smart medical clothing” includes for example, a smart compressionsleeve that uses electrocardiogram (ECG) technology to monitor heartrate activity, blood pressure, blood sugar levels, etc. “Smart medicalclothing” also has environmental sensors to detect radiation,contaminants, and other abnormal dangerous substances. The smartcompression sleeve also has sensors to monitor body temperature, airquality and ultra violet (UV) sun rays. The smart medical clothing alsoincludes smart medical socks and medical hats.

Smart watches also include technology that provides medical informationincluding, but not limited to, technology to monitor heart rateactivity, blood pressure, blood sugar levels, etc.

The “smart socks” include for example, includes a (1) baby socks as amonitor for babies that uses pulse oximetry technology used in hospitalsand monitor heart rates to make sure the baby's breathing isappropriate. It pairs with an IPHONE or ANDROID companion app overBluetooth to deliver data in real-time; and (2) running socks providinginformation on pace, distance and time and running style, which can leadto faster times and a reduced risk of injury. The socks feature threetextile pressure sensors, which measure the pressure placed on the footduring running. The socks feature textile pressure sensors, whichmeasure a pressure placed on the foot during running.

The “smart hats” for example include, a smart baby hat that monitorsvital signs monitor for newborn babies. It can measure temperature,heart rate, respiratory rate and blood oxygen saturation. The baby hatcan be wirelessly synced, via Bluetooth to smart phones and tablets.Doctors and nurses can check up on the vital signs of one or all babiesa room at a glance and get alerts on any changes in temperature or heartrate, etc.

The “smart underwear” for example includes, smart sports bras thatrecord distances runs, breathing rates, heart rate and calculatesrecovery time. The smart bra is synced, via Bluetooth to smart phonesand tablets.

The “smart suits” for example, include business suits that that collectbiometric weather and UV data. One smart suit includes an NFC smartsuit, that lets the wearer unlock and answer their smart phone, swapbusiness cards digitally and sync with other devices in an office suchas a fax machine, printer, etc. via the NFC communications protocol.

The “smart shoes” include for example, smart shoes with a heart ratecapture point sensors, a GPS sensor, motion sensors, and/oraccelerometers, that track motion and heart rate metrics in real-time.The smart shoes allow broadcast of live training data allowing athletesand coaches to monitor conditioning and fitness levels. Other smartshoes include micro-EMG sensors that detect which muscles are workingand transfer this workout data to a smartphone via a Bluetooth core.Muscle effort, heart rate and breathing are all tracked.

However, the present invention is not limited to the exemplary smartclothing described herein and more, fewer or other types of smartclothing can be used to practice the invention.

FIG. 2 is a block diagram with 40 illustrating exemplary wearabledevices. The wearable devices include one or more processors andinclude, but are not limited to, wearable digital glasses 42 (e.g.,GOOGLE Glass, etc.), clothing 44 (e.g., smart ties, smart headwear,smart tops and bottoms, etc.), jewelry 46 (e.g., smart rings, smartearrings, etc.), watches 48 (e.g., SONY, NIKE, SAMSUNG, NIKE, GARMIN,APPLE, etc.) and/or wrist bands or fitness bands 50 (e.g. GARMIN,FITBIT, POLAR, NIKE, JAWBONE, LG, etc.). The wearable mobile devices42-50 includes application 26 and/or 26′ to determine a current physicallocation 34, of the wearable network devices 42-50. The wearable devicesare also wearable by animals (e.g., service dogs, pets, etc.) to provideemergency location information for the animals owner. All of thewearable devices 42-50 have one or more processors, a non-transitorycomputer readable medium and/or selected ones have other componentsincluding, but not limited to, accelerometers, altimeters, musiccontrol, phone compatibility, etc. However, the present invention is notlimited to such embodiments and more, fewer and other types of wearabledevices can also be used to practice the invention.

Location of a Target Network Device in an Emergency Situation

FIGS. 3A, 3B and 3C are a flow diagram illustrating a Method 52 forlocating a network device in an emergency situation.

FIG. 4 is a block diagram 70 graphically illustrating Method 52 of FIG.3.

In FIG. 3A at Step 54, a first location information message is receivedon an emergency location application on an emergency locationinformation server network device with one or more processors from afirst server network device with one or more processors via acommunications network. The first location message includes locationinformation for a target network device with a location application andone or more processor that moved from a first physical location to asecond physical location. At Step 56, the emergency location applicationon the emergency location information server network device determines acurrent physical location for the target network device at the secondphysical location. At Step 58, the emergency location application on theemergency location information server creates a location information keydata structure for the target network device. The location informationkey data structure includes unique identification information for thetarget network device and unique identifying information for a networkthe target network device is currently connected to. The locationinformation key data structure includes a database key to a relationaldatabase and is usable only by the emergency location application on theemergency location information server. In FIG. 3B at Step 60, theemergency location information application on the emergency locationinformation server network device sends a second location informationmessage including the location information key data structure encryptedwith a pre-determined encryption method to the location application onthe target network device via the communications network. At Step 62, anemergency message is received on the emergency location application onthe emergency location information server network device from the firstserver network device via the communications network. The emergencymessage includes the encrypted location information key data structureand was sent to the first server network device via the communicationsnetwork from the location application on the target network device uponthe target network device encountering an emergency event. At Step 64,the encrypted location information key data structure is decrypted fromthe emergency location application on the emergency location informationserver network device. The emergency location application performs oneor more queries to the relational database using information indecrypted location information key data structure to determine thecurrent physical location of the target network device. The emergencylocation application also determines an emergency response servernetwork device with one or more processors to send the emergency messageto. In FIG. 3C at Step 66, the emergency message is sent in real-timefrom the emergency location application on the emergency locationinformation server network device to the determined emergency responseserver via the communications network. The emergency message is sentwithout the encrypted location information key data structure from theemergency location application on the emergency location informationserver network device to the determined emergency response server. AtStep 68, the determined emergency response server is notified inreal-time from the emergency location application on the emergencylocation information server network device via the communicationsnetwork that an emergency event has occurred with the target networkdevice.

Method 52 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment at FIG. 3A at Step 54, a first locationinformation message is received on an emergency location application 26′on an emergency location information server 22 network device with oneor more processors from a first server network device 20 with one ormore processors via a communications network 18, 18′. The first locationmessage includes location information from a location application 26 ona target network device 12 with one or more processor that moved from afirst physical location 34′ to a second physical location 34″.

In one embodiment, the first location message includes an initiallocation registration message for the target network device 12 at afirst physical location 34′ for the target network device 12. In such anembodiment, the first physical location 34′ and the second physicallocation 34″ are a same physical location. Such an embodiment is used toregister the target network device 12 a first time with the system 10.

In another embodiment, first location message includes a change inlocation registration message for the target network device 12 as thetarget network device moves from the first physical location 34′ to thesecond physical location 34″.

For example in FIG. 4, target network device 12 moves from physicallocation A including location information (12:(X, Y, Z): A 72) tophysical location B including location information (12:(X, Y, Z):B 74).

In one embodiment, the first location information message includesdimensional (2D) (X, Y), three-dimensional (3D) (X, Y, Z), GlobalPositioning System (GPS) information, Cartesian coordinate information,Euclidean space information, geo-space information, geographicinformation, carrier network infrastructure information, and/or networkinformation for the target network device 12. However, the presentinvention is not limited to this embodiment.

Returning to FIG. 3A, in one embodiment the first location informationmessage sent from the location application 26 on the target networkdevice 12 includes a HELD/HELD+ protocol message. However, the presentinvention is not limited to this embodiment and other messages and otherprotocols can be used to practice the invention.

In one embodiment, the location information for the target networkdevice 12 includes Network Layer (Layer 3) Internet Protocol (IP) and/orother network information about a network the target network device 12is currently connect to. This embodiment correlates IP address to aphysical location (e.g., (X, Y), (X, Y, Z), etc.). In such an embodimenta communication network 18, 18′ is typically broken up into logicalsubnets with each subnet having an associated current physical location.For example, all phones at 3 N. First Street., Chicago, Ill., 3rd Floorwill register and be assigned source IP addresses for the subnet on the3rd Floor and there will be a different subnet for each floor of thebuilding. Each Subnet is assigned a location record and an EmergencyLocation Identification Number (ELIN), a ten digit phone number. Whenphones (e.g., mobile phones 12, non-mobile phones 38, etc.) move fromone subnet to another, they re-register with the first server networkdevice 20, get a new IP address that is associated with their newsubnet, and sends a second location information message (e.g., a (HyperText Transfer Protocol (HTTP) Enabled Location Delivery) (HELD)/HELD+request message, etc.) to the emergency location server network device25 for their Location Reference Key (i.e., location information keyinformation) data structure 76.

Since multiple networks exists on the communications network 18, 18′(e.g., wired LAN, wireless LAN, wireless LAN, Internet, WLAN, WiLAN,etc.), each individual needs a unique name. This unique network name iscalled a Service Set IDentifer (SSID) of the network. The target networkdevices can determine a SSID of an individual network.

Packets/messages bound for target network devices on an individualnetwork need to go to the correct destination. The SSID keeps thepackets within the correct network, even when overlapping networks arepresent. However, there are usually multiple access points within eachindividual network, and there has to be a way to identify those accesspoints and their associated clients.

Another identifier is called a Basic Service Set IDentifier (BSSID) andis included in all wireless packets/messages. The BSSID is typically theMAC address of an access point on an individual network.

In one embodiment, the BSSID, is unique to a specific physicalgeographic location. If an enterprise is large enough to have multiplelocations, the SSIDs could be identical, but the BSSID is unique to thespecific physical geographic location.

An Extended Basic Service Set IDentifer (ESSID) includes of all of theBSSIDs in a network. For all practical purposes, the ESSID identifiesthe same network as the SSID does.

In one embodiment, the location information for the target networkdevice 12 also includes for Logical Link Layer (Layer 2) information.This Layer 2 information is used to require precise location definitiondown to a desktop device such as a non-mobile phone 38 or desktopcomputer, etc., or have a legacy network that cannot be configured intological subnets that correlate IP addresses to physical locations. Thisembodiment includes network connectivity into a local Voice over IP(VoIP) Virtual LAN (VLAN) so that it can interrogate the Layer 2 networkusing SNMP to find devices on Layer 2 devices and ports. This method isalso used with wireless controllers (e.g., Aruba, Aerohive, and Cisco)to track devices as they move on from a communications network 18 toanother network (e.g., Wi-Fi, etc.) network in real-time.

In one embodiment, only Layer 2 information is used. In anotherembodiment, only Layer 3 information is used. However, the presentinvention is not limited to these embodiments and other combinations ofnetwork device and network information and/or other layers can be usedto practice the invention.

In one embodiment, a transceiver chip in the target network device 12,is used to poll existing Wi-Fi, Wi-Fi Aware, WiMax, 802.xx.xx, cellular,Bluetooth beacons, RFID, mesh and other wireless networks to determineits current physical location 34. The location application 26 on thetarget network device 12 with the transceiver chip uses a variety ofmethods to determine current location information including, signalstrength, triangulation, orthogonality, etc. and the present inventionis not limited to the location methods described.

“Triangulation” is the process of determining a location of a point bymeasuring angles to it from known points at either end of a fixedbaseline, rather than measuring distances to the point directly (e.g.,trilateration). The point can then be fixed as the third point of atriangle with one known side and two known angles.

“Orthogonality” is process of relating two signal at right angles to oneanother (i.e., perpendicularity, etc.), and the generalization of thisrelation into N-dimensions; and to a variety other relationsnon-overlapping, independent objects of some kind.

In one embodiment, plural inbound wireless signals are used by theemergency location application 26′ and/or the location application 26for Peer-to-Peer (P2P) location determination of the target networkdevice 12 and other target network devices on the communications network18.

In one embodiment, the first location information message includes asocial media identifier (e.g., FACEBOOK, TWITTER, INSTAGRAM etc.). Inanother embodiment, the first location messages includes the socialmedia identifier and associated social media based location information.Many social media platforms track a user's current physical location inreal-time typically with GPS, and network information such as IPaddress, WiFi and/or LAN SSID, etc. Some social media platforms alsoinclude graphical map data with the location information (e.g., GOOGLEGHROME extension, MARAUDER'S MAP, used with the FACEBOOK messagingapplication, etc.). However, the social media location informationcannot be used alone to locate a target network device 12 in anemergency situation as such social media location information does notprovide an appropriate level of detail in the social media locationinformation.

At Step 56, the emergency location application 26′ on the emergencylocation information server network device 22 determines a currentphysical location 34 for the target network device 12 at the secondphysical location 34″.

At Step 58, the emergency location application 26′ on the emergencylocation information server network device 22 creates a locationinformation key data structure 76 for the target network device 12. Thelocation information key data structure 76 includes uniqueidentification information 107 for the target network device 12 andunique identifying information for a network the target network device12 is currently connected to 109, 111. The location information key datastructure 76 also includes a database key for a relational database 22′and is usable only by the emergency location application 26′ on theemergency location information server 22 and cannot be decrypted by, thetarget network device 12, any other target network devices or servernetwork devices. A new location information key data structure 76 withdifferent location information is created every time the target networkdevice 12 changes its physical location to a new physical location.

The location information key data structure 76 is encrypted with apre-determined encryption method (e.g., TLS, etc.) to prevent at least,including, but not limited to: (1) eavesdropping by other parties toimproperly determine a location of the target network device 12 in anon-emergency situation and invade and/or compromise the privacy of auser of the target network device 12; (2) tampering by hackers who couldendanger the health and safety of a user of the target device 12 in anemergency situation by altering current physical location information ofthe target network device 12; and (3) using the using the currentlocation information of the target network device 12 from other targetnetwork devices and/or other server network devices without agreementswith the providers of the emergency location information server 22.However, the present invention is not limited to this embodiment andother embodiments may be used to practice the invention.

The location information key data structure 76 includes a uniquecombination of target device 12 identification information 107 andnetwork 18, 18′ (e.g., LAN, WAN, mesh, etc.) connectivity informationdata 109, 111 for the target network device 12 to create a uniqueencrypted location key data structure 76 for the target network device12. When encrypted, the location information key data structure 76 hasno meaning to the end user of the target network device 12 and/or anyother target network devices or server network device other than theemergency location information server network device 22 and cannot beencrypted/decrypted by any entity other than emergency locationapplication 26′ on the emergency location information server networkdevice 22.

Database keys are an integral part of relational databases. They areused to establish and identify relationships between database datastructures such as tables, etc. They also ensure that each record withina table can be uniquely identified with a combination of one or morefields within a table stored in the database (e.g. FIG. 5—field 88 andfield 102, field 92 and field 104, etc.)

FIG. 5 is a block diagram 78 illustrating exemplary emergency locationinformation table layouts 80, 96 used for creating the encryptedlocation information key data structure 76.

However, the present invention is not limited to the data fieldsdescribed and more, fewer and other XML data fields and other datastructures and other layouts other than tables can be used to practicethe invention.

In one embodiment, the location information key data structure 76includes a Location Reference Key data structure 76 with an XML datastructure comprising: (1) a Level 2 XML data structure component 80(e.g., a row, column, etc.) and/or (2) a Level 3 XML data structurecomponent 96 (e.g., a row, column, etc.) and/or a device informationcomponent 107 with current physical information (e.g., (X, Y), (X, Y,Z), etc.) for the target network device 12.

In one embodiment, the Level 2 XML data structure component includes oneor more entries from a first relational database 22′ table layout 80with a network name 82 (e.g., SSID, BSSID, ESSID, etc.) switch name 84,switch port 86, target network device IP address 88, target networkdevice MAC address 90, ELIN 92 and Emergency Response Location (ERL) 94data fields. However, the present invention is not limited to the datafields described and more, fewer and other XML data fields and otherdata structures and other layouts other than tables can be used topractice the invention.

In one embodiment, the Level 3 XML data structure component includes oneor more entries from second relational database 22′ table layout 96 witha region 98, network name 100, IP address range 102, ELIN 104 and ERL106 data fields. However, the present invention is not limited to thedata fields described and more, fewer and other XML data fields andother data structures and other layouts other than tables can be used topractice the invention.

In one embodiment the, device information component 107 includes uniqueidentification information for the target network devices. For example,the target network device 12 includes device information 107 comprising:(1) device type: iPhone 10; (2) owner: Sally Jones; (3) dial number:312-552-1201; (4) current physical information (e.g., (X, Y), (X, Y, Z),GPS, geo-space etc.); and (5) social media identifier information. Inanother embodiment, the current physical information (e.g., (X, Y), (X,Y, Z), GPS, geo-space, etc.) is not included in the device information107. In another embodiment, the device information component 107 furtherincludes a social media identifier and/or social media identifier withassociated location information. However, the present invention is notlimited to the device information fields described and more, fewer andother device information location data fields and other data structuresand other layouts other than tables can be used to practice theinvention.

In this exemplary embodiment, the location information key datastructure 76 includes a Layer 2 component table 80 entry, for example,including Row 1, item 109: (Network Name: P, Switch: 22, Switch Port: 1,Device IP address: 193.169.88.1, Device MAC address: 00-04-8B-85-80-EE,ELIN: 312-552-1201, and ERL: 3 N. First Street, Cubicle 1) and/or aLayer 3 component table 96 entry, including Row 2, item 111: (Region: 1,Network Name: Orange, IP address range: 193.169.88.1 through193.169.88.254, ELIN of the main exchange: 312-552-1200, ERL: 3 N. FirstStreet, Second Floor). However, the present invention is not limited tosuch an embodiment, and more fewer or other data fields from therelational database tables can be used to practice the invention.

Therefore, in this exemplary embodiment, the location information keydata structure 76 before encryption includes device informationcomponent 107, Layer 2 component 109 and Layer 3 component 111. This key76 is exemplary only. The present invention is not limited to thelocation information key data structure 76 and more, fewer and otherdata fields and other data structures and other data structure layoutscan be used to practice the invention.

In one embodiment at Step 58, the emergency location informationapplication 26′ uses TLS encryption to encrypt/decrypt the locationinformation key data structure 76. TLS occurs in the transport layer inthe OSI network model. However, the present invention is not limited tothis embodiment and other or additional encryption and/or securitymessages can be used to practice the invention.

