Methods, systems, and devices for generating a unique electronic communications account based on a physical address and applications thereof

ABSTRACT

A unique electronic communications account is generated and linked to a physical address of a user. A network of electronic mail addresses linked to physical addresses can be used for the transmission of information in electronic or physical form. Users can send information to a single recipient or multiple recipients by selecting the recipient or an area of recipients on a map generated by the system. A plurality of users can use a single e-mail address linked to a physical address through creation and storage of user profiles. Users can deactivate and transfer their unique electronic mail address upon relocation to a new physical address. The communication platform can overcome technical problems and limitations of electronic mail existing today. The communication platform can create a transparent global communication that can be achieved via an electronic communications account that can be created for every physical address in the world.

CROSS REFERENCE TO RELATED APPLICATIONS

The present application is a continuation application of U.S. patentapplication Ser. No. 15/603,204, filed on May 23, 2017, and entitledMETHODS, SYSTEMS, AND DEVICES FOR GENERATING A UNIQUE ELECTRONICCOMMUNICATIONS ACCOUNT BASED ON A PHYSICAL ADDRESS AND APPLICATIONSTHEREOF, which claims the benefit under 35 U.S.C. 119(c) to U.S.Provisional Patent Application No. 62/341,551, filed on May 25, 2016,and titled METHODS, SYSTEMS, AND DEVICES FOR GENERATING A UNIQUEELECTRONIC ADDRESS BASED ON A PHYSICAL ADDRESS AND APPLICATIONS THEREOF,U.S. Provisional Patent Application No. 62/361,291, filed Jul. 12, 2016,and titled METHODS, SYSTEMS, AND DEVICES FOR GENERATING A UNIQUEELECTRONIC MAILING ADDRESS BASED ON A PHYSICAL ADDRESS AND APPLICATIONSTHEREOF, all of which are hereby incorporated by reference in itsentirety for all purposes.

BACKGROUND Field

The embodiments disclosed herein generally relate to systems and methodsfor providing and/or improving an electronic communications network andmore particularly to generating, managing, communicating, and using anelectronic communications account, which can include an electronicaddresses associated with physical civic addresses across the globe.

SUMMARY

Various embodiments described herein solve the problems of communicatingvia personal electronic mail by allowing a user to generate anelectronic communications account, which can include an e-mail addressand/or other electronic communications account, linked to a physicaladdress.

In some embodiments, an e-mail address can be generated when a userinputs his/her physical location into the system. The format of theinputted physical location can be a physical address or geographiccoordinates. The inputted information can be used to derive a location.For example, the inputted information can indicate a building orlandmark. The inputted information can be directed to a database thatstored previously visited locations. Using the inputted information, thesystem can be configured to locate the corresponding physical addressand generate an e-mail address.

Various embodiments described herein allow users to utilize the systemto have greater control over the sources from which they receiveinformation, as well as the type of information received.

Various embodiments described herein address issues with current e-mailcommunication and improve upon the capabilities of e-mail as aninformation transmission medium particularly adding transparency of userand reducing spam as well as delivery of letter mail via the systemsdescribed herein.

Finally, various embodiments described herein use the system to enhancethe ability of government, commercial, and other private entities tohave access to target audiences and for those target audiences torespond or initiate communications with those entities.

Some embodiments include a computer-implemented method for generating anelectronic communications account based on latitude and longitude andgeo coding associated with a location of a user device. In someembodiments, the method comprises receiving, by a computer system, arequest to generate the electronic communications account andauthorization to access location services; accessing, by the computersystem, data related to the location of the user device, wherein thelocation of the user device is determined by: receiving data from aplurality of transmitters; triangulating a location based on thereceived data from the plurality of transmitters; and identifying alatitude and longitude for the location; determining, by the computersystem, whether the location of the user device is associated with anelectronic communications account; in response to determining that thelocation of the user device is associated with an already existingelectronic communications account: sending, by the computer system, anelectronic message to the electronic communications account, wherein theelectronic message to the electronic communications account indicatesthat the user device is attempting to generate the electroniccommunications account; and in response to determining that the locationof the user device is not associated with the already existingelectronic communications account: automatically generating, by thecomputer system, the electronic communications account for the locationof the user device; associating, by the computer system, the latitudeand longitude for the location to the electronic communications account;and transmitting, by the computer system, data associated with theelectronic communications account to the user device, wherein thecomputer system comprises a computer processor and an electronic storagemedium.

In some embodiments, the transmitters include at least one of: asatellite, a Wi-fi base station, mobile Wi-fi base or a cellular basestation.

In some embodiments, the method further comprises: transmitting, by thecomputer system, a request for identification verification informationassociated with an identification document; receiving, by the computersystem, the identification verification information associated with anidentification document; and verifying, by the computer system, whetherthe identification verification information associated with anidentification document is sufficient to authenticate the user device.

In some embodiments, the automatically generated electroniccommunications account for the location of the user device includes anindication of the latitude and longitude of the location associated withthe user device.

In some embodiments, the method further comprises determining, by thecomputer system, whether the location of the user device is associatedwith a location of interest; and in response to determining that thelocation of the user device is associated with the location of interest,automatically generating, by the computer system, the electroniccommunications account, wherein the automatically generated electroniccommunications account is associated with the location of interest.

In some embodiments, the location of interest includes at least one of:a residence, a building, an infrastructure, or a vehicle.

In some embodiments, the method further comprises receiving, by thecomputer system, personal information of an individual independent ofthe individual associated with the user device; and associating, by thecomputer system, the electronic communications account with the personalinformation of the individual as a secondary individual.

In some embodiments, the method further comprises receiving, by thecomputer system, a selection to share the automatically generatedelectronic communications account to a computing device; andtransmitting, by the computer system, the electronic communicationsaccount to a computing device.

Some embodiments include a system for generating an electroniccommunications account based on a latitude and longitude associated witha location of a user device, wherein the system comprises: one or morecomputer readable storage devices configured to store a plurality ofcomputer executable instructions; and one or more hardware computerprocessors in communication with the one or more computer readablestorage devices and configured to execute the plurality of computerexecutable instructions in order to: receive, from a user device, arequest to generate an electronic communications account; access alocation of the user device, wherein the location of the user device isdetermined by triangulating a location based on received data from aplurality of transmitters; determine whether the user device is alreadyassociated with an already existing electronic communications account;in response to determining that the user device is already associatedwith the already existing electronic communications account: transmit,to a user device, a request identification verification information;receive identification verification information from the user device;determine whether the user device is verified based on theidentification verification information; in response to determining thatthe user device is verified based on the identification verificationinformation: automatically generate the electronic communicationsaccount for the location of the user device; associate the user deviceto the electronic communications account; and transmit the electroniccommunications account to the user device; in response to determiningthat the user device is not verified based on the identificationverification information: initiate a fraud verification procedure todetermine whether the request to generate the electronic communicationsaccount is a fraudulent request; and in response to determining that theuser device is already not associated with the already existingelectronic communications account: automatically generate the electroniccommunications account for the location of the user device; associatethe user device to the electronic communications account; and transmitthe electronic communications account to the user device.

In some embodiments, in response to determining that the user device isverified based on the identification verification information, theprocessor is further configured to: transmit, to the user device, arequest to select whether the user device is to be associated with thealready associated electronic communications account or to the generatedelectronic communications account for the location of the user device;receive, from the user device, a selection of the electroniccommunications account to be associated with the user device; andassociate the user device with the selected electronic communicationsaccount.

In some embodiments, the automatically generated electroniccommunications account for the location of the user device includes anindication of the location associated with the user device.

In some embodiments, the processor is further configured to: determinewhether the location of the user device is associated with a location ofinterest; and in response to determining that the location of the userdevice is associated with the location of interest, identify theelectronic communications account associated with the location ofinterest and transmit the electronic communications account to the userdevice.

In some embodiments, the processor is further configured to: receive,from the user device, personal information of an individual; andassociate the electronic communications account with the personalinformation of an individual as a secondary individual.

In some embodiments, the processor is further configured to: receive,from the user device, a selection to share the automatically generatedelectronic communications account to a computing device; and transmitthe electronic communications account to a computing device.

In some embodiments, automatically generating the electroniccommunications account includes identifying a channel of communicationfor the electronic communications account, the channel of communicationincluding at least one of: an email address, an SMS message, orexecutable code to initiate an alert on the user device.

Some embodiments include a computer-implemented method for transmittingan alert to electronic communications account associated with aparticular area, wherein the method comprises: receiving, by a computersystem, content for the alert to send to electronic communicationsaccount associated with the area; accessing, by the computer system, aselection of an area where alerts are to be sent; identifying, by thecomputer system, one or more electronic communications accountsassociated with the selected area; identifying, by the computer system,a channel of communication for the one or more electronic communicationsaccounts associated with the selected area; and transmitting, by thecomputer system, the alert to the one or more electronic communicationsaccounts associated with the selected area, wherein the computer systemcomprises a computer processor and an electronic storage medium.

In some embodiments, the method further comprises: identifying, by thecomputer system, a location of the one or more electronic communicationsaccounts associated with the selected area; and transmitting, by thecomputer system, the location of the one or more electroniccommunications accounts associated with the selected area to bedisplayed on a map within the area.

In some embodiments, the method further comprises: receiving, by thecomputer system, a selection of a characteristic of one or moreelectronic communications accounts; accessing, by the computer system,the one or more electronic communications accounts associated with theselected area that include the received selection of the characteristic;and transmitting, by the computer system, the alert to the one or moreelectronic communications accounts that include the receivedcharacteristic.

In some embodiments, the received characteristic includes at least oneof: a percentage of individuals, demographic data, sex, race, economicstatus, age, level of education, income level, employment, psychiatricdata, medical data, a personality trait, an interest, values, attitudes,lifestyles, opinions, preferences, likes, dislikes, predilections,purchase history, browser history, financial history, financial data,credit history, credit data, or personal information.

In some embodiments, accessing a selection of an area where alerts areto be sent comprises automatically determining, by the computer system,the at least a portion of the boundaries of the selection of an area.

For purposes of this summary, certain aspects, advantages, and novelfeatures of the invention are described herein. It is to be understoodthat not necessarily all such advantages may be achieved in accordancewith any particular embodiment of the invention. Thus, for example,those skilled in the art will recognize that the invention may beembodied or carried out in a manner that achieves one advantage or groupof advantages as taught herein without necessarily achieving otheradvantages as may be taught or suggested herein.

All of these embodiments are intended to be within the scope of theinvention herein disclosed. These and other embodiments will becomereadily apparent to those skilled in the art from the following detaileddescription having reference to the attached figures, the invention notbeing limited to any particular disclosed embodiment(s).

BRIEF DESCRIPTION OF THE DRAWINGS

A better understanding of the devices and methods described herein willbe appreciated upon reference to the following description inconjunction with the accompanying drawings.

FIG. 1 is an embodiment of a schematic diagram illustrating anembodiment of an electronic communications account generation andmanagement system.

FIG. 2 is a block diagram depicting an embodiment of a computer hardwaresystem configured to run software for implementing one or moreembodiments of an electronic communications account generation andmanagement system.

FIG. 3A is a flowchart depicting an embodiment of a method forgenerating an electronic communications account address linked to aphysical address.

FIG. 3B is a diagram depicting an embodiment of a method fortriangulating a physical location.

FIG. 3C is a diagram depicting an embodiment of a method fortriangulating a physical location.

FIG. 4 is a flowchart depicting an embodiment of a method for generatingan electronic communications account address linked to a physicaladdress

FIG. 5A is a flowchart depicting an embodiment of a method forgenerating an electronic communications account address linked to aphysical address, and verifying whether an electronic communicationsaccount address has already been linked to that physical address.

FIG. 5B is a flowchart depicting an embodiment of a method for updatinga physical address of an individual.

FIG. 6A is a diagram illustrating the correlation between a plurality ofcoordinates and a plurality of physical addresses.

FIG. 6B is a flowchart depicting an embodiment of a method forassociating coordinates with a physical mailing addresses.

FIG. 6C is a flowchart depicting an embodiment of a method forgenerating an electronic communications account based on a location on amap.

FIG. 6D is a diagram depicting an embodiment of a graphical userinterface using the geolocation of a user device and generating a map.

FIG. 6E is a diagram depicting an embodiment of a graphical userinterface of a location of interest that the user placed on the map.

FIG. 6F is a diagram depicting an embodiment of a graphical userinterface of an option to mark the current location of the user andcreate an electronic communications account.

FIG. 7 is a flowchart depicting an embodiment of a method for generatingan electronic communications account address linked to a physicaladdress, using a user-inputted location.

FIG. 8A is a flowchart depicting an embodiment of a method for verifyingthe physical address of a user.

FIG. 8B is a diagram depicting an embodiment of a graphical userinterface for entering in users associated with an electroniccommunications account.

FIG. 9 is a flowchart depicting an embodiment of a method for generatinga plurality of user profiles associated with a single electroniccommunications account address linked to a physical address.

FIG. 10A is a flowchart depicting an embodiment of a method forreceiving messages based on user-preferences.

FIG. 10B is a flowchart depicting an embodiment of a method for handlingmessages for a group of individuals.

FIG. 11 is a flowchart depicting an embodiment of a method for sendingmessages via an electronic communications account linked to a physicallocation.

FIG. 12 is a flowchart depicting an embodiment of a method for sendingmessages via and electronic communications account linked to a physicallocation.

FIG. 13A is a flowchart depicting an embodiment of a method for sendingmessages to all users within a sending user's specified areas via anelectronic communications account linked to a physical address.

FIG. 13B is a diagram depicting an embodiment of a method forautomatically selecting areas of interest for notification.

FIG. 13C is a diagram depicting an embodiment of a method forautomatically determining radiuses for the areas of interest.

FIG. 14 is a flowchart depicting an embodiment of a method for sendingmessages related to infrastructure management via an electroniccommunications account linked to a physical address.

FIG. 15A is a flowchart depicting an embodiment of a method forcollecting and sending resident information to recipients via anelectronic communications account linked to a physical address.

FIG. 15B illustrates a diagram depicting an embodiment of electroniccommunications accounts associated with an area affected by a flood.

FIG. 16 is a flowchart depicting an embodiment of a method for sendingmessages to residents via an electronic communications account linked toa physical address.

FIG. 17A is a flowchart depicting an embodiment of a method fordetermining the primary residence of a user.

FIG. 17B illustrates a diagram depicting an embodiment of the use of anelectronic communications account to track displacement of people.

FIG. 17C illustrates a diagram depicting an embodiment of a graphicaluser interface of a dashboard for the sign-in page by First Responder.

FIG. 17D illustrates a diagram depicting an embodiment of creating a newaccount by an Emergency Preparedness team member.

FIG. 17E illustrates an embodiment of how a first responder can send amessage to a particular area.

FIG. 17F illustrates an embodiment of a graphical user interface where afirst responder can select an option to send a message.

FIG. 17G illustrates an embodiment of a graphical user interface where afirst responder has drawn an area on a map.

FIG. 17H illustrates a flowchart depicting an embodiment of a method fora first responder sending a message to an electronic communicationsaccount.

FIG. 17I illustrates an embodiment of electronic communications accountssigned-in and located within the area on a map drawn by the firstresponders.

FIG. 17J illustrates an embodiment where the first responders select asubset of electronic communications accounts signed-in and locatedwithin an area on a map by drawing a boundary around the subset ofelectronic communications accounts and an example of an Alert to besent.

FIG. 17K is a diagram depicting an embodiment of a graphical userinterface of the messages sent to individuals associated with theelectronic communications account.

FIG. 17L illustrates a diagram depicting an embodiment whereby inresponse to a user clicking the “I need help” option, further optionscan be displayed.

FIG. 17M illustrates a graphical user interface depicting an embodimentwhere a specific help request is sent to a first responder based on aneed.

FIG. 17N illustrates a graphical user interface depicting an embodimentof a text box that can be used to enter in text to send to firstresponders.

FIG. 17O illustrates a graphical user interface depicting an embodimentupon initiation by a first responder.

FIG. 17P illustrates a graphical user interface depicting an embodimentwhere messages have been sent and responses received.

FIG. 17Q illustrates an embodiment of change in status to “safe”reflecting in a change in the icon.

FIG. 17R illustrates an embodiment of change in status to “cleared”reflecting in a change in the icon.

FIG. 17S illustrates an embodiment of change in status to “cleared” asdiscussed throughout the graphical user interface.

FIG. 17T illustrates an embodiment of change in status to “cleared”based on a “no response” whereas two other electronic communicationsaccounts are changed to a “help” status.

FIG. 17U illustrates an embodiment of graphical user interface thatdepicts an embodiment of displaying detailed information of anelectronic communications account for the first responders.

FIG. 17V illustrates an embodiment of graphical user interface where oneindividual has a help response but is a test simulation.

FIG. 17W illustrates an embodiment of a graphical user interface ofmessages sent.

FIG. 17X illustrates a diagram depicting an embodiment of a parceldelivery process.

FIG. 18 is a diagram depicting an embodiment of different messages sentto different electronic communications accounts.

FIG. 19 is a diagram depicting an embodiment of characteristics used tofilter electronic communications accounts for targeted marketing.

FIG. 20A is a flowchart depicting an embodiment of a method for sendingan alert to electronic communications accounts associated with an area.

FIG. 20B is a diagram depicting an embodiment of a log-in screen for theelectronic communications system.

FIG. 20C is a diagram depicting an embodiment of an inbox of theelectronic communications system.

FIG. 20D is a diagram depicting an embodiment of a draft mail to be sentvia an electronic communications account.

FIG. 20E is a diagram depicting an embodiment of a map option forsending mail from an electronic communications account.

FIG. 20F is a diagram depicting an embodiment of a map providing theoption to add an address and/or location of interest to the addressbook.

FIG. 20G is a diagram depicting an embodiment of a draft mail to be sentto an electronic communications account.

FIG. 20H is a diagram depicting an embodiment of a sent mail to anelectronic communications account.

FIG. 20I is a diagram depicting an embodiment of selecting a channel ofcommunication.

FIG. 20J is a diagram depicting an embodiment of electroniccommunications account verification to reduce spam and increasetransparency.

FIG. 20K is a diagram depicting an embodiment of a sent box for anelectronic communications account.

FIG. 20L is a diagram depicting an embodiment of an option to purchasemail credits.

FIG. 20M is a diagram depicting an embodiment of successfully purchasingmail credit.

FIG. 20N is a diagram depicting an embodiment of a reply mail wherebythe original email indicates the electronic communications account.

FIG. 20O is a diagram depicting another embodiment of a reply mailindicating the electronic communications account of the original sender.

FIG. 20P is a diagram depicting an embodiment of drafting a responsereply email.

FIG. 20Q is a diagram depicting another embodiment of drafting aresponse reply email.

FIG. 21 is a diagram depicting an embodiment of statuses between a useraccess point system and a first responder access point system.

FIG. 22 is a diagram depicting an embodiment of an algorithm forinferring the status of an electronic communications account.

FIG. 23 is a diagram depicting an embodiment of prioritizing firstresponder resources.

FIG. 24A is a flow diagram depicting an embodiment of an entityinitiating a marketing campaign.

FIG. 24B is a diagram depicting an embodiment of a front page of awebsite for the electronic communications system.

FIG. 24C is a diagram depicting an embodiment of a login page for theelectronic communications system.

FIG. 24D is a diagram depicting an embodiment of mail credits needed forinitiating a marketing campaign.

FIG. 24E is a diagram depicting an embodiment of an option to view a mapfor the marketing campaign.

FIG. 24F is a diagram depicting an embodiment of a map view with areasof selection for the marketing campaign.

FIG. 24G is a diagram depicting an embodiment of an area selected by theuser on a map.

FIG. 24H is a diagram depicting an embodiment of criteria that can beused to filter electronic communications accounts within a selectedarea.

FIG. 24I is a diagram depicting an embodiment of additional criteriathat can be used change the marketing campaign.

FIG. 24J is a diagram depicting an embodiment of criteria that can beassociated with an electronic communications account.

FIG. 24K is a diagram depicting an embodiment a marketing campaigndirected to a group of electronic communications accounts.

FIG. 24L is a diagram depicting an embodiment several marketing campaignmessages.

FIG. 25A is a flow diagram depicting an embodiment of a visitorinteracting with a local first responder.

FIG. 25B is a flow diagram depicting an embodiment of a visitorinteracting with a local vendors.

FIG. 25C is a flow diagram depicting an embodiment of a visitor settingup an itinerary.

FIG. 25D is a diagram depicting an embodiment of an itinerary with adeparture and return date for a particular location.

FIG. 25E is a diagram depicting an embodiment of an itinerary formultiple departure and return dates.

FIG. 25F is a diagram depicting an embodiment of an itinerary set forsending first responders alerts while on vacation.

FIG. 26A is a diagram depicting an embodiment of an example registrationdatabases that the electronic communications account can be associatedwith.

FIG. 26B is a diagram depicting an embodiment of an electroniccommunications account associated with a population registry.

FIG. 26C is a diagram depicting an embodiment of an graphical userinterface for two fire hydrants associated with respective electroniccommunications accounts.

FIG. 26D is a diagram depicting an embodiment of parking spacesassociated with electronic communications accounts.

FIG. 26E is a diagram depicting an embodiment of a graphical userinterface for two fire hydrants associated with respective electroniccommunications accounts.

DETAILED DESCRIPTION

Although several embodiments, examples, and illustrations are disclosedbelow, it will be understood by those of ordinary skill in the art thatthe inventions described herein extend beyond the specifically disclosedembodiments, examples, and illustrations and includes other uses of theinventions and obvious modifications and equivalents thereof.Embodiments of the inventions are described with reference to theaccompanying figures, wherein like numerals refer to like elementsthroughout. The terminology used in the description presented herein isnot intended to be interpreted in any limited or restrictive mannersimply because it is being used in conjunction with a detaileddescription of certain specific embodiments of the inventions. Inaddition, embodiments of the inventions can comprise several novelfeatures and no single feature is solely responsible for its desirableattributes or is essential to practicing the inventions hereindescribed.

Various embodiments described herein address one or more shortcomings ofcommunicating via personal electronic mail and physical mailingaddresses by providing users with e-mail addresses linked to theirphysical address. An electronic inbox can also be created for theelectronic communications account based on user preference and/or linkedto a current email address.

In some embodiments, the communication platform identified and describedthroughout this enclosure including a response mechanism and analysis ofdata is a unique system that overcomes technical problems of electronicmail existing today. In some embodiments, the communication platformcreates new opportunities of transparent global communication that canbe achieved via an electronic communications account that can be createdfor every physical address in the world.

In some embodiments, each electronic communications account is unique,being tied to a specific physical civic address, and the systemsdisclosed herein can generate the unique and specific electroniccommunications account based on the physical civic addresses of allstructures that have an address, such as, residential homes, apartments,condominiums and businesses (for example commercial property, industrialproperty, vacant lots), among others. These electronic communicationsaccounts can remain the same unless the property is demolished and/orbecomes non-existent. The systems disclosed herein can also create emailaddresses for any street furniture as deemed necessary by its owner suchas hydro transmission sites, street lights, and so forth. Where aphysical civic address is non-existent, for example in rural and remoteareas of the world, a generic electronic communications account can becreated based on the geographic name of the location, such as thevillage or hamlet.

Geocode can be tied to an eAddress (or an electronic communicationsaccount), such as an email address or can include an email address.Geocode can include location information (such as latitude and longitudeinformation) to ensure that the electronic communications account issite-specific. For example, the electronic communications account can benamed Lati43.7901_Long-79.3606@alphc.com In some embodiments, tyinggeocode to an electronic communications account ensures that theelectronic communications account is unique to that specific site,location, or address. In some embodiments, tying geocode to anelectronic communications account ensures that the electroniccommunications account is unique to the individual working at thespecific site, residing at the specific site, and/or otherwise locatedat the specific site. Geocoding can be used for temporary purposes. Forexample, geocoding can be used in a rural area where an address does notexist, where a location address is difficult to get to, a location thatis unknown to a tourist, or when a client requesting pick-up from a taxidriver in Kenya (no address) and other similar situations. Using geocoding based on latitude and longitude can be used to pin point a user'slocation for temporary use. This can be converted into an email, linkedto an email, or a telephone number, and be associated with a user'sbearing to easily locate the user. In an example, an Uber driver inIndia can determine a location within 10-20 feet of the pick-up place.

In some embodiments, tying geocode to a particular electroniccommunications account can require a verification process that preventsothers from generating such geocode and electronic communicationsaccount mapping, such as for fraudulent purposes. Unlike traditionalemail that can be created at will, the verification process can includean assessment of factors such as identification documents, data from GPSdevices, verification from other authorized users, verification from acomputing device (for example a mobile device), and the like.

In some embodiments, when the geolocation is tied with the electroniccommunications account, the system automatically generates theelectronic communications account such that the electroniccommunications account is unique to the particular location. Forexample, the electronic communications account can be generated and/orpredetermined based on global coordinates. This allows for transparencybetween the sender of the information through the electroniccommunications account, a characteristic that is absent from traditionalemails. This can prevent fraudulent and deceptive messages sent by anelectronic communications account.

Postal services provide mail delivery and related services to thepublic. These services operate by utilizing physical addresses toidentify the location of the sender and recipient of physical mail.However, physical mail delivery has become inefficient, cumbersome,expensive, and slow relative to electronic communications channels thathave developed in recent years. Electronic delivery of mail provides afaster, more convenient, and environmentally conscience method oftransmitting information.

Electronic mail, or e-mail, is one such electronic communicationchannel, which allows users to generate a unique electronic addressthrough which they can send and receive mail. These electronic addressesbecome associated with their owner and can be used to transmitinformation almost instantly across the globe, at very low cost.

The advantages of e-mail are numerous. Sending an e-mail is extremelysimple, and requires only basic training to learn. Delivery is almostinstantaneous, as recipients usually receive e-mails a few seconds afterthey are sent. Furthermore, no person must be present to receive e-mail,and they can be sent at any time of day, on any day of the week. Thecontent of e-mails can include text, images, and other files included asattachments. Copies of a message can be sent to a group of peopleconcurrently and carbon copies can be sent to any interested parties.Senders can request proof of receipt of an email being opened. E-mailmessages can be prepared in advance and saved until the sender is readyto send them. Finally, messages can be encrypted to ensure the safedelivery of confidential information.

Despite these advantages, there are significant drawbacks to the e-mailsystem that limit its value as an information transfer medium.Delivering an e-mail to another person requires the sender to know thee-mail address of the recipient. Without this address, no message can besent. E-mail addresses are often changed frequently, as a result ofpeople switching jobs or changing their internet service providers.

Additionally, e-mail's low cost and ease of use allow it to be used as ameans of transferring unsolicited messages and malicious software tounsuspecting recipients. Electronic spamming, the use of electronicmessaging systems to send unsolicited messages, afflicts the operationof e-mail as a private medium of communication. Advertisers that gainknowledge of a user's e-mail address can repeatedly send unwantedmessages to that user at low cost and with little risk of punishment.This reduces the effectiveness of e-mail communication by greatlyincreasing the volume of incoming e-mails, making it difficult for theuser to locate important messages.

Often, when creating an e-mail account through an e-mail serviceprovider, a user must enter some combination of his/her first and lastname, phone number, and/or date of birth. This user information is thenstored by the e-mail service provider for verification and recoverypurposes. The measure of safety and security of this user information isa significant concern for e-mail users. Should the e-mail serviceprovider's security be compromised, the user information could beaccessed and used in any number of undesirable ways.

Traditionally, if a receiver of an email wishes to contact the sender,under traditional processes, the receiver would have to rely onrequesting the sender contact information or can have to use complicatednetwork technology to simply retrieve an IP address of the sender, letalone contact information. Furthermore, if an individual wants tocontact a person or a company at a particular location, the individualwould traditionally have to contact the city government to find aproperty owner.

