Systems and methods for managing an emergency situation

ABSTRACT

Systems and methods for managing an emergency situation are disclosed herein. An example method includes capturing biometric data from one or more biometric sensors associated with a user, detecting an emergency event based on an analysis of biometric data, activating a predetermined response measure on an electronic device, wherein the predetermined response includes at least obtaining video, audio, image or location data by the electronic device, and transmitting an alert request to a responding party the video, audio, image or location data obtained by the electronic device.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This Non-Provisional U.S. Patent Application claims the benefit andpriority of, and is a continuation of U.S. patent applicant Ser. No.15/625,393, filed on Jun. 16, 2017, which claims the benefit andpriority of, and is a continuation of U.S. Pat. No. 9,704,377, whichclaims the benefit and priority of and is a continuation-in-part of U.S.Pat. No. 9,349,366 which claims the benefit and priority of U.S.Provisional Application Ser. No. 61/659,147, filed on Jun. 13, 2012, allof which are hereby incorporated by reference herein in their entiretiesincluding all references and appendices cited therein.

BACKGROUND OF THE INVENTION 1. Field of the Invention

The present invention relates in general to emergency response systemsand methods. More particularly, but not by way of limitation, thepresent technology may comprise systems and methods for monitoring,detecting, and providing notification and/or response measures inresponse to an emergency situation regarding a user.

SUMMARY OF THE INVENTION

According to some embodiments, the present disclosure may be directed toa method for activating a response measure on an electronic device. Theelectronic device comprises a processor and a memory for storing logic.Furthermore, the processor executes the logic to perform a methodcomprising: (a) detecting actuation of an emergency alert device by auser; (b) activating a predetermined response measure on an electronicdevice that is communicatively coupled with the emergency alertactivator over a short range wireless network, wherein the predeterminedresponse includes at least obtaining video, audio, image or locationdata by the electronic device; and (c) transmitting an alert message toa responding party that includes either the video, audio, image orlocation data or access to the video, audio, image or location data.

According to some embodiments, the present disclosure may be directed toa method for activating a response measure on an electronic device. Theelectronic device comprises a processor and a memory for storing logic.The processor executes the logic to perform a method comprising: (a)capturing biometric data from one or more biometric sensors associatedwith a user; (b) detecting an emergency event based on an analysis ofbiometric data; (c) activating a predetermined response measure on anelectronic device, wherein the predetermined response includes at leastobtaining video, audio, image or location data by the electronic device;and (d) transmitting an alert request to a responding party the video,audio, image or location data obtained by the electronic device.

According to some embodiments, the present disclosure may be directed toa system comprising: (a) an emergency alert device that is capable ofactuation by a user, the emergency alert activator being communicativelycoupled with an emergency alert activator over a short range wirelessnetwork; (b) the electronic device being configured to activate apredetermined response upon actuation of the emergency alert device,wherein the predetermined response includes at least obtaining video,audio, image or location data by the electronic device; and (c) a serverfor transmitting an alert request to a responding party that includesthe video, audio, image or location data obtained by the electronicdevice.

BRIEF DESCRIPTION OF THE DRAWINGS

Certain embodiments of the present invention are illustrated by theaccompanying figures. It will be understood that the figures are notnecessarily to scale and that details not necessary for an understandingof the invention or that render other details difficult to perceive maybe omitted. It will be understood that the invention is not necessarilylimited to the particular embodiments illustrated herein.

FIG. 1 is a flowchart of an exemplary method for activating a responsemeasure on an electronic device in response to an emergency situation;

FIG. 2 is a schematic diagram of an exemplary electronic device having asecurity application, communicatively coupled to an application servervia a network;

FIG. 3 is a schematic diagram of another exemplary electronic deviceconstructed in accordance with the present disclosure;

FIGS. 4-10 collectively and individually illustrate various embodimentsof exemplary arrangements that include an electronic device having asecurity application thereon;

FIG. 11 is a flowchart of another exemplary method for activating aresponse measure on an electronic device in response to an emergencysituation; and

FIG. 12 is a flowchart of yet another exemplary method for activating aresponse measure on an electronic device in response to an emergencysituation.

FIG. 13 is a flowchart of another example method for automatic selectionof a mode of operation.

FIG. 14 is a flowchart of another example method for proximity andidentification based alert responses. FIG. 15 illustrates a flowchart ofanother example method of the present technology; FIG. 16 illustrates anadditional flowchart of another method of the present technology; andFIG. 17 is a perspective view of another example embodiment of anemergency alert activator that includes an emergency alert activatorthat is selectively attachable to a user.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

While this invention is susceptible of embodiment in many differentforms, there is shown in the drawings and will herein be described indetail several specific embodiments with the understanding that thepresent disclosure is to be considered as an exemplification of theprinciples of the invention and is not intended to limit the inventionto the embodiments illustrated.

It will be understood that like or analogous elements and/or components,referred to herein, may be identified throughout the drawings with likereference characters.

Before explaining the presently disclosed and claimed inventiveconcept(s) in detail by way of exemplary embodiments, drawings, and thelike, it is to be understood that the present disclosure is not limitedin its application to the details of construction and the arrangement ofthe components set forth in the following description or illustrated inthe drawings. The present disclosure is capable of other embodiments orof being practiced or carried out in various ways. As such, the languageused herein is intended to be given the broadest possible scope andmeaning; and the embodiments are meant to be exemplary—not exhaustive.It is to be understood that the phraseology and terminology employedherein is for the purpose of description and should not be regarded aslimiting. Unless otherwise required by context, singular terms mayinclude pluralities and plural terms may include the singular.

The present disclosure generally relates to a security system and methodto monitor, detect, and provide notification and/or response measures inresponse to an emergency situation for a user. By way of example, a userhaving an electronic device (e.g., a smartphone, laptop, e-reader, andso forth) may suddenly find herself in an emergency situation (e.g., amugging, a robbery, an injury, an automobile accident, and so forth)where she is otherwise unable to access or use her electronic device inits normal manner to notify or alert others to the emergency. Forexample, in an emergency situation involving a robbery, the user cannotuse her cellphone to call the authorities without the robber observingher and possibly retaliating against her.

In accordance with certain aspects of the present disclosure, the userin this situation may simply speak predetermined word(s) or phrase(s)wherein the electronic device then automatically launches one or moreresponse measures in response (e.g., launches certain applications,transmits/receives messages, records and transmits audio/video/locationdata, and so forth). The electronic device may begin recording audio,video, and/or data indicative of the geographic location of theelectronic device and then transmit said information to one or morerecipients (police, fire, ambulance, family, friends, and so forth) toalert them to the emergency, and if appropriate, initiate a response. Ineffect, the presently disclosed security system and method turns auser's electronic device into a personal security and protection system.

Generally, the security system and method may include an electronicdevice (“device”) operating in a network or interconnected environmentand including software or logic instructions (“security program”)residing thereon and being configured to carry out or perform at least aportion of the disclosed inventive concepts. Certain aspects may providefor a security program on the electronic device that continuouslymonitors for an emergency situation for the user of the electronicdevice and, once an emergency situation is detected, triggers orotherwise launches predefined programs, functions, steps, or otherresponse measures on the electronic device in order to monitor,mitigate, and/or initiate a response to the emergency. Certain aspectsmay provide for the electronic device to include a microphone and aspeech recognition program and to monitor for and detect the emergencysituation via receiving and analyzing the words being spoken by the userof the electronic device. When the user speaks a predefined word orphrase (“safe word”), the response measures may be initiated. That is,the electronic device may have a security program and/or otherapplication (e.g., a speech recognition program) that constantly listensfor the user to speak the safe word, utilize the voice recognitionprogram to determine whether the user has spoken the safe word, and, ifso, launch the predetermined steps or functions in response. The speechrecognition program may be implemented as an integral component ormodule of the security program or as a separate program residing on theelectronic device wherein the security program may be in communicationwith the speech recognition program.

Certain aspects of the security system and method may provide for theelectronic device to carry out the predetermined steps or functions inthe background such that a person viewing or even using the electronicdevice would not be aware of the response measures being carried out.This mode of operation may be referred to as stealth response mode. Thatis, the security program on the electronic device may execute anemergency response, which may include executing various functions on theelectronic device that would normally cause some outwardly observableeffect, such as screen illumination, haptic feedback, or audibleindications. In stealth mode, the security program may disable anysettings on the electronic device that provide these types of feedback.