Client-server location applications 26, 26′ use the TLS protocol tocommunicate across a network 18 in a way designed to preventeavesdropping and tampering of location information used to locate atarget network device 12 in an emergency. Since applications 26, 26′ cancommunicate either with and/or without TLS, it is necessary for theclient target network device 12 to indicate to the emergency locationinformation server network device 22 that the setup of a TLS connectionis desired. One of the main ways of achieving this is to use a differentport number for TLS connections, for example, using port 443 for HTTPS,etc. Another mechanism is for the client target network device 12 tomake a protocol-specific request to the emergency location informationserver network device 22 to switch any current non-secure communicationsconnections over the communications network 18 to communications viaTLS.

Once the client target network device 12 and emergency locationinformation server network device 22 have agreed to use TLS, theynegotiate a state-based connection by using a handshaking procedure. TheTLS protocols use a handshake with an asymmetric cipher to establish notonly cipher settings but also a session-specific shared key with whichfurther communication is encrypted using a symmetric cipher. During thishandshake, the client target network device 12 and emergency locationinformation server network device 22 agree on various parameters used toestablish the connection's security. The handshake begins when theclient target network device 12 connects to a TLS-emergency locationinformation server network device 22 requesting a secure connection andthe client target network device 12 presents a list of supported ciphersuites (i.e., ciphers and/or hash functions, and/or encryption methodsand/r security methods etc.). From this list, the emergency locationinformation server network device 22 picks a cipher and hash functionthat it also supports and notifies the client target network device 12of the decision.

The emergency location information server network device 22 thenprovides identification in the form of a digital certificate. In oneembodiment, emergency location information server network device 22provides a modified digital certificate with additional emergencylocation information including, but not limited to, the emergencylocation information included in the location information key datastructure 76. However, the present invention is not limited to such anembodiment and other types of digital certificates can be used topractice the invention.

The modified digital certificate includes, but is not limited to, theemergency location information server network device 22, the trustedcertificate authority (CA) that vouches for the authenticity of thecertificate, the server's 22 public encryption key and the locationinformation key data structure 76. The client target network device 12confirms the validity of the certificate before proceeding.

In one embodiment, to generate the session keys used for the secure TLSconnection, the client target network device 12 encrypts a random numberwith the server's 22 public key and sends the result to the emergencylocation information server network device 22 (which only the emergencylocation information server network device 22 should be able to decryptwith its private key). Both parties then use the random number togenerate a unique session key for subsequent encryption and decryptionof data during the session uses a key exchange method (i.e.,Diffie-Hellman key exchange, etc.) to securely generate a random andunique session key for encryption and decryption that has the additionalproperty of forward secrecy. Thus, if the emergency location informationserver network device's 22 private key is ever disclosed in a futureevent, it cannot be used to decrypt the TLS session, even if the TLSsession is intercepted and recorded by a third party. This concludes thehandshake and begins the secured TLS connection, which is encrypted anddecrypted with the session keys until the connection closes. If any oneof the above steps fails, then the TLS handshake fails and the secureTLS connection is not created.

TLS is also used for dereferencing a location Uniform ResourceIdentifier (URIs) unless confidentiality and integrity are provided bysome other encryption or security methods. In one embodiment, targetnetwork device 12 location information recipients authenticate a networkhost (e.g., emergency location information server network device 22,etc.) identity with a DNS query using a domain name included in alocation URI. However, the present invention is not limited to thisembodiment. Pre-determined local security polices for emergency eventsdetermine what a target network device 12 and/or emergency locationinformation server network device 22 location information recipient doesif TLS authentication fails or cannot be attempted. However, the presentinvention is not limited to this TLS encryption method and otherencryption and/or security methods (e.g., RSA, DES, WEP, etc.) at otherlevels (e.g., Layers 1-7, etc.) including but not limited to thosedescribed herein, can be used to practice the invention and to encryptand decrypt the location information key data structure 76.

Returning to FIG. 3B at Step 60, the emergency location informationapplication 26′ on the emergency location information server networkdevice 22 sends a second location information message including theencrypted location information key data structure 76 back to thelocation application 26 on the target network device 12 via thecommunications network 18. The second location information message isnot sent back to the target network device 12 via the first servernetwork device 20.

In another embodiment, the second location information message is sentback to the target network device 12 via the first server network device20.

At Step 62, an emergency message is received on the emergency locationapplication 26′ on the emergency location information server networkdevice 22 from the first server network device 20 via the communicationsnetwork 18, 18′. The emergency message includes the encrypted locationinformation key data structure 76 and was sent by the target networkdevice 12 to the first server network device 20 via the communicationsnetwork 18, 18′ and indicates the target network device 12 hasencountered an emergency event.

The emergency message includes an E911 communication message, a legacy911 communication message, NG-911 communication message, a CommonAlerting Protocol (CAP) message, a Public safety answering point (PSAP)to AutoMatic location identification (ALI) (PAM) interface protocolmessage, text-to-911 message, 112 message and/or other type of emergencymessage.

In one embodiment the target network device 12 sends the encryptedlocation information key data structure 76 in one or more SIP protocolmessages that are used to initiate the emergency message to the firstserver network device 20. However, the present invention is not limitedto such and embodiment and other embodiments may be used to practice theinvention.

The emergency event includes an accident event, medical event, healthevent (e.g., disease outbreak, etc.) fire event, terrorist attack event,military event, weather event, natural disaster event (e.g., flood,earthquake, etc.) event and/or crime event. However, the presentinvention is not limited to such and embodiment and other embodimentsincluding more, fewer or other emergency events may be used to practicethe invention.

At Step 64, the encrypted location information key data structure 76 isdecrypted from the emergency location application 26′ on the emergencylocation information server network device 22. The emergency locationapplication performs one or more queries to the relational database 22′using information from the decrypted location information key datastructure 76 to determine the current physical location 34 of the targetnetwork device 12. The emergency location application 26′ alsodetermines an emergency response server network device 25 with one ormore processors to send the emergency message to.

In FIG. 3C at Step 66, the emergency message is sent immediately inreal-time from the emergency location application 26′ on the emergencylocation information server network device 22 to the determinedemergency response server 25 via the communications network 18, 18′. Theemergency message is sent without the encrypted location information keydata structure 76 from the emergency location application 26′ on theemergency location information server network device 22 to thedetermined emergency response server 25.

The desired emergency response server 25 includes an E911 or 911emergency response server, a text-to-911 server, a Public SafetyAnswering Point (PSAP) server, an Emergency Services IP networks(ESInet) server and/or other emergency gateway network server deviceand/or other emergency server network device.

In one embodiment at Step 66, emergency location application 26′ on theemergency location information server network device 22 determines adesired emergency response server 25 that is closest geographically tothe target network device 12 which is in turn used to notify emergencyresponders (e.g., police, fire, ambulance, etc.) closest to the currentphysical location 34 of the target network device 12. However, thepresent invention is not limited to such and embodiment and otherembodiments may be used to practice the invention including selectingother desired emergency response server 25 with other methods.

In another embodiment, a desired emergency response server 25 is not theclosest geographically to the target network device 12. In such anembodiment, the a desired emergency response server 25 closestgeographically to the target network device 12 may be out of service dueto the same emergency event the occurred for the target network device12 (e.g., fire, weather event, earthquake, etc.). In such an embodiment,the emergency location application 26′ on the emergency locationinformation server network device 22 determines the closest activeemergency response server 25. However, the present invention is notlimited to such and embodiment and other embodiments may be used topractice the invention including selecting other desired emergencyresponse server 25 with other methods.

At Step 68, the determined emergency response server 25 is notified inreal-time from the emergency location application 26′ on the emergencylocation information server network device 22 via the communicationsnetwork 18, 18′ that an emergency event has occurred with the targetnetwork device 12.

“Real-time” relates to a system 10 in which input data (e.g., emergencymessages, etc.) is processed within a few milliseconds or less to a fewseconds or less in time so that the input data is available immediatelyfor use and display as output data.

In one embodiment, information is displayed in real-time on thedetermined emergency response server network device 25 about theemergency event (e.g., fire 36″, etc.) that has occurred with the targetnetwork device 12.

In another embodiment, emergency information displayed in real-time onthe emergency location information server network device 22 about theemergency event (e.g., fire 36″, etc.) that has occurred with the targetnetwork device 12.

In another embodiment, emergency information displayed in real-time onboth the determined emergency response server network device 25 and theon the emergency location information server network device 22 about theemergency event (e.g., fire 36″, etc.) that has occurred with the targetnetwork device 12.

It has been determined based on data collected from emergency calls inthe United States that for every minute emergency help does not arrivein a medical emergency, survivability of a person is reduced by tenpercent. Method 52 helps improve response time by notifying emergencysecurity and administrative personnel the instant someone dials 911and/or texts 911 by sending a “screen popup” alert with a loud audioand/or audio/video alarm to security network devices and other networkdevices associated with the determined emergency response server 25 thatincludes the full current physical location information for the targetnetwork device 12. SMS/text messages are also sent to mobile securityresponse teams and email notifications sent to administrators. Theentire process is time-stamped and logged for audit purposes.

FIG. 6 is a block diagram 108 illustrating a graphical emergencylocation information system graphical display interface 110 fordisplaying information determined by the method of FIG. 3 and FIG. 9 andthe other emergency location methods described herein.

The graphical display system interface 110, includes, but is not limitedto a real-time map portion 112 including a graphical location marker 114(e.g., for the target device 12, etc.) including a location of a type ofemergency (e.g. fire, accident, etc.), a determined current physicallocation portion 116 including the determined currently physicallocation 34 of the target network device 12, a picture portion 118including a digital picture of the determined currently physicallocation 34, of the target network device 12 and an emergencyinformation portion 120 including information about the type ofemergency event and an audio component 121 for sending out audioemergency alerts or tones. However, the present invention is not limitedto such an embodiment and more, fewer and other types of portions can beused to display emergency information on the display system interface110.

Method 52 allows a current physical location of any type of targetnetwork device to be accurately determine during an emergency event.

In one exemplary embodiment, for example, all employees of a businessare assigned a non-mobile desk phone 38. Method 52 enables non-mobiledesk phones 38 (e.g., target network device 38 with location application26, etc.) to ask for its current physical location 34 whenever it movesfrom a first physical location 34′ to second physical location 34″within a selected enterprise (e.g., when an employee moves to a newoffice, is assigned to a new group, starts working as a new employee,etc.) The desk phone 38 sends its new second physical location 34″(i.e., new current physical location) when it dials 911. Method 52intelligently routes all emergency calls/message to their correct PublicSafety Answering Point (PSAP) based on the current physical location ofthe non-mobile desk phone 38 a caller is making an emergency call from.

In another exemplary embodiment, for example, all employees of abusiness are assigned mobile smart phones 12. Method 52 enables mobilesmart phones 12 (e.g., target network device 12 with locationapplication 26, etc.) to ask for its current physical location 34 whenit moves from a first physical location 34′ to second physical location34″ within a selected enterprise (e.g., anytime during any day theemployee moves to a new location at work, to a floor, cubicle,cafeteria, conference room, etc.). The mobile smart phones 12 send theirnew second physical location (i.e., new current physical location 34)when it dials 911 or texts 911. Method 52 intelligently routes allemergency calls/texts to their correct Public Safety Answering Point(PSAP) based on the current physical location of a mobile phone a calleris making an emergency call from.

In another exemplary embodiments, the employees of a company areassigned a mix of non-mobile desk phone 38 and mobile smart phones 12.

In another exemplary embodiment, for example, all employees of abusiness are assigned a wearable network device 42-50 comprising, forexample, wearable watch 48 including telephone capabilities. Method 52enables the wearable watch 48 (with location application 26, etc.) toask for its current physical location 34 when it moves from a firstphysical location 34′ to second physical location 34″ within a selectedenterprise (e.g., anytime during any day the employee moves to a newlocation at work). The wearable watches 48 send their new secondphysical location 34″ (i.e., new current physical location 34) when itdials 911 or texts 911. Method 52 intelligently routes all 911 calls totheir correct Public Safety Answering Point (PSAP) based on the currentphysical location of a wearable watch a caller is making an emergencycall from.

However, the present invention is not limited to such exemplaryembodiments and more, fewer and other types combinations of mobile andnon-mobile network devices can be used to practice the invention.

FIG. 7 is a block diagram 122 visually illustrating a data flow for themethods of FIG. 3 and FIG. 9.

FIG. 8 is a flow diagram illustrating a Method 124 for locating anetwork device in an emergency situation.

In FIG. 8 at Step 126, the emergency location information application onthe emergency location information server network device locates thecurrent physical location of the target network device by decrypting theencrypted location information key data structure received in theemergency message sent by the location application on the target networkdevice via the communications network by completing a database lookupwith the decrypted location information key. At Step 128, the emergencylocation information application on emergency location informationserver network device determines an emergency response server closest tothe current physical location of the target network device. At Step 130,the emergency location information application on emergency locationinformation server network device routes the emergency message to thedetermined emergency response server via the communications network. AtStep 132, the emergency location information application on theemergency location information server network device notifies thedetermined emergency response server in real-time from that an emergencyevent has occurred for the target network device.

Method 124 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment at Step 126, the emergency locationinformation application 26′ on the emergency location information servernetwork device 22 locates the current physical location 34 of the targetnetwork device 12 by decrypting the encrypted location information keydata structure 76 received in the emergency message sent by the locationapplication 26 on the target network device 12 via the communicationsnetwork 18, 18′ by completing a database 22′ lookup with the decryptedlocation information key 76.

At Step 128, the emergency location information application 26′ onemergency location information server network device 22 determines anemergency response server 25 closest to the current physical location 34of the target network device 12.

In one embodiment at Step 128, emergency location application 26′ on theemergency location information server network device 22 determines adesired emergency response server 25 that is closest geographically tothe target network device 12 which is in turn used to notify emergencyresponders (e.g., police, fire, ambulance, etc.) closest to the currentphysical location 34 of the target network device 12. However, thepresent invention is not limited to such and embodiment and otherembodiments may be used to practice the invention including selectingother desired emergency response server 25 with other methods.

In another embodiment at Step 128, a desired emergency response server25 is not the closest geographically to the target network device 12. Insuch an embodiment, the a desired emergency response server 25 closestgeographically to the target network device 12 may be out of service dueto the same emergency event the occurred for the target network device12 (e.g., fire, weather event, earthquake, etc.). The desired emergencyresponse server 25 may also not be a server anywhere close to thecurrent physical location 34 of the target network device as a result ofhow routing of emergency messages is completed on the communicationsnetwork 18, 18′. In such an embodiment, the emergency locationapplication 26′ on the emergency location information server networkdevice 22 determines a desired active emergency response server 25.However, the present invention is not limited to such and embodiment andother embodiments may be used to practice the invention includingselecting other desired emergency response server 25 with other methods.

At Step 130, the emergency location information application 26′ onemergency location information server network device 22 routes theemergency message to the determined emergency response server 25 via thecommunications network 18, 18′

At Step 132, the emergency location information application 26′ on theemergency location information server network device 22 notifies thedetermined emergency response server 25 in real-time from that anemergency event has occurred for the target network device 12.

Methods 52 and 124 provide secure “Find, Route, Notify®” technologies toaccurately notify and dispatch emergency responders after an emergencyevent has occurred with a target network device.

Enhanced Emergency Location Information for Emergency Situations

FIGS. 9A, 9B and 9C are a flow diagram illustrating a Method 134 forlocating a network device in an emergency situation.

The emergency situations, include, but are not limited to, accident,crime, fire, military, marine, natural disaster (e.g., earthquake,volcano, flood, landslide, etc.), medical, police, terrorist, military,marine, weather (e.g., hurricane, tornado, etc.), and/or other types ofemergency situations. However, the present invention is not limited tothis list of emergency situations, and more, fewer or other emergencysituations can be used to practice the invention.

In FIG. 9A at Step 136, a first location information message is receivedon an emergency location application on an emergency locationinformation server network device with one or more processors from afirst server network device with one or more processors via acommunications network. The first location message includes locationinformation for a target network device with a location application andone or more processor that moved from a first physical location to asecond physical location. At Step 138, the emergency locationapplication on the emergency location information server network devicedetermines a current physical location for the target network device atthe second physical location. At Step 140, the emergency locationapplication on the emergency location information server creates alocation information key data structure for the target network device.The location information key data structure includes uniqueidentification information for the target network device and uniqueidentifying information for a network the target network device iscurrently connected to. The location information key data structureincludes a database key to a relational database and is usable only bythe emergency location application on the emergency location informationserver. In FIG. 9B at Step 142, the emergency location informationapplication on the emergency location information server network devicesends a second location information message including the locationinformation key data structure encrypted with a pre-determinedencryption method to the location application on the target networkdevice via the communications network. At Step 144, an emergency messageis received on the emergency location application on the emergencylocation information server network device from the first server networkdevice via the communications network. The emergency message includesthe encrypted location information key data structure and was sent tothe first server network device via the communications network from thelocation application on the target network device upon the targetnetwork device encountering an emergency event. At Step 146, theencrypted location information key data structure is decrypted from theemergency location application on the emergency location informationserver network device. At Step 148, the emergency location applicationperforms one or more queries to the relational database usinginformation in decrypted location information key data structure todetermine the current physical location of the target network device.The emergency location application also determines an emergency responseserver network device with one or more processors to send the emergencymessage to. In FIG. 9C at Step 150, the emergency location applicationon the emergency location information server network device determinesadditional location information the target network device from one ormore other public location information sources via the communicationsnetwork using the current physical location of the target network devicefrom the emergency message as a search key for searching the one or moreother public location information sources. At Step 152, the emergencylocation application on the emergency location information servernetwork device adds the determined current physical location of thenetwork device and the determined additional location information to theemergency message providing additional information to locate the targetnetwork device. At Step 154, the emergency message with the determinedadditional location information is sent in real-time from the emergencylocation application on the emergency location information servernetwork device to the determined emergency response server via thecommunications network. The emergency message is sent without theencrypted location information key data structure from the emergencylocation application on the emergency location information servernetwork device to the determined emergency response server. At Step 156,the determined emergency response server is notified in real-time fromthe emergency location application on the emergency location informationserver network device via the communications network that an emergencyevent has occurred with the target network device.