Therefore, a system exploiting the speed, convenience, and efficiency ofe-mail, but eliminating its shortcomings as a communication medium, iscritical to the advancement of electronic communication globally. Usingone's physical civic address as a form of electronic communication canbe a critical missing link for all communications and has manyadvantages that person email accounts do not provide.

In some embodiments, the electronic communications system is tied withthe physical location, and the sender can be easily located (for examplefor the purposes of responding to emergencies). The electroniccommunications system can effortlessly allow a user to identify anindividual's contact information by finding the electroniccommunications account associated with the physical location.

In some embodiments, the system provides users the ability to sendmessages to any physical location around the world using the electroniccommunications account. For example, if a user desires to contact abuilding property manager or superintendent or security, the individualcan look up the address of the building. The system can provide a listof electronic communications accounts, categories (for example apartment1 electronic communications account, apartment 2 electroniccommunications account, property manager, superintendent, concierge,security), groupings of individuals, or the like for the user to select.The user can then send a message to the electronic communicationsaccount of the individual associated with the electronic communicationsaccount, name, category, etc. Hence, the person's personal email is notrequired to make contact. For example, Manager_125Kingstreet_W._Toronto_On_Canada@alphc.com would be received by the manageron at the location john.smith@propertymanagement.com.

While e-mail provides a convenient way to instantaneously communicatewith others, a major shortcoming is that one needs to know the e-mailaddress of the recipient in order send an e-mail. Without personallyasking or otherwise obtaining the recipient's e-mail address, it isimpossible to send an e-mail to that recipient. Furthermore, personale-mail addresses are changed frequently, which can cause importantinformation to be sent to the incorrect address. E-mail addresses arevulnerable to unsolicited and malicious messages and attachments, andoften require a litany of personal identification information to create.As a result, e-mail addresses can expose users to significant risks,including identity theft, computer viruses, and credit card fraud.

Currently a person can create email accounts in a few clicks of a buttonand/or without much restraint. Accordingly, email is a frequently usedmeans of communication for fraud and other malicious use. A person canhave multiple email accounts, alternating between the accounts as neededto commit internet related fraud anonymously. The cost to internetservice providers for providing easily accessible email accounts is veryhigh (for example storage place, spam, fraud detection). To maintain acompetitive edge, the products and services offered related to emailaccounts create an open environment for fraudulent activity.

An electronic communications account generated based on geo coding isunique and can share similar characteristics as a finger-print. Ageolocation, like a fingerprint, cannot easily be duplicated as it isautomatically generated based on your location. This form of accountgeneration reduces fraud due to its requirements for setting up anaccount as well as verification which can be sent to a cell phone toauthenticate the user.

For the shortcomings of e-mail discussed above, traditional postalservices and physical mailing addresses are still being used in thisInternet age. More specifically, an individual can send a message to arecipient via traditional postal services with knowledge of the physicalmailing address of the recipient. However, traditional postal servicescannot be used to send to a marker on a map, an individual's otherpersonal information (e.g. phone number or name), an unidentifiedphysical address, a building name, and the like. Still, communicationthrough physical mail is slow, unsecure and unreliable compared toelectronic communication channels.

In order to address the shortcomings of e-mail and physical maildelivery, the embodiments described herein provide systems, methods, anddevices for electronic communication via e-mail addresses that areuniquely tied to each user's physical mailing address. As used herein,“eAddress” can refer to an e-mail address that is uniquely generated,tied and/or related to a particular physical civic address and/orphysical mailing address, or an electronic communications account. Insome embodiments, the electronic communications account includes theeAddress. In some embodiments, the eAddress includes the electroniccommunications account. eAddresses have a number of unique advantagesand applications that improve on traditional e-mail and physical mailaddresses. Some embodiments of the present disclosure generate a uniqueemail address, eAddress, and/or electronic communications account foreach address in the world. Where an address does not exist in a certainarea of the world, an electronic communications account can be createdbased on geo-coding and using latitude and longitude coordinates. Thegeo-coded addresses in the electronic communications account can beassociated with a Lot number, Plot number and/or designated marker(s)based on country usage. For example, Lati43.7901_Long-79.3606@alphc.comcan be tied to Lot and/or Plot No. and designated marker(s) for thecountry. The electronic communications system can generate a globalcommunication network linking existing electronic addresses to geo-codedaddresses across the world to provide a transparent communicationplatform.

Upon generation of an e-mail address linked to a user's physicaladdress, the user can use the system as a global communication network.Any user can send an e-mail to an e-mail address associated with aphysical address with or without the personal information of theresidents of that address. Thus, the system can replace traditional maildelivery and e-mail for many types of messages.

In some embodiments, physical and/or electronic documents can bedelivered based on the location (for example an address) and not basedon individuals residing at a particular location. For example, mailcontaining coupons can be delivered to all apartment units in aparticular area based on the physical address of the units. In someembodiments, the mail can be delivered based on the electroniccommunications account. For example, the physical address can be used todetermine the electronic communications account of units in a particulararea. Then, the mail can be sent electronically to all eAddressesassociated with a particular area. This functionality of sendingelectronic messages (for example email) to a particular physical area islacking in traditional email technology.

In some embodiments, a user can use an electronic communications accountto mail a package without knowing the physical address of a personand/or via other information (e.g. a phone number tied to an electroniccommunications account) where traditional post offices would not be ableby using electronic communications accounts. For example, mail that isimproperly addressed cannot be delivered in traditional post officesystems. However, the sender can include other information that thesystem can use to identify an electronic communications account whichcan be used to mail the parcel. For example, the system can identify anaddress via activated electronic communications account, via a name, ora phone number and or QR code specific created for each unique address.Furthermore, the system can alternatively store the mail and send amessage to the electronic communications account that a package can beavailable for pickup based on scanned data. This improves the deliverysystem and can provide live updates. This can reduce the need to track apackage as scanned data is available and sent at every point of thedelivery process where the parcel is scanned. For example, points ofscanning can include at the point of mailing, arrival at the postaldepot, arrival at the main hub, departure to an alternate hub, arrivalat the local postal office, scanned for delivery, and/or item delivery(drop or signed delivery). The system can also take a picture image atany point and send to sender based on user preference. Parcel deliverymethodology based of predictable delivery can be created automaticallybased on scanning, addresses for delivery, number of employees working,work load and the like.

The electronic communications system can also enable the ability toemail letter mail (for example first class mail) to any activatedeAddress in the world using the system. In some embodiments, the systemcan reduce, or eliminate, the need to buy stamps, envelopes, drive tothe mail box, and collecting mail on time, losing or delaying thedelivery of mail, waiting for the mail, spending extra cost on mailing,and the like. The system reduces waste (for example less use ofenvelopes, paper) and improves the environment.

In some embodiments, the electronic communications system replacesphysical addresses and/or eAddresses (for example email addresses orphone numbers) all together. Communication can be performed using theelectronic communications account linked to the physical geolocation. Insome embodiments, the sender's information (for example geolocation)linked to the electronic communications account is encrypted and/orhidden. Accordingly, sending messages via electronic communicationsaccounts can provide security protection for personal information. Thus,using the electronic communications system that protects personalinformation solves a security issue in electronic communicationtechnology.

In another embodiment, marketing material such as flyers and couponssent via postal services can be used to target a particular audiencebased on the mailers needs and/or to specific areas where the currentmail system does not permit. For example, the current mail system doesnot permit delivery of flyers to an Apartment (for example a buildingwith 500 Units) or a retail plaza (for example a plaza of 20 units). Therequired coverage can be based on all the Apartments in a particular zipcode (postal code). Hence the mailer wishing to target an address (500units) would end up paying for delivery to all apartments in the zipcode (3000 units). The mailer/user can hence target mailings based onpreferences of both parties targeted to the specific address(es).

Electronic Communications Account or E-Mail Generation and ManagementSystem

FIG. 1 is an embodiment of a schematic diagram illustrating anelectronic communications account generation and management system. Insome embodiments, a main server system 102 can be comprised of anelectronic communications account address generation module 104, abilling module 106, an authentication module 108, a web server 110, anelectronic communications account address database 112, a physicaladdress database 114, a user profile database 116, and/or an electronicmap database 118. The main server system can be connected to a network120. The network can be configured to connect the main server to anexternal electronic map database 122 and/or one or more user accesspoint systems 124.

The electronic communications account, eAddress, or e-mail addressgeneration module 104 can function by generating an electroniccommunications account upon input of a physical address. In someembodiments, the generated electronic communications account can have astandard form, which can comprise the user's street address, unitnumber, zip code, area code, city, state, county, geographicalcoordinates, and/or other indicators of location. The billing module 106can function by charging users for various provided services using anyavailable payment methods. The authentication module 108 can function byverifying the user's inputted physical address, determining if anothere-mail address has previously been generated for the user's inputtedphysical address, determining if the user's inputted address is his/herprimary residence, and/or otherwise verifying aspects of the user'sinputted information. The web server 110 can function to serve filesthat form web pages at the request of users. These web pages can providean interface for users to interact with the system, these interactionscomprising the generation, management, usage, deactivation, andtroubleshooting of the user's e-mail address.

The results of the verification process can be used to block unsolicitedmail that has not been verified. Using the electronic communicationsaccount, the sender's geolocation (for example address) can betransparent and can reduce fraud or misuse. This improves security forelectronic messages by preventing spamming and/or unwanted solicitation.

The verification process can be based on user input. For example,verification can be based on a code sent to a mobile device. In someembodiments, the user can be required to respond to the code (forexample enter it into a system to activate an electronic communicationsaccount).

In some embodiments, the individual can access a user interface andreview the verification process. The individual can identify portions ofthe verification process and assess the results. In some embodiments,the system can request further identification verification information(for example identification documents) to verify a user. In someembodiments, the individual can challenge a result in the verificationprocess (for example by submitting a request for the system to reassessan identification document that was interpreted incorrectly).

In some embodiments, the user can block messages coming from aparticular geolocation. For example, the user can block all messagescoming from a foreign country, a particular industry, a specificcompany, another individual residing at a location, and the like. Thisprovides a filter for messages that is unavailable in email today. Forexample, in traditional email systems, the real estate or car dealershipcan change email accounts or have different affiliates with differentnames and/or email addresses to contact an individual. However, anindividual using the electronic communications system can block all realestate or car dealers from contacting the user.

Processing of the electronic communications account (for example,identification of the electronic communications account) can beperformed by the electronic communications system. Accordingly, theelectronic communications system can perform the steps of processing,storing, generating, transmitting, and receiving on a remote serverinstead of performing such processing on the client device. As such,processing can be offloaded to a remote server, storage of thecomputations, results, and input needed for the results can be stored onthe server rather than on the client device, and the required throughputcan be reduced based (for example, the results can be sent instead ofall inputs needed to determine the result to the client device).

The electronic communications account, eAddress or e-mail addressdatabase 112 can provide a collection of all electronic addresses (forexample e-mail addresses) generated or identified by the system or asubset that collection. The physical address database 114 can provide acollection of all the physical addresses for which electroniccommunications account, eAddresses, or e-mail addresses have beengenerated and linked, a collection of all physical addresses in acertain area, a collection of all physical addresses on earth, and/or asubset of any of these collections. The user-profile database 116 canprovide a collection of all the user profiles associated with electroniccommunications account, eAddresses or e-mail addresses generated by thesystem, all the user profiles associated with electronic communicationsaccount, eAddresses or e-mail addresses generated and linked to physicaladdresses within a certain area, and/or a subset of either of thesecollections.

In some embodiments, the unique electronic communications account caninclude an indication of the sender such as a domain (for example@AlphC) or alphanumerical code (for example portions of an IP address).This can allow users to obtain rights to certain domains. This canenable communication receivers to identify certain information (forexample regarding the sender or content of the information).

The electronic map database 118 can provide a collection of maps thatthe system can retrieve, reference, and/or display on a user's screen orother display for use in the various embodiments. The network 120 canallow the main server system to exchange data with one or more externaldatabases and one or more user access points. The external electronicmap database 122 can provide a collection of maps, not stored within themain server system, that the system can retrieve, reference, and/ordisplay on a user's screen for use in the various embodiments. The useraccess points 124 can provide users with an interface to access andcommunicate with the main server system, and to utilize the functionalaspects of the system.

Computer System

in some embodiments, the systems, processes, and methods describedherein are implemented using a computing system, such as the oneillustrated in FIG. 2. The example computer system 202 is incommunication with one or more computing systems 220 and/or one or moredata sources 222 via one or more networks 218. While FIG. 2 illustratesan embodiment of a computing system 202, it is recognized that thefunctionality provided for in the components and modules of computersystem 202 can be combined into fewer components and modules, or furtherseparated into additional components and modules.

Electronic Communications Account, eAddress or e-Mail Generation andManagement System

The computer system 202 can comprise an electronic communicationsaccount, eAddress or e-mail Generation and Management System 214 thatcarries out the functions, methods, acts, and/or processes describedherein. The electronic communications account, eAddress or e-mailGeneration and Management System 214 is executed on the computer system202 by a central processing unit 206 discussed further below.

In general the word “module,” as used herein, refers to logic embodiedin hardware or firmware or to a collection of software instructions,having entry and exit points. Modules are written in a program language,such as JAVA, C, or C++, or the like. Software modules can be compiledor linked into an executable program, installed in a dynamic linklibrary, or can be written in an interpreted language such as BASIC,PERL, LAU, PHP or Python and any such languages. Software modules can becalled from other modules or from themselves, and/or can be invoked inresponse to detected events or interruptions. Modules implemented inhardware include connected logic units such as gates and flip-flops,and/or can include programmable units, such as programmable gate arraysor processors.

Generally, the modules described herein refer to logical modules thatcan be combined with other modules or divided into sub-modules despitetheir physical organization or storage. The modules are executed by oneor more computing systems, and can be stored on or within any suitablecomputer readable medium, or implemented in-whole or in-part withinspecial designed hardware or firmware. Not all calculations, analysis,and/or optimization require the use of computer systems, though any ofthe above-described methods, calculations, processes, or analyses can befacilitated through the use of computers. Further, in some embodiments,process blocks described herein can be altered, rearranged, combined,and/or omitted.

Computing System Components

The computer system 202 includes one or more processing units (CPU) 206,which can comprise a microprocessor. The computer system 202 furtherincludes a physical memory 210, such as random access memory (RAM) fortemporary storage of information, a read only memory (ROM) for permanentstorage of information, and a mass storage device 204, such as a backingstore, hard drive, rotating magnetic disks, solid state disks (SSD),flash memory, phase-change memory (PCM), 3D XPoint memory, diskette, oroptical media storage device. Alternatively, the mass storage device canbe implemented in an array of servers. Typically, the components of thecomputer system 202 are connected to the computer using a standardsbased bus system. The bus system can be implemented using variousprotocols, such as Peripheral Component Interconnect (PCI), MicroChannel, SCSI, Industrial Standard Architecture (ISA) and Extended ISA(EISA) architectures.

The computer system 202 includes one or more input/output (I/O) devicesand interfaces 212, such as a keyboard, mouse, touch pad, and printer.The I/O devices and interfaces 212 can include one or more displaydevices, such as a monitor, that allows the visual presentation of datato a user. More particularly, a display device provides for thepresentation of GUIs as application software data, and multi-mediapresentations, for example. The I/O devices and interfaces 212 can alsoprovide a communications interface to various external devices. Thecomputer system 202 can comprise one or more multi-media devices 208,such as speakers, video cards, graphics accelerators, and microphones,for example.

Computing System Device/Operating System

The computer system 202 can run on a variety of computing devices, suchas a server, a Windows server, a Structure Query Language server, a UnixServer, a personal computer, a laptop computer, and so forth. In otherembodiments, the computer system 202 can run on a cluster computersystem, a mainframe computer system and/or other computing systemsuitable for controlling and/or communicating with large databases,performing high volume transaction processing, and generating reportsfrom large databases. The computing system 202 is generally controlledand coordinated by an operating system software, such as z/OS, Windows,Linux, UNIX, BSD, PHP, SunOS, Solaris, MacOS, ICloud services or othercompatible operating systems, including proprietary operating systems.Operating systems control and schedule computer processes for execution,perform memory management, provide file system, networking, and I/Oservices, and provide a user interface, such as a graphical userinterface (GUI), among other things.

Network

The computer system 202 illustrated in FIG. 2 is coupled to a network218, such as a LAN, WAN, or the Internet via a communication link 216(wired, wireless, or a combination thereof). Network 218 communicateswith various computing devices and/or other electronic devices. Network218 is communicating with one or more computing systems 220 and one ormore data sources 222. The electronic communications account, eAddressor e-mail Generation and Management System 214 can access or can beaccessed by computing systems 220 and/or data sources 222 through aweb-enabled user access point. Connections can be a direct physicalconnection, a virtual connection, and other connection type. Theweb-enabled user access point can comprise a browser module that usestext, graphics, audio, video, and other media to present data and toallow interaction with data via the network 218.

The output module can be implemented as a combination of an all-pointsaddressable display such as a cathode ray tube (CRT), a liquid crystaldisplay (LCD), a plasma display, or other types and/or combinations ofdisplays. The output module can be implemented to communicate with inputdevices 212 and they also include software with the appropriateinterfaces which allow a user to access data through the use of stylizedscreen elements, such as menus, windows, dialogue boxes, tool bars, andcontrols (for example, radio buttons, check boxes, sliding scales, andso forth). Furthermore, the output module can communicate with a set ofinput and output devices to receive signals from the user.

Other Systems

The computing system 202 can include one or more internal and/orexternal data sources (for example, data sources 222). In someembodiments, one or more of the data repositories and the data sourcesdescribed above can be implemented using a relational database, such asDB2, Sybase, Oracle, CodeBase, and Microsoft® SQL Server as well asother types of databases such as a flat-file database, an entityrelationship database, and object-oriented database, and/or arecord-based database.

The computer system 202 can also access one or more databases 222. Thedatabases 222 can be stored in a database or data repository. Thecomputer system 202 can access the one or more databases 222 through anetwork 218 or can directly access the database or data repositorythrough I/O devices and interfaces 212. The data repository storing theone or more databases 222 can reside within the computer system 202.

Generation of an Electronic Communications Account, eAddress or UniqueE-Mail Address Linked to a Physical Address

FIG. 3A is a flowchart depicting an embodiment of a method forgenerating an electronic communications account, eAddress or uniquee-mail address linked to a physical address. In some embodiments, a usercan request generation of an electronic communications account, eAddressin block 302. The user can input one or more physical locations via auser access point system through any available means in block 304, suchas for example inputting text of a physical address, selecting alocation on a map, or allowing the user access point system to locatethe user's current location through GPS tracking. This information canbe electronically transmitted from the user access point system to themain server system in block 306, which can determine the category oflocation to which the generated e-mail address can be linked. Forexample, the main server system can be configured to determine if theinputted location corresponds to a residence, business or governmentoffice, immobile infrastructure, a vehicle, or the like bycross-referencing corresponding database 310, 314, 318, or 322,respectively.

In some embodiments, the user can register a physical address and theelectronic communications account can automatically be generated by theelectronic communications system. For example, the user can requestregistration of their car via the Department of Motor Vehicles (“DMV”),or register their house with the local government. Then, the DMV and/orthe local government can automatically register an electroniccommunications account based on certain criteria.

More specifically, in some embodiments, the main server system can beconfigured to determine if the inputted location corresponds to aresidence in block 308. To do so, in certain embodiments, the mainserver system can be configured to compare and/or otherwisecross-reference the user-inputted location with physical residenceaddresses stored in one or more physical residence address databases310. If the system determines that the inputted location is a residence,the system can be configured to generate and/or store a uniqueelectronic communications account and/or an eAddress tied to thatresidential physical address in block 324. The generated electroniccommunications account and/or eAddress can be stored in one or moreelectronic communications account databases 326.

Similarly, in certain embodiments, the main server system can beconfigured to determine if the inputted location corresponds to abusiness or government office or location in block 312. To do so, incertain embodiments, the main server system can be configured to compareand/or otherwise cross-reference the user-inputted location withphysical organization addresses stored in one or more physicalorganization address databases 314. If the system determines that theinputted location is a business or government office or location, thesystem can be configured to generate and/or store a unique electroniccommunications account tied to that organization's physical address inblock 324. The generated electronic communications account can be storedin one or more electronic communications account databases 326. In someembodiments, business and/or government organizations can have theability to include their names (business name) as deemed necessary bythe user and create additional sub-categories such as computerdepartment, furniture, etc. Businesses and/or government organizationscan also add names of employees should they deem this necessary.

In some embodiments, the main server system can be configured todetermine if the inputted location corresponds to an immobileinfrastructure in block 318. To do so, in certain embodiments, the mainserver system can be configured to compare and/or otherwisecross-reference the user-inputted location with physical infrastructureaddresses stored in one or more physical infrastructure addressdatabases 318. If the system determines that the inputted location is aninfrastructure, the system can be configured to generate and/or store aunique electronic communications account tied to that infrastructure'sphysical location in block 324. The generated electronic communicationsaccount can be stored in one or more electronic communications accountdatabases 326.

For example, in some embodiments, an electronic communications account,an eAddress or e-mail address can be generated for infrastructuralfeatures, including traffic lights, intersections, fire hydrants,transformers, and other structural features. This can provide localresidents with means to electronically communicate with a responsibleorganization regarding required maintenance, malfunctions, or requestsfor relocation, reprogramming, or any other message regarding theinfrastructural feature. By allocating a particular electroniccommunications account, eAddress or e-mail address to eachinfrastructure, the electronic communications account itself can be usedas a unique identifier for the particular infrastructure and its exactlocation. In certain embodiments, communication with particularinfrastructure can be two-way where by the department responsible forthe street furniture or other infrastructure can contact the affectedresidents based on the issues on hand. This database can also be used asa repository of data by the department. For example, the electroniccommunication system can provide construction updates on a bridge,dates, times, etc. This is hence available for the residents to view.The department may also embed a website link for any further informationand or contact information. In some embodiments, the same process can beapplied to electronic items and/or items with serial numbers. Forexample, an electronic communications account can be created for an IPaddress 99.227.243.148@alphc.com or a serial number for a device such asan appliance. These electronic items can be linked with the electroniccommunications account of the entity to whom they belong for anycommunication based needs and or the like as needed by entity,manufactures and the like.

In certain embodiments, the main server system can be configured todetermine if the inputted location corresponds to a vehicle in block320. To do so, in certain embodiments, the main server system can beconfigured to compare and/or otherwise cross-reference the user-inputtedlocation with physical vehicle addresses stored in one or more physicalorganization address databases 314. If the system determines that theinputted location is a business or government office or location, thesystem can be configured to generate and/or store a unique electroniccommunications account tied to that organization's physical address inblock 324. The generated electronic communications account can be storedin one or more electronic communications account databases 326.

The electronic communications system can be configured to detectvehicles that are rented and/or cross reference the license plates withthe electronic communications account of the person renting the vehicle.This data can be cross-referenced by police, border services, andsimilar authorities to detect criminal activities. For example, multiplevehicles can be rented from various rental agencies by individualsliving at the same location (or within a location). When these vehiclescross states lines or borders, license plates can be read automaticallyand cross referenced with associated electronic communications accountsto alert authorities of suspicious activities. The same methodology canbe applied with passport no. connected to an electronic communicationsaccount and other similar government based identification.

Triangulation and Other Technology to Close in on a Location

In some embodiments, the physical location can be automaticallydetermined. The physical location of the device transmitting a messagecan be used. In some embodiments, GPS technology can be used totriangulate a location of the device. The device can receive informationfrom multiple satellites and triangulate its location. Wi-Fi technologycan be used to triangulate a location. The location information caninclude latitude, longitude, elevation, boresight, address, city, state,intersection, street, and the like. Sensors that detect changes tomotion (for example inertial sensors and/or barometers) can be used todetermine an updated location (for example when traveling through alocation without internet connection). Sensors that detect changes tomotion can also be used to detect changes in elevation that GPStechnology may not be able to provide. For example, if a user is on the10th floor of a building and travels to the 9th floor, GPS technologymay not be able to sense that the user is at a different elevation.However, using an inertial sensor, the electronic communications systemcan generate a different electronic communications account for anindividual on the 9th floor than the individual on the 10th floor

For multiple users requesting an address of the same location, item,infrastructure, address, or the like, triangulation can be used todetermine a more accurate physical location. In the embodiment of FIG.3B, is an example of three user devices 350, 354, 358. The first userdevice 350 can request an electronic communications account of a firehydrant 362. Based on the location of the user device 350, the systemcan determine a general area of the fire hydrant 362.

Upon a second request by a second user device 354 for an electroniccommunications account of the same fire hydrant 362, triangulation canbe used to determine that the fire hydrant 362 is likely in theoverlapping region of the radius circles of 352 and 356. Upon a thirduser device 358 requesting an electronic communications account of thesame fire hydrant 362, the system can triangulate an overlapping areaaround the radius 352, 356, 360 surrounding the user devices 350, 354,358.

The system can use triangulation to determine which of a multiple ofitems the user can be referring to. For example, there can be multipleitems within the radius 352 of user device 350. However, if user device354 requests an electronic communications account related to a similarinfrastructure, then the system can determine that there is a higherprobability that both user devices 350, 354 are referring to the firehydrant 362 rather than another item that is located only within theradius 352 and not within the radius 356.

In some embodiments, the system can determine the address,infrastructure, person, location, and/or other item that can beassociated with a location automatically based on user input that is nota particular address. For example, the user can send a picture of alocation. The system can utilize certain methods, such as imagerecognition, to determine the location, building, item, or the like thatthe user is trying to capture through the video or image.

The system can use a radar, or other type of distance tracking system,to determine the location of interest. For example, the user can point adevice at an object. The device can transmit electromagnetic signals andreceive the response. Based on the time between transmission of theelectromagnetic signals t₁ and the time between electromagnetic signalsreflecting back from the object to reception at the user device t₂, thedistance from the user to the object can be determined.

The embodiment of FIG. 3C illustrates the first user device 350 thattransmits electromagnetic signals 370 toward a fire hydrant 362. Theelectromagnetic signals 370 can bounce off the fire hydrant 362 andpropagate back 372 to the first user device 350. Based on the timebetween transmission and reception, the system can determine thedistance from the user device 350 to the fire hydrant 362.

In some embodiments, the electronic communications system generatesand/or identifies electronic communications accounts associated withutilities, such as hydro transformers, gas lines, and the like.

Electronic Communications Account Generation and User Verification

In generating an electronic communications account for users, whether itbe for residential, business, or other users, it can be advantageous toensure that each physical address or mailing address is associated withonly one representative electronic communications account, eAddress orunique e-mail address. However, in order to do so, it can be helpful toeffectively prevent others from activating and/or generating falseelectronic communications accounts that are associated with someoneelse's physical address or mailing address. As such, in someembodiments, the system is configured to require a user activatingand/or generating an electronic communications account, eAddress orunique e-mail address tied to a physical location to input the user'spersonal contact information. In certain embodiments, such inputtedpersonal contact information can be verified by the system and/or bestored in order to maintain a record of that user's personal informationand verification.

FIG. 4 is a flowchart depicting an embodiment of a method for generatingan electronic communications account, eAddress or unique e-mail addresslinked to a physical address with one or more features of requestingand/or storing personal information. In some embodiments, a user canrequest generation and/or activation of an electronic communicationsaccount, eAddress or unique e-mail address tied to a physical locationin block 402. The user access point system can be configured to receiveuser input regarding one or more locations for generation and/oractivation of an electronic communications account in block 404 by oneor more means. For example, the user access point system can beconfigured to receive user input regarding a physical location oraddress via the user typing in text, selection on an electronic map,location determination via GPS and/or any combination of the foregoing.