For example, the security system and method may be adapted such that theelectronic device or an application server may automatically dial anemergency 911 call in response to detecting the emergency wherein thedisplay, keypad, and so forth, on the electronic device does notactivate, light up, or otherwise display any information indicating thatthe call is being placed. Other aspects may provide for the electronicdevice to automatically mute a speaker on the electronic device whenplacing the emergency 911 call so as to again operate in the backgroundwithout indicating to others that security measures have beenimplemented. When the security system and method is implemented on anelectronic device other than a smart phone, certain aspects may providefor activating a webcam, microphone, and so forth, in the background onthe electronic device, but again without in any way alerting others tothe response measures being taken, e.g., not activating the LED lightassociated with the webcam, without changing the information beingdisplayed on the monitor, and so forth

Other aspects of the security system and method may include theelectronic device having location and/or position based sensors,transducers, and so forth. In this situation, the emergency situationmay be detected based on sensing sudden changes in the location and/orposition of the electronic device. At least a part of the responsemeasures may include the automatic and/or periodic transmission of dataindicative of the geographic location, movement, lack of movement, andso forth, of the electronic device to predetermined recipients. In thecase wherein the emergency situation involved theft or loss of theuser's electronic device, response measures transmitting the location ofthe electronic device, for example, may aid in locating the thief and/orrecovery of the electronic device.

Other aspects of the security system and method may also provide for theelectronic device to include an accelerometer, an inertial navigationsystem, GPS location based sensing device, and so forth, and also logicinstructions receiving inputs from said sensing devices wherein theelectronic device detects an emergency based on a sudden and/orsubstantial change to the location, orientation, and/or position of theelectronic device. A substantial change in location, orientation, and/orposition of the electronic device is referred to as a “thresholdexceeding” change in any of these parameters.

Once the emergency situation has been detected, based on the inputs fromthe sensing devices meeting and/or exceeding predetermined levels, thepredetermined steps or response measures are again initiated inresponse. Further, the security program and method may, using datareceived from the accelerometer or other sensing devices, track themovements and/or lack of movement of the electronic device to detect anemergency and, once an emergency has been detected, track the movementsof the electronic device. The movements and/or lack of movements of theelectronic device may then be transmitted to predetermined recipients aspart of the predetermined response measures. Other aspects may providefor the electronic device to include position-based hardware (e.g., GPS)and/or software using location based algorithms based on the location ofthe electronic device proximate to the nearest access point (e.g., cellphone tower, WiFi access point, internet service provider, and soforth), and the like, such that the electronic device is againconfigured to determine, store, and/or transmit data indicative of itsgeographic location as part of the response measures.

Certain aspects may also provide for the electronic device to include aplurality of sensors designed to gather information indicative of theenvironmental conditions surrounding the electronic device, e.g., acamera to capture and store photographic images and/or video; amicrophone to capture and store audio; a light sensor to sense andrecord the ambient light level around the electronic device; and thelike. Data from such sensors can be captured, stored, and/or transmittedto predetermined parties as a part of the response measures.

The predetermined steps, functions, or response measures initiated inresponse to the detection of an emergency using the presently disclosedsecurity system and method may include a variety of hardware, logicinstructions, applications, programs, modules, and so forth residingand/or operating on the electronic device or remotely on an applicationserver and, individually or collectively being adapted to monitor theemergency situation, mitigate the emergency, and/or initiate a responseto the emergency. Exemplary response measures may include, but are notlimited to, placing an emergency call to 911; determining an initiallocation of the electronic device when the emergency is detected andoptionally, at predetermined intervals thereafter, transmitting saidlocation(s), or data indicative of said location, to one or morepredetermined recipients; activating a microphone and/or camera on theelectronic device to capture, record, and/or transmit audio and/orvideo; automatically transmitting one or more emergency messages topredetermined recipient (s) via standard Short Messaging Service (SMS),Enhanced Messaging Service (EMS), Multimedia Messaging Service (MMS),Instant Message (IM), email message, or combinations thereof, whereinthe messages may include text, audio, video, and/or other data, e.g.,data indicative of the location of the electronic device.

As described above, certain aspects may provide for the response measurewherein the electronic device or an application server automaticallyplaces one or more calls to predetermined recipients upon detecting anemergency. The call may be placed to an emergency 911 service, familymember(s), friends, and the like. Certain aspects may provide forwherein the security program may further, when placing a call, includeidentification data that is transmitted to the call recipient whereinthe identification data permits the recipient to immediately recognizethat the user of the electronic device is in an emergency situation andalso that the user may not be able to use the electronic device in itsnormal manner (e.g., the user cannot speak directly to the callrecipient). The call recipient, recognizing the emergency situationbased on the identification data may understand that informationregarding the emergency situation would be obtained from monitoring anyaudio, video, location, and so forth, information being received fromthe electronic device. Exemplary identification data may reflect thename of the security program operating on the electronic device, dataidentifying the user of the electronic device, and so forth Otheridentification data may include a short, emergency message havingpredetermined text, e.g., “EMERGENCY-PLEASE HELP.” The identificationdata appearing to the recipient(s) (e.g., showing up on the recipient'scaller-ID) may indicate to the recipient that the user of the electronicdevice is unable to use the electronic device in its normal manner(e.g., the user cannot use a Smartphone to place a call) and also thatthe user is in an emergency situation. In one example, the securityprogram residing or operating on the electronic device may benamed“Calleez” wherein the Calleez is adapted to transmit “Calleez” asthe identification data, or at least a portion of the identificationdata, to the call recipient to alert the recipient to the emergency. A911 operator may see the name “Calleez” appear on her terminal as thecaller-id, along with additional information relating to the user of theelectronic device, and recognize the nature of the emergency and betrained to respond accordingly. Broadly, this identification data may bereferred to a security program communication identifier, such as Calleezmay be transmitted as identification data that allows an emergencyresponse communication to be quickly and easily identified.

Other aspects of the present disclosure may provide for more than onesafe word to be used on the electronic device. That is, the securityprogram operating on the electronic device may include logic orinstructions to permit the user of the electronic device to program orstore multiple safe words and assign different predetermined responsemeasures to each safe word. Each safe word may be assigned based on thespecific nature of the emergency situation (e.g., assault, robbery,injury, fire, and so forth) and the predetermined response measures maybe different for each type of emergency situation, or the same. Forexample, the present disclosure may permit the user of the electronicdevice to record a first safe word for an emergency situation involvinga personal injury. When the user speaks the first safe word, thesecurity program operating on the electronic device launches a first setof predetermined response measures. The user of the electronic devicemay record a second safe word for an emergency situation involving acrime (e.g., assault or robbery). When the user speaks the second safeword, the security program operating on the electronic device launches asecond set of predetermined response measures. As would be understood,the application may permit the user to record any number of safe wordsand associated response measures.

Referring now to FIG. 1, shown therein is an exemplary methodimplementing certain aspects of the present disclosure. Provided is amethod of monitoring and responding to an emergency situation. Themethod may include analyzing 105, via a speech recognition module, thewords or phrases spoken by a user of the electronic device. The methodmay further include determining 110, based on the words or phrasesspoken by the user of the electronic device, if the user has spoken apredetermined safe word. The method may further include activating 115,if the user has spoken the predetermined safe word, a predeterminedresponse measure on the electronic device. The method may be implementedvia a security program operating on the electronic device or remotely onan application server. The safe word may be indicative of the nature ofthe emergency situation. The response measure may include transmittingaudio and/or video to predetermined recipients. The response measure mayinclude placing a call to a predetermined recipient.

In accordance with other aspects, the present disclosure may provide fora personal security system for a user of an electronic device. Thesecurity system may include a security program stored incomputer-readable medium on an electronic device and executable by aprocessor of the electronic device, wherein, when executed, the programcauses the electronic device to monitor for a user of the electronicdevice to speak a safe word and launch, in response to detecting thesafe word, a predetermined response measure on the electronic device.The safe word may be indicative of an emergency situation of the user.The security program may provide for the user of the electronic deviceto record and assign multiple safe words wherein each safe word isindicative of a different type of emergency situation.

Referring to FIG. 2, certain aspects of the present disclosure mayprovide for the security program (e.g., Calleez) implementing aspects ofthe present disclosure to be launched in a variety of ways. Certainaspects may provide for the security program to operate at the OperatingSystem (OS) level of the electronic device in order to ensure that theprogram is continuously active and monitoring for the user to speak thesafe word at any time. When the electronic device is initially turned onor reset, the security program may automatically launch or be otherwiseactivated so as to begin monitoring for the user to speak the safe wordindicating an emergency situation has arisen.