Method 134 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment at FIG. 9A at Step 136, a first locationinformation message is received on an emergency location application 26′on an emergency location information server 22 network device with oneor more processors from a first server network device 20 with one ormore processors via a communications network 18, 18′. The first locationmessage includes location information from a location application 26 ona target network device 12 with one or more processor that moved from afirst physical location 34′ to a second physical location 34″.

In one embodiment, the first location message includes an initiallocation registration message for the target network device 12 at afirst physical location 34′ for the target network device 12. In such anembodiment, the first physical location 34′ and the second physicallocation 34″ are a same physical location. Such an embodiment is used toregister the target network device 12 a first time with the system 10.

In another embodiment, first location message includes a change inlocation registration message for the target network device 12 as thetarget network device moves from the first physical location 34′ to thesecond physical location 34″.

For example in FIG. 4, target network device 12 moves from physicallocation A including location information (12:(X, Y, Z): A 72) tophysical location B including location information (12:(X, Y, Z): B 74).

In one embodiment, the first location information message includesdimensional (2D) (X, Y), three-dimensional (3D) (X, Y, Z), GlobalPositioning System (GPS) information, Cartesian coordinate information,Euclidean space information, geo-space information, geographicinformation, carrier network infrastructure information and/or networkinformation for the target network device 12. However, the presentinvention is not limited to this embodiment.

Returning to FIG. 9A, in one embodiment the first location informationmessage sent from the location application 26 on the target networkdevice 12 includes a HELD and/or a HELD+ protocol message. However, thepresent invention is not limited to this embodiment and other messagesand other protocols can be used to practice the invention.

In one embodiment, the location information for the target networkdevice 12 includes Network Layer (Layer 3) Internet Protocol (IP) and/orother network information about a network the target network device 12is currently connect to. This embodiment correlates IP address to aphysical location (e.g., (X, Y), (X, Y, Z), etc.). In such an embodimenta communication network 18, 18′ is typically broken up into logicalsubnets with each subnet having an associated current physical location.For example, all phones at 3 N. First Street, Chicago, Ill., 3^(rd)Floor will register and be assigned source IP addresses for the subneton the 3^(rd) Floor and there will be a different subnet for each floorof the building. Each Subnet is assigned a location record and anEmergency Location Identification Number (ELIN), a ten digit phonenumber. When phones (e.g., mobile phones 12, non-mobile phones 38, etc.)move from one subnet to another, they re-register with the first servernetwork device 20, get a new IP address that is associated with theirnew subnet, and sends a second location information message (e.g., a(Hyper Text Transfer Protocol (HTTP) Enabled Location Delivery)(HELD)/HELD+ request message, etc.) to the emergency location servernetwork device 25 for their Location Reference Key (i.e., locationinformation key information) data structure 76.

Since multiple networks exists on the communications network 18, 18′(e.g., wired LAN, wireless LAN, wireless LAN, Internet, WLAN, WiLAN,etc.), each individual needs a unique name. This unique network name iscalled a Service Set IDentifer (SSID) of the network. The target networkdevices can determine a SSID of an individual network.

Packets/messages bound for target network devices on an individualnetwork need to go to the correct destination. The SSID keeps thepackets within the correct network, even when overlapping networks arepresent. However, there are usually multiple access points within eachindividual network, and there has to be a way to identify those accesspoints and their associated clients. This identifier is called a BasicService Set IDentifier (BSSID) and is included in all wirelesspackets/messages. The BSSID is typically the MAC address of an accesspoint on an individual network.

An Extended Basic Service Set IDentifer (ESSID) includes of all of theBSSIDs in a network. For all practical purposes, the ESSID identifiesthe same network as the SSID does.

In one embodiment, the location information for the target networkdevice 12 also includes for Logical Link Layer (Layer 2) information.This Layer 2 information is used to require precise location definitiondown to a desktop device such as a non-mobile phone 38 or desktopcomputer, etc., or have a legacy network that cannot be configured intological subnets that correlate IP addresses to physical locations. Thisembodiment includes network connectivity into a local Voice over IP(VoIP) Virtual LAN (VLAN) so that it can interrogate the Layer 2 networkusing SNMP to find devices on Layer 2 devices and ports. This method isalso used with wireless controllers (e.g., Aruba, Aerohive, and Cisco)to track devices as they move on from a communications network 18 toanother network (e.g., Wi-Fi, etc.) network in real-time.

In one embodiment, only Layer 2 information is used. In anotherembodiment, only Layer 3 information is used. However, the presentinvention is not limited to these embodiments and other combinations ofnetwork device and network information and/or other layers can be usedto practice the invention.

In one embodiment, a transceiver chip in the target network device 12,is used to poll existing Wi-Fi, Wi-Fi Aware, WiMax, 802.xx.xx, cellular,Bluetooth beacons, RFID, mesh and other wireless networks to determineits current physical location 34. The location application 26 on thetarget network device 12 with the transceiver chip uses a variety ofmethods to determine current location information including, signalstrength, triangulation, orthogonality, etc. and the present inventionis not limited to the location methods described.

“Triangulation” is the process of determining a location of a point bymeasuring angles to it from known points at either end of a fixedbaseline, rather than measuring distances to the point directly (e.g.,trilateration). The point can then be fixed as the third point of atriangle with one known side and two known angles.

“Orthogonality” is process of relating two signal at right angles to oneanother (i.e., perpendicularity, etc.), and the generalization of thisrelation into N-dimensions; and to a variety other relationsnon-overlapping, independent objects of some kind.

In one embodiment, plural inbound wireless signals are used by theemergency location application 26′ and/or the location application 26for Peer-to-Peer (P2P) location determination of the target networkdevice 12 and other target network devices on the communications network18.

In one embodiment, the first location information message includes asocial media identifier (e.g., FACEBOOK, TWITTER, INSTAGRAM etc.). Inanother embodiment, the first location messages includes the socialmedia identifier and associated social media based location information.Many social media platforms track a user's current physical location inreal-time typically with GPS, and network information such as IPaddress, WiFi and/or LAN SSID, etc. Some social media platforms alsoinclude graphical map data with the location information (e.g., GOOGLEGHROME extension, MARAUDER'S MAP, used with the FACEBOOK messagingapplication, etc.). However, the social media location informationcannot be used alone to locate a target network device 12 in anemergency situation as such social media location information does notprovide an appropriate level of detail in the social media locationinformation.

Returning to FIG. 9A at Step 138, the emergency location application 26′on the emergency location information server network device 22determines a current physical location 34 for the target network device12 at the second physical location 34″.

In one embodiment, Step 138, further includes the functionality of Step150 to obtain additional public location information 155 (FIG. 7) frompublic location information sources 24 about a current physical location34, 34′, 34″ for the target network device 12. In such an embodiment,the additional public location information 155 is added to the locationinformation key data structure 76 created at Step 140 (and Step 150).However, the present invention is not limited to this embodiment and theinvention can be practiced with obtained additional public informationat Step 138.

At Step 140, the emergency location application 26′ on the emergencylocation information server network device 22 creates a locationinformation key data structure 76 for the target network device 12. Thelocation information key data structure 76 includes uniqueidentification information 107 for the target network device 12 andunique identifying information for a network the target network device12 is currently connected to 109, 111. The location information key datastructure 76 also includes a database key for a relational database 22′and is usable only by the emergency location application 26′ on theemergency location information server 22 and cannot be decrypted by, thetarget network device 12, any other target network devices or servernetwork devices. A new location information key data structure 76 withdifferent location information is created every time the target networkdevice 12 changes its physical location to a new physical location.

In one embodiment, Step 140, further includes the functionality of Step152 to store the additional location information 155 obtained frompublic location information data sources 24 about the current physicallocation 34, 34′, 34″ for the target network device 12 in the createdlocation information key data structure 76. However, the presentinvention is not limited to this embodiment and the invention can bepracticed with obtained additional public information at Step 140.

The location information key data structure 76 is encrypted with apre-determined encryption method (e.g., TLS, etc.) to prevent at least,including, but not limited to: (1) eavesdropping by other parties toimproperly determine a location of the target network device 12 in anon-emergency situation and invade and/or compromise the privacy of auser of the target network device 12; (2) tampering by hackers who couldendanger the health and safety of a user of the target device 12 in anemergency situation by altering current physical location information ofthe target network device 12; and (3) using the using the currentlocation information of the target network device 12 from other targetnetwork devices and/or other server network devices without agreementswith the providers of the emergency location information server 22.However, the present invention is not limited to this embodiment andother embodiments may be used to practice the invention.

The location information key data structure 76 includes a uniquecombination of target device 12 identification information 107 andnetwork 18, 18′ (e.g., LAN, WAN, mesh, etc.) connectivity informationdata 109, 111 for the target network device 12 to create a uniqueencrypted location key data structure 76 for the target network device12. When encrypted, the location information key data structure 76 hasno meaning to the end user of the target network device 12 and/or anyother target network devices or server network device other than theemergency location information server network device 22 and cannot beencrypted/decrypted by any entity other than emergency locationapplication 26′ on the emergency location information server networkdevice 22.

Database keys are an integral part of relational databases. They areused to establish and identify relationships between database datastructures such as tables, etc. They also ensure that each record withina table can be uniquely identified with a combination of one or morefields within a table stored in the database (e.g. FIG. 5—field 88 andfield 102, field 92 and field 104, etc.)

FIG. 5 is a block diagram 78 illustrating exemplary emergency locationinformation table layouts 80, 96 used for creating the encryptedlocation information key data structure 76.

However, the present invention is not limited to the data fieldsdescribed and more, fewer and other XML data fields and other datastructures and other layouts other than tables can be used to practicethe invention.

In one embodiment, the location information key data structure 76includes a Location Reference Key data structure 76 with an XML datastructure comprising: (1) a Level 2 XML data structure component 80(e.g., a row, column, etc.) and/or (2) a Level 3 XML data structurecomponent 96 (e.g., a row, column, etc.) and/or a device informationcomponent 107 with current physical information (e.g., (X, Y), (X, Y,Z), etc.) for the target network device 12.

In one embodiment, the Level 2 XML data structure component includes oneor more entries from a first relational database 22′ table layout 80with a network name 82 (e.g., SSID, BSSID, ESSID, etc.) switch name 84,switch port 86, target network device IP address 88, target networkdevice MAC address 90, ELIN 92 and Emergency Location Name (ELN) 94 datafields. However, the present invention is not limited to the data fieldsdescribed and more, fewer and other XML data fields and other datastructures and other layouts other than tables can be used to practicethe invention.

In one embodiment, the Level 3 XML data structure component includes oneor more entries from second relational database 22′ table layout 96 witha region 98, network name 100, IP address range 102, ELIN 104 and ELN106 data fields. However, the present invention is not limited to thedata fields described and more, fewer and other XML data fields andother data structures and other layouts other than tables can be used topractice the invention.

In one embodiment the, device information component 107 includes uniqueidentification information for the target network devices. For example,the target network device 12 includes device information 107 comprising:(1) device type: iPhone 10; (2) owner: Sally Jones; (3) dial number:312-552-1201; (4) current physical information (e.g., (X, Y), (X, Y, Z),GPS, geo-space etc.); and (5) social media identifier information. Inanother embodiment, the current physical information (e.g., (X, Y), (X,Y, Z), GPS, geo-space, etc.) is not included in the device information107. In another embodiment, the device information component 107 furtherincludes a social media identifier and/or social media identifier withassociated location information. However, the present invention is notlimited to the device information fields described and more, fewer andother device information location data fields and other data structuresand other layouts other than tables can be used to practice theinvention.

In this exemplary embodiment, the location information key datastructure 76 includes a Layer 2 component table 80 entry, for example,including Row 1, item 109: (Network Name: P, Switch: 22, Switch Port: 1,Device IP address: 193.169.88.1, Device MAC address: 00-04-8B-85-80-EE,ELIN: 312-552-1201, and ERL: 3 N. First Street, Cubicle 1) and/or aLayer 3 component table 96 entry, including Row 2, item 111: (Region: 1,Network Name: Orange, IP address range: 193.169.88.1 through193.169.88.254, ELIN of the main exchange: 312-552-1200, ERL: 3 N. FirstStreet, Second Floor). However, the present invention is not limited tosuch an embodiment, and more fewer or other data fields from therelational database tables can be used to practice the invention.

Therefore, in this exemplary embodiment, the location information keydata structure 76 before encryption includes device informationcomponent 107, Layer 2 component 109 and Layer 3 component 111. This key76 is exemplary only. The present invention is not limited to thelocation information key data structure 76 and more, fewer and otherdata fields and other data structures and other data structure layoutscan be used to practice the invention.

In one embodiment at Step 58, the emergency location informationapplication 26′ uses TLS encryption to encrypt/decrypt the locationinformation key data structure 76. TLS occurs in the transport layer inthe OSI network model. However, the present invention is not limited tothis embodiment and other or additional encryption and/or securitymessages can be used to practice the invention.

Client-server location applications 26, 26′ use the TLS protocol tocommunicate across a network 18 in a way designed to preventeavesdropping and tampering of location information used to locate atarget network device 12 in an emergency. Since applications 26, 26′ cancommunicate either with and/or without TLS, it is necessary for theclient target network device 12 to indicate to the emergency locationinformation server network device 22 that the setup of a TLS connectionis desired. One of the main ways of achieving this is to use a differentport number for TLS connections, for example, using port 443 for HTTPS,etc. Another mechanism is for the client target network device 12 tomake a protocol-specific request to the emergency location informationserver network device 22 to switch any current non-secure communicationsconnections over the communications network 18 to communications viaTLS.

Once the client target network device 12 and emergency locationinformation server network device 22 have agreed to use TLS, theynegotiate a state-based connection by using a handshaking procedure. TheTLS protocols use a handshake with an asymmetric cipher to establish notonly cipher settings but also a session-specific shared key with whichfurther communication is encrypted using a symmetric cipher. During thishandshake, the client target network device 12 and emergency locationinformation server network device 22 agree on various parameters used toestablish the connection's security. The handshake begins when theclient target network device 12 connects to a TLS-emergency locationinformation server network device 22 requesting a secure connection andthe client target network device 12 presents a list of supported ciphersuites (i.e., ciphers and/or hash functions, and/or encryption methodsand/r security methods etc.). From this list, the emergency locationinformation server network device 22 picks a cipher and hash functionthat it also supports and notifies the client target network device 12of the decision.

The emergency location information server network device 22 thenprovides identification in the form of a digital certificate. In oneembodiment, emergency location information server network device 22provides a modified digital certificate with additional emergencylocation information including, but not limited to, the emergencylocation information included in the location information key datastructure 76. However, the present invention is not limited to such anembodiment and other types of digital certificates can be used topractice the invention.

The modified digital certificate includes, but is not limited to, theemergency location information server network device 22, the trustedcertificate authority (CA) that vouches for the authenticity of thecertificate, the server's 22 public encryption key and the locationinformation key data structure 76. The client target network device 12confirms the validity of the certificate before proceeding.

In one embodiment, to generate the session keys used for the secure TLSconnection, the client target network device 12 encrypts a random numberwith the server's 22 public key and sends the result to the emergencylocation information server network device 22 (which only the emergencylocation information server network device 22 should be able to decryptwith its private key). Both parties then use the random number togenerate a unique session key for subsequent encryption and decryptionof data during the session uses a key exchange method (i.e.,Diffie-Hellman key exchange, etc.) to securely generate a random andunique session key for encryption and decryption that has the additionalproperty of forward secrecy. Thus, if the emergency location informationserver network device's 22 private key is ever disclosed in a futureevent, it cannot be used to decrypt the TLS session, even if the TLSsession is intercepted and recorded by a third party. This concludes thehandshake and begins the secured TLS connection, which is encrypted anddecrypted with the session keys until the connection closes. If any oneof the above steps fails, then the TLS handshake fails and the secureTLS connection is not created.

TLS is also used for dereferencing a location Uniform ResourceIdentifier (URIs) unless confidentiality and integrity are provided bysome other encryption or security methods. In one embodiment, targetnetwork device 12 location information recipients authenticate a networkhost (e.g., emergency location information server network device 22,etc.) identity with a DNS query using a domain name included in alocation URI. However, the present invention is not limited to thisembodiment. Pre-determined local security polices for emergency eventsdetermine what a target network device 12 and/or emergency locationinformation server network device 22 location information recipient doesif TLS authentication fails or cannot be attempted. However, the presentinvention is not limited to this TLS encryption method and otherencryption and/or security methods (e.g., RSA, DES, WEP, etc.) at otherlevels (e.g., Layers 1-7, etc.) including but not limited to thosedescribed herein, can be used to practice the invention and to encryptand decrypt the location information key data structure 76.

Returning to FIG. 9B at Step 142, the emergency location informationapplication 26′ on the emergency location information server networkdevice 22 sends a second location information message including theencrypted location information key data structure 76 back to thelocation application 26 on the target network device 12 via thecommunications network 18. The second location information message isnot sent back to the target network device 12 via the first servernetwork device 20.

In another embodiment, the second location information message is sentback to the target network device 12 via the first server network device20.

At Step 144, an emergency message is received on the emergency locationapplication 26′ on the emergency location information server networkdevice 22 from the first server network device 20 via the communicationsnetwork 18, 18′. The emergency message includes the encrypted locationinformation key data structure 76 and was sent by the target networkdevice 12 to the first server network device 20 via the communicationsnetwork 18, 18′ and indicates the target network device 12 hasencountered an emergency event.

The emergency message includes an E911 communication message, a legacy911 communication message, NG-911 communication message, a CommonAlerting Protocol (CAP) message, a Public Safety Answering Point (PSAP)to Automatic Location Identification (ALI) (PAM) interface protocolmessage, text-to-911 message, 112 message and/or other type of emergencymessage.

In one embodiment the target network device 12 sends the encryptedlocation information key data structure 76 in one or more SIP protocolmessages that are used to initiate the emergency message to the firstserver network device 20. However, the present invention is not limitedto such and embodiment and other embodiments may be used to practice theinvention.