In certain embodiments, the user access point system can be configuredto additionally request personal contact information of the user inblock 406. For example, such personal information can comprise theuser's name, birthday, social security number, credit card number, bankaccount number, phone number, personal e-mail address, mailing addressand/or another form of contact information. Once the user has inputtedhis/her personal information in block 408, the main server system cangenerate a unique password in block 410, and transmit that passwordusing the inputted contact information to the user access point system.

After the password has been transmitted to the user, the user accesspoint system can display or otherwise communicate the generated passwordto the user in block 412, and can prompt the user to input thetransmitted password in block 416. The user can then input the generatedpassword into the user access point system in block 418. In someembodiments, either the user access point system and/or main serversystem can be configured to determine whether the inputted password iscorrect in block 420. If the inputted password is correct, an electroniccommunications account, eAddress or e-mail address linked to thephysical address or location inputted by the user can be generated andstored by the main server system in block 422. The physical address orlocation inputted by the user, electronic communications account, and/oruser information can be stored on corresponding databases 426, 428, and430, respectively in block 424. However, if the user inputted passwordis incorrect, the user access point system can be configured to requestthe user to input the password again in block 416.

In some embodiments, user authentication occurs based on certaincriteria. A user requesting an electronic communications account and/ora physical address, authentication can happen automatically eitherpartially or fully. For example, if a request for generation of anelectronic communications account is received from a trusted user accesspoint system, then the user can automatically be authenticated. In someembodiments, if a request is received from a trusted user access pointsystem, then one type of user authentication system (for exampledriver's license) would be sufficient whereas if the request comes froma different user access point system, then another type of userauthentication system (for example passport and birth certificate) canbe required.

In some embodiments, the type of electronic communications account,eAddress or the associated address, infrastructure, building, etcdetermines the type of authentication required. In some embodiments, aparticular username, password, identification, document, etc can berequired for an electronic communications account.

Previously Linked Physical Addresses and Changes in Physical Addresses

In some instances, a user can attempt to generate and/or activate anelectronic communications account or e-mail address linked to a physicaladdress for which another user has already generated and/or activated ane-mail address. For example, User 1 can who used to live in X locationcan have generated and activated an electronic communications accountuniquely tied to X location but can have moved. When User 2, whosubsequently moved to X location, attempts to generate and/or activatean electronic communications account, the system can deny User 2 ofgenerating and/or activating an electronic communications account asthere is already one that has been generated for X location. In such andother situations, it can be advantageous for the system to be configuredto check whether an old user or resident of a particular electroniccommunications account is in fact still using the electroniccommunications account and transfer that particular electroniccommunications account to a new user if not.

To address such issues, FIG. 5A illustrates a flowchart depictinganother embodiment of a method for generating an electroniccommunications account, eAddress or e-mail address linked to a physicaladdress and verifying whether an electronic communications account,eAddress or e-mail address has already been linked to the user-inputtedphysical address. In some embodiments, the user can request generationand/or activation of an electronic communications account in block 502similarly to any of the other embodiments described herein. Then, theuser access point system can be configured to receive the user input inblock 504 similar to any of the other embodiments described herein.

In certain embodiments, the main server system can be configured tocross-reference or otherwise verify using one or more physical addressdatabases 508 to determine if an electronic communications account,eAddress or e-mail address has previously been generated for theinputted physical address in block 506. If the main server systemdetermines that an electronic communications account, eAddress or e-mailaddress has not previously been generated for the inputted physicaladdress, an e-mail address can be generated and linked to the physicaladdress in block 528.

However, if the main server system determines that an electroniccommunications account has previously been generated and/or activatedfor the inputted physical address in block 510, the user can be promptedto verify the inputted physical address in block 512 via the user accesspoint system. In response, the user can either change the inputtedphysical address or verify the previously inputted address in block 514.If the user changes the inputted physical address or location, then thesystem can be configured to repeat one or more blocks starting withblock 506.

However, if the user verifies the address, the main server system cangenerate and send a message to User 2, the current user of theelectronic communications account, eAddress or e-mail address linked tothe inputted physical address in block 516. In some embodiments, thesystem can request User 2 to verify his/her continued use of theelectronic communications account, eAddress or e-mail address in block518. If User 2 verifies that he/she has discontinued use of theelectronic communications account, eAddress or e-mail address, the mainserver system can continue to process generation and/or activation of anelectronic communications account, eAddress or e-mail address linked tothe inputted physical address in block 528 and/or transfer the currentelectronic communications account, eAddress or e-mail address to the newuser. In some embodiments, when a user moves and deactivates theirelectronic communications account, the system can be configured toprompt the user to activate their new electronic communications account,for example via one or more communications methods provided by the user.

However, if User 2 does not verify discontinued use of the e-mailaddress linked to the inputted physical address, the system can beconfigured to request and/or display a request for additionalverification information from the new user in blocks 520 and 522. Forexample, the system can be configured to request the new user foradditional information such as proof of residence, title, deed, utilitybill, lease contract, or the like. If the user inputs the requestedinformation in block 524, the main server system can be configured toverify that the inputted information passes a security threshold inblock 526. If the information passes the threshold, the main serversystem can generate a new electronic communications account, eAddress ore-mail address linked to the inputted physical address or transfers thecurrent electronic communications account, eAddress or e-mail address tothe new user in block 528.

Under the current mail delivery process, when an individual moves in orout of a location, delivery of mail and parcels does not occur untilvarious processes are completed by the Post Office. Not only does theindividual have to notify the Post Office of the address change, thePost Office also has to internally adapt to this change (for exampleassigns delivery paths, allocations sortation of parcels at the PostOffice, update databases). Some embodiments of the electroniccommunications account system solve this problem by automaticallyactivating a new address for the resident when moving in or out of alocation. The system can send mail using the electronic communicationsaccount tied with the new geolocation. This can allow for an immediateupdate and thus users can receive mail effortlessly and swiftly afterthe change is notified.

In some embodiments, the system identifies the resident's change oflocation automatically. For example, the individual can tie theirpersonal accounts (for example credit card addresses or electric bills),computing devices (for example mobile phones), employer databases, othersources or databases including updated addresses for an individual, andthe like, such that the system can automatically detect a change ofphysical address. The system can then automatically update theelectronic communications account associated with the individual. Thesystem can send a notification to the user requesting that theelectronic communications account be updated.

In some embodiments, when an individual moves to a new location, theuser can notify the system of the move. The system can identify that anindividual moved to a new location automatically by using locationalinformation of a user (for example GPS location of a mobile deviceresiding at a location for an extended period of time). The system canrequest the user to verify whether the new address is the new residenceof the user. As such, a secure method for reassigning the electroniccommunications account can be implemented by the system.

FIG. 5B is a flowchart depicting an embodiment of a method for updatinga physical address of an individual. At block 540, the main serversystem identifies that User 1 is associated with a new electroniccommunications account. This can be a result of User 1 sendingnotification of a move of residence. The main server system can identifythe new address automatically.

The main server system can update the physical address database 508using the newly identified physical address retrieved for User 1.

At block 542, the user access point system can receive a request toverify the new physical address associated with User 1. The request canbe a simple confirmation of the physical address. The request canrequest the User to enter in the new physical address, whereby the mainserver system does not disclose the identified new physical address toUser 1. The request can simply ask whether User 1 has moved to a newresidence. In some embodiments, the request can be verification of a newphysical address that User 1 is located in (for example not necessarilywhere User 1 resides but other associated location such as a work placeaddress).

At block 544, User 1 can provide a response to the verification. Forexample, User 1 can provide confirmation of the address. User 1 can sendthe response via an SMS message, an application on a mobile phone, on awebsite, or other input to be received by the main server system.

At block 546, the main server system receives the response from User 1.The main server system checks to see if User 1 is associated withanother geolocation. If not, the system proceeds to block 558 and checksif the new address is associated with another user. If the new addressis not associated with another user, then the system generates anelectronic communications account using the physical address (forexample, street, city, state, zip code, etc.) at block 528.

If the new address is associated with another user at block 558, thenthe main server system sends a notification to User 2 and User 2receives a notification of another user attempting to create anelectronic communications account. The notification can include arequest to verify whether User 2 is still associated with the newaddress. The notification can include information on User 1. Thenotification can include an option for User 2 to indicate that the User1 attempt can be fraudulent.

If User 1 is associated with another location, then the main serversystem generates a message to send to User 1 regarding the otherlocation. At block 552, the User Access Point system generates a requestfor User 1 to submit verification information in response to receivingthe message of User 1 associated with the other location. For example,if User 1 has not deactivated the other location, then the user accesspoint system can request a government issued identification document asproof of the new residence.

At block 554, User 1 can provide the requested identification document.A copy of the identification document can be sent to the main serversystem. In some embodiments, a picture of the identification documentcan be taken by the user using the user access point system. In someembodiments, information pertaining to the identification document (forexample passport number, driver's license expiration date) can berequested and the User can enter this information.

If the identification document is provided by User 1, then the mainserver system checks whether the new address is associated with anotheruser at block 558. If the new address is not associated with anotheruser, then the main server system generates an electronic communicationsaccount at block 528. If the new address is associated with anotheruser, then the main server system can send a notification to User 2notifying User 2 of the other user attempting to create the electroniccommunications account.

If the identification document is not provided at block 554, then atblock 556, the user access point system sends a notification that theidentification document was not received. The main server system canthen initiate a fraud verification procedure at block 562. The fraudverification procedure can include notifying a third party, such as apolice department for further investigation. The fraud verificationprocedure can include internal verification, such as identifying thesource of the request from User 1 (for example identifying the IPaddress or looking at information pertaining to the other location.

At block 558, if the new address is associated with another user, themain server system mal also initiate the fraudulent verificationprocedure at block 562.

Updating the residence information using some embodiments of the presentdisclosure is an improvement to traditional current mail technology.Changes to the current residence traditionally require a change ofaddress form that can include human error, where mail continues to beredirected to an incorrect mailing address. If the mail is rejected,mail can be placed for extended periods of times until the home ownerscome to collect the mail, increasing the security risk of safe delivery.The use of updating the electronic communications account using thesystems described in some embodiments of the present disclosure providesecure and swift updates to databases and timely delivery of mail.

In some embodiments, the change of address using the electroniccommunications account system occurs in substantially real time. Thus,mail is delivered to the correct address substantially immediately uponthe change.

Generation of an Electronic Communications Account Using GeographicCoordinates

In some embodiments, a user can use his/her geographic coordinatesdirectly or indirectly to generate and/or activate an electroniccommunications account, eAddress or e-mail address linked to a physicallocation. For example, a user can use his or her smartphone or otherelectronic device with location services, via GPS, Wi-Fi, or the like,to determine his or her current location comprising his or hergeographic coordinates. However, depending on the situation, one-to-onemapping between a single set of geographic coordinates and a singlephysical address or mailing address may not be possible. For example, insome circumstances, a plurality of geographic coordinates can map to asingle physical address or mailing address. Similarly, in certaincircumstances, one set of geographic coordinates can map to or at leastpotentially map to a plurality of physical addresses or mailingaddresses.

FIG. 6A is a diagram illustrating this issue with mapping geographiccoordinates to physical and/or mailing addresses. For example, 602A and606A represent two adjacent properties, while the dotted lines representthe property boundaries. Within the property boundary of property 602A,there is a single residence 604A, but a plurality of latitudes andlongitudes. Similarly, within the property boundary of 606A, there is asingle residence 608A. Thus, to create an electronic communicationsaccount using inputted latitude and longitude data, the system canassociate a plurality of coordinates with one physical address.

To this end, FIG. 6B illustrates a flowchart depicting an embodiment ofa method for associating a plurality of coordinates with physicaladdresses. The system can use the property database 604B to determinethe longitudinal and latitudinal coordinates of the boundary of aproperty at block 602B. Using the boundary coordinates, the system canthen compute a list of all the coordinates that fall within the boundaryat block 606B, and determine the physical mailing addresses that fallwithin the boundary at 608B. At block 610B, the system can determine ifthere is more than one physical address within the property boundary).For example, there can be multiple units in an apartment building,condominium, or duplex. If there is only one physical address, thesystem can associate all the coordinates within the property boundarywith that address at block 614B, and store the set of coordinates withthe physical address in the physical address database 618B at block616B. If there is more than one physical address within the propertyboundary, the system can associate all coordinates within the boundarywith the multiple physical addresses at block 612B. This information canbe stored within the physical address database 618B. Consequently, if auser inputs one of those coordinates to generate his/her electroniccommunications account, the system can prompt him/her to select thecorrect addresses from a list of the multiple associated physicaladdresses.

Alternatively, the system could be configured to associate certaincoordinates with certain physical addresses within a single propertyboundary. If a user enters one of those coordinates to generate his/herelectronic communications account, the system can locate the correctphysical address without prompting the user.

FIG. 6C is a flowchart depicting an embodiment of a method forgenerating an electronic communications account based on a location on amap. At block 630, User 1 enables location services. For example, User 1can enable location services on an application on a user access pointsystem. At block 632, the user access point system identifies thegeolocation of User 1. For example, the user access point system canidentify the latitude and longitude of User 1. In some embodiments, User1 can set a location at block 630. Then, the user access point systemidentifies the geolocation of the location set by User 1.

At block 634, the main server system receives the geolocation of User 1and adds the location to the geolocation database 636. The main serversystem can store the geolocation received (for example latitude orlongitude information). In some embodiments, the main server system canprocess the geolocation of User 1 and add it to the geolocationdatabase. For example, the main server system can determine a change inlocation of User 1 and add the change to the geolocation database 636.In some embodiments, the main server system can determine thegeolocation of the user access point system over a period of time andstore a trace of the geolocation in the geolocation database 636.

At block 638, the user access point system generates a map of thecurrent location of the user access point system (or the location ofchoice as described above). The map can be displayed to User 1. In someembodiments, an indication of the location can be generated to the User1 that indicates the location. For example, instead of a map, an addresscan be displayed.

At block 640, User 1 selects a location of interest. The User 1 canselect the location of interest by indicating the location on thedisplayed map. For example, User 1 can press down on the map and theuser access point system can automatically determine the location ofinterest based on the User 1's selection on the map. User 1 can select alocation of interest by entering in a physical address. User 1 canselect a location of interest by adding other information that can beused to identify a location, such as a name of a business.

At block 642, the user access point system can send the location ofinterest information to the main server system.

At block 638, the User can also receive a confirmation code. At block640, User 1 can enter in the confirmation code. The confirmation codecan be sent via SMS and the user can enter in the code into theapplication. This can added layer of security and verification that itis in fact User 1 making the selection of the location of interest. Atblock 642, the user access point system can send the confirmation codeto the main server system.

At block 644, the main server system can determine whether informationassociated with the location of interest is identifiable. The mainserver system can determine whether the location of interest isassociated with other information in the geolocation database 636. Forexample, the main server system can determine whether the location ofinterest is associated with a business or a park.

At block 644, the main server system can also determine if the locationof interest is associated with an electronic communications account. Ifthe location of interest is associated with an electronic communicationsaccount, then the main server system can send the electroniccommunications account of the location of interest to a third-partyentity at block 646, such as to first responders.

At block 644, if the main server system determines that the location ofinterest is not associated with an electronic communications account,then the main server system can send a request for more information fromthe user at block 648. At block 644, if the main server systemdetermines that the location of interest is not associated with anelectronic communications account, the main server system can alsoidentify the geolocation for the location of interest at block 650. Forexample, the main server system can identify a latitude and longitude ofthe location of interest.

At block 652, the main server system can generate an electroniccommunications account based on the geolocation information. Forexample, the main server system can generate the following electroniccommunications account based on the latitude and longitude: L43.7901L-79.3606@AlphC.com. Accordingly, an electronic communications accountcan be generated for an unidentifiable location based on the physicallocation (for example latitude and longitude information).

In some embodiments, the electronic communications account can indicateinformation regarding the sender. The electronic communications accountcan include an address and a name of a business. For example, theelectronic communications account can be:2-8-log-fern-way-toronto-ontario-canada@alphc.com. The exampleelectronic communications account shows the address and unit number fora particular residence. In some embodiments, the electroniccommunications account can include information on the business, such asa department name, a business name, a name of a person working at theaddress, or the like.

In some embodiments, the electronic communications account appendsinformation provided by the user. For example, if the user appended aname or a purpose, then the name or purpose can be appended to theelectronic communications account. In some embodiments, locationalinformation (for example latitude and longitude) information is searchedto determine an indicator of the location such as a street number. Insome embodiments, the indication of the location can be in an incorrectformat. The system can correct the format using its internal formatcorrection component, can use a format and/or address provided by theuser, or can use the incorrect format. In some embodiments, theelectronic communications account is created by appending at least oneof: a unit number, a street number, a street name, a city, a province orstate, a country, or a zip code. The electronic communications accountcan be generated in different formats (for example lower case, separatedby dashes).

In some embodiments, the electronic communications account includesinformation of the category of business. For example, retirement homesand hospitals can create an electronic communications account thatindicate the type of business. This information can be used to identifythe type of response and/or information regarding the individuals in thearea. For example, in the event of a disaster, first responders can usethese categories to identify the locations of individuals (for example,Room No.). In another example, in the event of a disaster, firstresponders can identify the type of assistance required based on thenumber of elderly in the area. This can provide a more effectiveidentification system than traditional hospital databases andprocedures.

The main server system can then send the generated electroniccommunications account for the location of interest to a third-partyentity at block 646.

FIG. 6D-F are diagrams depicting an embodiment of a user interface forgenerating an electronic communications account based on a location on amap. FIG. 6D illustrates using the geolocation of a user device andgenerating a map. FIG. 6D also illustrates an input toolbar for anindividual to input the place or address of a location of interest.

FIG. 6E illustrates a location of interest that the user placed on themap. The user can mark a location on the map. The example in FIG. 6Eillustrates a marked location in the same location of User 1. The userhas the option to edit the location and/or determine directions to thelocation.

FIG. 6F illustrates an option to mark the current location of the user.The user interface example also shows latitude and longitudeinformation, as well as address information. The user also has theoption to share the user's location. This can be used to share thelocation of a user in emergency situations immediately and quickly.

FIG. 7 illustrates a flowchart depicting an embodiment of a method forgenerating an e-mail address linked to a physical address, usinglongitudinal and latitudinal coordinates. In this embodiment, the usercan input a location at block 702 through any available means, includingselection on a map or GPS tracking. Using the inputted location, thesystem can determine the longitudinal and latitudinal coordinatescorresponding with this location at block 704. At block 706, the mainserver system can then determine the physical address or addressesassociated with the coordinates using the physical address database 708.If there is only one physical address associated with the coordinates,the system can generate an e-mail address linked to that physicaladdress at block 718. However, as noted previously, in some cases, therecan be more than one physical address within the property boundarywithin which a set of coordinates falls. If the system determines thatthere is more than one physical address associated with the longitudinaland latitudinal coordinates at block 710, the system can populate a listof all those physical addresses at block 712 and display them at block714. The user can be prompted to select the physical address for whichhe/she would like to link an e-mail address at block 716. Afterselection, the system can generate an e-mail address linked to theselected physical address at block 718. The generated electroniccommunications account can be displayed to the user at block 720.

In some embodiments, associating electronic communications accounts withcertain areas can be stored in a self-referential table. For example,when a user enters a certain area, the electronic communications accountassociated with a device of the user can be referenced in a table ofelectronic communications accounts of the area. The database can includethe entry of the electronic communications account and/or a reference ofthe electronic communications account and/or other information relatedto the electronic communications account and/or the physicallocation/infrastructure/building, or the like.

When a user leaves a certain area, the electronic communications accountassociated with a device of the user can be removed from electroniccommunications accounts for that area. This can allow for moreflexibility in configuring the database, resulting in the improvement ofdatabase storage technology. Furthermore, deploying such a relationaldatabase can be automated and/or can result in substantially real-time.Furthermore, the self-referential table can allow for more effectivestorage of data such that looking at an area will identify electroniccommunications accounts associated with that area.

The self-referential table can also refer to other types of information,documents, databases, or the like. For example, the self-referentialtable can reference a database that saves GPS locations for a particularindividual. This can improve database efficiency by not having to saveall GPS locations for the individual. This can also improve look-up byhaving a precise alternative database for identifying past GPS history.This can also provide for additional electronic privacy and security bynot having sensitive GPS history information saved by the entity thatmaintains the self-referential table. Although certain embodiments aredescribed for GPS data, it is appreciated that other types of data canbe used, such as credit data, financial data, personal data, othersensitive data, or the like.

Verification of Physical Address

In some embodiments, a user can need to verify his/her physical addressbefore an email-address can linked to that address. Withoutverification, an electronic communications account could be created bypersons wholly unconnected to the physical address for which theelectronic communications account is being generated. Since one aim ofthe embodiments is to provide access to communication and services andimprove upon the utilization of electronic mail and physical mail, itcan be important to restrict access to electronic communicationsaccounts to the residents and/or owners of the physical address forwhich the electronic communications account is being generated andothers that gain permission from the residents. Another related issue isa situation in which one user has generated and activated an electroniccommunications account for which another user later attempts togenerate. This can be common when a User 1 generates an electroniccommunications account for his/her physical address, then later moves toanother physical address. When a User 2 moves into User 1's previousphysical address and attempts to generate and activate an electroniccommunications account, the system can be able to verify that User 2 isa resident of that address and transfer access of the electroniccommunications account. To assist in restricting access to the properusers, FIG. 8A illustrates a flowchart depicting an embodiment of amethod for verifying the physical address of a user. In this embodiment,a User 1 can input documents related to proof of occupancy and/orownership at block 802. For example, proof of occupancy and/or ownershipcan comprise a leasing agreement, deed, title, utilities bill, financialstatements, or the like. The user access point system can conduct apreliminary analysis of the inputted documents at block 804. Followingpreliminary analysis, the main server system can complete a fullanalysis of the inputted documents at block 806, using a set ofdatabases 808, which can comprise a physical address database 810 and/oran e-mail address database 812. If the documents are found to beadequate by the main server system at block 814, the physical addresscan be verified at block 834, allowing the user to access the linkedelectronic communications account.

On the other hand, if the documents are found to be inadequate forverification purposes at block 814, User 1 can be prompted to submitadditional documentation to prove occupancy at block 816. Alternativelyand/or additionally, the user access point system can prompt User 1 toaccept collection of data at block 818. This collection can allow theuser access point system to track the user's location to determine ifthe user is currently located at the physical address and/or waspreviously at the physical address for which an electroniccommunications account is being generated. If User 1 agrees to thecollection of data at block 820, the user access point system can trackUser 1's location, for example over a predetermined period of time, atblock 822.

The main server system can analyze the collected location information atblock 824 using the set of databases 808. If the system determines thatthe location information indicates that User 1 is and/or was located atthe physical address for which he/she wishes to generate a linked e-mailaddress at block 826, the main server system can check if there is anexisting e-mail address linked to that physical address at block 828. Ifthe system determines that there is no existing e-mail address linked tothe physical address for which User 1 wishes to generate a linked e-mailaddress at block 828, the system can verify the physical address atblock 834 and allow the user to generate an electronic communicationsaccount. If, however, the system determines that there is an existinge-mail address linked to the physical address for which User 1 wishes togenerate a linked e-mail address at block 828, the system can send amessage to the existing electronic communications account at block 830,asking a User 2, the current user of that address, to agree to thetransfer of that email address to User 1. If User 2 agrees to transferthe electronic communications account at 832, the system can verify theaddress for which User 1 wishes to generate a linked e-mail address atblock 834 and transfer access to the electronic communications accountto User 1.

In some embodiments, an electronic communications account can be linkedto other individuals. For example, an electronic communications accountcan be linked to employees of a business, people in a particular area,members of a household, or the like. FIG. 8B is a diagram depicting anembodiment of a graphical user interface for entering in usersassociated with an electronic communications account. For example, anelectronic communications account can be linked with secondary userssuch that all secondary users would receive alerts based on contactinformation (for example an email address or a contact phone number).The electronic communications account can be used as a main source ofany other form of communication.

In some embodiments, an electronic communications account is linked toindividuals based on a characteristic, such as percentage ofindividuals, demographic data, sex, race, economic status, age, level ofeducation, income level and employment, psychiatric data, medical data,a personality trait, an interest, values, attitudes, lifestyles,opinions, preferences, likes or dislikes, predilections, purchasehistory, browser history, financial history and data, credit history anddata, personal history and data, other activity data, and the like. Inthe example of FIG. 8B, characteristics such as an area of interest,community, jobs, real estate, and pets can be used.

User Profiles and Preferences

In some embodiments, a user can associate a user profile with his/here-mail address, which can be used to filter mail to specific residentsat one physical address, set message and alert preferences, and forvarious other purposes. Often, there can be multiple residents or otheroccupants at a single physical address. In that case, the creation ofunique user profiles for each residence and/or location could allow eachresident and/or occupant to customize the source and type of messagesthat he/she receives. To this end, the system can be configured to storeand utilize user profiles to enhance the services and communicationcapabilities of electronic communications accounts.

FIG. 9 illustrates a flowchart depicting an embodiment of a method forstoring a plurality of user profiles and associating them with a singlee-mail address linked to a physical address. In some embodiments, a User1 can request generation of an electronic communications account atblock 902, a user access point system 1 can receive and transmit thisrequest to the main server system at block 904, and an electroniccommunications account can be generated by the main server system at 906via one or more processes described herein in relation to one or moreembodiments. This electronic communications account, eAddress or e-mailaddress can be stored within an e-mail address database 912, while thelinked physical address can be stored in a physical address database910, with both databases forming part of a plurality of databases 908 insome embodiments.

After generation of the e-mail address linked to the physical address ofa User 1, a user access point system 1 can prompt User 1 to enter thenumber of users who are residents at the inputted physical address, oralternatively, the number of users who can use the electroniccommunications account, eAddress or e-mail address linked to thephysical address at block 914. After User 1 inputs the number of usersat block 916, the user access point system 1 can prompt the user togenerate a profile at block 918, including User 1's age, gender,occupation, interests, and/or any other useful information. Upon inputby User 1 at block 920, the profile can be stored within a user profiledatabase 928 as User 1 profile 924. If User 1 indicates that more thanone user can use the e-mail address linked to the physical address atblock 914, the main server system can also request that the additionaluser or users, denoted User X, generate profiles at block 930. Uponinput by User X at block 932, the profiles can be stored in the userprofile database 928 as User X profile 926. The user profile databasecan be a part of a plurality of databases 922.

Upon the delivery of new mail at block 934, the main server system cancategorize the mail according to user profile at block 936. The mail canbe displayed to User 1 at block 938 and/or User X at block 940,depending on the content of the user profiles (938, 940).

Message Alert System

In some embodiments, user profiles can be configured so that the systemalerts users when they have received a message of a particular type,from a specific source, at a specific time, or based on otherpreferences. For example, a user could set a preference so that he/sheis alerted every time they receive a message from a User 1 and a User 2,but not when he/she receives one from User 3. Similarly, the user couldselect an option so that he/she is alerted every time they receive ane-mail with a particular subject line or with a particular file typeattached. These alert settings allow users to receive immediatenotification regarding messages that they deem to be important. Inaddition, such heightened alert systems can be useful for sendingemergency-related messages to ensure that the recipient is notified assoon as possible regarding emergency situations.

FIG. 10A illustrates a flowchart depicting an embodiment of a method fortransmitting messages based on user-preferences. In this embodiment, aUser 1 can input categories for which he/she would prefer to receiveheighted alerts at block 1002. These categories can comprise the type ofsender, type of message, time of delivery, and/or another category orany combination of the above. User 1 can also input his/her preferredmethod or methods of alert delivery, including text, alarm, phone call,e-mail, physical mail, and/or another method of delivery, electronic orphysical, or any combination of the above at block 1004. A user accesspoint system can receive and transmit User 1's preferred categories andmethods of delivery to the main server system at 1006, where theinformation can be stored in a user profile database 1010 at block 1008.