Other aspects may provide for the security program to be launched orotherwise activated by the user pressing one or more keys, switches, andso forth on the electronic device. As would be understood, certainelectronic devices operate on batteries and, in order to conserve andextend the life of the battery, it may be beneficial for the securityprogram to be adapted to permit the user to launch the program on an asneeded basis. For example, the user of the electronic device may findherself in a situation that, while not an emergency, raises concernsthat an emergency situation is about to occur, e.g., walking to her carlate at night in a poorly lit parking garage. In such a situation, theuser may activate the security program by pressing keys or switches onthe electronic device as they enter the garage or before leaving heroffice in order to be prepared for any emergency that may arise. Oncesafely in her car, the user may then deactivate the security program byagain pressing certain keys or switches on the electronic device. Asanother example, the security program being implemented on a computerused by a teller at a bank may be adapted to permit the teller toactivate the program by pressing certain keys on the keyboard when theyobserve individuals approaching or entering the bank that appear tointend harm or otherwise raise an alarm to the teller. The securityprogram may be adapted to be launched when the user presses certainkey(s), activates predetermined switch(s), presses a dedicatedkey/switch on the electronic device, on an as needed basis, e.g.,pressing the CTRL-S key. Again, the user may deactivate the securityprogram once they are comfortable that the potential emergency situationhas passed.

Referring to FIG. 2, the security program 200 may include, or beimplemented using a variety of modules. A module (or application), asreferenced in the present disclosure, should be generally understood asa collection of routines that perform various system-level functions andmay be dynamically loaded and unloaded by hardware and device drivers asrequired. The modular software components described herein may also beincorporated as part of a larger software platform or integrated as partof an application specific component. As used herein, the term “module”may also refer to any of an application-specific integrated circuit(“ASIC”), an electronic circuit, a processor (shared, dedicated, orgroup) that executes one or more software or firmware programs, acombinational logic circuit, and/or other suitable components thatprovide the described functionality.

As shown in FIG. 2, the security program 200 may include an app module205, a record module 210, a motion module 215, a voice (audio)module220, a messaging module 225, a GPS module 230, a video module 235,and/or a phone module 240. Generally, said modules operate to carry outat least a portion of the presently disclosed inventive concepts. Itwill be understood that the security program 200 may be referred to as“logic” that is stored in a memory 250 of an electronic device 255. Theelectronic device 255 further comprises a processor 260 that executesthe logic stored in memory 250. Further details regarding additionalcomponents or functional aspects of an exemplary electronic device aredescribed with regard to FIG. 3, which illustrates an exemplaryelectronic device 300, although it will be understood that theelectronic device 255 comprises a particular purpose machine that has beprogrammed to execute the functionalities described with regard to thesecurity program 200.

In some embodiments, the app module 205 may generally include logic,instructions, and the like to communicate with and operate on theelectronic device 255 or remotely on an application server 280. Asdiscussed, the app module 205 may operate at the 0/S level of theelectronic device 255 in order to load on initial power-up of theelectronic device 255 to continuously monitor for the user to speak asafe word. The app module 205 may also be launched on an as needed basisand remain fully functional in its monitoring and communicationscapabilities even when the app module 205 is not the foreground on themobile device 255 or when the display of the mobile device 255 is turnedoff or is in a mode intended to restricted access by unauthorized users.The app module 205 may include instructions and the like to operate asthe core module of the security program 200 and be in communicationswith the other modules to carry out the present disclosure. The recordmodule 210 may be in communication with one or more storage mediums onthe electronic device 255 and include logic instructions to control therecording of inputs or data from, e.g., the microphone, camera, GPSsensor, and so forth, during an emergency situation. The record module210 may further be in communication with the other modules to permitrecovery and transmission of the recorded inputs or data to recipientsas part of the response measures.

The motion module 215 may be in communication with any of the positionsensors discussed above (e.g., accelerometer, INS, and so forth), orwith other applications or dedicated programs operating on theelectronic device 255. The motion module 215 may receive motion datainputs indicative of the motion of the electronic device 255. The motionmodule 215 may provide the motion data inputs to one or more of theother modules of the security program. The voice module 220 may includea speech recognition logic or be in communication with a separate speechrecognition application or program operating on the electronic device255 or remotely on an application server 280 and receive inputsindicative of the words being spoken by the user of the electronicdevice 255 in order to analyze said words using voice recognitionalgorithms. Generally, the voice module 220 may analyze the words orphrases spoken by the user of the electronic device 255, using speechrecognition, to determine if the user has spoken the safe word. Thevoice module 220 may output data that indicates that the user has spokena safe word. In accordance with other aspects, the voice module 220 may,during an emergency, activate the microphone on the electronic device255 in order to record and transmit surrounding audio.

The messaging module 225 may include logic instructions to compose,generate, and/or communicating with other modules so as to transmit oneor more messages to predetermined recipients once an emergency situationhas been detected. The messages may be in any one or more of the hereindescribed messaging formats (e.g., email, SMS, IM, and so forth). Themessages may include information, data, text, and so forth, such asdiscussed herein.

In accordance with certain aspects, the voice module 220 may further meadapted to detect a user screaming, yelling, and/or other such noisesand, utilizing this detected information, determine when an emergencysituation has occurred. That is, the voice module 220 may detect whenthe user's voice has exceeded a predetermined decibel level.Additionally, the voice module 220 may be configured to determine thedifference between a scream and another high volume sound such as acheer or a whistle. That is, the voice module 220 may be configured toconsult voice patterns or other reference information that allows thevoice module 220 to determine characteristics of the sounds that areevaluated by the voice module 220. The voice module 220 may evaluate anysound that exceeds the predetermined decibel level to determine if thesound is indicative of distress by the user.

In some instances, the voice module 220 may trigger an emergencyresponse when the user exceeds the predetermined decibel level,especially after the voice module 220 has previously detected that theuser has spoken a safe word.

Additionally, the voice module 220 may include data, instructions, andthe like to determine which user has spoken the safe word, screamed, andso forth For example, the voice module 220, locally or remotely, mayinclude voice identification data, algorithms and the like configured toanalyze the auditory patterns being generated by the user, or someoneelse near the user, so as to provide a positive confirmation of who hasspoken the safe word, screamed, and so forth In certain aspects, thevoice module 220 and/or electronic device 255 may be configured totransmit the voice of an attacker to a remote system, such as theapplication server 280, which determines the identity of the attacker bycomparison against voice prints. The identity can be transmitted to thepolice/emergency contact with the initial contact or later.

Additionally, the electronic device 255 may also trigger other systemsto activate within in the area, such as a house, car, office, and soforth. The other systems may have cameras, microphones, infraredcameras, pressure sensors (to detect location or weight), and theinformation may be sent to other systems for identification, storage orto emergency contacts.

The GPS module 230 may be in communication with a GPS sensor 270 on theelectronic device 255 or with a separate application or program residingon the electronic device 255 and may include logic instructions adaptedto permit the security program to receive location data indicative ofthe geographic location of the electronic device 255. The GPS module230, using such location data, may record and/or transmit the locationof the electronic device 255 to recipient(s) during an emergencysituation. The video module 220 may be in communication with a camera275 on the electronic device 255 and include logic instructionsconfigured to capture, record, and/or transmit photographic imagesand/or video received from the camera 275 to recipient(s) during anemergency situation. The electronic device 255 may be configured totransmit images to the application server 280 that is adapted toidentify an attacker by comparison to other pictures. The identity canbe transmitted to the police/emergency contact with the initial contactor later.

The phone module 240 may be in communication with a communicationsmodule on the electronic device and include instructions configured toplace call(s) to predetermined recipients during an emergency. As alsodiscussed, the phone module 240 may be in communications with one ormore other applications operating onthe electronic device in order toplace the call over, for example, the Internet. In one example, thephone module 240 may be in communication with an application configuredto place a call over the Internet using, e.g., VOIP protocols. Oneexemplary VOIP application that the phone module may be in communicationwith and utilized to place the emergency call is Skype®. The phonemodule 240 may also be configured to control operations of theelectronic device 255 to allow for the app module 205to place theelectronic device 255 into stealth operation mode. That is, the phonemodule 240 may control the hardware drivers of the electronic device 255that control, for example, screen activation and brightness, as well asmicrophone or speakerphone control and muting, as well as otherfunctions that provide indications of use of the electronic device 255that may be detected by an assailant.