The emergency event includes an accident event, medical event, healthevent (e.g., personal health emergency, disease outbreak, etc.) fireevent, terrorist attack event, military event, marine event, weatherevent (e.g., hurricane, tornado, etc.), natural disaster event (e.g.,flood, earthquake, volcano, etc.) event, police event, crime eventand/or other emergency events. However, the present invention is notlimited to such and embodiment and other embodiments including more,fewer or other emergency events may be used to practice the invention.

At Step 146, the encrypted location information key data structure 76 isdecrypted from the emergency location application 26′ on the emergencylocation information server network device 22.

At Step 148, the emergency location application 26′ performs one or morequeries to the relational database 22′ using information from thedecrypted location information key data structure 76 to determine thecurrent physical location 34, 34′, 34″ of the target network device 12.The emergency location application 26′ also determines an emergencyresponse server network device 25 with one or more processors to sendthe emergency message to.

In FIG. 9C at Step 150, the emergency location application 26′ on theemergency location information server network device 22 determinesadditional location information 155 for the target network device 12from one or more other public location information sources via thecommunications network 18, 18′ using the current physical location 34,34′, 34″ of the target network device 12 from the emergency message as asearch key for searching the one or more other public locationinformation sources 24.

In one embodiment, the additional location information from the one ormore public location information sources 24 includes, but is not limitedto, online mapping site information, cellular telephone towerinformation, Bluetooth protocol wireless beacon information, WirelessFidelity (Wi-Fi) wireless beacon information, Radio Frequency Identifier(RFID) information, Internet of Things (IoT) device sensor informationor IoT actuator information, Near field communication (NFC) protocolinformation and/or machine-to-machine (M2M) communications information.However, the present invention is not limited to the public informationsources listed and more, fewer or other information sources can be usedto practice the invention.

The public information sources 24 includes plural network devices, IoTdevices, communications networks 18, 18′ (e.g., cellular, cloud, WiFi,Bluetooth, RFID, NFC, M2M, etc.) at known and fixed physical locations(e.g., street address, floor in a building, rooms and hallways in abuilding, retail location, restaurant, coffee shop, etc.) The known andfixed physical locations are used to: (1) provide additional verifiableinformation about a current physical location 34, 34′, 34″ for thetarget network device 12; and (2) confirm and verify the target networkdevice 12 is at a current physical location 34, 34′, 34″. Such known andfixed locations are stored in one or more public databases 22′, 24′,etc. In another embodiment, the known and fixed and locations are storedin one or more private databases 20′, etc. However, the presentinvention is not limited to such embodiments and other embodiments canbe used to practice the invention.

For example, a restaurant or coffee shop includes at a known streetaddress and has a WiFi network with a known and fixed SSID sent out in aWiFi beacon that can be used to further verify and confirm a currentphysical location 34, 34′, 34″ of the target network device 12, etc.

In one embodiment, the cellular tower information includes cell towerinformation. A cell tower houses the electronic communications equipmentalong with an antenna to support cellular communication in acommunications network 18, 18′. A cell tower is an elevated structurewith the antenna, transmitters and receivers located at the top. A celltower also known as cellular tower or cell site. Cell tower informationincludes, but is not limited to, signal strength, triangulation,orthogonality, cell tower pinging, and other types of cell towerinformation used to determine a current physical location 34, 34′, 34″of the target network device 12. To “ping” a cell tower in this contextmeans to send a signal to a particular cell phone 12 and have it respondwith the requested data. The cell towers are typically 6 to 12 milesapart (less in cities) and a cell phone 12 is usually within range of atleast three of them.

However, the present invention is not limited such cell towerinformation and other cell tower information can be used to practice theinvention.

In one embodiment, the Bluetooth protocol wireless beacon is generatedfrom small Bluetooth radio transmitters, powered by batteries or otherelectrical source. Bluetooth beacons are similar to a lighthouse infunctionality. These small hardware devices transmit Bluetooth LowEnergy (BLE) signals. The Bluetooth enabled smartphones 12 and othernetwork devices are capable of scanning and displaying these signals.Bluetooth Low Energy transmits less data over a smaller range, henceconsuming much less power. BLE beacons transfers small amounts of dataat regular intervals of time. However, the present invention is notlimited to such Bluetooth beacons and other beacons can be used topractice the invention.

In one embodiment, the WiFi wireless beacon includes, but is not limitedto, WiFi beacon frames. WiFi networks include unique SSIDs. Every SSIDon each band broadcasts its own unique WiFi beacon frame. This is aperiodic advertisement broadcast out to tell any listening devices 12that this SSID is available and has particular features andcapabilities. Target network devices 12 depend upon these beacon framesto discover what networks 18,18′ are available (passive scanning), andto ensure that the networks 18,18′ that they are associated with areactually still present and available. A client network device 12 alsohas the option to perform active scanning, where a client device sends abroadcast request to see what networks are available, and each SSID fromeach wireless access point in range will send out a unicast proberesponse that has the same information as a beacon frame. However, thepresent invention is not limited to such WiFi beacons and other beaconscan be used to practice the invention.

The NFC protocol information includes NFC unique tag identifiers (TIDs).A NFC reader accepts a TID from a target network device 12 and validatesit against a database 20′, 22′. The formal scan record includes the TID,date, time, capture method (e.g., NFC read, TID lookup, etc.) and anyother data collected at that point of service. However, the presentinvention is not limited to such an embodiment, and other types of NFCinformation can be used to practice the invention.

In one embodiment, M2M communications information includes, but is notlimited to, time of arrival (TOA) and time difference of arrival (TDOA)based localization information. M2M information is used to estimate alocation of unknown target network device 12 using TOA and TDOA from thelocation information of anchor M2M devices. In one embodiment, the TOAand TDOA are used via a cellular telephone network. However, the presentinvention is not limited to such an embodiment and the M2M informationcan be used on other communications networks 18, 18′ to practice theinvention.

In one embodiment, the online (i.e., available via the communicationsnetwork 18, 18′ (e.g., Internet, etc.)) mapping site informationincludes, but is not limited to, APPLE map location information, BINGmap location information, GOOGLE map location information, MAPQUEST maplocation information, ROADTRIPPERS, map location information,TERRASERVERS-USA map location information, HERE map locationinformation, aviation flight tracker map location information, marinevessel locator map location information, UNITED STATES GEOGLOGICALSURVEY (USGS) NATIONAL map location information, NATIONAL OCEANICATMOSPHERIC ADMINISTRATION (NOAA) map location information, GeographicInformation System (GIS) map location information and/or other types ofonline mapping information. However, the present invention is notlimited to the public information sources listed and more, fewer orother information sources can be used to practice the invention.

Such online mapping site information, includes, but is not limited to,locations or extents (i.e., natural features of the earth's surface,including topography, climate, soil, vegetation, etc.) in earthspace-time recorded as dates/times of occurrence, and (X, Y, Z)coordinates representing, longitude, latitude, and elevation,respectively. All earth-based spatial-temporal location and extentreferences are relatable to one another and ultimately to a “real”current physical location or extents.

Such online mapping site information, also includes, but is not limitedto, motion, magnetic, barometric pressure, humidity, moisture,temperature, precipitation, wind, height, depth, altimeter, GPS,traffic, flight, shipping, and/or other types of mapping information.

In one embodiment, the online mapping site information, includes, but isnot limited to, real-time traffic information, real-time weatherinformation, construction information, route planning information,satellite photograph information, building floor plan, and/or othertypes of mapping site information. The online mapping site informationis used by emergency responders: (1) to more precisely locate the targetnetwork device at the currently physical location 34, 34′, 34″; and (2)to provide emergency responders with additional information that mayaffect a travel route selected by the emergency responder such astraffic jams, construction projects, weather related events (e.g.,flooding, etc.), etc.

At Step 152, the emergency location application emergency locationinformation server 20 network device adds the determined currentphysical location 34, 34′, 34″ of the target network device 12 and thedetermined additional location information 155 to the emergency messageproviding additional information to locate the target network device 12.

In another embodiment, the determined additional location information155 is sent in real-time in another message after the emergency messageis sent. However, the present invention is not limited to thisembodiment.

In one embodiment, the determined additional location information isinclude in an XML data structure component. In one embodiment, theadditional location information is included in a XML PresenceInformation Data Format Location Object (PIDF-LO). However, the presentinvention is not limited to such embodiments and other embodiments canbe used to practice the invention.

Table 3 illustrates an exemplary XML Presence Information Data FormatLocation Object (PIDF-LO) layout. However, the present invention is notlimited to this layout and other XML layouts and other types of targetnetwork device 12 location information objects can be used to practicethe invention.

TABLE 3 <presence xmlns=“urn:ietf:params:xml:ns:pidf”xmlns:dm=“urn:ietf:params:xml:ns:pidf:data-model”xmlns:gp=“urn:ietf:params:xml:ns:pidf:geopriv10” xmlns:gml=“http://www.opengis.net/gml” xmlns:cl=“urn:ietf:params:xml:ns:pidf:geopriv10:civicAddr entity=“pres:312.431.4321”>  <dm:device id=“android-cell-phone”><gp:geopriv>  <gp:location-info> <gml:PointsrsName=“urn:ogc:def:crs:EPSG::4326”>  <gml:pos41.881832,−87.623177</gml:pos> </gml:Point> <cl:civicAddress>333 N. MichiganAvenue, Chicago, IL 60601</cl:civiAddress>  <cl:FLR>9th</cl:FLR> <cl:ROOM>Conference Room 3</cl:ROOM>  <gp:location-info>41.881832,−87.623177</gp:location-info>  <gp:usage-rules/> <gp:method>Wiremap</gp:method> </gp:geopriv><dm:deviceID>mac:8asd7d7d70cf</dm:deviceID><dm:timestamp>2020-01-22T20:57:29Z</dm:timestamp>  </dm:device></presence>

Table 4 illustrates an exemplary data structure including the determinedadditional location information. This data structure is exemplary onlyand other data structures and other embodiments can be used to practicethe invention. Table 4 illustrates determined additional locationinformation including an electronic links for online maps to GOOGLEmaps, GOOGLE real-time traffic maps, and BING maps for the streetaddress of 333 N. Michigan Avenue, Chicago, Ill. 60601.

In another embodiment, the determined additional location information isadded in additional fields of the XML Presence Information Data FormatLocation Object (PIDF-LO) layout (Table 3). This determined additionallocation information is exemplary only and other embodiments can be usedto practice the invention. The data structures described in Tables 3-5are exemplary only and other data structures layouts, with more, fewerand other fields and other mark-up and non-mark-up languages can be usedto practice the invention.

TABLE 4 Exemplary determined additional location information messagefield layout { ″tn″:″312.432.4321″, ″locationName″:″Conference Room 3″,″street″:″333 N Michigan Ave″, “locationInfo”:”9^(th) floor”,“city”:”Chicago”, “state”:”IL”, “postalCode”:”60601”, “companyID” :6f2f2d50-c385-,b72-b8,a-ce0ca3a77cb7 “google-maps”://goo.gl/maps/aCALrpR1tw8z9DH66 “google-traffic”://goo.gl/traffic-maps/aCALrpR1tw8z9DH66 “bing-maps”: //binged.it/38YO3Tj}

In one embodiment, the data structures described in Tables 3-5 are usedin HELD+ protocol messages. However, the present invention is notlimited to such an embodiment and other embodiments can be used topractice the invention.

At Step 154, the emergency message with the determined additionallocation information 155 is sent in real-time from the emergencylocation application 26′ on the emergency location information servernetwork device 22 to the determined emergency response server 25 via thecommunications network 18, 18′. The emergency message is sent withoutthe encrypted location information key data structure 76 from theemergency location application 26′ on the emergency location informationserver network device 22 to the determined emergency response server 25.

The desired emergency response server 25 includes an E911 or 911emergency response server, a text-to-911 server, a Public SafetyAnswering Point (PSAP) server, an Emergency Services IP networks(ESInet) server and/or other emergency gateway network server deviceand/or other emergency server network device.

In one embodiment at Step 154, emergency location application 26′ on theemergency location information server network device 22 determines adesired emergency response server 25 that is closest geographically tothe target network device 12 which is in turn used to notify emergencyresponders (e.g., police, fire, ambulance, etc.) closest to the currentphysical location 34 of the target network device 12. However, thepresent invention is not limited to such and embodiment and otherembodiments may be used to practice the invention including selectingother desired emergency response server 25 with other methods.

In another embodiment, a desired emergency response server 25 is not theclosest geographically to the target network device 12. In such anembodiment, the a desired emergency response server 25 closestgeographically to the target network device 12 may be out of service dueto the same emergency event the occurred for the target network device12 (e.g., fire, weather event, earthquake, etc.). In such an embodiment,the emergency location application 26′ on the emergency locationinformation server network device 22 determines the closest activeemergency response server 25. However, the present invention is notlimited to such and embodiment and other embodiments may be used topractice the invention including selecting other desired emergencyresponse server 25 with other methods.

At Step 156, the determined emergency response server 25 is notified inreal-time from the emergency location application 26′ on the emergencylocation information server network device 22 via the communicationsnetwork 18, 18′ that an emergency event has occurred with the targetnetwork device 12.

“Real-time” relates to a system 10 in which input data (e.g., emergencymessages, etc.) is processed within a few milliseconds or less to a fewseconds or less in time so that the input data is available immediatelyfor use and display as output data.

In one embodiment, information is displayed in real-time on thedetermined emergency response server network device 25 about theemergency event (e.g., fire 36″, etc.) that has occurred with the targetnetwork device 12.

In another embodiment, emergency information displayed in real-time onthe emergency location information server network device 22 about theemergency event (e.g., fire 36″, etc.) that has occurred with the targetnetwork device 12.

In another embodiment, emergency information displayed in real-time onboth the determined emergency response server network device 25 and theon the emergency location information server network device 22 about theemergency event (e.g., fire 36″, etc.) that has occurred with the targetnetwork device 12.

It has been determined based on data collected from emergency calls inthe United States that for every minute emergency help does not arrivein a medical emergency, survivability of a person is reduced by tenpercent. Methods 52, 134 and 164 help improve response time by notifyingemergency security and administrative personnel the instant someonedials 911 and/or texts 911 by sending a “screen popup” alert with orwithout a loud audio and/or audio/video alarm to security networkdevices and other network devices associated with the determinedemergency response server 25 that includes the full current physicallocation information for the target network device 12. SMS/text messagesare also sent to mobile security response teams and email notificationssent to administrators. The entire process is time-stamped and loggedfor audit purposes.

FIG. 6 is a block diagram 108 illustrating a graphical emergencylocation information system graphical display interface 110 fordisplaying information determined by the methods of FIG. 3 and FIG. 9and the other emergency location methods described herein.

The graphical display system interface 110, includes, but is not limitedto a real-time map portion 112 including a graphical location marker 114(e.g., for the target device 12, etc.) including a location of a type ofemergency (e.g. fire, accident, etc.), a determined current physicallocation portion 116 including the determined currently physicallocation 34 of the target network device 12, a picture portion 118including a digital picture of the determined currently physicallocation 34, of the target network device 12 and an emergencyinformation portion 120 including information about the type ofemergency event and an audio component 121 for sending out audioemergency alerts or tones. However, the present invention is not limitedto such an embodiment and more, fewer and other types of portions can beused to display emergency information on the display system interface110.

Methods 52, 134 and 164 allow a current physical location of any type oftarget network device to be accurately determine during an emergencyevent.

In one exemplary embodiment, for example, all employees of a businessare assigned a non-mobile desk phone 38. Methods 52, 134 and 164 enablesnon-mobile desk phones 38 (e.g., target network device 38 with locationapplication 26, etc.) to ask for its current physical location 34whenever it moves from a first physical location 34′ to second physicallocation 34″ within a selected enterprise (e.g., when an employee movesto a new office, is assigned to a new group, starts working as a newemployee, etc.) The desk phone 38 sends its new second physical location34″ (i.e., new current physical location) when it dials 911. Methods 52and 134 intelligently routes all emergency calls/message to theircorrect Public Safety Answering Point (PSAP) based on the currentphysical location of the non-mobile desk phone 38 a caller is making anemergency call from.

In another exemplary embodiment, for example, all employees of abusiness are assigned mobile smart phones 12. Methods 52, 134 and 164enable mobile smart phones 12 (e.g., target network device 12 withlocation application 26, etc.) to ask for its current physical location34 when it moves from a first physical location 34′ to second physicallocation 34″ within a selected enterprise (e.g., anytime during any daythe employee moves to a new location at work, to a floor, cubicle,cafeteria, conference room, etc.). The mobile smart phones 12 send theirnew second physical location (i.e., new current physical location 34)when it dials 911 or texts 911. Methods 52, 134 and 164 intelligentlyroutes all emergency calls/texts to their location appropriate PublicSafety Answering Point (PSAP) based on the current physical location ofa mobile phone a caller is making an emergency call from.

In another exemplary embodiments, the employees of a company areassigned a mix of non-mobile desk phone 38 and mobile smart phones 12.

In another exemplary embodiment, for example, all employees of abusiness are assigned a wearable network device 42-50 comprising, forexample, wearable watch 48 including telephone capabilities. Methods 52,134 and 164 enable the wearable watch 48 (with location application 26,etc.) to ask for its current physical location 34 when it moves from afirst physical location 34′ to second physical location 34″ within aselected enterprise (e.g., anytime during any day the employee moves toa new location at work). The wearable watches 48 send their new secondphysical location 34″ (i.e., new current physical location 34) when itdials 911 or texts 911. Methods 52, 134 and 164 intelligently routes all911 calls to their location appropriate Public Safety Answering Point(PSAP) based on the current physical location 34 of a wearable watch acaller is making an emergency call from.

However, the present invention is not limited to such exemplaryembodiments and more, fewer and other types combinations of mobile andnon-mobile network devices can be used to practice the invention.

FIG. 10 is a flow diagram illustrating a Method 158 for locating anetwork device in an emergency situation.