In some embodiments, a User 2 can input a message at block 1012 and/or asummary of the message at block 1014 for delivery to User 1. The mainserver system can analyze the characteristics of User 2 and/or his/herinputted message at block 1016. At block 1018, the system can determinewhether the characteristics of the sender and message match the userpreferences inputted by User 1 relating to heightened alert methods. Ifthe characteristics do not match User 1's preferences, the main serversystem can send User 2's message to User 1 via User 1's electroniccommunications account, eAddress or e-mail address linked to a physicaladdress at block 1020 via the regular alert method. However, if thesystem determines that the characteristics do match the preferencesinputted by User 1 relating to heightened alert methods at block 1018,the main server system can send User 2's message via User 1's preferredmethods of heightened alert delivery at block 1022. Whether thecharacteristics match the preferences of User 1 or not, the user accesspoint system can display the inputted summary of User 2's message, withor without a hyperlink to the full message at block 1024. User 1 canthen activate the hyperlink at block 1026 to display the full message atblock 1028.

In other embodiments, user profiles and the associated alert settingscan facilitate user sales and purchases. Users who wish to sell orpurchase certain items, such as a car or home, can select options sothat others are alerted to this fact. For instance, a User 1, who isselling their motorcycle, can select an option within the system toindicate that User 1's motorcycle is for sale and an option that causesthe system to send an alert to User 1 if another user indicates thathe/she is looking to buy a motorcycle. A User 2, who is looking for amotorcycle to purchase, can similarly choose an option that indicatesthat he/she is in the market for a motorcycle and an option that causesthe system to send an alert to User 2 if another user is selling amotorcycle. Users can personalize the alerts to match their preferences.Users can specify both the type of messages they wish to receive and thearea for which they would like to receive messages. For example, a usercould specify that they only wish to be alerted about home sales in a2-mile radius around a user-specified physical address. Users can alsoupdate their user profiles to alert businesses about their interests.For example, a user could enter “basketball shoes” as an interest.Companies that sell basketball shoes could then compose a message to allusers with “basketball shoes” listed as an interest. This allowscompanies to interact directly with users with interest in theirproducts.

In other embodiments, the system can generate a map showing currentsellers and buyers for an area around a user-specified address. Thesystem can also be configured so users can select options indicatingthat they are having garage sales, estate sales, giveaways, or otherrelevant events. Event organizers, including those organizing charityevents, volunteering events, political rallies, debates, or any otherevents, can post their event on the map and alert everyone in therelevant area about the details of their event. In addition, the map canbe filtered to show only specific types of events or people. The map canalso be configured to show only events and people within auser-specified area around a user-specified address. This can permitcommercial activity within the community and across borders andcountries. For example, a shoes manufacture in Japan can contact allbusiness that sell shoes in Canada. Likewise, a local grocerystore/farmer, can advertise their apples at 0.39 cts lb based on anearly harvest. The same concept can be applied in the developed worldfor missing persons and local foods for sale.

In other embodiments, businesses can use the user profile, alert, andmap functionality to indicate the existence of a sale or job opening atthe business. In other embodiments, the business can send a message toall users within a user-specified area of residences or to all users atspecific addresses. Users can view current sales and job openings on themap generated by the system. Businesses can also integrate their userprofiles and the map functionality into their own websites, to directlyshow sales and job openings at different locations on the website.

In other embodiments, users can utilize the user profile, map, and alertfunctionality to advertise available rooms for rent in their home orapartment, and to communicate with their tenants.

In other embodiments, user profiles can include wish lists for specificproducts they are currently considering purchasing. When a user inputs amessage regarding a sale on one or more of the items on a user's wishlist, that user can receive an alert.

In some embodiments, users can be able to deactivate alerts for auser-specified period of time.

In some embodiments, alerts can be managed such that a notificationand/or a response can affect the notifications of other individuals ofinterest. If alerts are sent to multiple individuals, a response fromone or more individuals can be displayed to other individuals. Forexample, in the case of an emergency, a notification can be sent to allmembers of a household with parents and children. Then, upon a responsefrom one of the children, the parents can be notified of the children'ssafety and status.

FIG. 10B illustrates an embodiment of a method for handling messages fora group of individuals. In some embodiments, a main server system and/ora user access point system can transmit an alert to users within an areaof interest at block 1030. In some embodiments, the main server systemprioritizes the alerts. For example, the alerts can be sent to parentsand children. In some embodiments, the alerts can be sent based on anurgency. For example, the alerts can first be sent to those located inthe area of danger, and a second round of alerts sent to those outsideof the area of danger.

At block 1032 and 1034, user 1 and user 2 can receive the alert anddisplay the alert onto the user 1 access point system and the user 2access point system respectively. For example, the main server candispatch an alert to multiple individuals of a dangerous criminal in thearea. At block 1049, the main server system can indicate a status of noresponse if User 1 has not responded after a certain period of time.Then at block 1046, the first responders can receive an indication ofsuch a status.

The alert can be an email address tied to an individual associated witha physical address in the area of interest. The alert can be sent to amobile device of a user. For example, the alert can be an SMS message, aphone call, a message embedded in an application of a mobile device,executable code that enables the mobile device to display an alert, andthe like.

The alert can be interactive. The alert can allow an individual toselect certain people and/or devices to update and/or notify. Forexample, the alert can include an option for the user to notify othersin the area of his or her current situation. In some embodiments, thisis used in situations where the user is notifying others of a dangerousscenario, a safety indication, an incident, or area of interest, or thelike. For example, the user can notify a government agency and/or otherdrivers of a broken street light.

At block 1036, user 1 can provide a response to the alert. In block1037, the response can include information related to User 2. If so, thesystem can alert User 2 that User 1 has indicated the safety of User 2at block 1048. At block 1046, the first responders can receivenotification of users that are deemed to be safe, in need of help, notyet responded, and other status information. Otherwise, the response canbe sent to the main server system at block 1038. For example, if theresponse from User 1 includes an indication that User 2 is also safe,then the system can end the process in block 1039. If User 1 does notrespond with User 2 safety, then the main server can send anotherresponse to User 2 at block 1038.

In some embodiments, the response from User 1 can be automaticallydetermined. For example, the user 1 access point system can identifycertain data being used on the device. Then, the use of data will besent to the main server system to indicate that the user 1 access pointsystem is currently being used. In some embodiments, user 1 access pointsystem can identify a location of the device. The location can indicatethat user 1 is in safe area and can transmit this information to themain server system.

In some embodiments, the main server system or the user 1 access pointsystem can be linked to another device that indicates the status of anindividual. For example, the user 1 access point system (for example amobile device) can be linked to a wearable device (for example anelectronic watch). Based on the physiological readings of the electronicwatch, the main server system can identify that the individual is stillalive and/or is currently in motion (for example higher than normalheart rate can be indicative of running).

At block 1040, the user 2 access point system can receive the updatebased on the response of the alert from User 1. The alert can includeexecutable code that performs certain functions of the User 2 AccessPoint System. For example, the code can include identifying GPScoordinates of the User 2 Access Point System and returning theinformation to the Main Server System. Then, the Main Server System cansend the returned information to appropriate entities. For example, GPScoordinates can be sent back to User 1 who can be a father looking forUser 2, the child. The code can include turning on other functionalityof the phone, such as automatically turning on audio such that the mainserver system (or another entity or individual associated with the mainserver system) can communicate with User 2 automatically.

The response by User 1 can identify more information regarding theincident that initiated the alert. For example, if there is a shooter,then User 1 can identify that the shooter has two semi-automatic weaponsand is checking from room to room. This would provide nearby individualsthis notification such that the individuals can decide that it is saferto run far away rather than to hide in a nearby room. Furthermore, thisresponse to the alert can provide nearby authorities the appropriatebackup to call to respond to the level of threat.

In some embodiments, the response can be a snapshot, video, audio, orotherwise capture of the current incident. If the incident is asituation of interest, such as a food truck location, celebrity, or alive concert, the user can share a capture of the situation such thatother individuals in the area can decide whether the situation ofinterest is worth attending in real-time. Location services that havebeen activated on a mobile device in a disaster area can be pinned bythe systems and tracked, based on persons registered in an area and with“unknown” status.

In some embodiments, the system can make a determination based on theresponse. For example, the system can identify whether User 2 alreadyresponded to the alert at block 1042. If yes, then the system cangenerate an update to send to the User 1 Access Point System, and User 1can be notified that User 2 already responded to the alert at block1044. This can be useful in emergency situations where in the case of anatural disaster, a father can identify whether his children and hiswife are safe based on their responses to the alert.

If User 2 has not responded to the alert, then notification can also besent an entity, such as a third-party entity. At block 1046,notification is sent to a first responder, such as fire fighters, thatreceive an indication of the danger. For example, the notification caninclude who has responded as safe, who has responded as not safe, anindication of individuals in the area of danger (for example via GPS onmobile devices), an indication of individuals that have not responded,and the like.

Sending Messages

A key aspect of some embodiments is the transmission of messages betweenusers. While users can send messages to others by inputting therecipients electronic communications account, in some embodiments, userscan send messages to other users by selection of those users on a map.This allows users to send messages to other users without knowing theelectronic communications account of that user. Traditional email doesnot allow for this functionality.

FIG. 11 illustrates a flowchart depicting an embodiment of a method forsending messages via an e-mail address linked to a physical location. Insome embodiments, a user can access the e-mail address linked to his/herphysical address at block 1102. Upon accessing the system, the useraccess point system can determine the user's current location at block1104, using GPS, Wi-Fi, or another available means. At block 1106, thislocation can be displayed on a generated map, which can include thelocation of other residents. The user can select one or more points onthe generated map and/or one or more areas to which the message can besent at block 1108. Upon input of a message by the user at block 1110,the main server system can analyze the selected points and/or areas tofind physical addresses and/or electronic communications account,eAddresses or e-mail addresses linked to those points and/or areas usinga physical address database 1116 and an e-mail address database 1118 atblock 1112. These databases can form a part of a plurality of databases1114.

The main server system can first determine whether the selectedrecipients have an electronic communications account at block 1120. Forthose selected recipients that do have an e-mail address linked to theirphysical address, the inputted message can be transmitted via eachrecipient's e-mail address at block 1122. Those recipients can receivethe message using their user access point systems at 1124. If someselected recipients do not have an e-mail address linked to theirphysical address, the system can determine whether these recipients havea physical address at 1126. For those selected recipients that do have aphysical address, but do not have an e-mail address linked to thatphysical address, the system can ask the sending user whether themessage can be sent via physical mail at block 1128. If the sending userconsents to delivery via physical mail at block 1130, the message can besent via physical mail at block 1132.

In other embodiments, users can send messages using only the physicaladdress of the recipient. Knowing the linked electronic communicationsaccount or finding the physical location on a map is not necessary. Theuser can input the physical address and the system can match thatphysical address with the linked electronic communications account. FIG.12 illustrates a flowchart depicting embodiment of a method for sendingmessages via and e-mail address linked to a physical location. In someembodiments, a sending user can input one or more physical addresses ofintended recipients at 1202, as well as a message to be sent to therecipients at block 1204. Upon input of a message by the user, the mainserver system can analyze the inputted physical addresses and e-mailaddresses linked to those physical addresses using a physical addressdatabase 1210 and an e-mail address database 1212 at block 1206. Thesedatabases can form a part of a plurality of databases 1208. The mainserver system can determine whether each inputted physical address has alinked e-mail address at block 1214. For those inputted physicaladdresses that do have linked e-mail addresses, the main server systemcan send the message via the linked e-mail addresses at block 1216. Therecipients can receive the message via their user access point systemsat block 1218. If some inputted physical addresses do not have linkede-mail addresses, the system can ask the sending user whether themessage can be sent via physical mail to the inputted physical addressesat block 1220. If the sending user consents to delivery via physicalmail at block 1222, the message can be sent via physical mail at block1224.

In other embodiments, users can send messages to all or a subset ofusers within an area inputted by the user. These areas could be cities,zip codes, counties, neighborhoods, building complexes, or any otherarea. Again, this functionality solves the technical problem of notbeing able to send messages to others without knowing an e-mail address,physical address, and/or electronic communications account. Sending amessage to other users within a certain area by using associatedelectronic communications accounts expands the reach and functionalityof electronic messaging. For example, the local government can send anotification to the specific area for a political rally, a fund raisingevent, local community event or the like.

FIG. 13A is a flowchart depicting an embodiment of a method for sendingmessages to all or a subset of users within a sending user's selectedarea. In this embodiment, a sending user can select an area or areaswithin which users can be sent a message at block 1302. Upon input of anarea, the user access point system can group the recipients within theselected areas based on common factors, including the recipients' city,neighborhood, zip code, area code, or another factor at block 1304.

After grouping the recipients, the user access point system candetermine whether any recipients cannot be grouped with the otherrecipients based on a common factor at block 1306. If the systemdetermines that there are any recipients that cannot be grouped with theother recipients based on common factors, the user access point systemcan request modification of the area selection from the sending user atblock 1308. If the sending user modifies the selection at block 1310,the user access point system can continue to group the recipients basedon common factors at block 1304 and determine whether any recipientscannot be grouped at block 1306 until there are no such recipients. Whenthe system determines that all recipients can be grouped based on acommon factor or if the sending user refuses to modify the areaselection at block 1310, even though one or more recipients cannot begrouped, the sending user can input a message to be sent to the groupedrecipients at block 1312.

Upon message input, the main server system can determine the e-mailaddresses linked to the physical addresses within the selected areasusing an e-mail address database 1316 at block 1314. After the mainserver system has determined the e-mail addresses linked to the physicaladdresses within the selected areas, it can send the inputted message toeach determined e-mail address at block 1318. The recipients can thenreceive the message at block 1320.

In some embodiments, the area can be automatically selected. The areacan be selected based on an algorithm that determines an optimal areafor a particular purpose. The algorithm can select a certain areaindicative of a particular marketing campaign's effectiveness. Forexample, New York City can be selected by the algorithm for a marketingcampaign for luxury goods based on average salary and number of luxurybrands. Similarly, New York City Tourism can send an email to an area inBoston or Montreal about a special timed special weekend gateway.

In some embodiments, the area can be selected based on predeterminedpreferences. The area can be selected based on an urgency and/or amagnitude. For example, a fire started in an area with houses made ofwood can be considered higher urgency, and thus the warning message canbe sent to individuals in a larger area. If the fire has already spreadto several hundred acres, the fire can be considered one of highmagnitude, and thus, a warning message can be sent to individuals in alarger area.

The area can also be selected automatically and/or manually based onfactors that indicate a particular group and/or a location. The area canbe selected based on an association. For example, the area can beselected based on a 5 mile radius around all branches of a particularfranchise. FIG. 13B illustrates five locations of interest 1340, 1342,1344, 1346, and 1348. In this embodiment, the system can select a radius1350, 1352, 1354, 1356, and 1358 around the five locations of interest1340, 1342, 1344, 1346, and 1348.

In some embodiments, various factors can be used to select individualswithin a particular area. Customers associated with a physical addresswithin the area and/or customer devices physically located within thearea can be selected for a marketing campaign. For example, a fooddelivery service can provide electronic coupons to individuals thatreside near the area of interest as well as provide electronic couponsto individuals with mobile devices located within the area of interest.

Areas can be automatically selected and messages automatically sent. Forcertain time-sensitive information, the message can be sent to a remotedevice of a user. This solves the technical problem of sendingtime-sensitive information in real-time to individuals that can have ahigh probability of being affected by the incident initiating themessage. For example, as illustrated in the embodiment of FIG. 13C, ifthere is a fire in the area, then the area can be automaticallydetermined and a warning message sent to those in the area. This wouldprovide a more effective means of communication to provide increasedsafety to those in the area. Three fires are shown in FIG. 13C, a smallfire 1374, a medium fire 1372, and a large fire 1370. For the areaaffected by a large fire, it can be desirable to notify a largersurrounding area as the danger can be greater as compared to the mediumfire 1372 or the small fire 1374. Thus, the area 1370 for the large fire1370 for notification is greater than the area 1382 for the medium fire1372, and the small fire 1374 has the smallest notification area 1384.These radiuses can also be manually and/or partially manually selectedby an entity, such as individuals that notify first responders in thearea (for example systems associated with ambulance and/or fire truckdispatch).

Although embodiments describe a message, notification, and/or alertbeing sent, it is appreciated that such messages, notifications, and/oralerts can include executable code. Executable code can include codethat initiates an application on a remote device. Thus, the executablecode would initiate an application that would have otherwise not beenavailable to the user. This can allow certain time-sensitive informationto be transmitted to a user which would not have otherwise had access tothis information.

The area can be a collection of residences and/or an area around thecollection of residences. The area can be selected based on familiesthat have children attending a particular school.

The area can be based on a particular time. The area can be updated onreal time. The area can be for a particular window of time in the past,present, or future. The areas that have met a certain threshold for aperiod of time can be selected. For example, the areas that are noted tobe affected by the fire for over 4 hours can be selected.

The individuals selected within the area can be based on time.Individuals that are in the area for a length of time, during aparticular time period, and/or other factor of time can be used alone orin combination with another factor. The user interface can beinteractive. In some embodiments, the user interface can display aregion associated with an area of interest. The user can select criteriathat can determine an area of interest. The user can control the area ofinterest, such as radius, size, outer parameters, exclude certain areas,and the like.

The user can control the density of selected individuals within aparticular area. For example, the user can desire to select a subset ofindividuals within a particular area. This selection can be based on apercentage of individuals, demographic data, sex, race, economic status,age, level of education, income level and employment, psychiatric data,medical data, a personality trait, an interest, values, attitudes,lifestyles, opinions, preferences, likes or dislikes, predilections,purchase history, browser history, financial history and data, credithistory and data, personal history and data, other activity data, andthe like.

Although embodiments describe factors or options available to a usercontrol, it is appreciated that these factors or options can beautomated using an algorithm, and vice versa.

In other embodiments, users can send messages to organizationsresponsible for maintenance and management of infrastructure. Theseembodiments will facilitate infrastructure management and allowcommunity residents to take an active role in the maintenance ofcommunity infrastructure.

FIG. 14 illustrates a flowchart depicting an embodiment of a method forsending messages related to infrastructure management via an e-mailaddress linked to a physical address. In this embodiment, a user canaccess the e-mail address linked to his/her physical address at block1402. Upon accessing the system, the user access point system candetermine the user's current location at block 1404, using GPS, Wi-Fi,or any other available means. This location can be displayed on agenerated map at block 1406, which can include the location of nearbyinfrastructure with linked e-mail addresses. The user can select one ormore of the nearby infrastructure as mail recipients at block 1408, andinput a message to be sent at block 1410. The user access point systemcan transmit the message to the selected e-mail addresses at block 1412.Also, the main server system can determine the e-mail addresses linkedto the organizations responsible for the maintenance and management ofthe selected infrastructure using an e-mail database 1416 at block 1414.The main server system can then reroute the inputted message to thee-mail addresses linked to the organizations responsible for themaintenance and management of the selected infrastructure at block 1418.The recipient organizations can then receive the message at block 1420.

In other embodiments, a quick response code or other similar uniquecode, for example one that can be scanned, can be generated for eachelectronic communications account. The code can be used as a method ofsharing a user's electronic communications account with other users, andcan be stored in a database within the main server system. This code canbe used in place of the full generated e-mail address and can be read byan imaging device and processed using Reed-Solomon error correction. Forexample, the unique code can be tied to a fingerprint or DNA of anindividual. Scannable codes can be generated and printed to be placed onparcels for delivery. The scannable codes can be used to track packages.The scannable codes can be generated upon entering of an authenticationcode (for example a password).

Use by First Responders and Law Enforcement

In other embodiments, information about the residents at the physicaladdress linked with a generated e-mail address can be provided to assistfirst responders, police, fire departments, and any emergencypreparedness services. Information provided by users can include thenumber, names, and ages of residents, special health needs, languagesspoken, information about pets, and any other information requested bythe specific emergency service provider. Property managers can berequired to provide such information about their residents to firstresponders database. The provided information can be sent to theemergency service provider for use in emergencies and incorporated withthe National Incident Management Systems. This database can beinvaluable for any emergency preparedness program or emergencyoperations center. It can guarantee that the applicable authorities havea profile for each residence prior to an emergency, ensuring rescueefforts are planned and executed to save as many lives and resources aspossible. The provided information can also be provided to theDepartment of Transportation at the time of vehicle registration or thegranting of a driver's license in order to provide accurate data tofirst responders or residents home profile for emergency usage. Thisinformation can be collected by the government but the data is not usedto its full potential. The information can also be provided for aneighborhood watch that can help target specific areas for alerts.

FIG. 15A is a flowchart depicting an embodiment of a method forcollecting and sending resident information to recipients via an emailaddress linked to a physical address. In this embodiment, a user canrequest generation of an e-mail address linked to a physical address atblock 1502, a user access point system can receive and transmit therequest to a main server system at block 1504, and the main serversystem can generate and store the e-mail address linked to the physicaladdress within an electronic communications account database 1512 atblock 1506. The physical address can be stored within a physical addressdatabase 1510. These databases can form part of a plurality of databases1508. Upon generation of the e-mail address linked to the physicaladdress, the user access point system can request user input regardingthe number of residents at the physical address and the personalinformation of those residents at block 1514. This personal informationcan include gender, age, disability status, and any other usefulinformation. Upon input by the user at block 1516, the main serversystem can store the information in a resident information database 1528at block 1518. The resident information database can include anelectronic communications account database 1522, a physical addressdatabase 1524 and a user profile database 1526. These databases can formpart of a plurality of databases 1528.

In some embodiments, the main server system can generate a map at anytime, showing resident information for each household at block 1520.This map can be sent to the e-mail address linked to emergency servicesorganizations, law enforcement organizations, or any other recipient atblock 1530. The recipient can utilize this information in emergencysituations at block 1532.

In other embodiments, the system can be used by law enforcementorganizations to assist in reporting crimes. Criminal activity at aspecific physical address can be reported through the e-mail addressassociated with that physical address. This can eliminate any doubtsabout the location at which the crime is occurring.

In other embodiments, the system can be used by law enforcementorganizations to assist in ongoing investigations. Law enforcementofficials can send e-mails to all the residents in a particular areausing any of the embodiments described above, updating them on thestatus of investigations or alerting them to possible danger. In anothervariation, residents can use the system to submit tips to lawenforcement agencies regarding ongoing investigations. These e-mails canthen be consolidated into a centralized database to help investigatorsin identifying and locating possible witnesses and suspects.

In other embodiments, the applicable authorities can have the ability tocommunicate critical information to a residence, area, or specificbuilding instantly by e-mail. These emails can contain advice aboutnecessary precautions based on the nature of the emergency, resulting inmore efficient evacuations and rescues. The system can facilitate thereturn of residents to their homes and the assist with post-incidentcommunications and distribution of aid. Similarly, in an ongoingemergency, residents can respond to emergency services via email,advising responders regarding the existence of an emergency or an updateon their current status.

FIG. 15B illustrates a diagram depicting an embodiment of electroniccommunications accounts associated with an area affected by a flood. Inthis example, the flood plain represents the area affected by the flood.The graphical user interface can display the electronic communicationsaccounts that are in the near vicinity of the affected area. In someembodiments, the first responders and/or the electronic communicationsaccounts can receive this graphical user interface. The electroniccommunications accounts can be indicated by a marker and/or by anotherrepresentation. The graphical user interface can display the statuses ofthe electronic communications accounts. For example, the graphical userinterface can show some electronic communications accounts that are inneed of help, an unknown status, or a safe status.

The flood plain (and/or an area affected by an incident) can bedetermined automatically. For example, the flood plain can be determinedby sensors determining a characteristic of the situation (for example,the water height of an area).

FIG. 16 illustrates a flowchart depicting an embodiment of a method forsending messages to residents via an email address linked to a physicaladdress. In this embodiment, a sending user, which can be a firstresponder, emergency service organization, law enforcement organization,or any other entity, can select one or more recipients and input amessage to be sent at 1602. The message can be an emergency alert,evacuation information, or any other message. Using an e-mail addressdatabase 1606, the main server system can determine the e-mail addresseslinked with the physical addresses of the selected recipients at block1604. The main server system can then use a user profile database 1610to determine the user or users associated with each e-mail address atblock 1608. The system can then send the inputted message via e-mail oranother heightened alert method to all associated users at block 1612.This message can consist of a full message or a summary of the messageand a hyperlink that links to the full message. The users can access themessage through a user access point system at block 1614 and canactivate the hyperlink to the full message at block 1616. Upon the userreceiving the message, the user access point system can request userinput regarding the status of the user, including his/her location,safety condition, condition of others, and/or other useful informationat block 1618. Upon user input regarding status at block 1620, the mainserver system can analyze the inputted information at block 1622 todetermine the level of the user's safety at block 1624. For example, ifthe user input indicates that the user has a broken leg and his/herhouse is on fire, the system can deem the user's safety to be veryunsafe. If the user is determined to have an unsafe status, the systemcan identify and/or prioritize users based on level of safety at block1626 and generate an aggregated list of users with an unsafe status atblock 1628. This list can be sent to the sending user to assist with thehandling of emergency situations at block 1630.

Government bodies, countries or local emergency preparedness entities,civil society and the like, can also create their own database of theirmetropolis. Using data from census, local community knowledge, and thelike, a mapped and/or map-able database can be created for planningpurposes. This eAddress database can be configured based on variablessuch as time (am, pm), date (days of the week, holidays), season,population, geographical characteristic, demographic characteristic,political lines, earthquake fault-lines, underground gas or pipelines(urban and rural areas), flood plain areas, and the like. This databasecan be used for pre-planning and post disaster rescue missions and/orfor residents that may not have activated and or signed onto eAddressplatform. For example, a University campus, a small town or village orremote mountainous region and the like may create such database. Basedon the above, predictable rescue missions can be forecasted using modelsbased on scientific research and area demographics

Use by Government and Relief Organizations

In another embodiment, government entities can send census forms toevery e-mail linked with a physical address. This can reduce deliverytime and guarantee delivery to maximize accurate and efficient datacollection and response rates. Government entities can also use thesystem to send voting ballots to users. Voters can then respond usingtheir eAddress and/or electronic communications account. This can reducecongestion at voting centers and allow users who cannot attend thephysical voting center to vote remotely.

FIG. 17A is a flowchart depicting an embodiment of a method fordetermining the primary residence of a user. In this embodiment, theCensus Bureau can request census analysis of one or more areas at block1702. The main server system can retrieve all the e-mail addressesassociated with all the physical addresses within the specified areasusing an e-mail address database 1706 at block 1704. At block 1708, thesystem can then retrieve all user profiles associated with the retrievede-mail addresses using a user profile database 1710. The system cananalyze the retrieved user profiles to determine if there are anyidentical user profiles at block 1712. The system checks for duplicateuser profiles to ensure that users are not counted more than once. Ifthere are no identical user profiles, the user profile, e-mail addressand physical address of each user in the specified areas can be sent tothe Census Bureau at block 1732. If, however, there are identical userprofiles associated with multiple e-mail addresses, the system candetermine all the physical addresses and e-mail addresses linked withthese physical addresses associated with the identical user profiles atblock 1714. A message can be generated and sent to each of the user'selectronic communications accounts, containing a list of the associatedphysical addresses and/or e-mail addresses linked with the physicaladdresses at block 1716. The message can be displayed at a user accesspoint system at block 1718 and the user with multiple e-mail addresseslinked with physical addresses can select one of the e-mail addresses orphysical addresses as a primary residence may block 1720. The user'slocation can then be tracked over a system-specified period of time atblock 1722 and analyzed to find a user location pattern and determinethe actual primary residence of the user at block 1724. If thedetermined primary residence of the user matches the user-selectedprimary residence at block 1726, this information can be sent to theCensus Bureau at block 1732. Otherwise, the system can prompt the userto confirm the determined primary residence at block 1728. If the userconfirms that the determined is primary residence is his/her actualprimary residence at block 1730, this information can be sent to theCensus Bureau at block 1732. If the user fails to confirm that thedetermined primary residence is his/her actual primary residence atblock 1730, the user can again be prompted to select one of the e-mailaddresses or physical addresses as a primary residence at block 1720.This cycle can continue until the determined primary residence matchesthe user-selected primary residence.