As discussed, the security program 200 may receive data from amicrophone 280 of the electronic device 255 and utilize a speechrecognition program to determine if the user of the electronic device255 has spoken the safe word. The speech recognition program may beimplemented as a part of the security program (e.g., the voice module)or may be a separate program residing on the electronic device whereinthe security program is in communication with the speech recognitionprogram. Further, the security program 200, upon initial power-on, maybe in electrical communication with the one or more sensors on theelectronic device 255 to receive data therefrom. Other aspects mayprovide for the sensors on the electronic device 255 to be incommunication with one or more dedicated programs on the electronicdevice 255 wherein the dedicated programs are configured to receive andanalyze data from the sensors. In that instance, the security program200 may be configured to communicate with the dedicated programs inorder to receive data indicative of the sensor outputs.

With more particular regard to the electronic device 255 being used toimplement at least a portion of the disclosed security system andmethod, the electronic device 255 may include, but is not limited to asmart phone (e.g., an iPhone®, a blackberry, and so forth), an iPodTouch®, an iPad®, portable e-Reader, a personal computer, a portablegame player, a portable music player, a game console, a laptop, anetbook computer, a television set, and the like. The electronic devicemay include internet network access capabilities via one or more of acellular telephone network (voice and/or data), a WiFi access point, awired network port, and the like. Certain aspects may provide for theelectronic device 255 to include telephony access, such as the smartphone, wherein the electronic device includes a communication systemconfigured to communicate via a cellular telephone network and/or vialocal Telco providers (e.g., landline). Other aspects may providewherein the electronic device 255 does not include telephony access butis otherwise configured to communicate via a local area network, a widearea network, the Internet, a wireless network, an optical network, andthe like. The electronic device 255 communicating via said network(s)may transmit and/or receive data or text messages as well as place voiceand/or video calls using, for example, Voice Over IP (VOIP) protocols(e.g., Skype®).

Turning now to FIG. 3, shown therein is an exemplary electronic device300 constructed in accordance with the present disclosure. This device300 includes an exemplary embodiment of the electronic device 255 ofFIG. 2. Generally, the electronic device may include an audio/videocomponent, an applications component or module, a location/positioncomponent, a communications component, a memory component 325, anInput/Output (I/O) component, and one or more processors, wherein saidcomponents are in electrical communication and transferinformation/instructions via a data bus. The audio/video component mayinclude a microphone, a camera, or similar sensor, as well as logic,hardware, or combinations thereof configured to capture audio and/orvideo and to provide AV data output(s) including information indicativeof said captured audio and/or video. In exemplary embodiment, theelectronic device may include one or more microphones and/or cameraspositioned at various locations around the electronic device (front andback) wherein the multiple sensors may each provide said AV data output.The audio/video component may further include logic, hardware, orcombinations thereof configured to analyze, differentiate, and/orcombine the AV outputs from the multiple sensors and to provide the AVdata output in a format adapted to provide a comprehensive view of theenvironment surrounding the electronic device. The audio/video sensorsmay capture and provide AV data indicative of sound and/or imagesassociated with the environment proximate to the electronic device.

The applications module may include logic, hardware, or combinationsthereof, configured to implement or execute a plurality of applicationsresiding on the electronic device or remotely on an application server.The applications module may include one or more programs, applications,logic instructions, and/or computer executable code adapted to operatingthe electronic device. Exemplary applications include the hereindisclosed security program, operating system programs, messagingprograms, and the like. The programs being executed via the applicationsmodule may reside in a memory portion of the applications module orreside in the memory component. The applications module may be incommunications with the memory component via, for example, the data bus,in order to transfer and/or store data or instructions associated withthe applications for execution.

The location/position component may include, for example, the GPSsensor, accelerometer, INS, and the like, such as discussed above. Thelocation/position component may include logic instructions, hardware,and the like configured to receive data inputs from said sensors whereinthe data includes information indicative of the location, position,orientation, and so forth, of the electronic device. Thelocation/position component may output location data indicative of thelocation, position, orientation, and so forth, of the electronic device.The location data may be output via, for example, the data bus and maybe received by the applications module executing the security program.

The communications component may include logic, hardware, and the like,configured to permit the electronic device to communicate on a varietyof communications mediums. Exemplary communications mediums may include,but are not limited to, a cellular telephone network (voice and/ordata), a wireless network(e.g., WiFi), a wired network, the Internet, anoptical network, and so forth The communications component may be inelectrical communications with any of the other components of theelectronic device via, for example, the data bus. Certain aspects mayprovide for the communications component to be configured toprepare(e.g., compose, formulate, arrange, and so forth) information ordata in a manner required by the communications medium it is operatingon so as to be transmitted thereon. Further, the communicationscomponent may receive information via the communications medium andprovide the received information to one or more other components of theelectronic device, e.g., the applications module executing the securityprogram.

The memory component may include logic, hardware, the like configured tostore information, data, programs, and so forth, to be executed by theelectronic device. The memory component may store, for example, theapplications or programs, operating protocols, and the like, as well asa variety of other processing system parameters, as would be understoodin the art. The memory component may include a mass storage device andportable storage mediums. The memory component may be implemented via amagnetic disk drive, an optical disk drive, a solid-state disk drive,and so forth. The memory component may be implemented via non-volatilestorage device for storing data and instructions.

The I/O component may include logic instructions, hardware, orcombinations thereof adapted to permit a user of the electronic deviceto operate, interface, or otherwise control the electronic device.Exemplary I/O devices may include, but are not limited to, a keyboard, avirtual keyboard, a mouse, a virtual pointing device, a monitor ordisplay, a pointing device, a printer, a scanner, switches, buttons, andso forth, or combinations thereof.

The one or more processor(s) component may include logic instructions,hardware, or combinations thereof, adapted to generally operate theelectronic device. The processor component may, for example, receiveand/or execute instructions relating to the operating system of theelectronic device. Certain aspects may provide for the processorcomponent to receive and execute instructions from the security programin order for the electronic device to implement at least a portion ofthe herein described inventive concepts.

Other aspects may provide for the electronic device to include a uniqueidentification number wherein the security program may transmit saididentification number to the predetermined recipients as a part of thepredetermined response measure.

Exemplary identification numbers that can be associated with eachelectronic device include, but are not limited to, a telephone number,an Electronic Serial Number, a Media Access Control (MAC) address, anInternet Protocol (IP) address, a Unique Device Identification (UDID)number, an International Mobile Equipment Identity (IMEI), and the like.

As would be understood in the art, the unique identification numberassociated with each electronic device can be used in a variety of waysto identify the electronic device as well as information associated withthe user of the electronic device. The identification number may also betransmitted to the recipient(s) during an emergency as a part of theidentification data discussed above.

Other aspects may provide for the electronic device to include infraredsensors and further be configured to transmit information indicative ofthe number of individuals within a predetermined distance from theelectronic device. Other sensors may also be used to determine thenumber of individuals near the electronic device, e.g., a camera inconjunction with facial recognition program to locate and identify eachperson, a microphone identifying and distinguishing different personsvoice patterns, and so forth Information indicative of the number ofindividuals within the predetermined distance may be transmitted as apart of the response measures.

Other aspects may provide for the electronic device to be configured todetermine and/or store the layout of the facility it is located in,e.g., the room layout of a house, and further to transmit informationindicative of where in the facility the electronic device is located asa part of the response measures. For example, the camera, the proximitysensors, GPS sensors, infrared sensors, and the like may individually orcollectively be adapted to determine the location of walls, doors,windows, and the like within the structure. Information indicative ofthe layout may be stored and accessed, in cooperation with any of thelocation sensing systems discussed herein, so as to monitor and recordwhere within the facility the electronic device is located. Once anemergency situation has been detected, information indicative of wherethe electronic device is located, and by extension the user, may betransmitted to, for example, emergency response personnel.