In FIG. 10 at Step 160, a confirmation request message is sent inreal-time from the emergency location information application on theemergency location information server network device via thecommunications network to the location application on the target networkdevice. The confirmation request message includes the determined currentphysical location of the target network device determined with the oneor more queries to the relational database with the decrypted locationinformation key. The confirmation message includes a confirmationrequest for the target network device to immediately accept, reject ormodify the determined current physical location for the emergency eventthat has occurred with the target network device. At Step 162, aconfirmation response message is received in real-time on the emergencylocation information application on the emergency location informationserver network device via the communications network from the locationapplication on the target network device accepting, rejecting ormodifying the determined current physical location of the target networkdevice for the emergency event that has occurred with the target networkdevice. The location application on the target network deviceautomatically accepts, rejects or modifies the determined currentphysical location of the target network device.

Method 158 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment in FIG. 10 at Step 160, a confirmationrequest message is sent in real-time from the emergency locationinformation application 26′ on the emergency location information servernetwork device 20 via the communications network 18, 18′ to the locationapplication 26 on the target network device 12. The confirmation requestmessage includes the determined current physical location 34 of thetarget network device determined with the one or more queries to therelational database 25′ with the decrypted location information key 76.The confirmation message includes a confirmation request for the targetnetwork device 12 to immediately accept, reject or modify the determinedcurrent physical location 34 for the emergency event that has occurredwith the target network device 12.

At Step 162, a confirmation response message is received in real-time onthe emergency location information application 26′ on the emergencylocation information server network device 20 via the communicationsnetwork 18, 18′ from the location application 26 on the target networkdevice 12 accepting, rejecting or modifying the determined currentphysical location 34 of the target network device 34 for the emergencyevent that has occurred with the target network device 12. The locationapplication 26 on the target network device 12 automatically accepts,rejects or modifies the determined current physical location 34 of thetarget network device 12.

In one embodiment, Method 158, is executed in associated with Step 154of Method 134 of FIG. 9C. Method 158 would be executed before theemergency message is sent at Step 154 in Method 134 of FIG. 9C. However,the present invention is not limited to this embodiment, and the Method134 can be practiced without Method 154 of FIG. 10. In addition, Method158 of FIG. 10 is practiced in addition to Method 134 of FIG. 9.However, the present invention is not limited to these embodiments andother embodiments can be used to practice the invention.

Table 5 illustrates exemplary messages sent and received by Method 158.However, the present invention is not limited to these exemplary messageand other messages can be used to practice the invention. Table 5includes a confirmation request message, a confirmation response messagethat has been accepted, a confirmation response message that has beenmodified and a confirmation response message that has been rejected.

The target network device 12 (e.g., mobile phone 12) starts out on9^(th) floor in Conference Room 3 at 333 N. Michigan Avenue, Chicago,Ill. 60601. It then moves to a different floor and conference room atthe same street address. It then moves to a new street address.

The Confirmation Response Message with Modifications indicates, thetarget network device 12 has moved to the 11^(th) Floor and intoConference Room 7 at the same street address when it is sent theConfirmation Request Message in Table 4. The target network device 12then moves to a coffee shop on the first floor, unit 2, with a streetaddress at 179 N. Michigan Chicago, Ill. 60601. So when the confirmationrequest message is sent, the Confirmation Response message is rejectedbecause the target network device 12 has moved to the new street addressat 1 N. Michigan Chicago, Ill. 60601.

TABLE 5 Exemplary Confirmation Request Message { ″tn″:″312.432.4321″,″locationName″:″Conference Room 3″, ″street″:″333 N Michigan Ave″,“locationInfo”:”9^(th) floor”, “city”:”Chicago”, “state”:”IL”,“postalCode”:”60601”, “companyID” : 6f2f2d50-c385-,b72-b8,a-ce0ca3a77cb7} Exemplary Confirmation Response Message { ″tn″:″312.432.4321″,″status″: ″Success″, ″statusCode″: ″200″, ″Msg″:″VALID″,″locationName″:″Conference Room 3″, ″street″:″333 N Michigan Ave″,“locationInfo”:”9^(th) floor”, “city”:”Chicago”, “state”:”IL”,“postalCode”:”60601”, “companyID” : 6f2f2d50-c385-,b72-b8,a-ce0ca3a77cb7} Exemplary Confirmation Response Message with Modification {″tn″:″312.432.4321″, ″status″: ″Success″, ″statusCode″: ″201″,″Msg″:″MODIFIED″, ″locationName″:″Conference Room 7″, ″street″:″333 NMichigan Ave″, “locationInfo”:”11^(th) floor”, “city”:”Chicago”,“state”:”IL”, “postalCode”:”60601”, “companyID” :6f2f2d50-c385-,b72-b8,a-ce0ca3a77cb7 } Exemplary Confirmation ResponseMessage with Rejection { ″tn″:″312.432.4321″, ″status″: ″Success″,″statusCode″: ″202″, ″Msg″:″REJECTED″, ″locationName″:″Coffee Shop″,″street″:″179 N. Michigan Ave″, “locationInfo”:”1^(st) floor”, “Unit 2”,“city”:”Chicago”, “state”:”IL”, “postalCode”:”60601”, “companyID” :6f2f2d50-c385-,b72-b8,a-df1db4b88dc8 }

Verifying a Determined Current Physical Location of a Network Device

One problem that occurs is that when a current physical location isdetermined for a network device, the determined current physicallocation may be incorrect for the network device. The network device hasno opportunity to verify or change an incorrect determined currentphysical location before an emergency event occurs. In such a situation,emergency responders may be sent to an incorrect location for thenetwork device in an emergency situation.

It is important for the current physical location of a network device tobe accurately known before an emergency event occurs so first responderscan be immediately dispatched and sent to the current physical locationfor the network device without having to send any messages to or receiveany messaging from the network device to determine its current physicallocation. Reaction time by first responders is critical when anemergency event occurs.

The determined current physical location may be incorrect because thenetwork device is at a location where there is no telecommunicationsservice and the determined current physical location may be an olddetermined current physical location, one or more networks the networkdevice could connect to may be down, a network may have an incorrectnetwork identifier (e.g. an incorrect SSID, etc.), the locationidentifier for the determined current physical location may beidentified by vanity identifier (e.g., State of Illinois Center, etc.)instead of an actual street address (e.g., 100 W. Randolph Street,Chicago, Ill.), the network device has physically moved again to anothernew current physical location since the network device's initial contactwith an emergency location information server network device thatrecords its current physical location for emergencies, the currentphysical location may not be available on a map or via online mappinginformation sites (e.g., a rural location, a newly built sub-division, anew road or highway, etc.), a network address (e.g., Internet Protocol(IP) address, etc.) may be masked or encrypted, the network device iscurrently moving to a new location or will be moving to a new locationin the next few seconds, minutes, etc., the accelerometer, one or moresensors and/or one or more actuators have been activated on the networkdevice indicating an immediate change in the environment around thenetwork device, and/or for many other reasons.

FIGS. 11A, 11B, 11C, 11D and 11E are a flow diagram illustrating aMethod 164 for locating a network device before an emergency situation.

In FIG. 11A at Step 166, a first location information message isreceived on an emergency location application on an emergency locationinformation server network device with one or more processors from afirst server network device with one or more processors via acommunications network, wherein the first location message includesprivate location information determined with a location application on atarget network device with one or more processors that moved from afirst physical location to a second physical location. At Step 168, theemergency location application on the emergency location informationserver network device determines a current physical location for thetarget network device at the second physical location with the privatelocation information provided by the target network device. At Step 170,a location verification message including the determined currentphysical location is sent in real-time from the emergency locationapplication on the emergency location information server network deviceto the location application on the target network device via thecommunications network to verify the target network device is actuallylocated at the determined current physical location, wherein thelocation verification messages allows the location application on thetarget network device to automatically accept, reject or modify thedetermined current physical location without user input. In FIG. 11B atStep 172, a second location information message is received in real-timeon the emergency location application on the emergency locationinformation server network device via the communications network fromthe location application on the target network device. At Step 174, atest is conducted to determine on the emergency location application onthe emergency location information server network device with locationstatus information from the second location information message whetherthe target network device has accepted the determined current physicallocation, and if so, at Steps 176 and 178 are executed. If not, Step 194of FIG. 11E is execute. In FIG. 11B At Step 176, the emergency locationapplication on the emergency location information server network devicecreates an encrypted location information key data structure for thetarget network device, wherein the location information key datastructure includes unique identification information for the targetnetwork device and unique identifying location information for a networkthe target network device is currently connected to and the determinedcurrent physical location information, wherein the location informationkey data structure includes a database key to a relational database andis usable only by the emergency location application on the emergencylocation information server. At Step 178, a third location informationmessage including the location information key data structure encryptedwith a pre-determined encryption method is sent from the emergencylocation information application on the emergency location informationserver network device back to the location application on the targetnetwork device via the communications network. In FIG. 11C at Step 180,an emergency message is received on the emergency location applicationon the emergency location information server network device from thefirst server network device via the communications network, wherein theemergency message includes the encrypted location information key datastructure sent to the target network device, and wherein the emergencymessage was sent to the first server network device via thecommunications network from the location application on the targetnetwork device upon the target network device encountering an emergencyevent. At Step 182, the encrypted location information key datastructure is decrypted from the emergency location application on theemergency location information server network device. At Step 184, thecurrent physical location of the target network device is determinedwith one or more queries to the relational database with the decryptedlocation information key and also determining an emergency responseserver network device with one or more processors to send the emergencymessage based on the determined current physical location of the targetnetwork device. In FIG. 11D at Step 186, the emergency locationapplication on the emergency location information server network devicedetermines additional location information for the target network devicefrom one or more other public location information sources via thecommunications network using the determined current physical location ofthe target network device as a search key for searching the one or moreother public location information sources. At Step 188, the emergencylocation application on the emergency location information servernetwork device adds the determined current physical location of thenetwork device and the determined additional location information to theemergency message providing additional information to locate the targetnetwork device. At Step 190, the emergency message is sent in real-timefrom the emergency location application on the emergency locationinformation server network device to the determined emergency responseserver network device via the communications network, wherein theemergency message is sent from the emergency location application on theemergency location information server network device to the determinedemergency response server network device via the communications networkwithout the encrypted location information key data structure. At Step192, the emergency location application on the emergency locationinformation server network device notifies in real-time via thecommunications network the determined emergency response server networkdevice that an emergency event has occurred with the target networkdevice. In FIG. 11E at Step 194, a test is conducted to determine on theemergency location application on the emergency location informationserver network device with location status information from the secondlocation information message whether the target network device hasmodified the determined current physical location, and if so, Step 196is executed and if not, Steps 198 and 200 are executed. In FIG. 11E atStep 196, the determined current physical location is updated with a newmodified current physical location determined by the locationapplication on the target network device and included in the secondlocation information message sent by the location application on thetarget network device. The method continues at Step 180 of FIG. 11C. AtStep 198, the emergency location application on the emergency locationinformation server network device determines a new current physicallocation for the target network device with location informationincluded in the second location information message. At Step 200, thedetermined current physical location is updated with the new determinedcurrent physical location determined for the target network device bythe emergency location application on the emergency location informationserver network device after the target network device rejected adetermined current physical location. The method continues at Step 180of FIG. 11C.

Method 164 is an extension of Methods 52 and 134 and includes additionallocation verification functionality. The security and encryption methodsdescribed for these methods above including TLS security, the HELD/HELD+protocol, the location information key data structure 76 with XML datastructure, the XML Presence Information Data Format Location Object(PIDF-LO) layout illustrated in Table 3, the exemplary messagesillustrated in Tables 4 and 5 as described above are also used withMethod 164.

Method 164 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment in FIG. 11A at Step 166, a firstlocation information message is received on an emergency locationapplication 26′ on an emergency location information server 22 networkdevice with one or more processors from a first server network device 20with one or more processors via a communications network 18, 18′. Thefirst location message includes location information from a locationapplication 26 on a target network device 12 with one or more processorthat moved from a first physical location 34′ to a second physicallocation 34″.

In one embodiment, the first location message includes an initiallocation registration message for the target network device 12 at afirst physical location 34′ for the target network device 12. In such anembodiment, the first physical location 34′ and the second physicallocation 34″ are a same physical location. Such an embodiment is used toregister the target network device 12 a first time with the system 10.

In another embodiment, first location message includes a change inlocation information and/or enhancement in location information,registration message for the target network device 12 as the targetnetwork device moves from the first physical location 34′ to the secondphysical location 34″.

For example in FIG. 4, target network device 12 moves from physicallocation A including location information (12:(X, Y, Z): A 72) tophysical location B including location information (12:(X, Y, Z): B 74).Any aspect of the current physical location B may be different fromphysical location A.

In one embodiment, the first location information message includesdimensional (2D) (X, Y), three-dimensional (3D) (X, Y, Z), GlobalPositioning System (GPS) information, Cartesian coordinate information,Euclidean space information, geo-space information, geographicinformation, carrier network infrastructure information and/or networkinformation for the target network device 12. However, the presentinvention is not limited to this embodiment.

Returning to FIG. 11A, in one embodiment the first location informationmessage sent from the location application 26 on the target networkdevice 12 includes a HELD and/or a HELD+ protocol message. However, thepresent invention is not limited to this embodiment and other messagesand other protocols can be used to practice the invention.

In one embodiment, the location information for the target networkdevice 12 includes Network Layer (Layer 3) Internet Protocol (IP) and/orother network information about a network the target network device 12is currently connect to. This embodiment correlates IP address to aphysical location (e.g., (X, Y), (X, Y, Z), etc.). In such an embodimenta communication network 18, 18′ is typically broken up into logicalsubnets with each subnet having an associated current physical location.For example, all phones at 3 N. First Street, Chicago, Ill., 3^(rd)Floor will register and be assigned source IP addresses for the subneton the 3rd Floor and there will be a different subnet for each floor ofthe building. Each Subnet is assigned a location record and an EmergencyLocation Identification Number (ELIN), a ten digit phone number. Whenphones (e.g., mobile phones 12, non-mobile phones 38, etc.) move fromone subnet to another, they re-register with the first server networkdevice 20, get a new IP address that is associated with their newsubnet, and sends a second location information message (e.g., a (HyperText Transfer Protocol (HTTP) Enabled Location Delivery) (HELD)/HELD+request message, etc.) to the emergency location server network device25 for their Location Reference Key (i.e., location information keyinformation) data structure 76.

Since multiple networks exists on the communications network 18, 18′(e.g., wired LAN, wireless LAN, wireless LAN, Internet, WLAN, WiLAN,etc.), each individual needs a unique name. This unique network name iscalled a Service Set IDentifer (SSID) of the network. The target networkdevices can determine a SSID of an individual network.

Packets/messages bound for target network devices on an individualnetwork need to go to the correct destination. The SSID keeps thepackets within the correct network, even when overlapping networks arepresent. However, there are usually multiple access points within eachindividual network, and there has to be a way to identify those accesspoints and their associated clients. This identifier is called a BasicService Set IDentifier (BSSID) and is included in all wirelesspackets/messages. The BSSID is typically the MAC address of an accesspoint on an individual network.

An Extended Basic Service Set IDentifer (ESSID) includes of all of theBSSIDs in a network. For all practical purposes, the ESSID identifiesthe same network as the SSID does.

In one embodiment, the location information for the target networkdevice 12 also includes for Logical Link Layer (Layer 2) information.This Layer 2 information is used to require precise location definitiondown to a desktop device such as a non-mobile phone 38 or desktopcomputer, etc., or have a legacy network that cannot be configured intological subnets that correlate IP addresses to physical locations. Thisembodiment includes network connectivity into a local Voice over IP(VoIP) Virtual LAN (VLAN) so that it can interrogate the Layer 2 networkusing SNMP to find devices on Layer 2 devices and ports. This method isalso used with wireless controllers (e.g., Aruba, Aerohive, and Cisco)to track devices as they move on from a communications network 18 toanother network (e.g., Wi-Fi, etc.) network in real-time.

In one embodiment, only Layer 2 information is used. In anotherembodiment, only Layer 3 information is used. However, the presentinvention is not limited to these embodiments and other combinations ofnetwork device and network information and/or other layers can be usedto practice the invention.

In one embodiment, a transceiver chip in the target network device 12,is used to poll existing Wi-Fi, Wi-Fi Aware, WiMax, 802.xx.xx, cellular,Bluetooth beacons, RFID, mesh and other wireless networks to determineits current physical location 34. The location application 26 on thetarget network device 12 with the transceiver chip uses a variety ofmethods to determine current location information including, signalstrength, triangulation, orthogonality, etc. and the present inventionis not limited to the location methods described.

“Triangulation” is the process of determining a location of a point bymeasuring angles to it from known points at either end of a fixedbaseline, rather than measuring distances to the point directly (e.g.,trilateration). The point can then be fixed as the third point of atriangle with one known side and two known angles.

“Orthogonality” is process of relating two signal at right angles to oneanother (i.e., perpendicularity, etc.), and the generalization of thisrelation into N-dimensions; and to a variety other relationsnon-overlapping, independent objects of some kind.

In one embodiment, plural inbound wireless signals are used by theemergency location application 26′ and/or the location application 26for Peer-to-Peer (P2P) location determination of the target networkdevice 12 and other target network devices on the communications network18.

In one embodiment, the first location information message includes asocial media identifier (e.g., FACEBOOK, TWITTER, INSTAGRAM etc.). Inanother embodiment, the first location messages includes the socialmedia identifier and associated social media based location information.Many social media platforms track a user's current physical location inreal-time typically with GPS, and network information such as IPaddress, WiFi and/or LAN SSID, etc. Some social media platforms alsoinclude graphical map data with the location information (e.g., GOOGLEGHROME extension, MARAUDER'S MAP, used with the FACEBOOK messagingapplication, etc.). However, the social media location informationcannot be used alone to locate a target network device 12 in anemergency situation as such social media location information does notprovide an appropriate level of detail in the social media locationinformation.

At Step 168, the emergency location application 26′ on the emergencylocation information server network device 22 determines a currentphysical location 34 for the target network device 12 at the secondphysical location 34″.

In one embodiment, Step 168, further includes the functionality of Step150 to obtain additional public location information 155 (FIG. 7) frompublic location information sources 24 about a current physical location34, 34′, 34″ for the target network device 12. In such an embodiment,the additional public location information 155 is added to the locationinformation key data structure 76 created at Step 140 (and Step 150).However, the present invention is not limited to this embodiment and theinvention can be practiced with obtained additional public informationat Step 168.