In other embodiments, the system can be used to track people when theyare displaced from one area to another. For instance, users that havebeen displaced by war, natural disaster, or otherwise, can alert supportand aid services regarding their condition and new location. In anothervariation, the displaced users can be tracked using the GPSfunctionality in their phones. Widespread use of this application canallow aid organizations to organize and execute a relief effort moreeffectively, and to narrow the search parameters for missing personsfrom the affected area. The information can also be sent to localauthorities from the affected area, who can contact displaced citizenswith updates about the situation. Furthermore, use of the system bydisplaced users can allow for real-time updates on the flow of peopleover time, including their starting locations, movements, and finaldestination.

In some embodiments, the electronic communications system can be used totrack displacement of people. For example, during war, a naturaldisaster, political discourse, or the like, people can move fromlocation to location. FIG. 17B illustrates the use of electroniccommunications accounts to track displacement of people. For example,FIG. 17B illustrates migration of refugees from Syria, to Turkey,Macedonia, Hungary, Austria, and Germany. During each phase of themigration, aid services and organizations (UNHCR) can track where peoplewere and what type of aid is needed. For example, the names of refugeesfrom Syria can be added to an electronic communications account based ontheir respective phase of migration. Then, the electronic communicationsaccount can be used to notify the refugees of critical information, suchas where to go for safety, food, shelter.

This electronic communications system can store information and can beused to identify individuals associated with the electroniccommunications account at a later time. For example, the government ofSyria can contact their citizens 20 years later based on the historicaleAddresses of the persons even though the place may not exist.

Individuals associated with an electronic communications account can becross referenced and linked. For example, Immigration Services can crossreference people associated with a particular electronic communicationsaccount and identify family members and friends for each phase of themigration. The electronic communications system can allow individuals tocontact family members and friends through the electronic communicationsaccount.

The electronic communications system can also track past history ofindividuals. For example, the electronic communications system can helptrack where the individuals came from and provide valuable informationfor Border and Immigration Services.

Police service can use electronic communications account as another formof gathering data to map activities and complaints as required and basedon needs.

Use by Financial Institutions, Utilities, and Creditors

In other embodiments, bills or bank statements can be sent to the e-mailaddress linked with a physical address, rather than through physicalmail. Using this embodiment can guarantee delivery, so that creditorsneed not worry about mail disruption and delivery failures.

In other embodiments, utility companies can use this system to instantlycontact residences regarding interruptions in service and timelines forthe restoration of services.

In other embodiments, the e-mail address and associated user profilelinked with a physical address can be connected to a financialinstitution or credit card, so that users can receive communicationsfrom the financial institution via e-mail. This can allow users to makepayments to the linked financial institution as well as third partycreditors. By linking their e-mail to their financial institution, userscould also deposit checks by uploading a picture of the check ande-mailing it to the financial institution, as well as request awithdrawal. Using the electronic communications account can add anadditional source of security compared to a personal email that can bemore easily compromised as we have seen in the endorsements within thisdocument.

In some embodiments, alerts and notifications can be sent to a communityor an area. For example, utility companies (such as gas or water) canconnect directly with a particular address. Hydro transformers serving aparticular area communicate directly with individuals linked with theaddresses it serves. In response to a power outage, an email or an alertcan be sent to electronic communications accounts associated with theaffected homes. Counter-terrorist organizations can use historicalelectronic communications account information of an individual to tracka person's historical movement. This movement can be compared with otherindividuals to identify similar movement patterns. Cross referencingthis data can help identify suspicious individuals and improvecounter-terrorism procedures and technology.

EAddresses and/or electronic communications accounts can be linked to avehicle. For example, electronic communications accounts can be linkedto license plates. These electronic communications accounts can be readby Border Services and identify whether other cars are traveling to adestination with a similar pattern based on information associated withthe electronic communications account (for example traveling from thesame area of the electronic communications account). Rental cars (forexample and rented vehicle license plates) can be associated with anelectronic communications account for cross reference checks. Forexample, individuals or suspects can be placed into a database, and thepairing of the license plate by the rental company to their electroniccommunications account would trigger a red-flag for the relevantauthorities at the time of rental. Such additional information andverification procedures can assist with identifying criminals and be anadded tool against terrorism activity and the like.

In some embodiments, electronic communications accounts can be used forresearch and for collecting data and data analysis. For example,epidemics can be traced and associated neighbors of the areas where theepidemic is traced can be notified. The same can be applied forpassengers on a plane in close quarters that require to be contacted.Communication can be more fluid and instantaneous to reduce the spreadof infection. Person visiting places like hospitals can be contactedshould the need arise via the electronic communications account.

Social Media Functionality

In other embodiments, the system can also include social mediafunctionality, so that users in the same area can interact andcommunicate instantly using their accounts linked to their physicaladdresses. Users can use the map functionality described in previousembodiments to find other users located in the same area, and connectwith them using e-mail and other social media. Social media privateaccounts can be set up using the electronic communications system. Thesocial media accounts can be private or public (for example based on auser's preference).

User Interface

FIG. 17C illustrates a diagram depicting an embodiment of a graphicaluser interface of a dashboard. In FIG. 17C, first responders can signinto an application (for example a webpage). The electroniccommunications account for the first responders is illustrated as:emergencypreparedness-toronto-ontario-canada@alphc.com. Accordingly, thereceiver of a communication from this electronic communications accountcan retrieve information associated with the sender. The sign on pageincludes a section where the electronic communications account isassociated with an email address, a location, and a data field to enterin a password. New users can also be added to the electroniccommunications account, such as supplemental users as described above.

FIG. 17D illustrates a diagram depicting an embodiment of creating a newaccount. In FIG. 17D, an individual can create a new account and add anemail, an address (for example country, state, county, city, town,street name, and number), an electronic communications account, andother information to be tied with the electronic communications account.Sub-accounts can also be created under an electronic communicationsaccount. For example, supplemental users can have varying levels ofaccess to the electronic communications account. The sub-accounts cancreate a pyramid access.

FIG. 17E illustrates an embodiment of how a first responder can send amessage to a particular area. In this embodiment, first responders cansee how many people are signed onto the area by the pins on the map.First responders can send a message to a select group of usersidentified on the map. For example, first responders can send a messageby drawing an area on the map, typing an electronic communicationsaccounts (for example AlphC emails), or send to a category of users (forexample send to all Toronto-Ontario-Canada users).

FIG. 17F illustrates an embodiment of a graphical user interface where afirst responder can select an option to send a message. The User ID canbe the electronic communications account associated with the firstresponder. The legend can show the status of individuals associated witha particular address. Characteristics of the legend icon can indicatethe status of the electronic communications account. For example, thecolors of the icon can indicate different statuses (for example unknown,need help, safe, away, cleared). The first responder can select aparticular action to select where the message will be sent. For example,the first responder can draw an area on a map. The first responder cantype in an electronic communications account (for example an AlphCemail), or send to a group of electronic communications accounts (forexample all electronic communications accounts associated with Toronto,Ontario, Canada).

FIG. 17G illustrates an embodiment of a graphical user interface where afirst responder has drawn an area on a map. This area can beautomatically selected based on characteristics, such as boundaries fora community, a radius or distance from a location, bordering on aparticular street, near a landmark or site, or the like. The area canalso be selected by a first responder. For example, the user can selectfour points on the map whereby the area as illustrated by FIG. 17E-1 iscreated.

FIG. 17H illustrates a flowchart depicting an embodiment of a method fora first responder sending a message to an electronic communicationsaccount. At block 1770, the first responder can initiate an electroniccommunications system. The electronic communications system can beinitiated via opening an application such as on a user device. At block1772, the first responder access point system receives and transmits theinitiation of the system to the main server system.

The main server system can request locational information from theaccess point system at block 1774. In some embodiments, the locationinformation can be automatically determined based on prior dataretrieved from the first responder access point system. In someembodiments, the location information can automatically be pulled fromthe access point system, or other system, to identify the currentlocation.

At block 1776, the first responder access point system retrieves andtransmits location of the access point system. At block 1779, the mainserver system can retrieve map information associated with the locationof the access point system. The map information can be retrieved from amap database 1773.

At block 1780, the first responder access point system can display a mapon the first responder access point system, and the user can select anarea on the map at block 1782. The area selected on the map can beautomatically generated by a user's response such as coordinates orseveral intersections. The area can be selected via a user's inputpointing to certain areas in the map.

At block 1784, the map that is displayed can be updated to show the areaof emergency, such as earthquake or other disaster. This area can besent to the main server system, where the main server system can fetchelectronic communications accounts associated with the area and filterbased on the User Profile database 1775 at block 1786. For example, auser profile can indicate that the first responder should only receiveelectronic communications accounts associated with teenagers, personswith certain medical conditions, visitors, or the like. This informationcan be sent to the first responder access point system and furtherinformation can be displayed to the first responder.

The first responder can select certain electronic communicationsaccounts within the area to send a message to, at block 1788. In someembodiments, the first responder can send to all electroniccommunications accounts in the area. In some embodiments, the firstresponder can select the area after viewing the electroniccommunications accounts in the area. In some embodiments, the firstresponder can select electronic communications accounts within a subsetarea of the selected area.

The first responder can select electronic communications accounts bychoosing the pinned electronic communications accounts on the map. Insome embodiments, the first responders can select criteria to send themessage based on the emergency.

At block 1790, the first responder access point system can transmit theselected electronic communications accounts to the main server system togenerate a message at block 1792. In some embodiments, the firstresponder access point system can generate and send the message itself.This would help create a form of redundancy; in any case the main serversystem is unable to send the messages (for example affected by anelectromagnetic blast).

At block 1794, the other user access point system associated with theselected electronic communications accounts can receive the messagesfrom the main server system at block 1794. In block 1796, the other useraccess point system can send a response to the message.

In some embodiments, the first responder access point system canidentify the Urgency of the message to be sent and can determine thechannel of communication based on the length of the message. Forexample, if the nature of the message is Urgent it can be sent via Text.Less urgent communication can be sent via Email. Or the first respondercan elect to send via both mediums based on their preference andjudgement.

FIG. 17I illustrates an embodiment of electronic communications accountssigned-in and located within the area on a map drawn by the firstresponders. In this example, seven electronic communications accountsare currently signed in and located within the selected area.Accordingly, the message can be sent to all seven electroniccommunications accounts. In some embodiments, all electroniccommunications accounts associated with an area is displayed. In someembodiments, a subset of electronic communications accounts isdisplayed. For example, the electronic communications system canidentify a user profile and depending on the first responder profile,the electronic communications system can filter certain electroniccommunications accounts from the map. For example, an ambulance firstresponder can display electronic communications accounts associated withindividuals in need of medical attention, whereas police firstresponders can get notified of electronic communications accounts ofcriminals in the area.

FIG. 17J illustrates an embodiment where the first responders select asubset of electronic communications accounts signed-in and locatedwithin an area on a map by drawing a boundary around the subset ofelectronic communications accounts. Thus, the electronic communicationssystem would only send the message to the subset selected by the firstresponders. Also shown in FIG. 17J, the first responders can selectadditional options and the graphical user interface displays additionalinformation. For example, although only 4 electronic communicationsaccounts are selected, the electronic communications system is sendingan alert to 5 users, indicating a secondary user associated with one ofthe electronic communications accounts (for example, an additional userresiding at the physical address associated with the electroniccommunications accounts). Furthermore, the graphical user interfacenotes that the alert is sent via email. The graphical user interfaceallows the first responders to select an option for an emergency alert,whereby a different channel of communication can be used (for example atext message).

In some embodiments, selecting an area displays how many users thecommunication will be sent to. The graphical user interface can allowthe user to enter in the alert (for example that an earthquake hasaffected your area), a department (for example from the firedepartment), request for a particular status (for example in trouble, ina fire, safe), or the like. The message can be sent to communicationchannels associated with the electronic communications account (forexample text message, mobile phone application, email address).

FIG. 17K is a diagram depicting an embodiment of a graphical userinterface of the messages sent to individuals associated with theelectronic communications account. In this example, a text message issent for the alert. The text message includes content for the alert (forexample a test message for the communication). The text message canrequest the status of the user. The text message can also indicate whenthe text message was sent and/or received. The alert includes anotification of the danger (for example Urgent, please stay in yourhomes. Heavy flooding reported in your area. We will be coming toevacuate you.)

The notification can include a response mechanism for the individual, asdescribed throughout this disclosure. In this example, the notificationincludes the option to respond that the individual is safe, away, or inneed of help. Based on the response, the color of the icon can bereflected. For example, if the response is that the individual is safe,then the icon can be colored in blue, if away then in green, and if inneed then in red.

If the individual response that he or she is safe, the electroniccommunications system can acknowledge that the individual is safe. Ifthe individual response that he or she needs help, the electroniccommunications system can acknowledge the response and note that firstresponders are on their way. This system can save many lives by creatinga system that enables quick and reliable communication between firstresponders and individuals in the area.

In some embodiments, the context of the message can be determined basedon the appropriate communication channel. For example, a text messagecan include minimal text alerting the individual of a warning. The alertcan include a link (for example a hyperlink) that the user can select toobtain further information.

FIG. 17L illustrates a diagram whereby in response to a user clickingthe “I need help” option, further options can be displayed. For example,an “I am home” or “help not home” options can be displayed. Providingeasily selectable further questioning can help custom tailor themessages to the first responders based on the further selections made.For example, if the “help not home” option is selected, then the messagecan include an indication of the new location and the type of assistancerequired. The new location can be automatically generated by a userdevice, inputted in by the user, and the like. The new location can bedisplayed on the first responder map with other useful information forthe first responder. For example, type of assistance required, age, anyspecial needs traffic data, weather data, accident data, miles per hourdata, can be provided. Such information can be helpful for firstresponders, such as helping first responders finding the fastest routeto the user.

FIG. 17M illustrates an exemplary graphical user interface where a helprequest is sent to a first responder. The request for help can includefurther information regarding the request for help. The request caninclude information that can be selected, such as in the example of FIG.17M, showing an example of three entries. A broken leg and cannot move,mother is home and may need help, and I am at location 20 Peter St. butcannot move. In some embodiments, the user can further customize itsrequest for help. For example, the user can enter in text or record acommand or audio/video to send to the first responder. The user candescribe the incident and/or show a clip (for example a video clip). Theuser can provide guidance on the danger at the incident, such as a gasleak. The user can provide information on how to provide guidance and/orthe type of particular guidance needed (for example firetrucks, entrancethrough the back door).

The electronic communications system can assess the response and makefurther determinations helpful for a first responder. For example, ifthe user selects a broken leg and cannot move response, then theelectronic communications system can determine that the user is at homeand in need of help. The electronic communications system can select theurgency of the response, location, and the like. If the user selectsthat mother is at home and needs help, the electronic communicationssystem can note that the response was referential to another party. Theelectronic communications system can determine that the response from anelectronic communications account is for a concern at a location otherthan the physical address associated with the electronic communicationsaccount.

FIG. 17N illustrates an exemplary graphical user interface of a text boxthat can be used to enter in text to send to first responders. In someembodiments, a voice capture and/or video capture option can be used.Voice recognition and/or image recognition can be used to automaticallycategorize and assess the response to send to the first responders. Insome embodiments, the actual audio and/or video clip can be sent toprovide further information on the situation and/or urgency. Undercertain circumstances first responders can provide guidance for firstaid via live video feed.

FIG. 17O-W is a diagram depicting an embodiment of a graphical userinterface for providing information on individuals in an area. FIG. 17Oillustrates a graphical user interface upon initiation by a firstresponder. In this example, several individuals are identified in aparticular area. The electronic communications accounts (for exampleAlphC email) indicate an address and an association to AlphC:

ph103-18-valleywoods-road-toronto-ontario-canada@alphc.com

611-45-sunrise-avenue-toronto-ontario-canada@alphc.com

611-45-sunrise-avenue-toronto-ontario-canada@alphc.com

2-8-log-fern-way-toronto-ontario-canada@alphc.com

These individuals are identified but the status is currently unknown andno response has been received. The first responders can have the optionof clearing the status of these individuals. The default for individualscan be unknown, or other available status. The default status of theindividuals can also be based on a recent assessment on a characteristicof the electronic communications account. For example, the defaultstatus can indicate the last location or data usage of the device.

FIG. 17P illustrates an exemplary graphical user interface wheremessages have been sent and responses received. The graphical userinterface can indicate a legend that visually portrays the status of theindividuals. For example, a color code can be used to indicate differentstatus types (for example unknown, help, safe, away, cleared). In thisexample, the individual associated with the electronic communicationsaccount ph903-18-valleywoods-road-toronto-ontario-canada@alphc.comindicated that they are in need of help: Thus, the status icon ischanged to the color indicative of a help status. The response indicatesthat this is a test simulation for this individual. The graphical userinterface can also display a map with the legend icon indicating thestatus on the map itself, showing the first responder where theindividual in need of help is located.

FIG. 17Q illustrates an exemplary change in status to “safe” reflectingin a change in the icon. For example, the electronic communicationsaccount2-8-log-fern-way-toronto-ontario-canada@alphc.com responds with a“safe.” This is reflected in the response section, the status section,and the icon on the map. The icon can be a change in the icon shape,size, color, or other indication of a change. The first responder has anoption to change the status back from safe to not cleared.

FIG. 17R illustrates an exemplary change in status to “cleared”reflecting in a change in the icon. For example, a first responder canchange the status to “cleared” once the first responder responds to theneed or identifies that there is no need (or less need). The icon canreflect this change (for example changing to a green color). Theidentification of the first responder that cleared the electroniccommunications account can be noted. Based on a “clear” status, thecolor of the indicator can change to visually display the urgency of anarea quickly to a first responder.

FIG. 17S illustrates an exemplary change in status to “cleared” asdiscussed throughout the graphical user interface. In response to thefirst responder selecting the clear tab, the electronic communicationsaccount associated with the selection can be updated to reflect a“clear” status in the table and/or the map. The status can be updated inan electronic communications account database to be used to update othergraphical user interfaces and/or other user devices and systems. Thiscan allow for real-time updating across several systems connected to theelectronic communications system.

FIG. 17T illustrates an exemplary change in status to “cleared” based ona “no response” whereas two other electronic communications accounts arechanged to a “help” status. The help status can be a result of aresponse from an alert. The icons in the status and/or the map canreflect these different statuses via a visual indication (for examplecolor change).

FIG. 17U illustrates an exemplary graphical user interface that depictsan embodiment of displaying detailed information of an electroniccommunications account for the first responders. In this example, thefirst responder can access detailed information on the electroniccommunications account: a phone number, an address, languages spoken,the property type, age range, and notes. The detailed information can bea text, embedded into the map, interactive to display furtherinformation, or the like.

FIG. 17V illustrates an exemplary graphical user interface where oneindividual has a help response but is a test simulation. The second andthird individuals have no response. The fourth individual has respondedseveral times indicating that an elderly lady requires help associatedwith a broken leg. The response can be a response received by theelectronic communications system via a text or email. Based on the colorof the indicator, the first responder can quickly identify the urgencyof the assistance required. Having a real-time indication of statusand/or urgency of help, first responders can plan rescues based on livedata improving the safety of the lives at risk.

The example graphical user interface of FIG. 17V illustrates that thefirst responder can clear the status of the individuals. For example,all four individuals have status listed as “cleared.” This can indicatethat a first responder has already responded to the request for help orthat the area has been deemed safe and thus even without a response, theindividual's status can be cleared. The cleared statuses can be updatedin real-time and thus increase effectiveness and efficiency time offirst responders. This becomes imperative in situations where time issensitive (for example a few minutes could mean life and death incertain circumstances).

FIG. 17W illustrates an exemplary graphical user interface of messagessent. In some embodiments, the graphical user interface stores anddisplays historical data. The graphical user interface can have thefunctionality to send alerts or notifications in the future upon a setperiod of time (for example in a week) or in response to a condition(for example earthquake over a magnitude of 5.2). The first respondercan also have the option of setting an algorithm to send different typesof messages and/or alerts and various times based on the occurrence of acondition (for example a different message sent to a wider area for ahigher magnitude earthquake). Precautionary alerts can also be sent daysin advance based on needs. For example, in response to an approachinghurricane, residents can be notified of what precautions need to betaken or an advanced flooding precaution, site specific and targetedmessages and alerts, to best prepare residents and first responders. Inanother example, first responders can be notified of which homes will beoccupied based on information provided by the residents. For example,the notification can state: “1 adult male age 35 will remain and thefamily 1 woman and child will drive to safe site”. This specificcollaborative communication can be vital for all parties and increasesafety.

In some embodiments, multiple alerts sent to various areas at the sametime can be viewed. Each alert can have its own mapped information.

In some embodiments, when a resident activates an account informationcan be provided to first responders, police, fire departments, and anyemergency preparedness services, local, regional or national. Thisinformation can include residents' names, number of residents, ages,special health needs, pets, and other relevant information. The goal ofproviding this information is to ensure that the required authoritiescan have the required profile for each house, apartment, and/or areaprior to any disasters. Hence ensuring, rescue missions are plannedeffectively to save lives and resources.

In some embodiments, persons that have not signed-on and need assistancecan be assisted by an activated account. The address of the personrequiring assistance can be mapped for first responders to provide help.The information of the activated account can be visible to firstresponders, The activated account can provide further details such ascontact number, type of assistance, nature of injury, etc. For example,in response to an earthquake in an area, 911 services can beoverwhelmed. An activated account can receive a call from a friendindicating he needs help. The friend can send the location and detailsfor first responders via the application which would be mapped with therelevant information as noted above.

Communication using electronic communications accounts can also beincorporated with National Incident Management Systems (NIMS)-FEMA, 911,and the like. This database could be invaluable for any EmergencyPreparedness Program/Emergency Operations Centre (EOC). The aidorganizations can communicate any critical information to an area orspecific building by instant group/mass email advising residents of whatprecautions are deemed necessary based on the nature of the emergency.Evacuations can be streamlined; residents returning to their homes canbe effectively coordinated and financial aid better disbursed viaelectronic communications account communication.

In some embodiments, different messages can be sent to differentelectronic communications accounts based on the circumstances of theincident. FIG. 18 is a diagram depicting an embodiment of differentmessages sent to different electronic communications accounts. In thisexample, electronic communications accounts associated with the area Aare provided a suggested travel route. This can indicate that the areais not yet in imminent danger. The electronic communications system canuse map and traffic information to provide the best route of escape andevacuation for individuals located within and/or associated with area A.

Electronic communications accounts associated with area B can receive amessage with very precise instructions. The instructions can indicatethat several other alternative routes are closed and are told to take aparticular route for evacuation.

Electronic communications accounts associated with area C can indicatetwo routes that residents can take.

EAddresses associated with area D can include a message to go to a SafeZone at 225west_st_Los_Angeles_California_USA@alphc.com. This electroniccommunications account can be associated with a particular address. Theindividuals receiving this message can identify the address and travelto the safe zone. In some embodiments, the electronic communicationsaccount itself can be entered into an application (for example into aroute finder that would find the best route to the physical addressassociated with the electronic communications account).

During fire, earthquakes, or other emergencies, relevant rescueoperations can also be planned with efficiency as critical profiles foreach home is available to the authorities. For example, the authoritiescan know a particular house has three people, and rescue operations canbe planned accordingly. Homeowners and/or care givers can also respondvia email during an ongoing emergency, notifying the proper authoritiesthat they are not home, or that an elderly family member is the onlyperson inside the home. Precious time and resources can be deployedaccordingly, allowing contingency planning for all rescues. Usingcommunication via electronic communications account permits the commandcenter on site to coordinate efficiently with personnel on site.

In some embodiments, the electronic communications system can be appliedin pre-disaster planning. For example, the electronic communicationssystem can develop a plan for a disaster based on the demographic of thearea.

In other embodiments, radio frequency communication aided with hand-heldsmart phones can provide timely communication designed to flash/vibrateproviding timely communication to rescue teams. For example, a redflashing “703—10 yr child”—meaning rescue required unit 703; greenflashing “1816—clear” unit 1816 is empty; “Blue flashing—1506C” pet catunit 1506; Constant Red—evacuate building immediately. The numbers andtype of alerts can vary depending on the specific authority. The sourceof the information relayed to the personnel on site can be electroniccommunications account communications from residents.

Providing smartphones with appropriate protection from water, fire andchemicals and turning on location services can also act as a safetyfeature for first responders or other relevant authorities that canrequire assistance. For example, an injured person associated with anelectronic communications account and/or first responders being sweptaway in a flooding can be located and can provide further information toother first responders for help. Vital signs of first responders canalso be monitored.

In other embodiments, electronic communications account communicationcan be used by anyone, warning a resident of a fire or any otheremergency or non-emergency event at his/her residence. For example, aresident on vacation in Rome can receive notification via electroniccommunications account about a fire at his house in Ohio.

In other embodiments, communication between residents and aidorganizations can be made using other methods of communication whenWi-Fi is not available and incorporated into a local readiness plan.Where Wi-Fi is not available during large scale natural disasters,balloons such as “project loon or “mobile Wi-Fi transportation vehicles”can be deployed providing critical Wi-Fi communication.

In other embodiments, the system can be used to track people displacedfrom one area to another. It can also provide more accurate data ofdeath and persons displaced and age profile. This data can permit aidagencies to plan for logistics and send resources more effectively. Themigration of displaced population can be tracked as they settle in safezones. Local authorities from where they were displaced can also havethe capacity to contact their displaced citizens. This capability can bean invaluable tool for all parties.

Further to the above application, people displaced and applying forrefugee status in a foreign country or under temporary care of UN couldbe required to have a registered electronic communications account. Adatabase can show the real-time flow of people by dates, including theirplace of origin, their movements, and final destination. For example, arefugee from Syria travels to Lebanon then Turkey then Greece thenMacedonia then Germany then Canada and finally to Calgary. The flow canbe tracked via his/her electronic communications account.

In another embodiment, a database of the 4.5 Million refugees displacedby the war in Syria can be created. As data can be traced back to townof origin in Syria, cross reference checks can now be done for anysuspicious person verified against “friendly,” neutral, and suspiciouselectronic communications accounts of neighbors. This database wouldprovide an enormous aid to Secret Service and show the plight ofhumanity. Similar databases can be created around the Globe to fightcrime providing authorities access to friendly electronic communicationsaccounts for cross-reference verification.

In other embodiments, police services can use electronic communicationsaccounts to assist them in fighting crime. Cross referencing criminalactivity and having the ability to communicate with “friendly”electronic communications accounts. This ability would work in reverseas well, allowing resident electronic communications accounts tocommunicate with police.

Police services can map areas of high criminal activity and/or areaswhere crimes are currently taking place. Police services can indicatefurther information on the crime in the message to electroniccommunications accounts to inform individuals of the safety risk (forexample the type of crime occurring, the name and picture of asuspicious individual under investigation). Police services can inquireindividuals to report any person that can be identified as a suspiciousindividual and/or provide updates on the incident in real-time. Policeservices can warn individuals to stay indoors or drive away from an areaof interest based on knowledge of electronic communications accounts ofhomes, vehicles, and/or individual locations in the area.