Other aspects may provide for ancillary components (“secondary devices”)forming a part of the presently disclosed security system and method. Inone embodiment, the system may include a secondary electronic devicethat may be carried on the person of the user and is in wirelesscommunication with the primary electronic device that may be locatedproximate the user, but in a fixed location. The secondary device may bea wristwatch worn on the wrist of the user, a Bluetooth headset worn bythe user, a pendant worn on the wrist, neck, or attached to the clothingof the user, integrated into a piece of jewelry (e.g., belt buckle) wornby the user, a hearing aid being worn by the user, incorporated intoglasses worn by the user, and so forth In this instance, the primaryelectronic device may be positioned locally (e.g. in the same room, thesame building, and so forth) to the user carrying the secondary device.As one example, the primary electronic device having the securityprogram may be a desktop computer, a laptop computer, a point-of-saleterminal, a home assistant system, a television, and the like, whereinthe secondary device is being carried by/worn on the user. In anotherembodiment, the primary device may be incorporated into a smoke alarmwherein such smoke alarms are located in each room of a building. Aswould be understood, the primary device may establish communication witheach, or at least one user entering the room so as to monitor for theuser to speak the safe word to indicate an emergency situation hasarisen and to initiate the response measures. The primary and secondarydevices may also include the ability to operate on internal batteriesthat can be charged via a wired connection or using inductive charging.Inductive charging may be performed using an inductive couplingcomponent 33 contained within the device 2, an inductive mat 17connected to a standard outlet mounted charging device 19 via a cable18.

The primary and secondary devices may be in communication via, forexample, Bluetooth, Infra-Red, or other wireless communication medium.In other aspects, the primary and secondary devices may be incommunication via one or more interconnected or network environments,e.g., via a wireless network, a wired network, the Internet, and thelike. In one exemplary embodiment, the secondary device may include amicrophone and/or camera wherein the security program operating on theprimary device receives input from the secondary device so as to monitorfor and detect when an emergency situation has occurred. Once theprimary device determines that the emergency has occurred, theelectronic device may initiate the response measures in accordance withthe inventive features described herein. In this exemplary embodiment,the primary and secondary device may be in communication via theInternet.

While the present invention has been described in connection with aseries of preferred embodiments, these descriptions are not intended tolimit the scope of the invention to the particular forms set forthherein. The above description is illustrative and not restrictive. Manyvariations of the invention will become apparent to those of skill inthe art upon review of this disclosure. The scope of the inventionshould, therefore, be determined not with reference to the abovedescription, but instead should be determined with reference to theappended claims along with their full scope of equivalents. The presentdescriptions are intended to cover such alternatives, modifications, andequivalents as may be included within the spirit and scope of theinvention as defined by the appended claims and otherwise appreciated byone of ordinary skill in the art. In several respects, embodiments ofthe present invention may act to close the loopholes in the currentindustry practices in which good business practices and logic arelacking because it is not feasible to implement with current resourcesand tools.

The components provided in the electronic device 300 of FIG. 3 are thosetypically found in computing systems that may be suitable for use withembodiments of the present invention and are intended to represent abroad category of such computer components that are well known in theart. Thus, the computing system 300 of FIG. 3 may be a personalcomputer, hand held computing system, telephone, mobile computingsystem, workstation, server, minicomputer, mainframe computer, or anyother computing system. The computer may also include different busconfigurations, networked platforms, multi-processor platforms, and soforth Various operating systems may be used including Unix, Linux,Windows, Macintosh OS, Palm OS, Android, iPhone OS and other suitableoperating systems.

FIGS. 4-10 illustrate various embodiments of electronic devices thatimplement various modules described supra with respect to FIGS. 1-3.Many of these embodiments involve the use of mobile electronic devices.Before describing the embodiments in greater detail, a list ofdefinitions pertinent to the descriptions will be discussed initially.Protectee: 1 the user of the mobile electronic devices/sensors. SafetyBuddy: an individual defined by the protectee to offer assistance in theevent of a safety incident or emergency. Safety buddies are users of thesecurity system, but are unmonitored unless they are also registered asprotectees.

Security system (or application): Is always active (foreground,background) and is a monitor, personal protector, emergency, medical, orlocation, and so forth, application that alerts when described actionsare taken. Network: a wired or wireless communications network inclusiveof cell towers radio beacons, radio receivers, transmitters,transceivers, and wireless access points 6 (see FIGS. 1 and 4).

Social Network: safety buddies/individuals defined by protectees' (alsoreferred to as Samaritans). Personal Network: a plurality of safetybuddings/individuals defined by an individual protectee.

Mobile devices: shown in the FIGS. as sensors 2, 4, 20, 26, and 32,wireless communications devices 3 and 5 (e.g., beacons), smartphones 4,and wireless transceiver 8. Inputs/sensors: the system will monitor avariety of sensors and inputs on the protectee's mobile device/devicesto determine signs of potential threats or distress. These inputs caninclude but are not limited to: audio 4 and 7, ultrasonic transducer 16,camera 31, GPS sensor 15, accelerometer 13, magnetometer (Compass) 14,Biometric apparel 20, 26, and 32, blood pressure sensor 25, galvanicskin response sensor 24, pulse sensor 22, oximeter 23, brain wave sensor27, iris monitor camera 28, and wireless button 12.

If the system detects a potential threat or distress from the protectee,the system will enter a triggering mode and create an incident alertthat will be sent out to the protectee's Safety Buddies and potentiallyany other Safety Buddies in the vicinity (see FIG. 10). Multiple sensorinput: The system can monitor one or more sensors simultaneously todetect potential threats and distress situations for the protectee.Audio: voice, speech recognition (keyword), loud noise (e.g., gun shot,glass breaking), scream, and voice stress. Ultrasonic transducer: sensorthat a user can wear, the sensor would monitor objects and/or personsentering the protectee's blind spot (e.g., from behind). The systemcould then alert the protectee when a person or object is within aspecified distance (e.g., 10 feet) or is approaching rapidly. Thesealerts can be done at the same time (e.g., when someone is approachingthe protectee), a pulsating tone alert is sounded, and as the persongets closer the pulse interval decreases. If the person is approachingthe protectee at a high rate of speed, the volume and pitch candramatically increase.

Camera: can use the camera to detect faces, perform facial recognition,and examine facial expressions on people in close proximity to theprotectee, to detect individuals that may be potential threats to theprotectee. The camera can also be used to detect infrared heatsignatures to differentiate people from other objects. The camera canalso be used to detect a flash (e.g., muzzle flash from gun). Imagescaptured by the camera could be used to provide an augmented realityview of the area around the protectee. This augmented reality could alsobe used in conjunction with GPS signals indicative of the location ofthe device. Augmented reality could provide the user an image of theircurrent location on their smartphone with details overlaid on the imagesbuilding, streets, landmarks, and so forth to highlight the safestareas, locate the safest direction to travel, the nearest emergencyservices facilities, and so forth.

A camera could also be used to monitor the protectee and determine theirstate of fear. As an example the camera can monitor the protectee'sfacial expressions and/or changes in their iris size to determine ifprotectee perceives a potential threat.

Accelerometer: It can be used to detect a high increase or decrease inacceleration (e.g., fall or crash). Bio-metric: biometrics sensors canmonitor the protectee's body to measure stress levels and detect theirperception of potentially hazardous situations. These can include butare not limited to sensors that measure: heart rate, blood pressure,brain waves, galvanic skin response, and blood oxygen levels (oximeter).Any combination of these could be used to trigger the system.

Pre-trigger Interval: avoid false alarms, provide feedback to user,sound, voice, pre-recorded message, blinking lights, vibration, user canturn this off if they are in a high threat area or the system can viageo-location. The security program will allow the protectee to defeatthe triggering (an amount of time to react within e.g.: 30 seconds) ifthe triggering is incorrect. If the system detects another input duringthe pre-triggering period (e.g.: another noise or distress sound) thesystem will automatically trigger. Also, during the pre-triggeringperiod the system can also increase the monitoring sensitivity andmonitor other sensors (e.g.: accelerometer or trigger at lower soundthreshold) to better determine if an incident is occurring and toprovide additional data to Safety Buddies in the event the systemcontinues to a triggering stage (see FIG. 9).

Output and feedback to user: The system can provide the user continuousfeedback both prior to and during an incident. These can include but arenot limited to mapping and route guidance, e-mails, text messages pushnotification, blinking lights 10, vibration, pre-recorded voice,augmented reality, heads up display/LCD display 29 wireless speakers 9,wireless strobe lights 10, and status light 11 (see FIGS. 2, 7, and 8).