At Step 170, a location verification message including the determinedcurrent physical location 34 is sent in real-time from the emergencylocation application 26′ on the emergency location information servernetwork device 22 to the location application 26 on the target networkdevice 12 via the communications network 18, 18′ to automatically verifythe target network device 12 is actually located at the determinedcurrent physical location, wherein the location verification messagesallows the location application 26 on the target network device 12 toautomatically accept, reject or modify, the determined current physicallocation 34.

In one embodiment, the location verification message includes a HELDand/or HELD+ message. However, the present invention is not limited tothis embodiment and other types of messages and other message protocolscan be used to practice the invention.

In a preferred embodiment, the location verification is conductedautomatically without user input by the location application 26 on thetarget network device 12. In such an embodiment, the locationverification is completely automatic and is completed automatically bythe target network device 26 and is done without any user input.

In another embodiment, the location verification is completed by a userof the target network device 12. The user of the target network device12 responds to queries and enters manual commands via the locationapplication 26 on the target network device 12. However, the presentinvention is not limited to such an embodiment and other embodiments canbe used to practice the invention and the invention can be practicedautomatically without any user inputs and without any manual inputs.

In FIG. 11B at Step 172, a second location information message isreceived in real-time on the emergency location application 26′ on theemergency location information server network device 22 via thecommunications network 18, 18′ from the location application 26 on thetarget network device 12.

In one embodiment, the location verification message includes a HELDand/or HELD+ message. However, the present invention is not limited tothis embodiment and other types of messages and other message protocolscan be used to practice the invention.

At Step 174, a test is conducted to determine on the emergency locationapplication 26′ on the emergency location information server networkdevice 22 with location status information from the second locationinformation message whether the target network device 12 has acceptedthe determined current physical location 34, and if so, at Steps 176 and178 are executed.

At Step 176, the emergency location application 26′ on the emergencylocation information server network device 22 creates a locationinformation key data structure 76 for the target network device 12. Thelocation information key data structure 76 includes uniqueidentification information 107 for the target network device 12 andunique identifying information for a network the target network device12 is currently connected to 109, 111. The location information key datastructure 76 also includes a database key for a relational database 22′and is usable only by the emergency location application 26′ on theemergency location information server 22 and cannot be decrypted by, thetarget network device 12, any other target network devices or servernetwork devices. A new location information key data structure 76 withdifferent location information is created every time the target networkdevice 12 changes its physical location to a new physical location.

In one specific embodiment, Step 176, further includes the functionalityof Step 152 to store the additional location information 155 obtainedfrom public location information data sources 24 about the currentphysical location 34, 34′, 34″ for the target network device 12 in thecreated location information key data structure 76. However, the presentinvention is not limited to this specific embodiment and the inventioncan be practiced with obtained additional public information at Step176.

The location information key data structure 76 is encrypted with apre-determined encryption method (e.g., TLS, etc.) to prevent at least,including, but not limited to: (1) eavesdropping by other parties toimproperly determine a location of the target network device 12 in anon-emergency situation and invade and/or compromise the privacy of auser of the target network device 12; (2) tampering by hackers who couldendanger the health and safety of a user of the target device 12 in anemergency situation by altering current physical location information ofthe target network device 12; and (3) using the using the currentlocation information of the target network device 12 from other targetnetwork devices and/or other server network devices without agreementswith the providers of the emergency location information server 22.However, the present invention is not limited to this embodiment andother embodiments may be used to practice the invention.

The location information key data structure 76 includes a uniquecombination of target device 12 identification information 107 andnetwork 18, 18′ (e.g., LAN, WAN, mesh, etc.) connectivity informationdata 109, 111 for the target network device 12 to create a uniqueencrypted location key data structure 76 for the target network device12. When encrypted, the location information key data structure 76 hasno meaning to the end user of the target network device 12 and/or anyother target network devices or server network device other than theemergency location information server network device 22 and cannot beencrypted/decrypted by any entity other than emergency locationapplication 26′ on the emergency location information server networkdevice 22.

Database keys are an integral part of relational databases. They areused to establish and identify relationships between database datastructures such as tables, etc. They also ensure that each record withina table can be uniquely identified with a combination of one or morefields within a table stored in the database (e.g. FIG. 5—field 88 andfield 102, field 92 and field 104, etc.)

FIG. 5 is a block diagram 78 illustrating exemplary emergency locationinformation table layouts 80, 96 used for creating the encryptedlocation information key data structure 76.

However, the present invention is not limited to the data fieldsdescribed and more, fewer and other XML data fields and other datastructures and other layouts other than tables can be used to practicethe invention.

In one embodiment, the location information key data structure 76includes a Location Reference Key data structure 76 with an XML datastructure comprising: (1) a Level 2 XML data structure component 80(e.g., a row, column, etc.) and/or (2) a Level 3 XML data structurecomponent 96 (e.g., a row, column, etc.) and/or a device informationcomponent 107 with current physical information (e.g., (X, Y), (X, Y,Z), etc.) for the target network device 12.

In one embodiment, the Level 2 XML data structure component includes oneor more entries from a first relational database 22′ table layout 80with a network name 82 (e.g., SSID, BSSID, ESSID, etc.) switch name 84,switch port 86, target network device IP address 88, target networkdevice MAC address 90, ELIN 92 and Emergency Location Name (ELN) 94 datafields. However, the present invention is not limited to the data fieldsdescribed and more, fewer and other XML data fields and other datastructures and other layouts other than tables can be used to practicethe invention.

In one embodiment, the Level 3 XML data structure component includes oneor more entries from second relational database 22′ table layout 96 witha region 98, network name 100, IP address range 102, ELIN 104 and ELN106 data fields. However, the present invention is not limited to thedata fields described and more, fewer and other XML data fields andother data structures and other layouts other than tables can be used topractice the invention.

In one embodiment the, device information component 107 includes uniqueidentification information for the target network devices. For example,the target network device 12 includes device information 107 comprising:(1) device type: iPhone 10; (2) owner: Sally Jones; (3) dial number:312-552-1201; (4) current physical information (e.g., (X, Y), (X, Y, Z),GPS, geo-space etc.); and (5) social media identifier information. Inanother embodiment, the current physical information (e.g., (X, Y), (X,Y, Z), GPS, geo-space, etc.) is not included in the device information107. In another embodiment, the device information component 107 furtherincludes a social media identifier and/or social media identifier withassociated location information. However, the present invention is notlimited to the device information fields described and more, fewer andother device information location data fields and other data structuresand other layouts other than tables can be used to practice theinvention.

In one embodiment, the (Z) component of the 3D current physical locationinformation includes, but is not limited to, enhanced Z-componentinformation including the new FCC Z-axis height/elevation informationand/or other enhanced elevation and/or enhanced height data from newother public information sources (e.g., satellite, low earth orbit (LEO)satellite, carrier network infrastructure, etc.) and/or privateinformation (e.g., satellite, low earth orbit (LEO) satellite, carriernetwork infrastructure, etc.) sources.

In this exemplary embodiment, the location information key datastructure 76 includes a Layer 2 component table 80 entry, for example,including Row 1, item 109: (Network Name: P, Switch: 22, Switch Port: 1,Device IP address: 193.169.88.1, Device MAC address: 00-04-8B-85-80-EE,ELIN: 312-552-1201, and ERL: 3 N. First Street, Cubicle 1) and/or aLayer 3 component table 96 entry, including Row 2, item 111: (Region: 1,Network Name: Orange, IP address range: 193.169.88.1 through193.169.88.254, ELIN of the main exchange: 312-552-1200, ERL: 3 N. FirstStreet, Second Floor). However, the present invention is not limited tosuch an embodiment, and more fewer or other data fields from therelational database tables can be used to practice the invention.

Therefore, in this exemplary embodiment, the location information keydata structure 76 before encryption includes device informationcomponent 107, Layer 2 component 109 and Layer 3 component 111. This key76 is exemplary only. The present invention is not limited to thelocation information key data structure 76 and more, fewer and otherdata fields and other data structures and other data structure layoutscan be used to practice the invention.

In one embodiment at Step 58, the emergency location informationapplication 26′ uses TLS encryption to encrypt/decrypt the locationinformation key data structure 76. TLS occurs in the transport layer inthe OSI network model. However, the present invention is not limited tothis embodiment and other or additional encryption and/or securitymessages can be used to practice the invention.

Client-server location applications 26, 26′ use the TLS protocol tocommunicate across a network 18 in a way designed to preventeavesdropping and tampering of location information used to locate atarget network device 12 in an emergency. Since applications 26, 26′ cancommunicate either with and/or without TLS, it is necessary for theclient target network device 12 to indicate to the emergency locationinformation server network device 22 that the setup of a TLS connectionis desired. One of the main ways of achieving this is to use a differentport number for TLS connections, for example, using port 443 for HTTPS,etc. Another mechanism is for the client target network device 12 tomake a protocol-specific request to the emergency location informationserver network device 22 to switch any current non-secure communicationsconnections over the communications network 18 to communications viaTLS.

Once the client target network device 12 and emergency locationinformation server network device 22 have agreed to use TLS, theynegotiate a state-based connection by using a handshaking procedure. TheTLS protocols use a handshake with an asymmetric cipher to establish notonly cipher settings but also a session-specific shared key with whichfurther communication is encrypted using a symmetric cipher. During thishandshake, the client target network device 12 and emergency locationinformation server network device 22 agree on various parameters used toestablish the connection's security. The handshake begins when theclient target network device 12 connects to a TLS-emergency locationinformation server network device 22 requesting a secure connection andthe client target network device 12 presents a list of supported ciphersuites (i.e., ciphers and/or hash functions, and/or encryption methodsand/r security methods etc.). From this list, the emergency locationinformation server network device 22 picks a cipher and hash functionthat it also supports and notifies the client target network device 12of the decision.

The emergency location information server network device 22 thenprovides identification in the form of a digital certificate. In oneembodiment, emergency location information server network device 22provides a modified digital certificate with additional emergencylocation information including, but not limited to, the emergencylocation information included in the location information key datastructure 76. However, the present invention is not limited to such anembodiment and other types of digital certificates can be used topractice the invention.

The modified digital certificate includes, but is not limited to, theemergency location information server network device 22, the trustedcertificate authority (CA) that vouches for the authenticity of thecertificate, the server's 22 public encryption key and the locationinformation key data structure 76. The client target network device 12confirms the validity of the certificate before proceeding.

In one embodiment, to generate the session keys used for the secure TLSconnection, the client target network device 12 encrypts a random numberwith the server's 22 public key and sends the result to the emergencylocation information server network device 22 (which only the emergencylocation information server network device 22 should be able to decryptwith its private key). Both parties then use the random number togenerate a unique session key for subsequent encryption and decryptionof data during the session uses a key exchange method (i.e.,Diffie-Hellman key exchange, etc.) to securely generate a random andunique session key for encryption and decryption that has the additionalproperty of forward secrecy. Thus, if the emergency location informationserver network device's 22 private key is ever disclosed in a futureevent, it cannot be used to decrypt the TLS session, even if the TLSsession is intercepted and recorded by a third party. This concludes thehandshake and begins the secured TLS connection, which is encrypted anddecrypted with the session keys until the connection closes. If any oneof the above steps fails, then the TLS handshake fails and the secureTLS connection is not created.

TLS is also used for dereferencing a location Uniform ResourceIdentifier (URIs) unless confidentiality and integrity are provided bysome other encryption or security methods. In one embodiment, targetnetwork device 12 location information recipients authenticate a networkhost (e.g., emergency location information server network device 22,etc.) identity with a DNS query using a domain name included in alocation URI. However, the present invention is not limited to thisembodiment. Pre-determined local security polices for emergency eventsdetermine what a target network device 12 and/or emergency locationinformation server network device 22 location information recipient doesif TLS authentication fails or cannot be attempted. However, the presentinvention is not limited to this TLS encryption method and otherencryption and/or security methods (e.g., RSA, DES, WEP, etc.) at otherlevels (e.g., Layers 1-7, etc.) including but not limited to thosedescribed herein, can be used to practice the invention and to encryptand decrypt the location information key data structure 76.

At Step 178, the emergency location information application 26′ on theemergency location information server network device 22 sends a thirdlocation information message including the encrypted locationinformation key data structure 76 back to the location application 26 onthe target network device 12 via the communications network 18. Thesecond location information message is not sent back to the targetnetwork device 12 via the first server network device 20.

In another embodiment, the third location information message is sentback to the target network device 12 via the first server network device20. However, the present invention is not limited to this embodiment andother embodiments can be used to practice the invention.

In FIG. 11C at Step 180, an emergency message is received on theemergency location application 26′ on the emergency location informationserver network device 22 from the first server network device 20 via thecommunications network 18, 18′. The emergency message includes theencrypted location information key data structure 76 and was sent by thetarget network device 12 to the first server network device 20 via thecommunications network 18, 18′ and indicates the target network device12 has encountered an emergency event.

In one embodiment, the target network device 12 automatically determinesit has encountered an emergency event. For example, with anaccelerometer, sensors, actuators, etc. integral to, and/or attached tothe target network device 12.

In another embodiment, a user of the target network device 12 determinesan emergency event has occurred. For example, the user is in anaccident, witnesses a fire, witnesses a crime, witnesses an accident ofanother person, etc.

In another embodiment, the target network device 12 is automaticallynotified an emergency event is now occurring. For example, riot, fire,weather event, military action, amber alert, emergency broadcastingsystem, etc.

However, the present invention is not limited to such embodiments andother embodiments can be used to practice the invention.

The emergency message includes an E911 communication message, a legacy911 communication message, NG-911 communication message, a CommonAlerting Protocol (CAP) message, a Public Safety Answering Point (PSAP)to Automatic Location Identification (ALI) (PAM) interface protocolmessage, text-to-911 message, 112 message and/or other type of emergencymessage.

In one embodiment the target network device 12 sends the encryptedlocation information key data structure 76 in one or more SIP protocolmessages that are used to initiate the emergency message to the firstserver network device 20. However, the present invention is not limitedto such and embodiment and other embodiments may be used to practice theinvention.

The emergency event includes an accident event, medical event, healthevent (e.g., personal health emergency, disease outbreak, etc.) fireevent, terrorist attack event, military event, marine event, weatherevent (e.g., hurricane, tornado, etc.), natural disaster event (e.g.,flood, earthquake, volcano, etc.) event, police event, crime eventand/or other emergency events. However, the present invention is notlimited to such and embodiment and other embodiments including more,fewer or other emergency events may be used to practice the invention.

At Step 182, the encrypted location information key data structure 76 isdecrypted from the emergency location application 26′ on the emergencylocation information server network device 22.

At Step 184, the emergency location application 26′ performs one or morequeries to the relational database 22′ using information from thedecrypted location information key data structure 76 to determine thecurrent physical location 34, 34′, 34″ of the target network device 12.The emergency location application 26′ also determines an emergencyresponse server network device 25 with one or more processors to sendthe emergency message to.

In FIG. 11D at Step 186, the emergency location application 26′ on theemergency location information server network device 22 determinesadditional location information 155 for the target network device 12from one or more other public location information sources via thecommunications network 18, 18′ using the current physical location 34,34′, 34″ of the target network device 12 from the emergency message as asearch key for searching the one or more other public locationinformation sources 24.

In one embodiment, the additional location information from the one ormore public location information sources 24 includes, but is not limitedto, online mapping site information, cellular telephone towerinformation, Bluetooth protocol wireless beacon information, WirelessFidelity (Wi-Fi) wireless beacon information, Radio Frequency Identifier(RFID) information, Internet of Things (IoT) device sensor informationor IoT actuator information, Near field communication (NFC) protocolinformation and/or machine-to-machine (M2M) communications information.However, the present invention is not limited to the public informationsources listed and more, fewer or other information sources can be usedto practice the invention.

The public information sources 24 includes plural network devices, IoTdevices, communications networks 18, 18′ (e.g., cellular, cloud, WiFi,Bluetooth, RFID, NFC, M2M, etc.) at known and fixed physical locations(e.g., street address, floor in a building, rooms and hallways in abuilding, retail location, restaurant, coffee shop, etc.) The known andfixed physical locations are used to: (1) provide additional verifiableinformation about a current physical location 34, 34′, 34″ for thetarget network device 12; and (2) confirm and verify the target networkdevice 12 is at a current physical location 34, 34′, 34″. Such known andfixed locations are stored in one or more public databases 22′, 24′,etc. In another embodiment, the known and fixed and locations are storedin one or more private databases 20′, etc. However, the presentinvention is not limited to such embodiments and other embodiments canbe used to practice the invention.

In one embodiment, the public information data sources 24 include freepublic information data sources and/or public information data sourcesthat require fees and/or subscriptions to access the public informationdata sources.

In one embodiment, the private information data sources 20′ include freeprivate information data sources and/or private information data sourcesthat require fees and/or subscriptions to access the private informationdata sources.

For example, a restaurant or coffee shop includes at a known streetaddress and has a WiFi network with a known and fixed SSID sent out in aWiFi beacon that can be used to further verify and confirm a currentphysical location 34, 34′, 34″ of the target network device 12, etc.

In one embodiment, the cellular tower information includes cell towerinformation. A cell tower houses the electronic communications equipmentalong with an antenna to support cellular communication in acommunications network 18, 18′. A cell tower is an elevated structurewith the antenna, transmitters and receivers located at the top. A celltower also known as cellular tower or cell site. Cell tower informationincludes, but is not limited to, signal strength, triangulation,orthogonality, cell tower pinging, and other types of cell towerinformation used to determine a current physical location 34, 34′, 34″of the target network device 12. To “ping” a cell tower in this contextmeans to send a signal to a particular cell phone 12 and have it respondwith the requested data. The cell towers are typically 6 to 12 milesapart (less in cities) and a cell phone 12 is usually within range of atleast three of them.

However, the present invention is not limited such cell towerinformation and other cell tower information can be used to practice theinvention.

In one embodiment, the Bluetooth protocol wireless beacon is generatedfrom small Bluetooth radio transmitters, powered by batteries or otherelectrical source. Bluetooth beacons are similar to a lighthouse infunctionality. These small hardware devices transmit Bluetooth LowEnergy (BLE) signals. The Bluetooth enabled smartphones 12 and othernetwork devices are capable of scanning and displaying these signals.Bluetooth Low Energy transmits less data over a smaller range, henceconsuming much less power. BLE beacons transfers small amounts of dataat regular intervals of time. However, the present invention is notlimited to such Bluetooth beacons and other beacons can be used topractice the invention.