In other embodiments, the delivery of letter-mail by Postal Services canbe demonetized by the use of electronic communications accounts.Residents with active accounts can communicate with any electroniccommunications account, even those across the globe, for free or nominalcost. Large volume mailers can pay a fee for this service, but reduceoverall cost, overhead, and equipment cost. These embodiments can reducewaste, and the use of paper. The environment can benefit.

In some embodiments, large volume mailers can send targeted marketingmaterial to a particular building or an area/region using the electroniccommunications account. The entity can choose certain characteristics.These characteristics can be used as a filter when applied toinformation associated with the electronic communications accounts.Thus, electronic communications accounts that do not meet thecharacteristics can be filtered out and the message only sent toelectronic communications accounts that have met the characteristics.

FIG. 19 is a diagram depicting an embodiment of characteristics used tofilter electronic communications accounts for targeted marketing. Thecharacteristics can include interests, selected individuals associatedwith an electronic communications account, spoken languages, addressesthat are filtered or blocked, or vacations. In the example of FIG. 19,the interest characteristics are chosen. The entity chose electroniccommunications accounts associated with characteristics associated withthe categories that are checked. For example, the entity desires tomarket to real estate owners of homes, condos, land, and apartments.

In other embodiments, bills can be sent via electronic communicationsaccounts by utility companies, which can eliminate problems resultingfrom mail disruption and delivery failures. Bills can also be paid bylinking an electronic communications account to a financial institution.Financial institutions can store client address on file. Hence allcorrespondence can be based on your eAddress, or electroniccommunications account for further transparency and security. There maybe more risk with sending mail via the physical format as opposed to aneAddress. As described earlier, with few safe guards, the electroniccommunications system can provide further security than a personalemail, furthering security for the bank and their clients. Yourelectronic communications account can add another layer of security forfinancial institutions, governments bodies and the like. An individualusing an electronic communications system, eAddress, physical address,phone number, and the like for means of misrepresentation can bered-flagged.

Companies, such as utility companies, banks, and credit card companies,can link their billing information to an electronic communicationsaccount. This would improve delivery of bills, products, and services.For example, under traditional procedures, when a bill is paid, thecustomer service representative asks if the customer desires aconfirmation via email. If yes, the customer service representativewould have to request the email address. However with the electroniccommunications system, communication can be directly sent using theelectronic communications account, and the electronic communicationsaccount would route the message appropriately to the means ofcommunication desired by the individual. This can add a level ofsecurity as personal information (for example actual email address orphysical address) is not exposed and/or passed along.

In other embodiments, customer service operators does not need to verifyan email or mailing address as all receipts can be sent to an electroniccommunications account directly. This delivery can be instant, reducingthe cost of customer service interactions. The reduction of time spenton the phone by telephone operators, would further reduce overhead andoverall cost.

In other embodiments, a local Post Office can have the option to send amessage to an electronic communications account advising a user that aparcel can be collected at a retail office. In some embodiments, parcelscan be scanned using the electronic communications account (or a codeassociated with the electronic communications account). Furthermore,electronic communications accounts can include information indicatingwhere parcels can be picked up (for example based on the address wherethey reside). In some embodiments, some areas would have a centraldelivery pick-up location with an electronic communications account forease of reference for a delivery agent, resident, and/or a local postoffice.

In other embodiments, optical character readers, scanning equipment andthe like deployed by postal offices/parcel delivery companies in theirmail systems can be linked to the electronic communications system,providing various efficiencies, including delivery notification andstatus updates to homeowners sent directly to their electroniccommunications account. For example, when a homeowner has activatedtheir electronic communications account, they can have the option ofreceiving a picture or other status notifications of their delivery.

FIG. 17W illustrates a diagram depicting an embodiment of a parceldelivery process. The parcel can include an identifier for theelectronic communications account. For example, the parcel can includean email (for example 123KingStE_LA_California USA@alphc.com. At block1, the parcel can include the identifier in a way that a delivery systemcan identify the identifier. For example, the identifier can be writtenon the parcel. The identifier can be a scannable code (for example ORCode). The identifier can be a chip (for example RFID tag) that can beelectronically scanned. The scanner can scan the identifier at block 2.

The identifier can be placed on, in, around, or otherwise near theparcel to be associated with the parcel. For example, the identifier caninclude a sticker to be placed on the side of the parcel. The identifiercan be a chip inserted into the parcel.

The identifier can be identified and associated with an electroniccommunications account. The identifier can include a scan to identify anAlphC account and an associated email address. At block 3, theidentifier can be verified to determine whether the identifier is for anactivated address. At block 4, in response to determining that theidentifier is for an activated account, to activate the identifier fordelivery.

At block 5, the electronic communications system can convert theidentifier to an electronic communications account. For example, theidentifier can be a physical address, and the electronic communicationssystem can convert the physical address to an electronic communicationsaccount. In some embodiments, the identifier is the electroniccommunications account and is converted to a physical address. At block6, a communication can be sent to the identifier and/or the electroniccommunications account. For example, an email can be sent to the emailaddress associated with the electronic communications account. At block7, the parcel can be sent and the delivery status updated.

In some embodiments, part or all of the system for delivery can beautomated. For example, the parcel can be sent to an RFID scanner thatautomatically scans an RFID tag. The parcel can automatically beinputted into the system, the system can determine where the parcel isto be delivered, and the system can automatically deliver the parcel andupdate the delivery system.

In some embodiments, one or more parcels can be placed on a movingplatform (for example a conveyor belt) that passes by a reader (forexample an RFID reader). Accordingly, the electronic communicationssystem can identify parcels via the identifier (for example the RFIDtag) of many parcels that are placed on the conveyor belt. This type ofsystem can automate the mail delivery system for many mail parcels thatare unidentified and/or unorganized. The electronic communicationssystem can automatically determine where the parcel came from, which canbe useful if the destination cannot be determined and/or if thedestination was incorrect. The electronic communications system candetermine where the parcels need to go.

The electronic communications system can determine other characteristicsof the parcel using the identifier. For example, the identifier can beassociated with an electronic communications account that has a parcelregistered containing certain items. The items can be identified by acharacteristic (for example fragile, food, currency, medical device, andthe like).

The use of electronic communications accounts can minimize, oreliminate, the need for emails and/or physical addresses. Onceregistered, the electronic communications account can be activated and amessage sent directly to the electronic communications account withinformation associated with the parcel or mail (for example scannedinformation, expected delivery dates, the type of product, or otherinformation helpful to the receiver of the parcel).

In other embodiments, a personal e-mail address of a resident is notrequired to create an electronic communications account. This removes aredundant link, providing direct communication for every electroniccommunications account globally.

In other embodiments, utility companies can instantly contactresidences. For example, a hydro-transformer can have its electroniccommunications account linked to a resident's home. Any power outagescan be instantly conveyed to the effected residents. Power restorationinformation can also be conveyed. In other embodiments, this sameapplication can be applied for cable, water, gas, utility services, cityservices, and other services.

In other embodiments, electronic communications accounts can be createdfor traffic lights and intersections. This would allow neighborhoodsand/or traffic centers to communicate any information to the requiredauthorities. For example, a traffic light changing at 4 am on a quietstreet can now reprogrammed by sending an e-mail to the correctelectronic communications account.

In other embodiments, any postings on a map generated by the system canbe made via a resident's electronic communications account or using ageneric electronic communications account for the entire area. Forexample, a home for sale can be posted via the electronic communicationsaccount linked to the physical address of the home and a car sale can beposted using generic electronic communications account for the zip codein which the car is stored.

In other embodiments, residents with a registered electroniccommunications account can post consumer goods on a generated map thatcan be filtered by area of interest. For sale postings can becommunicated to a targeted audience as specified in their areas ofinterest. The electronic communications system can provide the abilityto cross-reference buyers and sellers and hence target the relevantprospective audiences.

For example, a home and/or rental property can be listed by an agent onthe generated map. The posting can then be sent to a target audiencebased on their area of interest. A consumer can also browse anelectronic communications account website and filter down to real estateand contact the agent/buyer via his/her electronic communicationsaccount. Homeowners can list their own homes for sale on the generatedmap and target prospective buyers based on their areas of interest. Thisoption to sell and target buyers provides flexibility and savings to allusers. Condos and apartments and retail space for lease can be posted onthe electronic communications account map.

In other embodiments, a retail store can also have a “Flash Sale” for aspecified time period, and/or to a targeted audience of their choosingto achieve maximum response. For example, a pizza restaurant can have apizza sale targeting three high rise apartment addresses on Tuesday 5-7pm.

In other embodiments, garage sales can also be posted on the generatedmap.

In other embodiments, businesses can target neighborhood or area for anyconsumer goods and or marketing.

In other embodiments, job postings can be posted by businesses on thegenerated map. This can enable residents to view and apply using theirelectronic communications accounts.

In other embodiments, hotels and motels can have the capability to postany flash sales or room rates on the generated map. Homeowners can havea capability to advertise available rooms for rent in their home via thegenerated map.

In other embodiments, community events can be posted on the generatedmap and targeted to neighborhoods for maximum benefit of all. Politicalrallies can be broadcasted by area.

In other embodiments, census forms can be distributed via electroniccommunications account to ensure timely delivery and to maximize dataefficiency.

In other embodiments, various parts of city planning and business can beincorporated by planners into the electronic communications system. Forexample, a database of residents' ages can assist with planning.

In other embodiments, voting via electronic communications account canprovide an accurate and viable methodology. This can be combined withother applications as dictated by the relevant voting rules.

In other embodiments, the Department of Transportation can incorporateelectronic communications account data into vehicle registrations. Thiscan provide accurate data to first responders during emergencies.

In other embodiments, the system can include social media capability viaelectronic communications generic accounts for each zip code. Theelectronic communications system can include social media affiliatedusernames to further protect identity of users and their electroniccommunications accounts.

In other embodiments, the electronic communications account forbusinesses and retailers can be incorporated into their externalwebsites. This can permit consumers to contact businesses and retailers.The capability to connect to a retailer using a uniform resource locatorand then electronic communications account can be called “shop link.”

In other embodiments, a user can input a physical address and anelectronic communications account, and a home location would appear onthe generated map. Another optional input would provide the option toactivate or deactivate the inputted electronic communications account.The user can complete a simple profile and a password would be sent to apersonal e-mail address or mobile device. Once authenticated, theaccount can be active. When a user moves, he/she can deactivate theaccount, and can be prompted to activate a new account. Utilitycompanies can also require an electronic communications account to beactivated at the time of account set-up.

In other embodiments, property management companies can be obliged toprovide resident information to first responders. In the event of anemergency, first responders can have critical information needed to savelives. Insurance companies and or by-laws can require resident. to beregistered Property management companies can use this database tocommunicate with residents. All communication can make electroniccommunications account identification easier. For example,603-125-western-battery-road-toronto-ontario-canada@alphc.com can beeasily identified by the unit number as opposed to john.smith@gmail.com.

In other embodiments, anyone with a registered electronic communicationsaccount can have the ability to search businesses. This would provide aregional or global communication network to link parties for commerce orother activities. For Example, a shoe retailers in Los Angeles can becontacted by a wholesaler or manufacture from France based on panningthe city under the “shoes” identifier. This panning ability is notavailable in a traditional email system.

In other embodiments, residents that do not have third-party emailaccounts can sign onto their electronic communications account andreceive e-mails directly into their electronic communications accounts.Family members concerned about elderly members of their family canregister their own electronic communications account and/or theirtelephone contact numbers as an additional contact in the event of anemergency. These family members can be in the anywhere and receivealerts.

In other embodiments, owners with multiple residences can register aseparate electronic communications account for every residence,indicating “vacant” unit where applicable

In other embodiments, residents can have the opportunity to link theirelectronic communications account to their credit card. This would allowresidents to pay for items, like pizza, with their credit-cardsconnected to their electronic communications account via touch-to-pay.The pizza restaurant in this case can have the resident's electroniccommunications account and the process can be streamlined. This featurecan save time for the resident as well as the vendor.

In other embodiments, during dates and times of high demand such asSuper Bowl Sunday, hockey nights, and other events, demands from foodvendors can be very high. A surge pricing module can be activated. Forexample, during the Super Bowl, a pizza restaurant can wish to advertisevia the embodiments described above. However, in a time of high demand,the restaurant can pay surge prices to advertise using the system. Theprice can depend on the demand and time of the sale. Higher demand canresult in higher fees for posting.

In some embodiments, only a limited number of pizza restaurant's salescan be permitted during surge periods. For example, a chain pizzarestaurant can advertise across America and pay a certain fee for a sale1-2 hours prior to an event. A chicken restaurant can wish to have asale during half-time. Vendors can also advertise a sale 2-5 days inadvance of the game. Residents can order early for delivery on thespecified day and time. This can provide smaller vendors the ability toalso advertise as surge prices can be very high at the day of the event.

This application can ensure residents are not overwhelmed by a largenumber of sales. Residents can also have the ability to turn offnotifications in their “area of interest” for a temporary or extendedperiod.

In other embodiments, a quality response code or similar unique code canbe generated when a user activates an electronic communications account.This code can be scanned, and can link to an electronic communicationsaccount. It can be used for sharing purposes and can be stored in aserver providing scanning functionality for any delivery and other uses.This unique code can one day replace a readable address providingdigital capability for future use. The system can have a uniquerepository for all activated electronic communications account acrossthe globe and their unique codes. This quality response code can also begenerated for infrastructure electronic communications accounts.

In other embodiments, residents can choose one or more “Areas ofInterest,” based on these interests, they would receive e-mails fromcertain vendors. These areas of interest can include real estate, pizza,shoes, or any other interests. An additional field called “wish list”can be filled, which the resident can change based on what he/she islooking for at any given time. For example, “basketball shoes men size12” or “pants size 6 (black or grey)” or “toaster oven 9 inches” or“Books about Gandhi.” The user can be as specific as he/she wishes.Vendors and business can search for a term within wish lists and sendusers specific offers and prices based on the wish lists. This featurecan allow vendors to contact users directly. Vendors can pay a fee forthis service.

In other embodiments, companies and government organizations can accessa module within the system, in which tenders can be posted and vendorscan view and make their offers directly with the firm requesting thebid. There can be a paid site on the system where bidders can use afilter to isolate their areas of expertise. Companies may have theoption of adding their web site links for further ease of reference.

In another embodiment, such as a military base, the Base Command Centreor any similar body can have their own generic account where thelocation would remain confidential. Base personal can be provided covertaccounts to ensure their privacy is protected (location data notprovided as would person(s) on location). Based on the need of themilitary and as deemed necessary the system can be programmed to ensureaccess to external and internal communication can be readily accessed asrequired.

In other embodiments, medical research can be conducted by tracking usertravel patterns and tracking person who may have been infected. Trackinghistorical and present patterns of infectious transmissions can beimplemented in certain embodiments.

In other embodiments, reviews can be posted on a generated map forrestaurants, hotels, businesses, family and children activities, healthand well-being, among others.

In other embodiments, an electronic communications account can beconnected to the weather network providing alerts as deemed necessary bythe government body.

In other embodiments, an “Alert” feature can be added to the system withdirect contact to 911 emergency services.

In other embodiments, visitors to an area can register under a visitorssection for an area or city or state. Based on this, the visitors canreceive emergency alerts while visiting the area. Their area of interestprofile can remain active ensuring that they receive any targeted alertssuch as sales and restaurant specials. To ensure security a unanimousemail account can be created for visitors, for example visitor 1,visitor 3 and so on. Visitors linked to an electronic communicationsaccount for emergency, marketing, and/or other information relevant to avisitor can be provided unique electronic communications accounts fortheir visitations. In some embodiments, the new unique electroniccommunications account can be linked with the visitor's residenceelectronic communications account. In some embodiments, the new uniqueelectronic communications account can be a temporary electroniccommunications account provided for the visitor until the end of theirvisitation. The electronic communications system can periodicallyrequest status information for visitors.

In other embodiments, residents can wish to add historical addresseswhere they lived tracing back to many generations. This database andmapping ability can provide a historical migration mapping capability.In some embodiments, the system can also comprise the ability to contactpersons that may have been your neighbor years ago.

In other embodiments, residents can wish to register for traffic alertsfor their town. This can ensure traffic alerts are provided via text oremail as required.

In other embodiments, one can communicate in real-time ‘live stream’using your electronic communications account.

In some embodiments, credit card companies can link credit cards (visa,American Express, MasterCard, etc. to your electronic communicationsaccount for further authentication of user. QR codes can be generatedfor each address to add simplicity and while ensuring that security ofdata is not breached.

In some embodiments, insurance companies can require their clients tocreate an electronic communications account and show proof of use toensure their safety is further enhanced as they can receive emergencyalerts furthering their safety

As cell phone usage increase, the need for a home line is decreasing.Your home phone number can be directly connected to 911 services. Insome embodiments, cell phones, cell and/or cell phone lines can beconnected to your electronic communications account and hence to 911 tofurther increase safety. First responders can have your address when 911services are required.

In some embodiments, the system can be configured to generate uniqueelectronic communications account, eAddresses and/or e-mail addressesbased on a phone number of a user in addition to and/or instead of aphysical civic address of the user. For example, the system can beconfigured to generate a unique electronic communications account thatis tied to a cell phone number of a user. In certain embodiments, suchgenerated electronic communications account, eAddress or e-mail addresscan comprise of the cell phone number of a user or a portion thereofbefore the domain name. For example, such generated electroniccommunications account, eAddress or e-mail address can comprise thegeneral form of: 123.456.7890@alphc.com. The particular process forgenerating an electronic communications account, e-mail address oreAddress linked to a phone number can comprise any one or more processesthat are similar to those described herein with respect to electroniccommunications account, eAddresses and/or e-mail address linked tophysical civic addresses. For example, when activating such anelectronic communications account, the system can be configured togenerate and transmit an activation code to a phone of the user, whichthe user can input into the system via his or her phone or other useraccess point system for verification. By allowing generation of uniqueelectronic communications account, eAddresses and/or e-mail addresseslinked to a phone number of a user, one can easily communicate with theuser via electronic communication simply by knowing the phone number ofthe user without actually knowledge of the e-mail address of the user insome embodiments.

Although certain embodiments refer to electronic communications account,eAddress as an e-mail address, and/or cell phone number, the electroniccommunications account can include additional and/or other forms ofinformation indicative of an electronic address. For example, electroniccommunications account can include an application and/or program, awireless device and/or remote device, text message and/or SMS messagingapplication, a card and/or card reader, an e-book reader, a database, amemory, a processor, a log-in, a username and/or password, biometricdata, identification data and/or documents, a locational device (forexample a GPS), a wearable device, an automotive device, infrastructuraldevice, an identification device, a tracker, a device that can becarried and/or used by an individual, and the like.

In some embodiments, the electronic communications system is the sourceof means for communication to an individual. A sender can send a messageto an electronic communications account, and the electroniccommunications account can send the message to the appropriatecommunication channel. For example, the receiver can desire emails overtext messages. The electronic communications account can decide that formore urgent messages, a text message is more appropriate whereasmarketing material can be sent via email.

In some embodiments, the sender can send a message via a communicationchannel (for example an email). Then, the electronic communicationssystem can determine that the appropriate communication channel is notemail but text message. Then, the electronic communications system cantake the message and send it via text message to the individual.

In some embodiments, the electronic communications system allows asender to email a telephone number. For example, the sender can send anemail to 1.555.555.1234@alphc.com where the telephone number is (555)555-1234. Thus, the phone number can be tied to an electroniccommunications account, and the electronic communications system canroute the message to the email associated with the phone numberelectronic communications account. This provides flexibility in sendingemails that is not available with traditional email systems.

In some embodiments, the electronic communications system allows asender to send a message to a particular structure, address, individual,or other identifying information. For example, the sender can send anemail to a license plate number, a name of a bridge, to a first and lastname, or the like. Then, the electronic communications system canassociate the appropriate communication to the desired receiver.

In some embodiments, the electronic communications system allows asender to send a message to a particular location when the address canbe associated with multiple particular locations. For example, apartmentcomplexes, hospitals, retirement homes, adult living centers, buildings,or the like can a add room number to the electronic communicationsaccount. Thus, the sender can send a message directly to a particularlocation (for example room number, first floor, cafeteria). This wouldassist first responders by providing a profile of individual(s) at thespecific room and related information that may be need at the time ofthe emergency.

Sending an Alert to EAddresses in an Area and User Interface forElectronic Communications Account Inbox

FIG. 20A is a flowchart depicting an embodiment of a method for sendingan alert to electronic communications accounts associated with an area.At block 2000, the main server system can transmit data associated withconcerns in an area. The data can indicate a natural disaster, or abounded area (for example the outline of a city), or an area surroundinga first responder, or the like. For example, in response to a flood, theareas of concern can indicate areas that are hit with the highest waterlevels.

The first responder access point system can at block 2002 generate a mapof the areas associated with the concerns. In some embodiments, thefirst responder access point system can indicate a single area ofconcern with options to view other areas of concern. The displayed areacan be interactive, such that a first responder can zoom in or out, canclick for further information, and the like. The area of concernsdisplayed can be prioritized based on an urgency level. For example, thegraphical user interface can display a first area of 10 feet offlooding, and have an option to display a second area of 8 feet offlooding.

At block 2004, the first responder can select an area of concern fromthe map interface. For example, the first responder can want to servicethe second area of 8 feet of flooding for various reasons. For example,there can be other responders attending the first area, the firstresponder can be in a closer vicinity of the first area, the first areaof concern can have individuals in need clustered in a single area, andthe like. The first responder access point system can send the selectedconcern to the main server system in block 2005.

At block 2006, the main server system can retrieve updated status of theelectronic communications account in the area of concern. The mainserver can interface with the electronic communications account database2022 to retrieve the updated statuses. The statuses can be retrieved bythe first responder access point system by input of the first responder.The updated electronic communications accounts can be filtered based ona user profile. User profiles can be stored in the user profile database2026. The main server system can identify the locations of theelectronic communications accounts and map it to the data retrieved fromthe map database 2024.

At block 2008, first responder access point system can display furtherinformation regarding the electronic communications accounts in the areaof concern. For example, the graphic user interface can display an iconon the map where the electronic communications account is associatedwith. The display can further provide indications of the need on themap. The display can show icons of different sizes, icon shapes, iconcolors, and the like.

At block 2010, the first responder can select an electroniccommunications account to clear the status of an electroniccommunications account. If the first responder selects an electroniccommunications account to clear, then the electronic communicationsaccount status is updated as “clear” in block 2014. The electroniccommunications account database can be updated. Then, the method cancontinue to block 2006 by accessing the electronic communicationsaccount database and the “clear” status updated in the first responderaccess point system at block 2008.

At block 2010, if the first responder has not selected to clear thestatus of an electronic communications account, then at block 2012, thefirst responder can select an electronic communications account(s) tosend a message. The first responder can also add additional informationto include in the alert. The first responder can select to send amessage to all electronic communications accounts. The first respondercan have additional options to the message. For example, the firstresponder can decide to send a message on a particular channel ofcommunication. The first responder can request certain types ofinformation from the electronic communications account. The firstresponder can send a customized warning or message to the electroniccommunications accounts.

If the first responder selected the option of sending a message, thenthe first responder access point system at block 2013. The main serversystem can receive the command to send the message at block 2016, andgenerate a message to send to the selected electronic communicationsaccounts. The message can be selected based on a filter. For example,the first responder can select a preference for sending the message, andthe main server can identify the electronic communications accounts thatmeet the requirements of the preference. For example, the preference canbe to send the message to the elderly or those in imminent danger.

At block 2018, other user access point systems associated with theselected electronic communications accounts can receive the messagesfrom the main server system, and at block 2020 the other user accesspoint systems can respond to the messages.

FIG. 20B is a diagram depicting an embodiment of a log-in screen for theelectronic communications system. The first responder, an individualassociated with an electronic communications account, supplementalindividuals associated with the electronic communications account,individuals with an account with the electronic communications accountsystem, and the like can enter in credentials to log into the electroniccommunications system. For example, an email address and password can beused. In some embodiments, the electronic communications account can beentered. In some embodiments, biometric data is used to verify anindividual.

FIG. 20C is a diagram depicting an embodiment of an inbox of theelectronic communications system. The inbox can be for a particularelectronic communications account (for example,603-125-western-battery-road-toronto-ontario-canada@alphc.com). Theelectronic communications account can be predetermined based on alocation, created by a user, predetermined by another characteristic(for example description of the location of interest such as “parkinglot”), or a combination of a subset.

The inbox includes an option to view incoming mail, sent mail, draftmail, and junk mail. The spam filtering can be more efficient thantraditional spam filtering. Where traditional spam filtering relies onother characteristics (for example whether the email address isassociated with prior spam mail), the electronic communications systemcan filter spam more readily because the electronic communicationsaccount can be tied to a physical location. Not only can the electroniccommunications account generation itself be regulated (for examplerequiring verification of residency of a location), the mail can beassessed based on the physical location associated with the electroniccommunications account. For example, if mail arrived from an electroniccommunications account that is located in the middle of the ocean or outin a desert, the electronic communications system can determine thatthis mail is likely spam.

The inbox can include a preview of the mail received. For example, theelectronic communications account, the title, a preview of the first fewlines of the mail, and the time of arrival for the mail can bedisplayed.

The inbox can also allow a user to purchase mail credit and displayavailable credit for the account owner of the electronic communicationsaccount. For example, the account owner can have 1 free mail creditavailable per day but have the option to purchase more mail credit. Thiscan replace the need for stamps, envelopes, and other requirements formailing a parcel via the post office.

FIG. 20D is a diagram depicting an embodiment of a draft mail to be sentvia an electronic communications account. The user display includes anaddress book where previously accessed electronic communicationsaccounts can be retrieved. This option also allows physical mail, phonenumbers, or other means of communications to be retrieved from theAddress book. The mail can be sent from the electronic communicationsaccount to a physical mail address, text messaged to a phone number,executed on an application on a user device (for example a phoneapplication), and the like.

The graphical user interface can include a map option. The draft mailcan be sent to a physical location. The electronic communications systemcan determine the electronic communications account (or other addresssuch as physical address) based on a marker placed on a map. The inboxcan include an input where a user can manually enter in an electroniccommunications account, a phone number, or other communication address.

FIG. 20E is a diagram depicting an embodiment of a map option forsending mail from an electronic communications account. The electroniccommunications system can display a map showing the location of theelectronic communications account. The location can be the location ofthe user device. The location can be a location based on an electroniccommunications account that is to receive the mail. The location can belocations saved in the address book, or locations associated withaccounts in the address book (for example the location of a phoneassociated with a phone number in the address book). The user can changethe view of the map, such as zooming in or out. The user can search forparticular locations (for example an intersection or a building name).The user can then select a location to send the mail to.

FIG. 20F is a diagram depicting an embodiment of a map providing theoption to add an address and/or location of interest to the addressbook. The electronic communications system can provide the user theoption to look at several points on a map. For example, the graphicaluser interface places several markers in a location. These markers canbe based on a search or category (for example a search for nearby postoffices).

The user can select the marker and the graphical user interface canprovide more information on the location. For example, the graphicaluser interface can provide the electronic communications account of themarker. The user can be provided the option to add the marker and/or theinformation associated with the marker (for example the electroniccommunications account associated with the marker). The user can selectto add the location to an address book and/or send a mail to the addressmarker.

FIG. 20G is a diagram depicting an embodiment of a draft mail to be sentto an electronic communications account. The electronic communicationsaccount inbox can provide a location on the draft email to enter in thedestination for the mail. For example, the destination can be anelectronic communications account, an email, a physical address, a phonenumber, an application ID, and the like. The draft mail can include asubject line to add a title and a body section to add the body of themail. FIG. 20H is a diagram depicting an embodiment of a sent mail to anelectronic communications account.