Mapping and route guidance: provide safest route from a bad area, italso can detect that the protectee is entering a danger area and alertthem. It can provide the Safety Buddies the location of the protectee aswell as show the protectee the location of their Safety Buddies or otherSafety Buddies in their area. On displayed maps detailed overlay can begenerated to illustrate potential areas of threat and safety, forexample, based on crime stats, location of safety buddies, police, andfire stations. Emails: The security system will provide emails to safetybuddies and others that an incident has occurred. Text messages: Thesecurity system will provide immediate text messages to safety buddiesand others that an incident has occurred. Push notification: When analert is fired the security system will push notification to alert asafety buddies that an incident is occurring along with the location ofthe incident. Blinking light: The device will blink, pulsate the screen,camera light and other items such as camera flash. Vibration: the devicewill pulsate when application is fired. This can also warn the protecteethat the application has been engaged and may allow them time to disarma false alert. Pre-recorded voice and audio: Has the ability to playpre-recorded voice messages and other audio to alert protectees, safetybuddies, authorities, or people in the general vicinity of an incident.VOiP: The system can have the capability to establish a Voice Over iPconnection with Safety Buddies to enable voice communications quickly inthe event of an incident. Augmented reality: Use of devise to helplocate where you are. For example, the security program may use thecamera, sound, video and GPS data. This data will provide and displaymore information regarding location, events, and crimes stats.

The security application may also provide other features and functionssuch as determining the location of other safety buddies. The securitysystem has the ability to locate all defined safety buddies to pushalerts that someone in their proximity is in need of help. The securityapplication may also monitor signs of distress, several differentsensors, wireless sensor, bio metric sensor glasses, biometric handsensor phone, and so forth, can be triggered when a threat is determinedby the protectee ora combination of data to the sensors.

The security application may also include the ability to triangulate amobile device location using fixed position, or multiple mobile devicesas well as the proctectee mobile devise to locate and triangulatelocation. For example, the security application may locate someone in aschool or business in the event of an emergency. The securityapplication may also provide itinerary base monitoring that gives thesystem the ability to alert the protectee's safety buddies if and whenthe protectee is in a particular spot at a prescribed time or not at aspot at a prescribed time. Alert the proctectee when they are near orabout to enter a danger zone.

The security application may also provide the ability to leverage othersthat are not your safety buddy, but have the security system on theirdevice and they can be alerted that someone within proximity of them isin danger.

The security application can be put into stealth mode so that theattacker is unaware that the security application has been executed. Thesecurity application may also implement a passcode that allows theprotectee to disarm the security application if it was inadvertently setoff. This may be done with a proctectee secret code or specializedgesture or a combination of both or similar methods. The securityapplication may also provide a deactivation mode. if the securityapplication is turned off the application will alert the appropriateproctectee that the application is off. The security application mayalso interact with biometric sensor devices that can be worn on the hand21, head 30 or clothing, pocket books and so forth (see FIGS. 6, 7, and8). These sensors will alert safety buddies that proctectee is indistress. The security application may also inform users of a dangerzone, which is an area where there is a higher rate of criminalincidents. This data can also be obtained through the social safetynetwork of protectee's. The protectee will have the ability to alertothers of an area of higher risk that they may have experienced.

According to some embodiments, the security program may be configured toselectively adjust an emergency event threshold for the electronicdevice. For example, the security program may be configured to monitorthe location of the electronic device, as well as temporal data, such astime of day or the day of the week. Location information may indicatethat the user is in a safe or possibly dangerous area. As mentionedabove, the security program may consult crime map data or other safetyrelated information and compare the location of the user to such data.if the user is in a dangerous location, the security program mayselectively adjust an emergency event threshold for the device. Forexample, assuming a normal operating mode would require that the useryell the designated Safe Word at a decibel level of at least 95 db. ifthe security program detects that the user is in a dangerous location,the security program may change this threshold level to only 80 db. itwill be understood that the security program may selectively adjust anythreshold type, whether it be volume related, accelerometer or velocityrelated, and so forth. Other instances where threshold adjustment may beappropriate may include a time of day where a user is more likely to beinvolved in an emergency situation, such as late at night. in someinstances, the security application may utilize both location andtemporal data, as well as any other types of data that would be known toone of ordinary skill in the art with the present disclosure beforethem.

The security program may selectively adjust the threshold levels foremergency events on a continual basis, even when monitoring one or moresensors to collect auditory, visual, and bio-metric data received by theelectronic device as described above.

Thus, the security program may be configured to detect a sudden orathreshold exceeding change relative to the emergency event threshold,from an analysis of the collected auditory, visual, and bio-metric data.That is, the security program compares the sensor input to theselectively adjusted emergency event threshold. if the security programdetects a sudden or threshold exceeding sensor input, the securityprogram activates a predetermined response measure on the electronicdevice if a sudden or threshold exceeding change is detected.

FIG. 11 illustrates an exemplary method for activating a responsemeasure on an electronic device in response to an emergency situation.Notably, the method proceeds similarly to the method of FIG. 1, withadditional steps, such a allowing the user a fixed amount of time todefeat a trigger. That is, if the user does not deactivate the trigger,it can be assumed that the trigger was executed in response to an actualemergency situation. The step of allowing a fixed amount of time isoptional. if this option is selected, the device continues monitor theadditional sensors or triggering inputs. The security application mayalso increase the sensitivity of the sensors.

FIG. 12 illustrates an exemplary method for activating a responsemeasure on an electronic device in response to an emergency situation.More specifically, the method of FIG. 12 is an exemplary process thatexecutes after an emergency event has triggered a predeterminedresponse. initially, the security program may determine a currentlocation and recent location history for the electronic device andcreate an incident record in the system. This record may be stored on anapplication server with which the electronic device is communicating. itwill be understood that this information may be transmitted in either asynchronous or a synchronous manner.

Next, the security program causes all audio captured by the device priorto triggering of the event to the incident record. Also, the securityprogram may stream audio from the device into the incident record. insome instances, the security program may stream camera images to theincident record and alert safety buddies to the incident. in someinstances the security program may allow those buddies access to theincident record.

The security program may also determine an appropriate response for theuser, based upon the type of emergency situation. For example, thesecurity program may determine if police, fire, or another emergencyresponder type should be called, based upon the event. if there is ashooting, the security program may immediately contact the police. ifthe emergency event is a fire, the security program may contact the firedepartment first.

The security program may also determine if the electronic device shouldbe put into stealth mode. if so, the security program may provide opencommunication with buddies and/or present the user with a map showing aroute to safety. if the emergency situation does not require stealthmode, the security program may execute various features such as a strobeor loud noise to draw attention to the user.

The following paragraphs describe additional embodiments of the presenttechnology. FIG. 13 illustrates an example system that comprises anemergency alert device (e.g., security device) 1305, a Smartphone (e.g.,mobile device or other suitable computing device) 1310, and a server1315. in general, the emergency alert device 1305 can include a devicesuch as device 2 of FIGS. 2-4. in some embodiments, the emergency alertdevice 1305 comprises a beacon that communicatively couples with theSmartphone 1310. The beacon comprises a button or other similaractuating means that can be actuated by a user 1320 when an emergencyevent occurs.

The emergency alert device 1305 and Smartphone 1310 can communicativelycouple over any short range wireless protocol such as Bluetooth, nearfield communication (NFC), and so forth. in general, the user canactuate the emergency alert device 1305 which causes the Smartphone 1310to perform one or more predetermined response measures. Thepredetermined response measures can include any of the predeterminedresponse measures described herein. To be sure, the Smartphone 1310 caninclude any of the other additional features as described in otherembodiments infra.

The server 1315 can be utilized to provide various features as describedin the following paragraphs. it will be appreciated that some of theembodiments described herein can accomplished with or without the use ofthe emergency alert device 1305.

According to some embodiments, the Smartphone 1310 is configured throughthe security program to implement a “smart” mode of operation when theSmartphone 1310 is located in a particular geographical location. inother embodiments, the Smartphone 1310 can enter smart mode when thedevice is in a particular geographical location at a given time of day.Thus, the smart mode parameters for the device can include both locationand time parameters.

By way of example, the Smartphone 1310 can be placed in “smart” modewhen the Smartphone 1310 and user enter a parking lot of a shopping mallduring a time when the shopping mall is open. if the user depresses abutton or otherwise activates the Smartphone 1310, the Smartphone 1310will know that the mall is open and likely to be populated with shopperand will automatically output a loud audible warning, flash lights, orprovide other alerting output that draws attention to other mall orparking lot occupants to the location of the user.

By way of example, the Smartphone 1310 can be placed in a different“smart” mode when the Smartphone 1310 and user enter a parking lot of ashopping mall during a time when the shopping mall is closed. if theuser depresses a button or otherwise activates the Smartphone 1310, theSmartphone 1310 will know that the mall is closed and likely to not bepopulated with shoppers and will automatically remain in “stealth” modeso as not to draw attention to the user's phone or that an alert hasbeen sent by the phone.