In one embodiment, the WiFi wireless beacon includes, but is not limitedto, WiFi beacon frames. WiFi networks include unique SSIDs. Every SSIDon each band broadcasts its own unique WiFi beacon frame. This is aperiodic advertisement broadcast out to tell any listening devices 12that this SSID is available and has particular features andcapabilities. Target network devices 12 depend upon these beacon framesto discover what networks 18,18′ are available (passive scanning), andto ensure that the networks 18,18′ that they are associated with areactually still present and available. A client network device 12 alsohas the option to perform active scanning, where a client device sends abroadcast request to see what networks are available, and each SSID fromeach wireless access point in range will send out a unicast proberesponse that has the same information as a beacon frame. However, thepresent invention is not limited to such WiFi beacons and other beaconscan be used to practice the invention.

The NFC protocol information includes NFC unique tag identifiers (TIDs).A NFC reader accepts a TID from a target network device 12 and validatesit against a database 20′, 22′. The formal scan record includes the TID,date, time, capture method (e.g., NFC read, TID lookup, etc.) and anyother data collected at that point of service. However, the presentinvention is not limited to such an embodiment, and other types of NFCinformation can be used to practice the invention.

In one embodiment, M2M communications information includes, but is notlimited to, time of arrival (TOA) and time difference of arrival (TDOA)based localization information. M2M information is used to estimate alocation of unknown target network device 12 using TOA and TDOA from thelocation information of anchor M2M devices. In one embodiment, the TOAand TDOA are used via a cellular telephone network. However, the presentinvention is not limited to such an embodiment and the M2M informationcan be used on other communications networks 18, 18′ to practice theinvention.

In one embodiment, the public online (i.e., available via thecommunications network 18, 18′ (e.g., Internet, etc.)) mapping siteinformation includes, but is not limited to, APPLE map locationinformation, BING map location information, GOOGLE map locationinformation, MAPQUEST map location information, ROADTRIPPERS, maplocation information, TERRASERVERS-USA map location information, HEREmap location information, aviation flight tracker map locationinformation, marine vessel locator map location information, UNITEDSTATES GEOGLOGICAL SURVEY (USGS) NATIONAL map location information,NATIONAL OCEANIC ATMOSPHERIC ADMINISTRATION (NOAA) map locationinformation, Geographic Information System (GIS) map locationinformation and/or other types of online mapping information. However,the present invention is not limited to the public information sourceslisted and more, fewer or other information sources can be used topractice the invention.

Such online mapping site information, includes, but is not limited to,locations or extents (i.e., natural features of the earth's surface,including topography, climate, soil, vegetation, etc.) in earthspace-time recorded as dates/times of occurrence, and (X, Y, Z)coordinates representing, longitude, latitude, and elevation,respectively. All earth-based spatial-temporal location and extentreferences are relatable to one another and ultimately to a “real”current physical location or extents.

Such online mapping site information, also includes, but is not limitedto, motion, magnetic, barometric pressure, humidity, moisture,temperature, precipitation, wind, height, depth, altimeter, GPS,traffic, flight, shipping, and/or other types of mapping information.

In one embodiment, the online mapping site information, includes, but isnot limited to, real-time traffic information, real-time weatherinformation, construction information, route planning information,satellite photograph information, building floor plan, and/or othertypes of mapping site information. The online mapping site informationis used by emergency responders: (1) to more precisely locate the targetnetwork device at the currently physical location 34, 34′, 34″; and (2)to provide emergency responders with additional information that mayaffect a travel route selected by the emergency responder such astraffic jams, construction projects, weather related events (e.g.,flooding, etc.), etc.

At Step 188, the emergency location application emergency locationinformation server 20 network device adds the determined currentphysical location 34, 34′, 34″ of the target network device 12 and thedetermined additional location information 155 to the emergency messageproviding additional information to locate the target network device 12.

In another embodiment, the determined additional location information155 is sent in real-time in another message after the emergency messageis sent. However, the present invention is not limited to thisembodiment.

In one embodiment, the determined additional location information isinclude in an XML data structure component. In one embodiment, theadditional location information is included in a XML PresenceInformation Data Format Location Object (PIDF-LO) as is illustrated inTable 3 above. However, the present invention is not limited to suchembodiments and other embodiments can be used to practice the invention.

The PIDF-LO can also be expressed as Location by Value (LbV) object,which is an XML string of tagged data. The PIDF-LO is also expressed asLocation by Reference (LbR) object including a Uniform Resource Locator(URL). The URL allows a recipient of the XML data structure to retrievethe XML string.

Table 4 above illustrates an exemplary data structure including thedetermined additional location information. This data structure isexemplary only and other data structures and other embodiments can beused to practice the invention. Table 4 illustrates determinedadditional location information including an electronic links for onlinemaps to GOOGLE maps, GOOGLE real-time traffic maps, and BING maps forthe street address of 333 N. Michigan Avenue, Chicago, Ill. 60601.

In another embodiment, the determined additional location information isadded in additional fields of the XML Presence Information Data FormatLocation Object (PIDF-LO) layout (Table 3). This determined additionallocation information is exemplary only and other embodiments can be usedto practice the invention. The data structures described in Tables 3-5are exemplary only and other data structures layouts, with more, fewerand other fields and other mark-up and non-mark-up languages can be usedto practice the invention.

Table 5 above illustrates exemplary messages sent and received by Method164. However, the present invention is not limited to these exemplarymessage and other messages can be used to practice the invention. Table5 includes a confirmation request message, a confirmation responsemessage that has been accepted, a confirmation response message that hasbeen modified and a confirmation response message that has beenrejected.

At Step 190, the emergency message with the determined additionallocation information 155 is sent in real-time from the emergencylocation application 26′ on the emergency location information servernetwork device 22 to the determined emergency response server 25 via thecommunications network 18, 18′. The emergency message is sent withoutthe encrypted location information key data structure 76 from theemergency location application 26′ on the emergency location informationserver network device 22 to the determined emergency response server 25.

The desired emergency response server 25 includes an E911 or 911emergency response server, a text-to-911 server, a Public SafetyAnswering Point (PSAP) server, an Emergency Services IP networks(ESInet) server and/or other emergency gateway network server deviceand/or other emergency server network device.

In one embodiment at Step 190, emergency location application 26′ on theemergency location information server network device 22 determines adesired emergency response server 25 that is closest geographically tothe target network device 12 which is in turn used to notify emergencyresponders (e.g., police, fire, ambulance, etc.) closest to the currentphysical location 34 of the target network device 12. However, thepresent invention is not limited to such and embodiment and otherembodiments may be used to practice the invention including selectingother desired emergency response server 25 with other methods.

In another embodiment, a desired emergency response server 25 is not theclosest geographically to the target network device 12. In such anembodiment, the a desired emergency response server 25 closestgeographically to the target network device 12 may be out of service dueto the same emergency event the occurred for the target network device12 (e.g., fire, weather event, earthquake, etc.). In such an embodiment,the emergency location application 26′ on the emergency locationinformation server network device 22 determines the closest activeemergency response server 25. However, the present invention is notlimited to such and embodiment and other embodiments may be used topractice the invention including selecting other desired emergencyresponse server 25 with other methods.

“Real-time” relates to a system 10 in which input data (e.g., emergencymessages, etc.) is processed within a few milliseconds or less to a fewseconds or less in time so that the input data is available immediatelyfor use and display as output data.

In one embodiment, information is displayed in real-time on thedetermined emergency response server network device 25 about theemergency event (e.g., fire 36″, etc.) that has occurred with the targetnetwork device 12.

In another embodiment, emergency information displayed in real-time onthe emergency location information server network device 22 about theemergency event (e.g., fire 36″, etc.) that has occurred with the targetnetwork device 12.

In another embodiment, emergency information displayed in real-time onboth the determined emergency response server network device 25 and theon the emergency location information server network device 22 about theemergency event (e.g., fire 36″, etc.) that has occurred with the targetnetwork device 12.

It has been determined based on data collected from emergency calls inthe United States that for every minute emergency help does not arrivein a medical emergency, survivability of a person is reduced by tenpercent. Methods 52, 134 and 164 help improve response time by notifyingemergency security and administrative personnel the instant someonedials 911 and/or texts 911 by sending a “screen popup” alert with orwithout a loud audio and/or audio/video alarm to security networkdevices and other network devices associated with the determinedemergency response server 25 that includes the full current physicallocation information for the target network device 12. SMS/text messagesare also sent to mobile security response teams and email notificationssent to administrators. The entire process is time-stamped and loggedfor audit purposes.

At Step 192, the determined emergency response server 25 is notified inreal-time from the emergency location application 26′ on the emergencylocation information server network device 22 via the communicationsnetwork 18, 18′ that an emergency event has occurred with the targetnetwork device 12.

In one embodiment, information is displayed in real-time on thedetermined emergency response server network device 25 about theemergency event (e.g., fire 36″, etc.) that has occurred with the targetnetwork device 12.

In another embodiment, emergency information displayed in real-time onthe emergency location information server network device 22 about theemergency event (e.g., fire 36″, etc.) that has occurred with the targetnetwork device 12.

In another embodiment, emergency information displayed in real-time onboth the determined emergency response server network device 25 and theon the emergency location information server network device 22 about theemergency event (e.g., fire 36″, etc.) that has occurred with the targetnetwork device 12.

In FIG. 11E at Step 194, a test is conducted to determine on theemergency location application 26′ on the emergency location informationserver 22 network device with location status information from thesecond location information message, whether the target network device12 has modified the determined current physical location 34, and if so,Step 196 is executed and if not, Steps 198 and 200 are executed becausethe location application 26 on the target network device 12 has rejectedthe determined current physical location 34 determined for the targetnetwork device 12.

In FIG. 11E at Step 196, the determined current physical location 34 isupdated with a new modified current physical location 34′″ (FIG. 4)determined by the location application 26 on the target network device12 and included in the second location information message sent by thelocation application 26 on the target network device 12. The methodcontinues at Step 180 of FIG. 11C.

For example, if the determined current physical location for the targetnetwork device was 333 N. Michigan Avenue, Suite 1600, Desk B, Chicago,Ill. 60601, but the target network device was actually located at 333 N.Michigan Avenue, Suite 1600, Desk S, Chicago, Ill. 60601, then the newmodified current physical location 34′″ would be sent back to theemergency location application 26′ on the emergency location informationserver network device 22.

At Step 198, the emergency location application 26′ on the emergencylocation information server network device 22 determines a new currentphysical location 34′″ for the target network device 12 with locationinformation included in the second location information message.

In another embodiment, the emergency location application 26′ on theemergency location information server network device 22 determines a newcurrent physical location 34′″ for the target network device 12 bysending one or more additional messages to, and receiving one or moreadditional messages from, the location application 26 on the targetnetwork device 12 to determine a new current physical location 34′″ forthe target network device 12. However, the present invention is notlimited to such an embodiment and other embodiments can be used topractice the invention.

At Step 200, the determined current physical location 34 is updated withthe new determined current physical location determined 34′″ for thetarget network device 12 by the emergency location application 26′ onthe emergency location information server network device 22 after thetarget network 12 rejected the determined current physical location 34.The method continues at Step 180 of FIG. 11C.

For example, if the determined current physical location for the targetnetwork device was 333 N. Michigan Avenue, Suite 1600, Desk B, Chicago,Ill. 60601, but the target network device 12 is on the move to 39 S.LaSalle Street, Suite 325, Chicago, Ill. 60606, then a new currentphysical location 34″″ would be sent back to the emergency locationapplication 26′ on the emergency location information server networkdevice 22 by the location application 26 on the target network device12.

FIG. 12 is a block diagram visually illustrating a partial data flow 202for Method 164 of FIG. 11.

FIG. 13 is a block diagram 204 illustrating location choices 206 on atarget network device for Method 164 of FIG. 11.

In FIG. 13, the target location application 26 on the target networkdevice 12 includes messages choices 206 from the emergency locationapplication 26′ on the emergency location information server networkdevice 22 that are automatically selected by target location application26.

In another embodiment, if a user of a target network device 12 wouldmanually make message choices, the messages choices 206 would bedisplayed on a display component of the target network device 12.However, the present invention is not limited to such an embodiment andthe location application on the target network device 12 makes automaticchoices without user input in preferred embodiments of the invention.

FIG. 14 is a flow diagram illustrating a Method 208 for locating anetwork device 12 before an emergency situation. At Step 210, a locationapplication on a target network device with one or more processorsreceives a location verification request message from an emergencylocation application on an emergency location information server networkdevice via a communications network, wherein the location verificationmessage includes a determined current physical location for the targetnetwork device. At Step 212, the location application on the targetnetwork device, automatically accepts, modifies or rejects thedetermined current physical location for the target network device. AtStep 214, the location application on the target network device sends tothe emergency location application on the emergency location informationserver network device via a communications network a locationverification response message including an acceptance, modification, orrejection response and the determined current physical location if thedetermined current physical location was accepted, a modified currentphysical location if the determined current physical location requiredmodification and a new current physical location if the determinedcurrent physical location was rejected.

Method 208 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment at Step 210, a location application 26on a target network device 12 with one or more processors receives alocation verification request message from an emergency locationapplication 26′ on an emergency location information server networkdevice 22 with one or more processors via a communications network 18,18′, wherein the location verification message includes a determinedcurrent physical location 34 for the target network device 12.

At Step 212, the location application 26′ on the target network device12 automatically accepts, modifies or rejects the determined currentphysical location 34 for the target network device 12.

At Step 214, the location application 26 on the target network device 12sends to the emergency location application 26′ on an emergency locationinformation server network device 22 via the communications network 18,18′ a location verification response message including an acceptance,modification, or rejection response and the determined current physicallocation 34 if the determined current physical location was accepted, amodified current physical location 34′″ if the determined currentphysical location 34 required modification and a new current physicallocation 34″″ if the determined current physical location 34 wasrejected.

In another embodiment, the location verification response messageincludes only a modified current physical location 34′″ if thedetermined current physical location 34 requires modification or a newcurrent physical location 34″″ if the determined current physicallocation 34 was rejected. However, the present invention is not limitedto such an embodiment and other types of verification response messagescan be used to practice the invention.

In one embodiment, the location application 26 on the target networkdevice 12 has the ability to determine its own current physical location34. In another embodiment, the location application 26 on the targetnetwork device 12 cannot determine its own current physical location 34.In such an embodiment, the emergency location application 26′ on anemergency location information server network device 22 sends one ormore additional messages to and receives one more additional messages,from the location application 26 on the target network device 12 if thelocation application 26 on the target network 12 has rejected thedetermined current physical location 34 or requires modification of thedetermined current physical location 34. However, the present inventionis not limited to such an embodiment and other embodiments can be usedto practice the invention.

The methods and system presented herein locate a network device in anemergency situation with verification. Current physical locationinformation is obtained for a network device every time it registers ona network or moves to a new physical location. When a current physicallocation is determined for a network device, the determined currentphysical location is sent back to the network device for verification.The network device has the ability to accept, modify or reject thedetermined current physical location. The current physical location issent and received in an encrypted format to and from the network device.When the network device initiates an emergency message (e.g. 911, E911,NG911, text-to-911, 112, etc.) based on an emergency event (e.g.,weather, crime, fire, natural disaster, medical, terrorist, military,etc.), the emergency message includes the encrypted current physicallocation information for the network device. The current physicallocation information is decrypted. Additional information is collectedfrom one or more public location information sources for the currentphysical location of the network device. The emergency message with theadditional information is routed in real-time to an appropriate PublicSafety Answering Point (PSAP). The appropriate PSAP is immediatelynotified in real-time so emergency responders (e.g., police, fire,medical, etc.) can be dispatched to the current physical location of thenetwork device.

It should be understood that the architecture, programs, processes,methods and systems described herein are not related or limited to anyparticular type of computer or network system (hardware and/or softwareand/or firmware, etc.), unless indicated otherwise. Various types ofgeneral purpose or specialized computer systems may be used with orperform operations in accordance with the teachings described herein.

In view of the wide variety of embodiments to which the principles ofthe present invention can be applied, it should be understood that theillustrated embodiments are exemplary only, and should not be taken aslimiting the scope of the present invention. For example, the steps ofthe flow diagrams may be taken in sequences other than those described,and more or fewer elements may be used in the block diagrams.

While various elements of the preferred embodiments have been describedas being implemented in software, in other embodiments hardware and/orfirmware implementations may alternatively be used, and vice-versa.

The claims should not be read as limited to the described order orelements unless stated to that effect. In addition, use of the term“means” in any claim is intended to invoke 35 U.S.C. § 112, paragraph 6,and any claim without the word “means” is not so intended.

Therefore, all embodiments that come within the scope and spirit of thefollowing claims and equivalents thereto are claimed as the invention.