FIG. 20I is a diagram depicting an embodiment of selecting a channel ofcommunication. In some embodiments, the mail can be received by asender. In this embodiment, the sender is an electronic communicationsaccount (603-125-western-battery-road-toronto-ontario-canada@alphc.com).The receiver is an electronic communications account(133-falkirk-street-toronto-ontario-canada@alphc.com).

The user can indicate how the mail will be received. For example, theuser can indicate that all mail will be sent via personal email, workemail, directly to the electronic communications account inbox, textmessage, application on a user device (for example phone application),other channels of communication, and/or a combination. In someembodiments, the user can create filters for determining how the mailwill be determined. For example, for short messages, the user can set atext message to be sent. In some embodiments, the filter can includeidentifying characteristics of the sender (for example sent from aparticular area, from an electronic communications account, from acompany, etc.) and the electronic communications system will determinewhich channel of communication the mail will be sent.

FIG. 20J is a diagram depicting an embodiment of electroniccommunications account verification to reduce spam and increasetransparency. In some embodiments, the electronic communications accountsender can need to verify the user before generating an electroniccommunications account, being able to receive and/or send mail via theelectronic communications account, send the electronic communicationsaccount to another user, or other functionality associated with theelectronic communications account. For example, a mail sent to theelectronic communications account can only be viewable upon logging intothe system and verifying user information (for example verifying thatthe user resides at the address associated with the electroniccommunications account).

FIG. 20K is a diagram depicting an embodiment of a sent box for anelectronic communications account. The sent box can list mail sent toother addresses (for example electronic communications account, physicaladdress, phone number). The illustration of FIG. 20K illustrates a listof electronic communications accounts where mail was sent. The sent mailcan indicate a channel of communication. In some embodiments, the sentmail indicates an electronic communications account, and the receivingaccount determines the channel of communication. In some embodiments,the sent mail can indicate a characteristic of the mail that affects thechannel of communication. For example, the sent mail can indicate anurgency whereby the receiving account can send the mail via text messageif a higher urgency is indicated.

FIG. 20L is a diagram depicting an embodiment of an option to purchasemail credits. In some embodiments, mail credits can be purchased. Forexample, mail credits can be purchased according to the amount of mailcredits. For example, each mail credit can cost $5 if purchasing 100credits, but can cost $100 if purchasing 3000 credits.

Mail credits can be used for different purposes and/or can costdifferent credit amounts. For example, it can cost a credit to receiveand/or send a mail to an electronic communications account. There can bea surcharge for certain features. For example, additional mail creditscan be required for sending a message through a particular channel ofcommunication (for example more credits for a text message). Mailcredits can be used to send large files and/or send messages at aparticular period of time. FIG. 20M is a diagram depicting an embodimentof successfully purchasing mail credit.

FIG. 20N is a diagram depicting an embodiment of a reply mail wherebythe original mail indicates the electronic communications account. Insome embodiments, for a reply and/or forward mail indicates informationon the prior mail. Traditional emails show just the email of the sender.However, in some embodiments of the electronic communications system,the email address can be hidden, and only the electronic communicationsaccount can be shown. This improves privacy and security by adding anadditional layer between the receiver and the email address.

In some embodiments, the reply and/or forward email can contain moreinformation. For example, a physical address, a phone number, or otherinformation associated with the electronic communications account can beshown. The electronic communications account can be shown to those thathave authentication to see the electronic communications account (andother information). In some embodiments, the channel of communication isshown in the mail. For example, if the mail is sent via text message,then the reply email can show that the message was sent to a phonenumber. FIG. 20O is a diagram depicting another embodiment of a replymail indicating the electronic communications account of the originalsender.

FIG. 20P is a diagram depicting an embodiment of drafting a responsereply email. In some embodiments, a response reply email can berequested. For example, upon generation of the electronic communicationssystem, the electronic communications system can run a test whereby mailis sent to an electronic communications account. In the example of FIG.20P, the electronic communications account is associated with a physicaladdress (133 Falkirk st). The response reply email indicates that theelectronic communications account is functional to the electroniccommunications system. FIG. 20Q is a diagram depicting anotherembodiment of drafting a response reply email.

Status Between User and First Responder

FIG. 21 is a diagram depicting an embodiment of statuses between a useraccess point system and a first responder access point system. At block2100, the user can initiate an electronic communications systemapplication on the user access point system. For example, the user canopen an application on a remote device that initiates an application forthe electronic communications system. In some embodiments, the remotedevice is continually transmitting information to the electroniccommunications system without requiring the user to open a separateapplication.

At block 2102, the user access point system can identify the location ofa user access point system. In some embodiments, the user can designateanother device for the location to be accessed and sent to the mainserver system. In some embodiments, the location of several user accesspoint systems can be sent. For example, the location of a remote userdevice (for example cell phone) and the location of a vehicle can besent to the main server system.

At block 2104, the main server system can retrieve informationassociated with the user access point system. For example, the mainserver system can retrieve map information of the location for the useraccess point system from a map database 2108. The main server system canretrieve user profile information from a user profile database 2110. Auser profile database 2110 can be helpful in determining characteristicsassociated with an electronic communications account. For example, theuser profile database 2110 can request location information for a remotedevice for one user, but can request location information for a vehiclefor another user.

At block 2112, the user access point system can display map information.The map information can be of a location of the user access pointsystem. For example, if the user access point system is currentlylocated in Toronto, Canada, the map can be a map of Toronto.

In some embodiments, the current status of the user can be illustrated.For example, the default status can be “unknown.” In some embodiments,the user access point system can determine a status based on informationavailable. For example, the user access point system can use the laststatus that was available for the user access point system. The useraccess point system can change the default status based on an incident.For example, for a routine update of map information, the last statuscan be used, but in response to a recent fire in the area, the systemcan set all default statuses to “unknown,” given the new danger.

In block 2114, the user can mark a location on the map. The mark can beto direct the attention of the first responders. For example, if theuser is close to the fire but not directly there, the user can mark acertain area such that the first responders can have a better idea forthe location of the fire. The mark can be for a particular specificlocation or can be drawn with boundaries or a certain area (for exampleradius). The user can use these features to indicate an area (forexample when the user is unsure on the exact location).

If the user marks a location on the map, the map is retrieved in block2116 and displayed at block 2112. The map can illustrate the user accesspoint system and/or the marked location. The map can be sent to thefirst responder access point system to display the marked locationand/or the user access point system in reference to the first responderaccess point system location.

If user does not mark a location on the map, the user can provide astatus at block 2118. If the user does not provide a status on thegraphical user interface, then the user access point system can continueto display map information at block 2112 and determine whether the usermarks the map at block 2114 and whether the user provides status atblock 2118.

If the user provides a status, then the status is transmitted at block2120. The main server system receives the transmitted updated status,and the main sever system identifies a first responder access pointsystem to respond to the status at block 2122. The main server systemcan determine the first responder based on characteristics of the firstresponder, the user access point system, and/or the type of alert. Forexample, the main server system can identify a first responder in thevicinity of the user access point system. The first responder can bechosen based on the particular need (for example firefighters for afire). The first responder can be chosen based on the availability (forexample some first responders can be busier than others).

At block 2123, a notification can be generated and sent to the firstresponder access point system. At block 2124, the first responder accesspoint system can display a map with the icon representing the useraccess point system and its location, status, and/or other information.

At block 2126, the first responder access point system can change thestatus of the user access point system (for example clear the status ofthe user access point system). For example, the first responder can haveaddressed the need of the user (for example broken leg). Then, the firstresponder can clear the status at block 2126 of the user access pointsystem, and the main server system can update the status database atblock 2128 and transmit updated status of the user access point systemto other systems. For example, the status can be sent to the user accesspoint system such that the user can see that the status is changed. Theuser can thereafter challenge the change of status, or request moreinformation on the change. The status can be sent to other user accesspoint systems (for example family members concerned about the user). Thestatus can be sent to other first responders notifying them that thehelp request has been handled.

Inferring Status of Users

FIG. 22 is a diagram depicting an embodiment of an algorithm forinferring the status of an electronic communications account. Thealgorithm can be used to infer a status of an electronic communicationsaccount. For example, the algorithm can be used to determine a defaultstatus (for example upon initiation of the system for the user device).The algorithm can also be used when a response from an electroniccommunications account has not been received. The time the system waitsbefore the algorithm is run can be based on several factors. The systemcan wait a shorter period of time when the urgency of an incident ismore imminent. The algorithm can be run on some user devices but notother user devices associated with the same electronic communicationsaccount. The algorithm can use one set of characteristics for onedevice, and another set of character

At block 2200, the algorithm can determine a status (and/or infer astatus) of an electronic communications account based on differentcharacteristics. The algorithm can infer the status of an electroniccommunications account using prior communication with the electroniccommunications system at block 2202. For example, if the user device wasconnected with the electronic communications system an hour before in alocation far away, then the algorithm can determine that the user is notlikely affected by the incident (for example user is likely far awayfrom the fire in California if the user connected with the electroniccommunications system in New York). In another example, the user canhave connected with the electronic communications system and reportedthat the user was safe from the small fire that started an hour ago andwas heading west away from the fire. This can be used by the algorithman hour later to infer that the individual is likely safe because theindividual knew of the danger and was heading away from it.

At block 2204, location information can be used to determine the statusof the electronic communications account. A user device can sendlocation information (for example latitude and longitude information) tothe electronic communications system such that the electroniccommunications system can locate and/or track the movements of the userdevice. The algorithm may not need to send an alert and request aresponse if the electronic communications account system knows that theuser device is not near the location of incident. In some embodiments,location information can be received from various user devices. Forexample, location information can be received from a mobile phone. Ifthe mobile phone does not currently have the option to send locationinformation, the vehicle location information can be received. If bothare received, both can be compared and if the vehicle and mobile devicelocation are the same, then the algorithm can apply a higher likelihoodof the location for the individual.

At block 2206, time stamp information can be used. Time stamp can beused in conjunction with other information. For example, locationinformation 2204 can be used with time stamp information 2206 todetermine where the individual is likely headed by assessing patterns ofmovement over time.

At block 2208, the algorithm can use personal information of the user.For example, the algorithm can use demographic data, sex, race, economicstatus, age, level of education, income level and employment,psychiatric data, medical data, a personality trait, an interest,values, attitudes, lifestyles, opinions, preferences, likes or dislikes,predilections, purchase history, browser history, financial history anddata, credit history and data, personal history and data, other activitydata, and the like. For example, if the individual can only walk at aslow pace and is determined to be near an area of danger, then thealgorithm can infer that the status of the individual is likely not goodand is likely in need of help.

At block 2210, responses from other users can be used. For example, ifthe electronic communications system receives responses from severalfamily members, the electronic communications system can request thefamily members to report their latest status of other family members(for example are they on vacation out of town? Are they with you andsafe?).

At block 2212, use of the user device can be assessed to determine thestatus of an electronic communications account. The use of data on auser device can indicate that the user is alive and is looking for help.The ack and nack from a user device can indicate whether the user isreceiving alerts. The user can be searching for particular informationthat can indicate his or her current status (for example searching for“finding family members in natural disaster” can indicate that theindividual is safe but looking for family members).

At block 2214, the battery level on a user device can be assessed. Forexample, if the battery level was very low in the last hour and the userdevice is not responsive to alerts and/or notifications, then thealgorithm can determine that it is likely that the user device hasturned off from a lack of power.

At block 2216, responses from surrounding members can be used to assessthe status of the electronic communications account. For example, if theelectronic communications account is found to be among other electroniccommunications accounts, and about 80% of the other electroniccommunications accounts in the vicinity of the electronic communicationsaccount of interest reported that they are safe and not in need, thenthe algorithm can determine that it is likely that the electroniccommunications account of interest is also safe.

At block 2218, the algorithm can assess the incident (for example fire)and/or location of interest (for example particular building) todetermine the status of an electronic communications account. If theincident of danger moves from one location to another (for example agunman drives to another town), then the status of the electroniccommunications account in the previous area of the gunman can changefrom potentially in danger to cleared.

The algorithm can make a determination of the status of the electroniccommunications account. The algorithm can determine a confidence factorof the determination of the status of the electronic communicationsaccount. For example, an electronic communications account can have ahigh confidence factor that the electronic communications account issafe because the individual last connected with the electroniccommunications system 10 minutes ago and was far away from the incident.

The algorithm can infer a status using a variety of different methods.For example, the algorithm can be a threshold, a lock step, a table lookup, machine learning, and/or a combination. The algorithm can includeself-learning techniques (for example a neural network trained for afire, and another neural network trained for a flood).

Prioritize First Responder Resources

The electronic communications system can prioritize resources for firstresponders. For example, the electronic communications system can lookat various factors when deciding how to approach an incident of danger.

FIG. 23 is a diagram depicting an embodiment of prioritizing firstresponder resources. The electronic communications system can prioritizefirst responder resources based on a variety of different factors 2300.The electronic communications system can prioritize based on mobility2302. The electronic communications system can assess trafficinformation and route information to determine where first respondersshould go to first. For example, if there are areas of high traffic butlow percentage of people in need, whereas another location has lowtraffic but high percentage of people in need, the electroniccommunications system can direct more first responders to the latterthan the former location.

The electronic communications system can also assess other mobilityfactors. For example, the electronic communications system can determinethat some of the first responders are fast but may not be able to takeon patients that need a smooth ride to the hospital. The electroniccommunications system can also look at the accessibility of theproperty. If specialized equipment is required and/or if the property isnot easily accessible, then the electronic communications system canprioritize accordingly.

In 2304, the location information can be used to prioritize firstresponders. For example, the system can determine that a first respondershould pick up one patient in its near vicinity before picking upanother patient far away. The system can determine that there aresufficient first responders in one area and can send supplemental firstresponders in that one area to another area that is in need of firstresponders. First responder activity can be tracked for efficiency basedon location services being turned-on on their mobile device. Vital signsof first responders can be linked the main database providing timely andlive data.

In block 2306, the timestamp information can be used to prioritize firstresponders. For example, if the time stamp of an urgent request can havea higher priority than another urgent request that was recently justsubmitted.

In block 2308, the system can assess personal information of a user toprioritize first responders. A person's health or age can be used todetermine the fragility of the individual, and can set to attend tothese individuals over those that are healthy and in their 20's to 30's.

In block 2310, the system can assess the type and urgency of theassistance required. The system can direct a first responder to anindividual that is suffering from a heart attack as compared to anindividual with a broken leg, given the urgency of providing care fasterto an individual suffering a heart attack. The system can also weightthe fact that an electronic communications account individual with anunknown status can be safe, and thus a first responder can be sent tocheck on an individual with an affirmative help response that is furtheraway, rather than an individual without a response that is closer to thefirst responder.

In block 2312, the system can allocate a first responder's resourcesbased on other first responder's availability. If the system shows thatother first responders can be able to attend to the needs of individualsin areas A and B, then the system can send the first responder to areaC.

In block 2314, the location of hospitals and treatment facilities can beassessed. For example, the first responders can be sent to an individualthat is on the way to a hospital. The system can prioritize treatmentfacility locations based on the needs of the individuals. For example,the electronic communications system can inform the treatment facilityservices to establish a location for treatment in a close vicinity of acluster of individuals with a high urgency of help.

In block 2316, responses of surrounding members can be used toprioritize first responder resources. For example, if people in one areaare helping each other such that the statuses of individuals arechanging more to clear for the same type of need, the system can inferthat the other individuals with similar help needs can ultimately beclear from the need. Accordingly, responses from surrounding members canbe a good indication of what will happen to the individual in thefuture.

In block 2318, characteristics of the incident (for example fire) and/orlocation of interest (for example houses made of wood) can be used toprioritize first responders. For example, if a fire occurs and thehouses up north are made of wood, the first responders can be sent tothose houses as highest priority because those houses can spread thefire faster than the other houses made of stone. If the fire isspreading to areas where houses are made of wood, then first responderscan be sent to block the fire from spreading in that direction.

In block 2320, data from the user device can be used to determine firstresponder resources. For example, if the user device is a medicalsensor, the medical sensor can provide update information on theindividual which can affect the urgency of the help needed. Theindividual can be getting better and have a lesser need for help, orvice versa. The user device can be a mobile phone, and the system canreceive a video or audio feed of the incident. This information can beused to determine the urgency of the help requested by the individual,and accordingly, prioritize the first responder resources.

Global and Local Marketing Platform

In some embodiments, an entity can use the electronic communicationssystem to initiate a local, national or international marketingcampaign. The entity can send an advertisement, an offer for sale, acoupon, a discount, a service, a product, a solicitation, or the like.Marketing can be precise, site specific and targeted to eAddress basedon area of interest. The electronic communications system can allow theentity to identify electronic communications accounts and send theadvertisement to the identified electronic communicationsaccounts/eAddresses. Traditional marketing lacks the many possibilitiesand advantages associated with targeted electronic communications systembased methodology of marketing. The eAddress of the entity can betransparent to all receivers of the marketing material.

The marketing entities can be vendors (for example local vendors) and/orbe in communication with vendors. The marketing campaigns can targetvisitors with special needs, recommendations, coupons, sites to visit,and the like. The marketing companies can target a specific building, asmall and/or large area based on panning, and the like. The marketingcampaign can be directed toward a particular category and associatedindividuals to the category. Accordingly, the marketing campaign can bearea specific and based on a client's area of interest.

For example, the user can desire to select a particular area. Thisselection can be based on area of interest, a percentage of individuals,demographic data, sex, race, economic status, age, level of education,income level and employment, psychiatric data, type of business, medicaldata, a personality trait, an interest, values, attitudes, lifestyles,opinions, preferences, likes or dislikes, predilections, purchasehistory, browser history, financial history and data, credit history anddata, personal history and data, other activity data, and the like.

In some embodiments, the electronic communications system can allow theentity to filter electronic communications accounts. For example, theelectronic communications system can select criteria to be used tofilter electronic communications accounts (for example electroniccommunications accounts associated with households with children). Theelectronic communications system can allow the entity to filterelectronic communications accounts in different stages. For example, theentity can filter electronic communications accounts based on aselection on a map, then select criteria to further filter theelectronic communications accounts once chosen.

FIG. 24A is a flow diagram depicting an embodiment of an entityinitiating a marketing campaign. At block 2400, the marketing entityaccess point system can initiate the electronic communications system.The marketing entity can initiate the electronic communications systemmy logging into the website. The marketing entity can automaticallyinitiate communication with the electronic communications system byusing communication protocols (for example API, push, or pull callfunction).

The marketing entity access point system can request the electroniccommunications system to display a map of a location and/or to retrievelocation information. The map information can be displayed on agraphical user interface. In some embodiments, the map information canbe coordinates. The map information can be of a selected location. Themap information can be associated with a location of an electroniccommunications account, a marketing entity location, the location of avendor or franchise location, or the like.

At block 2402, the main server system can identify map information forthe location. The map information can include topographical information,road information, climate information, political information, economicinformation, demographic information, physical map information, resourcemap information, thematic map information, and the like. The map can bedisplayed in different formats. For example, the map can be projected incylindrical, azimuthal, conic, polyhedral, retro azimuthal, and thelike. The main server system can retrieve map information from a mapdatabase 2404.

At block 2406, the main server system can identify eAdresses associatedwith the location. The main server system can retrieve information onelectronic communications accounts in the electronic communicationsaccount database 2408. The main server system can identify electroniccommunications accounts that are associated with the location. Theelectronic communications accounts can be identified based on a distancefrom the location. The electronic communications accounts can beidentified base on geographical lines, political lines, topographicallines, demographic lines, resource lines, climate lines, and the like.The electronic communications accounts can be identified based on theelectronic communications accounts assigned a residence associated withthe location (for example the electronic communications accounts that isassociated with a residence within a town). The electroniccommunications accounts can be identified based on the electroniccommunications accounts currently associated with the location (forexample currently within 5 miles of the location).

At block 2410, the main server system can determine whetherpredetermined areas exist. For example, predetermined areas for certainelectronic communications accounts can exist (for example an area ofconcentrated demographic or size of household). The predetermined areascan be preconfigured (for example preconfigured a particular portion ofa town by the marketing entity). The predetermined areas can be areasthat users can sign onto (for example a user signs up for a pizza storecoupon for a particular area).

If predetermined areas for electronic communications accounts exist,then at block 2412, the areas and/or the electronic communicationsaccounts for the areas are added to the map information. Then, the flowdiagram continues to block 2414. If the predetermined areas forelectronic communications accounts do not exist, the flow diagram cancontinue directly to block 2414.

At block 2414, the map information can be displayed on the marketingentity access point system. The map information can displaycharacteristics of the map (for example display political and climatelines, but optionally display economic information).

The map information can include interactive options. At block 2416, themarketing entity can select an area. The area can be selected using apanning tool, drawing a boundary around an area, a selection of apredefined area, and the like. The selection can be of individualelectronic communications accounts. The area can be automaticallyselected based on a criteria. For example, the area with the highestdensity or number of electronic communications accounts can beautomatically selected. The marketing entity can select a single areaand/or multiple areas.

At block 2418, the marketing entity access point system can displaycriteria that can be used to further filter the electroniccommunications accounts associated with the selected area. The marketingentity can select certain filters to filter in or out the electroniccommunications accounts. For example, the criteria can include filteringout all households with less than two people. The criteria can includeonly maintaining (filtering in) electronic communications accounts witha total household income of over $100,000.

At block 2420, the marketing entity access point system can receive theselection of criteria. The criteria can be automatically selected basedon a criteria selection algorithm. For example, for one state, thecriteria can be geared toward the middle class whereas for anotherstate, the criteria can be selected based on a particular demographic.

At block 2422, the main server system can apply the criteria to theelectronic communications accounts in the selected area. The electroniccommunications accounts that remain after the application of thecriteria can be displayed by the marketing entity access point system atblock 2424. The electronic communications account can be displayed onthe map, as a list, and the like.

At block 2426, the marketing entity access point system can receivemarketing material to send to the electronic communications accounts.For example, the marketing material can include an offer for sale, anadvertisement, and the like. The marketing material can be part of aprescreen procedure where the offer can be a firm offer for credit or abinding offer.

The marketing material can include a product/service and/or anidentifier for the individual. For example, the marketing material caninclude a car or a loan for the individual. The marketing material caninclude a social media identifier (for example username) that can beused to market to the user.

The marketing material can be at least partially automaticallydetermined. For example, the marketing material can be determined basedon the criteria selected to filter the electronic communicationsaccounts. For example, if the criteria included income of over $100,000,then the marketing material can include luxury goods.

At block 2428, the main server system can identify the channel ofcommunication for the electronic communications account. For example,some electronic communications accounts can be configured to receivemarketing material via physical address. Then, the electroniccommunications system can send the marketing material to the physicaladdress. Other electronic communications accounts can be configured toreceive marketing material via text message.

At block 2430, the main server system can generate the marketingmessages to send to the electronic communications system. The mainserver system can generate the marketing messages differently based onthe channel of communication for the electronic communications account.

In some embodiments, the channel of communication (for example an email,telephone) is not disclosed to the marketing entity. The marketingentity can only be able to select an electronic communications account.Thus, the electronic communications system provides security by reducingthe companies that have access to personal information such as an emailaddress or telephone number. A marketing entity can target a marketingcampaign on a subset of individuals based on area and/or characteristicswithout having the personal information and or addresses the individual.They would have general information of potential clients meeting theircriteria.

At block 2432A and 2432B, the main server system transmits the marketingmessages to users 1 and 2, and the user 1 access point system and user 2access point system displays the marketing message.

At block 2434, User 1 access point system receives a response to themarketing message. For example, user 1 can have selected an answer to aquestion (for example would you like to take out a loan?). User 1 canhave selected a hyperlink to provide more information on the marketinginformation.

At block 2436, the main server system can identify a service or productprovider for the marketing message. For example, the main server systemcan identify several banks that can provide a loan to the user inresponse to the user selecting the option of taking out a loan.

FIG. 24B is a diagram depicting an embodiment of a front page of awebsite for the electronic communications system. The website offers theuser an option to sign up or to log in. The user can sign up as anindividual associated with the electronic communications account, and/oran individual seeking to send messages to electronic communicationsaccounts.

FIG. 24C is a diagram depicting an embodiment of a login page for theelectronic communications system. The login page can include an entryfor an email and a password. The email can be the electroniccommunications account and/or can be other means of identifying anindividual (for example social security number, email, phone number).The log in page can have an option to retrieve a forgotten passwordand/or create an account.

FIG. 24D is a diagram depicting an embodiment of mail credits needed forinitiating a marketing campaign. In some embodiments, the user canpurchase mail credits. For example, the user can purchase a 500 mailcredits for $5. The mail credits can be used to determinecharacteristics of the marketing campaign. For example, the mail creditscan determine the size of an area to send marketing material to, thenumber of electronic communications accounts, the types of filters thatcan be used, the number of areas that can be selected, and the like.

FIG. 24E is a diagram depicting an embodiment of an option to view a mapfor the marketing campaign. The individual can have the option to selecta map option. The map option can display a map of a desired location.The location can be where the electronic communications accountassociated with the inbox is located. The map can be of a location thatthe user has previously inputted. The map can be of a location thatautomatically determines a location based on an algorithm (for examplechooses a certain location for a certain period of time in the day oryear). The map can be of a location of another electronic communicationsaccount and/or location of interest (for example an electroniccommunications account in the address book).

FIG. 24F is a diagram depicting an embodiment of a map view with areasof selection for the marketing campaign. In some embodiments, the mapdisplays predetermined areas (for example Area A, B, and C). Forexample, the predetermined areas can be determined based on a locationof interest (for example 5 miles around every fast food restaurant).This way, the marketing material can be centered around characteristicsof the location of interest (for example coupons for the fast foodrestaurant chain).

In some embodiments, the individual can select an area. The individualcan select an area using a panning tool. The individual can select anarea by clicking on the predetermined areas (for example selecting onArea A). The selected area can represent the area that the user wouldlike to market to.

FIG. 24G is a diagram depicting an embodiment of an area selected by theuser on a map. The user can select a boundary around an area as aselection of an area. For example, the user can draw a boundary. In someembodiments, the user can select certain points on the map and thepoints can be connected to form a boundary. For example, in FIG. 24G,three points are selected, and the points are connected by a straightline. This triangle represents the area selected by the user. In thisexample, the map shows 12 electronic communications accounts. Theindividual is able to select 9 out of the electronic communicationsaccounts by creating the selected area.

FIG. 24H is a diagram depicting an embodiment of criteria that can beused to filter electronic communications accounts within a selectedarea. The electronic communications accounts that were selected withinan area can be further filtered via criteria that can be selected. Theelectronic communications accounts can be filtered before the electroniccommunications accounts are shown on the map.

The criteria that can be selected can be based on characteristicsassociated with the electronic communications account. For example, thecharacteristics can include an area of interest. The Area of interestcan include categories such as baby items, books, electronic, garagesales, health, home jewelry, toys, games, books, other, or the like. Thecharacteristics can include an interest or hobby of the individual. Thecharacteristics can be an innate characteristic of the individual (forexample green eyes, black hair). The characteristics can includehousehold information, demographic, economic, political, and the like.The characteristics can include an association of the electroniccommunications account (for example community associations, the type ofjobs, real estate or other ownership).

In some embodiments, the individual can select one or morecharacteristics. In some embodiments, the characteristics selected canbe a range, a threshold, a minimum and/or maximum, a yes/no, a dropdownwindow, or the like. In some embodiments, the characteristics caninclude a channel of communication. For example, the marketing entitycan only want to direct its campaign to individuals they can textmessage and/or email. By providing this type of criteria filtering, themarketing entity can filter electronic communications accounts withoutobtaining personal information regarding the individuals associated withthe electronic communications account.