The use of smart mode allows the Smartphone 1310 to either drawattention to an attacker or escape detection by an attacker based uponcertain geographical and time parameter.

Using both location and time parameters, the Smartphone 1310 candetermine an appropriate mode of operation. When the user leaves theparking lot, the Smartphone 1310 can automatically determine the changein location of the Smartphone 1310 and revert back to a normal mode ofoperation.

FIG. 14 illustrates a flowchart of another method of the presenttechnology. in general, the method comprises a step of detecting 1405actuation of an emergency alert device by a user. For example, the usercan depress a button on an emergency alert device, such as the alertdevice illustrated in FIG. 4.

Next, the method comprises activating 1410 a predetermined responsemeasure on an electronic device that is communicatively coupled with theemergency alert activator over a short range wireless network. in someembodiments, the predetermined response includes at least obtainingvideo, audio, image or location data by the electronic device. Asmentioned herein, the response can include other processes such as alertmessage transmissions, call session creation, and so forth.

in one embodiment, the method comprises transmitting 1415 an alertmessage to a responding party that includes either the video, audio,image or location data or access to the video, audio, image or locationdata. in other embodiments, the alert message includes a uniqueidentifier that allows for retrieval of the video, audio, image orlocation data or other data such as user profile information by aresponding party.

FIG. 15 illustrates a flowchart of an example method of the presenttechnology. The method begins with a step of sensing 1505 a location ofa security device, as well as a time of day. Next, the method includesdetermining 1510 if the location and time of day correspond to a mode ofoperation profile for the security device. To be sure, a mode ofoperation profile includes specific settings that are to be utilized bythe security device in accordance with a location and time.

A server or the security device can store mode of operation profiles. Anexample profile can comprise a location and a time. For the specific setof location and time information, the security device can apply a set ofdevice attributes such as silent/stealth mode, contact listdesignations, response characteristic (e.g., silent recording, loud andobtrusive warnings, etc.), and so forth.

If the location and time of day do not correspond to a mode of operationprofile, the security device can utilize a default profile.

If the location and time of day do correspond to a mode of operationprofile, the method can comprise implementing 1515 a mode of operationon the security device. In some embodiments, the security device can bemaintained in a mode of operation until changed by the user.

In other embodiments, the security device can continually determine if amode of operation should be applied or changed. The method can includedetermining 1320 a change in the location and time and implementinganother mode of operation if required by the change in the location andtime.

In other embodiments, the Smartphone 1310 is configured, through thesecurity program to determine if a wireless device (either worn on or inclose proximity to a person's body) has detected an emergency situation.For example, the Smartphone 1310 may comprise (or communicate with)biometric devices to sense biometric information for a user. Forexample, the Smartphone 1310 can be configured to determine if theuser's body temperature drops below a pre-determined temperature. Inanother example, the Smartphone 1310 can sense decreases or increases ina user's heart rate, blood pressure, blood sugar level, breathing, and auser becomes unconscious or the user experiences extreme stresslevels—just to name a few, These conditions can be detected throughvital signs, skin responses, blink rates, eye motion, brain waves and soforth. Thus, the Smartphone 1310 can be configured to communicate withone or more types of biometric devices. In other embodiments, biometricsensors can be integrated into the Smartphone 1310.

In some embodiments, the Smartphone 1310 is configured to provideproximity based assistance to a user. Upon receiving a communicationfrom the Smartphone 1310, a recipient can determine that a user/victimrequires assistance. In response, the recipient can request that theserver 1315 identify closest first responders to the victim.

Some embodiments allow the server 1315 to interact with a campussecurity system (or other public security infrastructure) to interactwith campus blue light system to identify closest blue light fixtures toflash lights, turn cameras towards victim's location, and so forth.

In other embodiments, the server 1315 can engage with participatingestablishments (e.g., parking garage) to flash lights or engage facilityalarm systems.

In additional embodiments, when an emergency event has been detected andan alert sent to one or more recipients, the server is configured togenerate a unique numerical identifier. The unique identifier can beshared with responders. The responders can input the unique identifierinto a web based interface provided by the server.

If correctly entered, the responder will be provided with emergencyevent information collected by the Smartphone 1310. Again, thisemergency event information can comprise location, audio, images, speed,direction, and so forth. Responders can select to have this informationtransmitted to their mobile device. Also, in some embodiments, theresponders can request medical information that is pertinent to thevictim such as name, age, medical history, blood type, and other privateand/or HIPPA sensitive information about the victim.

Thus, prior to an emergency event, an end user can create a profile thatis stored in a database and made accessible to the server 1315. Theserver can link the profile of the end user to their emergency alertdevice by linking profile with an identifier for the Smartphone 1310such as a phone number, SIM card ID, NEI, MAC address, and so forth. Theemergency alert message can include identifying information for eitherthe Smartphone 1310 or the end user associated with the Smartphone 1310.

When a communication is alert message is received by the server 1315,the server 1315 determines a profile that is linked with the alertmessage (e.g., either from identifying the user or the alert device).The server 1315 obtains the requisite information from the user'sprofile and assembles that information into an alert response that canbe served via a web-based interface or transmitted to a responding partyin an SMS message or email.

FIG. 16 illustrates a flowchart of another method of the presenttechnology. The method generally comprises receiving 1605 an emergencyalert message from a alert device of the present technology. When analert message is received, the method includes generating 1610 a uniquemessage identifier. The identifier can be generated by the alert deviceor by the server.

During the emergency event, the alert device is obtaining event datasuch as video, audio, GPS location, and other available data. Thisinformation can be made accessible to a responder, along with anypre-generated data stored in the user's profile.

In some embodiments, the responder that is selected to respond to theemergency event includes a responder who is in closest proximity to theend user or the location where the emergency event is occurring. Thus,the method includes the server determining 1615 a responder who is inclosest proximity to the alert device and transmitting 1620 a request tothe responder that includes the unique message identifier.

The responder can utilize the identifier to obtain any event relateddata captured by the alert device or stored in the user's profile. Insome embodiments, the method comprises receiving 1625 the unique messageidentifier from a responder and providing 1630 event data captured bythe alert device or user information included in the user profile oraccount.

According to some embodiments, the mode of operation for the device canbe established after activation of the emergency alert device. Thus, theemergency alert and predetermined responses selected are not determineduntil the user depresses or otherwise activates the emergency alertdevice. Once a signal has been received from the emergency alert deviceby the mobile device (or other computing device communicatively linkedto the emergency alert device, the mobile device can perform a mode ofoperation analysis to determine a proper mode of analysis based on, forexample, location and time of day (as well as day of the week and othertime/date parameters). In one non-limiting example method, the mobiledevice detects actuation of an emergency alert device by a user. Forexample, activation of the emergency alert device causes a signal to besent from the emergency alert device to the mobile device indicatingthat an emergency event has occurred.

Next, the mobile device selects a mode of operation based on at leasttime and location parameters. To be sure, the time and locationparameters are matched to mode of operation parameters associated witheach mode of operation. Thus, the mobile device can maintain a list ofmodes of operation. A mode of operation can include mode of operationparameters that define the behaviors or functions (predeterminedresponse measures) that are executed by the mobile device thepredetermined response measures are activated or executed on the mobiledevice.

The mode of operation parameters can include time or location values, orranges of these values. For example, a time parameter could include bothtime and date such as Monday-Friday, 8 am to 4 pm. A location parametercould include a set of GPS coordinates or a virtual geographicalboundary defined by a plurality of location points.

In one embodiment, a mode of operation can be selected merely by use ofa time of day. By example, the mobile device determines that a time ofday is 2 am. When the user engages their emergency alert device at 2 am,the mobile device can immediately select a stealth mode of operation.Any mode of operation matching the time parameters can be selected foruse. In some embodiments, the user can be presented with options ofmodes of operation when more than one mode is available based on thetime parameters.

In some embodiments, location information can be used. For example, ifthe mobile device is engaged by the emergency alert activator in theuser's home (defined by certain GPS coordinates), a home mode ofoperation can be selected. The home mode of operation can include themobile device turning on all (or a portion) of its I/O devices such as amicrophone and camera.

In yet other embodiments, the mobile device can use both time (as wellas date/day) and location parameters to select a mode of operation. Aswith examples above, the mobile device can determine that the user is ina parking lot of a shopping mall during operating hours. The presence ofthe user in the parking lot during operating hours can indicate that theuser is being robbed or assaulted in the parking lot. The mode ofoperation selected would conform to the time and location parametersdiscovered by the mobile device.