I claim:
 1. A method for locating a network device before an emergencysituation, comprising: receiving a first location information message onan emergency location application on an emergency location informationserver network device with one or more processors from a first servernetwork device with one or more processors via a communications network,wherein the first location message includes private location informationdetermined with a location application on a target network device withone or more processors that moved from a first physical location to asecond physical location; determining from the emergency locationapplication on the emergency location information server network devicea current physical location for the target network device at the secondphysical location with the private location information provided by thetarget network device; sending in real-time a location verificationmessage including the determined current physical location from theemergency location application on the emergency location informationserver network device to the location application on the target networkdevice via the communications network to verify the target networkdevice is actually located at the determined current physical location,wherein the location verification messages allows the locationapplication on the target network device to accept, reject or modify thedetermined current physical location; receiving in real-time a secondlocation information message on the emergency location application onthe emergency location information server network device via thecommunications network from the location application on the targetnetwork device; determining on the emergency location application on theemergency location information server network device with locationstatus information from the second location information message whetherthe target network device has accepted the determined current physicallocation, and if so, creating from the emergency location application onthe emergency location information server network device a locationinformation key data structure for the target network device, whereinthe location information key data structure includes uniqueidentification information for the target network device and uniqueidentifying location information for a network the target network deviceis currently connected to and the determined current physical locationinformation, wherein the location information key data structureincludes a database key to a relational database and is usable only bythe emergency location application on the emergency location informationserver, and sending a third location information message including thelocation information key data structure encrypted with a pre-determinedencryption method from the emergency location information application onthe emergency location information server network device back to thelocation application on the target network device via the communicationsnetwork; receiving an emergency message on the emergency locationapplication on the emergency location information server network devicefrom the first server network device via the communications network,wherein the emergency message includes the encrypted locationinformation key data structure sent to the target network device, andwherein the emergency message was sent to the first server networkdevice via the communications network from the location application onthe target network device upon the target network device encountering anemergency event; decrypting the encrypted location information key datastructure from the emergency location application on the emergencylocation information server network device; determining the currentphysical location of the target network device with one or more queriesto the relational database with the decrypted location information keyand also determining an emergency response server network device withone or more processors to send the emergency message based on thedetermined current physical location of the target network device;determining from the emergency location application on the emergencylocation information server network device, additional locationinformation for the target network device from one or more other publiclocation information sources via the communications network using thedetermined current physical location of the target network device as asearch key for searching the one or more other public locationinformation sources; adding from the emergency location application onthe emergency location information server network device, the determinedcurrent physical location of the network device and the determinedadditional location information to the emergency message providingadditional information to locate the target network device; sending inreal-time the emergency message from the emergency location applicationon the emergency location information server network device to thedetermined emergency response server network device via thecommunications network, wherein the emergency message is sent from theemergency location application on the emergency location informationserver network device to the determined emergency response servernetwork device via the communications network without the encryptedlocation information key data structure; and notifying in real-time fromthe emergency location application on the emergency location informationserver network device via the communications network the determinedemergency response server network device that an emergency event hasoccurred with the target network device.
 2. A non-transitory computerreadable medium have stored therein a plurality of instructions forcausing one or more processors on one or more network devices to executethe steps, comprising: receiving a first location information message onan emergency location application on an emergency location informationserver network device with one or more processors from a first servernetwork device with one or more processors via a communications network,wherein the first location message includes private location informationdetermined with a location application on a target network device withone or more processors that moved from a first physical location to asecond physical location; determining from the emergency locationapplication on the emergency location information server network devicea current physical location for the target network device at the secondphysical location with the private location information provided by thetarget network device; sending in real-time a location verificationmessage including the determined current physical location from theemergency location application on the emergency location informationserver network device to the location application on the target networkdevice via the communications network to verify the target networkdevice is actually located at the determined current physical location,wherein the location verification messages allows the locationapplication on the target network device to accept, reject or modify thedetermined current physical location; receiving in real-time a secondlocation information message on the emergency location application onthe emergency location information server network device via thecommunications network from the location application on the targetnetwork device; determining on the emergency location application on theemergency location information server network device with locationstatus information from the second location information message whetherthe target network device has accepted the determined current physicallocation, and if so, creating from the emergency location application onthe emergency location information server network device a locationinformation key data structure for the target network device, whereinthe location information key data structure includes uniqueidentification information for the target network device and uniqueidentifying location information for a network the target network deviceis currently connected to and the determined current physical locationinformation, wherein the location information key data structureincludes a database key to a relational database and is usable only bythe emergency location application on the emergency location informationserver, and sending a third location information message including thelocation information key data structure encrypted with a pre-determinedencryption method from the emergency location information application onthe emergency location information server network device back to thelocation application on the target network device via the communicationsnetwork; receiving an emergency message on the emergency locationapplication on the emergency location information server network devicefrom the first server network device via the communications network,wherein the emergency message includes the encrypted locationinformation key data structure sent to the target network device, andwherein the emergency message was sent to the first server networkdevice via the communications network from the location application onthe target network device upon the target network device encountering anemergency event; decrypting the encrypted location information key datastructure from the emergency location application on the emergencylocation information server network device; determining the currentphysical location of the target network device with one or more queriesto the relational database with the decrypted location information keyand also determining an emergency response server network device withone or more processors to send the emergency message based on thedetermined current physical location of the target network device;determining from the emergency location application on the emergencylocation information server network device, additional locationinformation for the target network device from one or more other publiclocation information sources via the communications network using thedetermined current physical location of the target network device as asearch key for searching the one or more other public locationinformation sources; adding from the emergency location application onthe emergency location information server network device, the determinedcurrent physical location of the network device and the determinedadditional location information to the emergency message providingadditional information to locate the target network device; sending inreal-time the emergency message from the emergency location applicationon the emergency location information server network device to thedetermined emergency response server network device via thecommunications network, wherein the emergency message is sent from theemergency location application on the emergency location informationserver network device to the determined emergency response servernetwork device via the communications network without the encryptedlocation information key data structure; and notifying in real-time fromthe emergency location application on the emergency location informationserver network device via the communications network the determinedemergency response server network device that an emergency event hasoccurred with the target network device.
 3. The method of claim 1wherein the additional location information from the one or more publiclocation information sources includes online mapping site information,cellular telephone tower information, Bluetooth protocol wireless beaconinformation, Wireless Fidelity (Wi-Fi) wireless beacon information,Radio Frequency Identifier (RFID) information, Internet of Things (IoT)device sensor information or IoT actuator information, Near fieldcommunication (NFC) protocol information or machine-to-machine (M2M)communications information.
 4. The method of claim 3 wherein the onlinemapping site information includes, APPLE map location information, BINGmap location information, GOOGLE map location information, MAPQUEST maplocation information, ROADTRIPPERS, map location information,TERRASERVERS-USA map location information, HERE map locationinformation, aviation flight tracker map location information, marinevessel locator map location information, UNITED STATES GEOGLOGICALSURVEY (USGS) NATIONAL map location information, NATIONAL OCEANICATMOSPHERIC ADMINISTRATION (NOAA) map location information or GEOGRAPHICINFORMATION SYSTEM (GIS) map location information.
 5. The method ofclaim 1 wherein first location message includes an initial locationregistration message for the target network device at the first physicallocation.
 6. The method of claim 1 wherein the first locationinformation message includes unique identifying information for thetarget network device and unique identifying location information for anetwork the target network device is currently connected to.
 7. Themethod of claim 1 wherein the first location information messageincludes a social media identifier, a social media identifier withassociated location information, Internet Protocol (IP) address, IPsubnet, Network Address Translated (NAT) IP address, Media AccessControl (MAC) address, port identifier, local network location referencekey, network identifier name, cable television set-top box identifier,Internet television set-top box identifier, Internet television stickidentifier, satellite television box identifier, a Service SetIdentifier (SSID), a Basic Service Set Identifier (BSSID) or an ExtendedBasic Service Set Identifier (EBSSID), associated with the targetnetwork device.
 8. The method of claim 1, wherein the first locationinformation message and the second location information include a(Hypertext transfer protocol (HTTP) Enabled Location Delivery) (HELD)protocol request message or a HELD+ protocol request message.
 9. Themethod of claim 1, wherein the first location information message andthe second location information include current physical locationinformation comprising: two dimensional (2D) (X, Y) locationinformation, three-dimensional (3D) (X, Y, Z), location information,wherein the (Z) component includes temperature, wind speed, pressure,depth, height, altitude, elevation, magnetic, speed or accelerationinformation, Global Positioning System (GPS) information, Cartesiancoordinate information, Euclidean space information, geo-spaceinformation, geographic information, network connection information,carrier network infrastructure information, satellite information or lowearth orbit (LEE)) satellite information, for the target network device.10. The method of claim 1 wherein the current physical location includestwo-dimensional (2D) (X, Y) location information, three-dimensional (3D)(X, Y, Z) location information, Global Positioning System (GPS)information, Cartesian coordinate information, Euclidean spaceinformation, geo-space information, geographic information, carriernetwork infrastructure information or network information for the targetnetwork device.
 11. The method of claim 1 wherein the encrypted locationinformation key data structure includes a Location Reference Key with aneXtensible Markup Language (XML) data structure comprising a Level 2data structure component and a Level 3 data structure component, eachwith a plurality of individual data fields including one or moredatabase key entries for a relational database comprising uniqueidentification information for the target network device, uniqueidentifying location information for a network the target network deviceis currently connected to and current physical location information forthe target network device comprising two-dimensional (2D) (X, Y),three-dimensional (3D) (X, Y, Z), Global Positioning System (GPS)information, Cartesian coordinate information, Euclidean spaceinformation, geo-space information, geographic information or networkinformation for the target network device.
 12. The method of claim 11wherein the XML data structure includes a Presence Information DataFormat Location Object (PIDF-LO) comprising a Location by Value (LbV)object including a XML string of tagged data or a Location by Reference(LbR) object including a Uniform Resource Locator (URL), wherein the URLallows a recipient of the XML data structure to retrieve the XML string.13. The method of claim 1 wherein location information key datastructure is encrypted and decrypted using a Transport Layer Security(TLS) protocol encryption method.
 14. The method of claim 1 wherein theemergency message includes an E911 communication message, legacy 911communication message, Next Generation NG-911 communication message,Common Alerting Protocol (CAP) message, Public Safety Answering Point(PSAP) to Automatic Location Identification (ALI) (PAM) interfaceprotocol message, text-to-911 message or 112-message.
 15. The method ofclaim 1 wherein the emergency message includes one or more SessionInitiation Protocol (SIP) messages including the encrypted locationinformation key data structure.
 16. The method of claim 1 whereinemergency response server network device includes an E911 or 911emergency response server, a text-to-911 server, 112 server, a PublicSafety Answering Point (PSAP) server, or an Emergency Services IPnetworks (ESInet) server.
 17. The method of claim 1 wherein theemergency event includes an accident event, fire event, medical event,health event, terrorist attack event, military event, weather event,natural disaster event, environmental event, or crime event.
 18. Themethod of claim 1 wherein the target network device includes a mobilephone, smart phone, electronic tablet, mobile computer, unmanned aerialvehicle (UAV), driverless vehicle, vehicle with a driver, aircraft,water vehicles, snow machines, Internet of Things (IoT) network device,wearable network device, portable gaming platform, non-portable gamingplatform, non-mobile computer, non-mobile phone, Internet appliance,cable television set-top box, Internet television set-top box, satellitetelevision box, and network devices embedded into home appliances orintelligent building control and monitoring systems.
 19. The method ofclaim 1 wherein the target network device includes a wireless interfacefor communicating with the communications network comprising: an IEEE802.11a, 802.11ac, 802.11b, 802.11g, 802.11n, Wireless Fidelity (Wi-Fi),Wi-Fi Aware, Worldwide Interoperability for Microwave Access (WiMAX),ETSI High Performance Radio Metropolitan Area Network (HIPERMAN),Zigbee, Bluetooth, Infrared, Industrial Scientific and Medical (ISM),Radio Frequency Identifier (RFID), Real-Time Text (RTT), Near FieldCommunications (NFC) or Machine-to-Machine (M2M), wireless interface.20. The method of claim 1 wherein the communication network includes acloud communications network and the emergency location application onthe emergency location server network device offers a plurality of cloudservices comprising a cloud computing Infrastructure as a Service(IaaS), a cloud Platform as a Service (PaaS) and offers an emergencylocation information Specific cloud software service as a Service (SaaS)including one or more different software services for providingemergency location information to the location application on the targetnetwork device and a plurality of other target network devices andserver network devices on the cloud communications network.
 21. Themethod of claim 1 further comprising: displaying in real-time on thedetermined emergency response server network device or on the emergencylocation information server network device, audio, visual or textinformation about the emergency event that has occurred with the targetnetwork device.
 22. The method of claim 1 further comprising: locatingwith the emergency location information application on the emergencylocation information server network device the current physical locationof the target network device by decrypting the encrypted locationinformation key data structure received in the emergency message sent bythe location application on the target network device via thecommunications network and by completing a database lookup with thedecrypted location information key; determining from the emergencylocation information application on emergency location informationserver network device an emergency response server closest to thecurrent physical location of the target network device; routing theemergency message from the emergency location information application onemergency location information server network device to the determinedemergency response server via the communications network; and notifyingfrom the emergency location information application on the emergencylocation information server network device the determined emergencyresponse server in real-time from that an emergency event has occurredfor the target network device.
 23. The method of claim 1 furthercomprising: determining on the emergency location application on theemergency location information server network device with locationstatus information from the second location information message whetherthe target network device has accepted the determined current physicallocation, and if not, determining with the second location informationmessage on the emergency location application on the emergency locationinformation server network device whether the target network device hasmodified or enhanced the determined current physical location, and ifso, updating the determined current physical location with a newmodified current physical location determined by the locationapplication on the target network device and included in the secondlocation information message sent by the location application on thetarget network device.
 24. The method of claim 1 further comprising:determining on the emergency location application on the emergencylocation information server network device with location statusinformation from the second location information message whether thetarget network device has accepted the determined current physicallocation, and if not, determining with the second location informationmessage on the emergency location application on the emergency locationinformation server network device whether the target network device hasrejected the determined current physical location, and if so,determining from the emergency location application on the emergencylocation information server network device a new current physicallocation for the target network device with location informationincluded in the second location information message; and updating thedetermined current physical location with the new determined currentphysical location determined for the target network device by theemergency location application on the emergency location informationserver network device after a rejected determined current physicallocation.
 25. The method of claim 1 further comprising: receiving alocation verification request message on the location application on thetarget network device from the emergency location application on theemergency location information server network device via thecommunications network, wherein the location verification messageincludes a determined current physical location for the target networkdevice; accepting, modifying or rejecting on the location application onthe target network device, the determined current physical location forthe target network device; and sending from the location application onthe target network device to the emergency location application on theemergency location information server network device via thecommunications network, a location verification response messageincluding an acceptance, modification, or rejection response and thedetermined current physical location if the determined current physicallocation was accepted, a modified current physical location if thedetermined current physical location required modification and a newcurrent physical location if the determined current physical locationwas rejected.
 26. The method of claim 1 further comprising: sending aconfirmation request message in real-time from the emergency locationinformation application on the emergency location information servernetwork device via the communications network to the locationapplication on the target network device, wherein the confirmationrequest message includes the determined current physical location of thetarget network device determined with the one or more queries to therelational database with the decrypted location information key, andwherein the confirmation message includes a confirmation request for thetarget network device to immediately accept, reject or modify thedetermined current physical location for the emergency event that hasoccurred with the target network device; and receiving a confirmationresponse message in real-time on the emergency location informationapplication on the emergency location information server network devicevia the communications network from the location application on thetarget network device accepting, rejecting or modifying the determinedcurrent physical location of the target network device for the emergencyevent that has occurred with the target network device, wherein thelocation application on the target network device automatically accepts,rejects or modifies the determined current physical location of thetarget network device.
 27. A system for locating a network device in anemergency situation, comprising, in combination: a communicationsnetwork; a plurality of target network devices, each with a locationapplication, one or more processors and a non-transitory computerreadable medium; a plurality of server network devices each with one ormore processors and a non-transitory computer readable medium; one ormore emergency response server network devices with an emergencylocation application, one or more processors and a non-transitorycomputer readable medium, configured: for receiving a first locationinformation message on an emergency location application on an emergencylocation information server network device with one or more processorsfrom a first server network device with one or more processors via acommunications network, wherein the first location message includesprivate location information determined with a location application on atarget network device with one or more processors that moved from afirst physical location to a second physical location; for determiningfrom the emergency location application on the emergency locationinformation server network device a current physical location for thetarget network device at the second physical location with the privatelocation information provided by the target network device; for sendingin real-time a location verification message including the determinedcurrent physical location from the emergency location application on theemergency location information server network device to the locationapplication on the target network device via the communications networkto verify the target network device is actually located at thedetermined current physical location, wherein the location verificationmessages allows the location application on the target network device toaccept, reject or modify the determined current physical location; forreceiving in real-time a second location information message on theemergency location application on the emergency location informationserver network device via the communications network from the locationapplication on the target network device; for determining on theemergency location application on the emergency location informationserver network device with location status information from the secondlocation information message whether the target network device hasaccepted the determined current physical location, and if so, forcreating from the emergency location application on the emergencylocation information server network device a location information keydata structure for the target network device, wherein the locationinformation key data structure includes unique identificationinformation for the target network device and unique identifyinglocation information for a network the target network device iscurrently connected to and the determined current physical locationinformation, wherein the location information key data structureincludes a database key to a relational database and is usable only bythe emergency location application on the emergency location informationserver, and for sending a third location information message includingthe location information key data structure encrypted with apre-determined encryption method from the emergency location informationapplication on the emergency location information server network deviceback to the location application on the target network device via thecommunications network; for receiving an emergency message on theemergency location application on the emergency location informationserver network device from the first server network device via thecommunications network, wherein the emergency message includes theencrypted location information key data structure sent to the targetnetwork device, and wherein the emergency message was sent to the firstserver network device via the communications network from the locationapplication on the target network device upon the target network deviceencountering an emergency event; for decrypting the encrypted locationinformation key data structure from the emergency location applicationon the emergency location information server network device; fordetermining the current physical location of the target network devicewith one or more queries to the relational database with the decryptedlocation information key and also determining an emergency responseserver network device with one or more processors to send the emergencymessage based on the determined current physical location of the targetnetwork device; for determining from the emergency location applicationon the emergency location information server network device, additionallocation information for the target network device from one or moreother public location information sources via the communications networkusing the determined current physical location of the target networkdevice as a search key for searching the one or more other publiclocation information sources; for adding from the emergency locationapplication on the emergency location information server network device,the determined current physical location of the network device and thedetermined additional location information to the emergency messageproviding additional information to locate the target network device;for sending in real-time the emergency message from the emergencylocation application on the emergency location information servernetwork device to the determined emergency response server networkdevice via the communications network, wherein the emergency message issent from the emergency location application on the emergency locationinformation server network device to the determined emergency responseserver network device via the communications network without theencrypted location information key data structure; for notifying inreal-time from the emergency location application on the emergencylocation information server network device via the communicationsnetwork the determined emergency response server network device that anemergency event has occurred with the target network device; and fordisplaying in real-time on the determined emergency response servernetwork device or on the emergency location information server networkdevice, audio, visual or text information about the emergency event thathas occurred with the target network device.