In some embodiments, the mobile device can use location parameters thatare not strictly GPS coordinates, but the mobile device can implementlogic or heuristics that allow for deduction or inference as to theuser's circumstances. For example, the mobile device can determine thatthe user is within 100 yards of a shopping mall and infers that the useris either in a parking lot of the shopping mall or is on a streetadjacent to the shopping mall.

According to some embodiments, the mobile device can engage the mode ofoperation. Again, the mode of operation includes a predeterminedresponse measure that is activated and can include at least one ofobtaining content through I/O devices of the mobile device and causingoutput devices to broadcast an emergency alert.

For example, the mobile device can receive images, video, and audiocontent as one predetermined response measure. In another example, themobile device can receive images, video, and audio content as onepredetermined response measure, as well as activating LEDs and/or aspeakerphone of the mobile device to broadcast an emergency signal.

In some embodiments, the present technology can utilize steps of othermethods described herein such as activating communication sessions withcontacts or transmitting alert messages to the contacts.

According to some embodiments, the method can be executed entirely bythe emergency alert activator when the emergency alert activator isprovisioned with processing components and functionalities, as well aslocation and communication modules.

Referring now to FIG. 17, another example embodiment of an emergencyalert activator includes an emergency alert activator 1705 that isselectively attachable to a user via, for example, a helmet 1710. Inthis embodiment, the emergency alert activator 1705 can incorporate oneor more motion sensing elements 1715, such as the motion module 215 ofFIG. 2. Rather than requiring the user to depress a button or otherwisemanually actuate the emergency alert activator, the one or more motionsensing elements 1715 can sense rapid changes in speed, direction,orientation, acceleration and so forth, which are indicative of anemergency even such as a fall or impact. In some embodiments, theemergency alert activator 1705 can include a processor that isconfigured to receive these motion signals and determine if a thresholdexceeding event has occurred, which would be indicative of an emergency.For example, the processor can determine that a negative accelerationthat exceeds a negative acceleration threshold has occurred. In anotherexample, the processor can receive motion signals and determine that animpact has occurred.

In response to a threshold exceeding event, the emergency alertactivator 1705 can cause the activation of a predetermined responsemeasure by the emergency alert activator or by a mobile device 1720 thatis communicatively coupled with the emergency alert activator over ashort range wireless connection. In some embodiments, either or both ofthe emergency alert activator 1705 and the mobile device 1720 cancommunicate with a server 1725 that can transmit alert message tocontacts or first responders. In other embodiments, the mobile device1720 can establish connections directly with the contacts.

Some of the above-described functions may be composed of instructionsthat are stored on storage media (e.g., computer-readable medium). Theinstructions may be retrieved and executed by the processor. Someexamples of storage media are memory devices, tapes, disks, and thelike. The instructions are operational when executed by the processor todirect the processor to operate in accord with the technology. Thoseskilled in the art are familiar with instructions, processor(s), andstorage media.

It is noteworthy that any hardware platform suitable for performing theprocessing described herein is suitable for use with the technology. Theterms “computer-readable storage medium” and “computer-readable storagemedia” as used herein refer to any medium or media that participate inproviding instructions to a CPU for execution. Such media can take manyforms, including, but not limited to, non-volatile media, volatile mediaand transmission media. Non-volatile media include, for example, opticalor magnetic disks, such as a fixed disk. Volatile media include dynamicmemory, such as system RAM. Transmission media include coaxial cables,copper wire and fiber optics, among others, including the wires thatcomprise one embodiment of a bus. Transmission media can also take theform of acoustic or light waves, such as those generated during radiofrequency (RF) and infrared (IR) data communications. Common forms ofcomputer-readable media include, for example, a floppy disk, a flexibledisk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROMdisk, digital video disk (DVD), any other optical medium, any otherphysical medium with patterns of marks or holes, a RAM, a PROM, anEPROM, an EEPROM, a FLASHEPROM, any other memory chip or data exchangeadapter, a carrier wave, or any other medium from which a computer canread.

Various forms of computer-readable media may be involved in carrying oneor more sequences of one or more instructions to a CPU for execution. Abus carries the data to system RAM, from which a CPU retrieves andexecutes the instructions. The instructions received by system RAM canoptionally be stored on a fixed disk either before or after execution bya CPU.

Computer program code for carrying out operations for aspects of thepresent technology may be written in any combination of one or moreprogramming languages, including an object oriented programming languagesuch as Java, Smalltalk, C++ or the like and conventional proceduralprogramming languages, such as the “C” programming language or similarprogramming languages. The program code may execute entirely on theuser's computer, partly on the user's computer, as a stand-alonesoftware package, partly on the user's computer and partly on a remotecomputer or entirely on the remote computer or server. In the latterscenario, the remote computer may be connected to the user's computerthrough any type of network, including a local area network (LAN) or awide area network (WAN), or the connection may be made to an externalcomputer (for example, through the Internet using an Internet ServiceProvider).

The corresponding structures, materials, acts, and equivalents of allmeans or step plus function elements in the claims below are intended toinclude any structure, material, or act for performing the function incombination with other claimed elements as specifically claimed. Thedescription of the present technology has been presented for purposes ofillustration and description, but is not intended to be exhaustive orlimited to the invention in the form disclosed. Many modifications andvariations will be apparent to those of ordinary skill in the artwithout departing from the scope and spirit of the invention. Exemplaryembodiments were chosen and described in order to best explain theprinciples of the present technology and its practical application, andto enable others of ordinary skill in the art to understand theinvention for various embodiments with various modifications as aresuited to the particular use contemplated.

Aspects of the present technology are described above with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems) and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer program instructions. These computer program instructions maybe provided to a processor of a general purpose computer, specialpurpose computer, or other programmable data processing apparatus toproduce a machine, such that the instructions, which execute via theprocessor of the computer or other programmable data processingapparatus, create means for implementing the functions/acts specified inthe flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in a computerreadable medium that can direct a computer, other programmable dataprocessing apparatus, or other devices to function in a particularmanner, such that the instructions stored in the computer readablemedium produce an article of manufacture including instructions whichimplement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer,other programmable data processing apparatus, or other devices to causea series of operational steps to be performed on the computer, otherprogrammable apparatus or other devices to produce a computerimplemented process such that the instructions which execute on thecomputer or other programmable apparatus provide processes forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods and computer program products according to variousembodiments of the present technology. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof code, which comprises one or more executable instructions forimplementing the specified logical function(s). It should also be notedthat, in some alternative implementations, the functions noted in theblock may occur out of the order noted in the figures. For example, twoblocks shown in succession may, in fact, be executed substantiallyconcurrently, or the blocks may sometimes be executed in the reverseorder, depending upon the functionality involved. It will also be notedthat each block of the block diagrams and/or flowchart illustration, andcombinations of blocks in the block diagrams and/or flowchartillustration, can be implemented by special purpose hardware-basedsystems that perform the specified functions or acts, or combinations ofspecial purpose hardware and computer instructions.

While various embodiments have been described above, it should beunderstood that they have been presented by way of example only, and notlimitation. The descriptions are not intended to limit the scope of thetechnology to the particular forms set forth herein. Thus, the breadthand scope of a preferred embodiment should not be limited by any of theabove-described exemplary embodiments. It should be understood that theabove description is illustrative and not restrictive. To the contrary,the present descriptions are intended to cover such alternatives,modifications, and equivalents as may be included within the spirit andscope of the technology as defined by the appended claims and otherwiseappreciated by one of ordinary skill in the art. The scope of thetechnology should, therefore, be determined not with reference to theabove description, but instead should be determined with reference tothe appended claims along with their full scope of equivalents

What is claimed is:
 1. A method for activating a response measure on anelectronic device, the electronic device comprising a processor and amemory for storing logic, the processor executing the logic to performthe method comprising: capturing biometric data from one or morebiometric sensors associated with a user; detecting an emergency eventbased on an analysis of biometric data; activating a predeterminedresponse measure on an electronic device, wherein the predeterminedresponse includes at least obtaining video, audio, image or locationdata by the electronic device; and transmitting an alert request to aresponding party the video, audio, image or location data obtained bythe electronic device.
 2. The method according to claim 1, furthercomprising: generating a unique identifier upon actuation of theemergency alert device; transmitting the unique identifier to aresponding party; receiving the unique identifier from the respondingparty; and providing the responding party with the video, audio, imageor location data obtained by the electronic device.