FIG. 24I is a diagram depicting an embodiment of additional criteriathat can be used change the marketing campaign. In some embodiments, alanguage can be selected. The language and/or other criteria can be usedto filter in or out certain electronic communications accounts (forexample send messages only to electronic communications accounts thatcan receive messages in English). Furthermore, the language selectioncan be used in other ways to modify the marketing campaign. For example,the language selection can be used to determine the language that themarketing message will be sent.

FIG. 24J is a diagram depicting an embodiment of criteria that can beassociated with an electronic communications account. The electroniccommunications account can be associated with certain criteria. Thecriteria can be set by a user. In some embodiments, the criteria isautomatically set and/or set by an algorithm (for example automaticallydetermining that the electronic communications account is associatedwith a location). The selection can be based on an area, a town, or acountry. The electronic communications account can select the option ofreceiving messages from a particular country and/or block othercountries. The electronic communications account interface can have theoption of terminating the account.

In some embodiments, the electronic communications account can haveselected categories of criteria. For example, the electroniccommunications account can have a “my info” section to enter in personalinformation, such as a phone number, an address, and the like. The “Myinterest” section can include options to enter in preferences anddislikes of an individual. The electronic communications account canhave a section to add secondary users. Spoken languages can also beadded.

The electronic communications account can block or filter specificentities or addresses, or categories. For example, the electroniccommunications account system can block all advertisements, or justadvertisements related to coffee.

FIG. 24K is a diagram depicting an embodiment a marketing campaigndirected to a group of electronic communications accounts. The marketingmessage can display the number of electronic communications accountsthat the marketing campaign message will be sent to. The marketingmessage can illustrate the electronic communications accounts that themessage will be sent to. The user can add more electronic communicationsaccounts using the Address book.

If multiple areas were selected and/or multiple criteria chosen suchthat there are different groups of electronic communications accounts,the marketing message can show the total number of electroniccommunications accounts to be sent. This would allow further privacy andanonymity by not showing which electronic communications accounts werefiltered or are in certain areas.

In some embodiments, the marketing message can show the different groupsseparately. The marketing entity can select certain groups to send themarketing message to.

In some embodiments, the marketing entity has the option of selectingfrom several predefined marketing messages. In some embodiments, themarketing entity can customize the marketing message for the identifiedelectronic communications accounts. In some embodiments, the electroniccommunications system can automatically determine the marketing messagesto be sent to the electronic communications system and automaticallypopulate these messages. In some embodiments, the electroniccommunications system can retrieve a marketing message from a thirdparty vendor of products or services.

The marketing message can provide a percentage discount or a certainprice for a particular service or product. The marketing message can bevalid for a time frame. The marketing message can be for a particulargood or service, or a category of goods or services (for example allshoes). The marketing message can have an expiration date.

FIG. 24L is a diagram depicting an embodiment several marketing campaignmessages. The marketing message can include a special for a pizza store.For example, the marketing message can be a pizza special only for todayfrom 5-7 PM for $3.99. The marketing message can be for shoes on sale,where the sale is happening on a weekend for 50% to 75% off reducedprices. The marketing message can include a spa special, with a couponfor $39.99 that is valid for the next 90 days. Marketing material can beposted directly on the area map where the user can click the link toactivate the coupon. For example, the pizza special can be viewable onthe map, where the activated accounts can receive the email for thespecial.

In some embodiments, the marketing entity can select the messages tosend. The marketing entity can customize how the marketing message issent to the electronic communications account. For example, themarketing entity can send the first marketing message to teenagers, thesecond marketing message to households with children, and the thirdmarketing message to single ladies.

In some embodiments, the electronic communications system can identify avisitor for a particular area and provide services to these visitors.For example, a visitor can be visiting an area that is in an emergencysituation. The electronic communications system allows for efficientnotification to a visitor and a first responder system, and also allowsfor effective communication between the visitor and first responder.FIG. 25A is a flow diagram depicting an embodiment of a visitorinteracting with a local first responder. The flow diagram begins atblock 2502, where current location information is retrieved for thevisitor access point system.

At block 2504 the main server system updates the electroniccommunications account database 2506 with the current location for thevisitor access point system. The electronic communications account canbe tied to multiple addresses (for example a residence location, acurrent location such as when visiting a new place).

At block 2508, the main server system determines whether an emergency isoccurring at the current visitor location. If not, then the flow diagramcan return to block 2502, where the current location of the visitor istracked. If there is an emergency situation (for example tornado watchat the beach where visitor is visiting), then the main server systemgenerates visitor location information for the first responder system.

At block 2512, the first responder system displays map information withthe location for the visitor. The map information can includeinformation on the visitor. The map information can be interactive suchthat the first responder can select the visitor and obtain moreinformation on the visitor. For example, the map information can includethe electronic communications accounts (and/or personal information)associated with the group of visitors, the original residence physicaladdress, the type of communication channel, the availability of thevisitor, and the like.

At block 2514, the main server system generates the emergency messagefor the visitor, and at block 2516 the visitor access point systemdisplays the emergency message. For example, the emergency message candisplay information on the emergency on a map (for example a fire in thetown of Irvine, Calif.), the extent of the emergency, recommendationsfor responding to the emergency (for example locations of safety, safetravel routes away from the emergency, etc.), and the like. The messagecan display the emergency message for other supplemental users of theelectronic communications system (for example informing other familymembers that one of the family members is visiting an area of anemergency).

At block 2518, the visitor access point system can receive a messagefrom the visitor about a particular location set by the visitor. Thevisitor can pin a location that is of interest. The visitor can pin afuture location that the visitor will travel to. The visitor can pin alocation that the visitor sees as a danger (for example pin a locationand send a video of the danger).

At block 2520, the main server system can access information on avisitor's access point system. For example, the main server system canaccess information on a visitor's itinerary for the trip, personalinformation, any medical conditions that can be relevant to a firstresponder, and the like. The main server system can generate a messageat block 2522 to send to a first responder system.

At block 2524, the first responder system can identify the location ofthe first responder(s). The first responder system can identify a firstresponder that is available to attend to the visitor. For example, thefirst responder system can identify based on a variety ofcharacteristics that a first responder is assigned to the visitor. Thecharacteristics can be based on location (for example relative distancefrom the visitor), availability, staff and medical equipment, etc.

At block 2526, the first responder system can update map information setby the visitor. For example, the map can show where the first responderis, where the visitor is, and where the location set by the visitor is.This can help a first responder to understand how to react to thecircumstances (for example can travel between the visitor and thelocation set by the visitor if the first responder learns that thevisitor is traveling to the location).

At block 2528, the main server system can transmit the first respondermessage to the visitor and at block 2530, the visitor access pointsystem can display first responder information, such as location, of thefirst responder assigned to the visitor. In some embodiments, thevisitor can see all, or a subset of all, available first responders inthe area. The displayed information can show characteristics of thefirst responder (for example equipment and staff). Thereafter, thevisitor can respond to the message by the first responder (for exampleinforming them of a particular need, time urgency of the emergency, andthe like).

In some embodiments, the first responder can include a governmententity, such as the local embassy. For example, a visitor can betraveling to a country that is in political upheaval. Then, the localembassy can inform the visitor (and/or other visitors associated withthe embassy country nationality) to return to the embassy for safeevacuation. The message can include safe travel routes, danger zones,areas of safety, and the like.

In some embodiments, local vendors can have access to an electroniccommunications account system to market to visitors in the area. FIG.25B is a flow diagram depicting an embodiment of a visitor interactingwith a local vendors. At block 2542, the visitor access point system canenter a travel itinerary to the electronic communications system. Thetravel itinerary can include a destination location with a time ofarrival and a time of departure. The travel itinerary can includedetails for the trip, such as hotel information, sites to travel,restaurants of interest, times for certain visits, and the like.

The travel itinerary can be updated in the electronic communicationsaccount database 2546 by the main server system at block 2544. Thedatabase can include the travel itinerary (and/or a subset of the travelitinerary data). At block 2548, the main server system can determinewhether local vendors are associated with the itinerary, and if so, cangenerate visitor information for the local vendor system at block 2550.If not, then, the flow diagram can continue to block 2560.

In some embodiments, the local vendors do not obtain specificinformation on the visitors. The local vendors can instead set upcriteria for the main server system to identify visitors andautomatically send marketing messages. For example, the local vendorscan indicate that a visitor that includes a travel itinerary where oneof the locations is within a 2 mile radius one of the local vendorbranches, then a marketing message is automatically sent.

At block 2552, the local vendor system can identify products or servicesfor the itinerary and at block 2554, the local vendor system cangenerate the marketing message for the vendor. At block 2556, the mainserver system can transmit the marketing message for the vendor, and atblock 2558, the marketing message can be displayed.

A subset of the steps of FIG. 25B can occur at different time periods.For example, the marketing message can be sent when the visitor isentering travel itinerary information to book a hotel. The marketingmessage can be sent upon setting up the itinerary, such that themarketing message can influence the visitor to change the itinerary.

At block 2560, the current location of the visitor access point systemis tracked during travel. At block 2562, the main server system canassess the current location of the visitor with local vendors in thearea. If a local vendor is associated with the current location of thevisitor access point system at block 2564, then the local vendor systemcan identify products and/or services that are relevant for the visitor.If the current location is not associated with a local vendor at block2564, then the flow can continue to 2560 where the location of thevisitor is tracked.

At block 2568, the local vendor system can generate a marketing messagefor the visitor. At block 2570, the main server system transmits themarketing message to the visitor, and at block 2572, the visitor accesspoint system can display marketing messages. In some embodiments,sending a marketing message based on the current location of the visitorcan improve the relevancy of the electronic marketing messages sent tothe visitor by displaying pertinent messages in real-time (for examplecoffee coupon for a nearby coffeehouse).

In some embodiments, the marketing message includes coupons, sales,promotions, and the like for nearby local vendors. The marketing messagecan include events such as concerts or broadway shows. The marketingmessage can make restaurant or hotel suggestions for the visitor, basedon the visitor's information in the electronic communications accountdatabase 2546. The marketing message can include travel tips, such asavoiding certain routes during certain parts of the day.

FIG. 25C is a flow diagram depicting an embodiment of a visitor settingup an itinerary. In this embodiment, the visitor that is associated withan electronic communications account can set up an itinerary for futuretravel. The visitor can enter a departure and return date. In someembodiments, the visitor can enter in multiple destinations withassociated departure and return dates. For example, the visitor entersinformation for an itinerary visiting Toronto, CA for a week, then toVancouver, CA the following week.

The visitor can enter a location. The visitor can enter a city name, azip code, an address, or the like. In some embodiments, the visitorenters a location of interest (for example a park name, a building, anevent).

FIG. 25D is a diagram depicting an embodiment of an itinerary with adeparture and return date for a particular location. In this embodiment,the user interface displays a map of the location where the visitor willtravel. The departure date is set to 2017-05-22 and the return date isset to 2017-05-28. In some embodiments, the dates can be a time, a dayof the week, or other form of time.

In some embodiments, the itinerary can be flexible. For example, theitinerary can have an option for +3/−3 days, such that the departuredate can be somewhere between 2017-05-20 to 2017-05-27. This would allowfor flexibility on the itinerary. The electronic communications systemcan suggest to the visitor to stay at certain days based on particularcharacteristics (for example less traffic, big event happening,predicted emergency during certain times).

FIG. 25E is a diagram depicting an embodiment of an itinerary formultiple departure and return dates. The itinerary can illustrate twoseparate trips. For example, the visitor can visit Los Angeles, Calif.on 2017-05-22 to 2017-05-28 on a first trip and 2017-06-05 to 2017-06-11on a second trip. The itinerary can include separate trips that arelinked together. For example, between the first and second trip, thevisitor can be visiting San Diego from 2017-05-28 to 2017-06-05.

The user interface can allow a user to input multiple potentialitineraries. The electronic communications system can recommend theoptimal time to a visitor based on characteristics described throughoutthis disclosure. For example, the recommendation can be based on lesstraffic, events in the area, predicted emergency during certain times,promotion for local vendors, etc.

FIG. 25F is a diagram depicting an embodiment of an itinerary set forsending first responders alerts while on vacation. In this embodiment,the vacation itinerary is linked with first responder systems such thatthe first responders will be notified that the visitor will be in thearea, in any case of an emergency. First responders can be alerted ofthe visitor's current location, needs, medical condition, otherindividuals visiting with the visitor, and the like. The electroniccommunications system can alert the visitor's family members and/orother individuals associated with the electronic communications systemwhile the visitor is on vacation (or traveling otherwise).

The electronic communications account, eAddress, and/or e-mail addresscan be associated with registration databases. FIG. 26A is a diagramdepicting an embodiment of an example registration databases that theelectronic communications account can be associated with. The electroniccommunications account 2602 can be associated with a crime registrationdatabase 2604. For example, an individual associated with the electroniccommunications account 2602 can have a crime record or can be a suspectto a crime. In some embodiments, the registration database can be tieredand/or categorized. For example, the electronic communications account2602 can be associated with a drugs department 2606, a gangs department2608, an organized crime department 2610, and/or a sex unit department2612. Accordingly, when police are notified of activity on theelectronic communications account 2602, then the appropriate departmentcan be notified. Activity on the electronic communications account 2602can also be evidentiary proof used in the department's assessment of thecurrent crime.

The example in FIG. 26A illustrates an electronic communications account2602 associated with terrorism suspects 2614. For example, if theactivity of the electronic communications account 2602 is a terroristsuspect and in the terrorism suspects registry 2614, the airport checkmay identify the individual and more cautiously check the individual'sbelongings. The electronic communications system 2602 can use thisinformation to notify authorities. For example, if terrorism suspectsare located in a particular area, other electronic communicationsaccount 2602 in the near vicinity may be notified to police authorities.If several terrorism suspects gather in a particular location, policeauthorities can also be notified.

The electronic communications account 2602 can be associated with othertypes of registries. For example, the electronic communications account2602 can be associated with a gun registration 2618, an immigrationregistry 2620, a marijuana registry 2622, a vicious dog registry 2624,and/or a drone registry 2626.

FIG. 26B is a diagram depicting an embodiment of an electroniccommunications account associated with a population registry. Theelectronic communications account 2602 can be associated with apopulation registry 2630. The country registry 2632 can be associatedwith a particular population location 2634. For example, the countryregistry 2632 can be a part of a country registry 2632, a countyregistry, a state registry, a state registry, and the like.

The population location 2634 can be linked with characteristics of thelocation. In some embodiments, the population location 2634 can beassociated with demographic information, geographical information,political information, road and highway information, trafficinformation, and the like. For example, the population location 2634 canbe associated with planning for schools, community centers, parks, andcity services 2636. The population location 2634 can also be associatedwith planning private businesses such as coffee shops, restaurants, andthe like.

The electronic communications account 2602 can be associated withparticular devices such as appliances and/or computers, as described inthis disclosure herein. The devices can be associated with anidentifier. The appliance can be associated with a serial number, and assuch, the electronic communications account 2602 can be associated withthe serial number. Likewise, a computer may be associated with an IPAddress, and the electronic communications account 2602 can beassociated with the IP address.

FIG. 26C is a diagram depicting an embodiment of an graphical userinterface for two fire hydrants associated with respective electroniccommunications accounts. The individual can view a map of an area on thegraphical user interface. On the map, markers can be associated withareas and/or locations of interest (for example, a fire hydrant). In theexample illustrated in FIG. 26C, the graphical user interface includestwo fire hydrants 2652 and 2654. The first fire hydrant 2652 isassociated with an electronic communications account (for example,FireHydrantLat43.7900 Lon75.3599@alphc.com). The second fire hydrant2654 is associated with an electronic communications account (forexample, FireHydrantLat43.7902 Lon75.3591 @alphc.com). As the user getscloser or further away from the point or area of interest, the graphicaluser interface may update the map. The graphical user interface 2650 mayprovide additional information to the individual. For example, thegraphical user interface 2650 may provide text on information regardingthe two fire hydrants 2652 and 2654. The individual may stand by one ofthe two fire hydrants 2652 and 2654 and generate an electroniccommunications account using geocode. For example, the individual mayuse the latitude and/or longitude information. In some embodiments, thegraphical user interface may show distances between two areas orlocations of interest. For example, the graphical user interface 2650may show that two fire hydrants 2652 and 2654 are 20 feet apart. In someembodiments, other points or areas of interest can be used. For example,TV cable and/or internet can be used. In some embodiments, the radius ofa transmitter can be shown. For example, the strength of the signal froma Wi-Fi broadcasting router can be shown on the map. Accordingly, anindividual can know where the individual can move to get access to theinternet using the Wi-Fi signal.

FIG. 26D is a diagram depicting an embodiment of parking spacesassociated with electronic communications accounts. For example, arental car business can have multiple parking spaces (for example,parking space 1, 2, 3, and 4). The individual can identify the parkingspace associated with the rental car the individual is to rent. Thegraphical user interface may also display available cars that areavailable to rent. In this example, the rental process can be automatedwhile directing the user to the parking space. For example, thegraphical user interface may display that parking space 1 and 2 areavailable but not parking space and 4. The parking space 1 may beassociated with ParkingSpace1ChambersBlvdToronto@alphc.com. THe parkingspace 2 may be associated withParkingSpace2ChambersBlvdToronto@alphc.com.

In some embodiments, the individual may send a message to the owner ofthe parking space and/or car parked at the parking space. For example,the individual may decide to send a message to the car parked at parkingspace 1 because the car has been hit by another car.

FIG. 26E is a diagram depicting an embodiment of a graphical userinterface for two fire hydrants associated with respective electroniccommunications accounts. In this embodiment, a map of the United Kingdomand Ireland are shown. Domains can be created for the electroniccommunications accounts. For example, electronic communications accountsin the United Kingdom may have an indication that at least one physicaladdress is associated with the United Kingdom. For example, theelectronic communications account address may be20HunterStreetManheimer.UK@alphc.com. For, electronic communicationsaccounts in Ireland, the electronic communications account address maybe 123MainStreetNewDell.ie@alphc.com. Below is a list of example domainnames for several countries:

-   -   Afghanistan .af    -   Albania .al    -   Algeria .dz    -   American Samoa .as    -   Andorra .ad    -   Angola .ao    -   Anguilla .ai    -   Antarctica .aq    -   Antigua and Barbuda .ag    -   Argentina .ar    -   Armenia .am    -   Aruba .aw    -   Ascension Island .ac    -   Australia .au    -   Austria .at    -   Azerbaijan .az    -   Bahamas .bs    -   Bahrain .bh    -   Bangladesh .bd    -   Barbados .bb    -   Basque Country .eus    -   Belarus .by    -   Belgium .be    -   Belize .bz    -   Benin .bj    -   Bermuda .bm    -   Bhutan .bt    -   Bolivia .bo    -   Bonaire .bq    -   Bosnia and Herzegovina .ba    -   Botswana .bw    -   Bouvet Island .bv    -   Brazil .br    -   British Indian Ocean Territory .io    -   British Virgin Islands .vg    -   Brunei .bn    -   Bulgaria .bg    -   Burkina Faso .bf    -   Burma .mm    -   Burundi .bi    -   Cambodia .kh    -   Cameroon .cm    -   Canada .ca    -   Cape Verde .cv    -   Catalonia .cat    -   Cayman Islands .ky    -   Central African Republic .cf    -   Chad .td    -   Chile .cl    -   China, People's Republic of .cn    -   Christmas Island .cx    -   Cocos Islands .cc    -   Colombia .co    -   Comoros .km    -   Congo, Democratic Republic of the .cd    -   Congo, Republic of the .cg    -   Cook Islands .ck    -   Costa Rica .dr    -   Côte d'Ivoire .ci    -   Croatia .hr    -   Cuba .cu    -   Curaçao .cw    -   Cyprus .cy    -   Czech Republic .cz    -   Denmark .dk    -   Djibouti .dj    -   Dominica .dm    -   Dominican Republic .do    -   East Timor .tl    -   Ecuador .ec    -   Egypt .eg    -   El Salvador .sv    -   Equatorial Guinea .gq    -   Eritrea .er    -   Estonia .ee    -   Ethiopia .et    -   European Union .eu    -   Falkland Islands .fk    -   Faeroe Islands .fo    -   Federated States of Micronesia .fm    -   Fiji .fj    -   Finland .fi    -   France .fr    -   French Guiana .gf    -   French Polynesia .pf    -   French Southern and Antarctic Lands .tf    -   Gabon .ga    -   Galicia .gal    -   Gambia .gm    -   Gaza Strip .ps    -   Georgia .ge    -   Germany .de    -   Ghana .gh    -   Gibraltar .gi    -   Greece .gr    -   Greenland .gl    -   Grenada .gd    -   Guadeloupe .gp    -   Guam .gu    -   Guatemala .gt    -   Guernsey .gg    -   Guinea .gn    -   Guinea-Bissau .gw    -   Guyana .gy    -   Haiti .ht    -   Heard Island and McDonald Islands .hm    -   Honduras .hn    -   Hong Kong .hk    -   Hungary .hu    -   Iceland .is    -   India .in    -   Indonesia .id    -   Iran .ir    -   Iraq .iq    -   Ireland .ie    -   Isle of Man .im    -   Israel .il    -   Italy .it    -   Jamaica .jm    -   Japan .jp    -   Jersey .je    -   Jordan .jo    -   Kazakhstan .kz    -   Kenya .ke    -   Kiribati .ki    -   Kuwait .kw    -   Kyrgyzstan .kg    -   Laos .la    -   Latvia .lv    -   Lebanon .lb    -   Lesotho .ls    -   Liberia .lr    -   Libya .ly    -   Liechtenstein .li    -   Lithuania .lt    -   Luxembourg .lu    -   Macau .mo    -   Macedonia, Republic of .mk    -   Madagascar .mg    -   Malawi .mw    -   Malaysia .my    -   Maldives .mv    -   Mali .ml    -   Malta .mt    -   Marshall Islands .mh    -   Martinique .mq    -   Mauritania .mr    -   Mauritius .mu    -   Mayotte .yt    -   Mexico .mx    -   Moldova .md    -   Monaco .mc    -   Mongolia .mn    -   Montenegro .me    -   Montserrat .ms    -   Morocco .ma    -   Mozambique .mz    -   Myanmar .mm    -   Namibia .na    -   Nauru .nr    -   Nepal .np    -   Netherlands .nl    -   New Caledonia .nc    -   New Zealand .nz    -   Nicaragua .ni    -   Niger .ne    -   Nigeria .ng    -   Niue .nu    -   Norfolk Island .nf    -   North Cyprus .nc.tr    -   North Korea .kp    -   Northern Mariana Islands .mp    -   Norway .no    -   Oman .om    -   Pakistan .pk    -   Palau .pw    -   Palestine .ps    -   Panama .pa    -   Papua New Guinea .pg    -   Paraguay .py    -   Peru .pe    -   Philippines .ph    -   Pitcairn Islands .pn    -   Poland .pl    -   Portugal .pt    -   Puerto Rico .pr    -   Qatar .qa    -   Romania .ro    -   Russia .ru    -   Rwanda .rw    -   Réunion Island .re    -   Saba .bq    -   Saint Helena .sh    -   Saint Kitts and Nevis .kn    -   Saint Lucia .lc    -   Saint Martin    -   Saint-Pierre and Miquelon .pm    -   Saint Vincent and the Grenadines .vc    -   Samoa .ws    -   San Marino .sm    -   Sāo Tomé and Príncipe .st    -   Saudi Arabia .sa    -   Senegal .sn    -   Serbia .rs    -   Seychelles .sc    -   Sierra Leone .sl    -   Singapore .sg    -   Sint Eustatius .bq    -   Sint Maarten .sx/.an    -   Slovakia .sk    -   Slovenia .si    -   Solomon Islands .sb    -   Somalia .so    -   Somaliland .so    -   South Africa .za    -   South Georgia and the South Sandwich Islands .gs    -   South Korea .kr    -   South Sudan .ss    -   Spain .es    -   Sri Lanka .lk    -   Sudan .sd    -   Suriname .sr    -   Svalbard and Jan Mayen Islands .sj    -   Swaziland .sz    -   Sweden .se    -   Switzerland .ch    -   Syria .sy    -   Taiwan .tw    -   Tajikistan .tj    -   Tanzania .tz    -   Thailand .th    -   Togo .tg    -   Tokelau .tk    -   Tonga .to    -   Trinidad & Tobago .tt    -   Tunisia .tn    -   Turkey .tr    -   Turkmenistan .tm    -   Turks and Caicos Islands .tc    -   Tuvalu .tv    -   Uganda .ug    -   Ukraine .ua    -   United Arab Emirates .ae    -   United Kingdom .uk    -   United States of America .us    -   United States Virgin Islands .vi    -   Uruguay .uy    -   Uzbekistan .uz    -   Vanuatu .vu    -   Vatican City .va    -   Venezuela .ve    -   Vietnam .vn    -   Wallis and Futuna .wf    -   Western Sahara .eh    -   Yemen .ye    -   Zambia .zm    -   Zimbabwe .zw

In some embodiments, the electronic communications system can store acookie on the web browser indicating information on the electroniccommunications account. The cookie stored on the web browser can includeinformation relevant to the individual. For example, the cookie caninclude an individual's name, social security number, email addresses,phone numbers, weight/height, education, occupation, blood type,preferences, sex, likes and dislikes, and the like. The cookie caninclude information on the electronic communications account and what itis linked to. For example, the cookie can include information on aphysical location, a name of a mark (for example a building name), anobject, a serial number, an identifier. The cookie can includeinformation to be sent to a third party, such as browser data, accesstimes, location of the individual, and the like. Cookie data may alsoinclude third party information. For example, cookie data may includeadvertisers interested in advertising to the individual and/or theelectronic communications account.

For purposes of this application, certain aspects, advantages, and novelfeatures of the invention are described herein. It is to be understoodthat not necessarily all such advantages can be achieved in accordancewith any particular embodiment of the invention. Thus, for example,those skilled in the art will recognize that the invention can beembodied or carried out in a manner that achieves one advantage or groupof advantages as taught herein without necessarily achieving otheradvantages as can be taught or suggested herein.

Although several embodiments, examples, and illustrations are disclosedherein, it will be understood by those of ordinary skill in the art thatthe inventions described herein extend beyond the specifically disclosedembodiments, examples, and illustrations and includes other uses of theinventions and obvious modifications and equivalents thereof.Embodiments of the inventions are described with reference to theaccompanying figures, wherein like numerals refer to like elementsthroughout. The terminology used in the description presented herein isnot intended to be interpreted in any limited or restrictive mannersimply because it is being used in conjunction with a detaileddescription of certain specific embodiments of the inventions. Inaddition, embodiments of the inventions can comprise several novelfeatures and no single feature is solely responsible for its desirableattributes or is essential to practicing the inventions hereindescribed.

Although this invention has been disclosed in the context of certainembodiments and examples, it will be understood by those skilled in theart that the invention extends beyond the specifically disclosedembodiments to other alternative embodiments and/or uses of theinvention and obvious modifications and equivalents thereof. Inaddition, while several variations of the embodiments of the inventionhave been shown and described in detail, other modifications, which arewithin the scope of this invention, will be readily apparent to those ofskill in the art based upon this disclosure. It is also contemplatedthat various combinations or sub-combinations of the specific featuresand aspects of the embodiments can be made and still fall within thescope of the invention. It should be understood that various featuresand aspects of the disclosed embodiments can be combined with, orsubstituted for, one another in order to form varying modes of theembodiments of the disclosed invention. Any methods disclosed hereinneed not be performed in the order recited. Thus, it is intended thatthe scope of the invention herein disclosed should not be limited by theparticular embodiments described above.

Conditional language, such as, among others, “can,” “could,” “might,” or“can,” unless specifically stated otherwise, or otherwise understoodwithin the context as used, is generally intended to convey that certainembodiments include, while other embodiments do not include, certainfeatures, elements and/or steps. Thus, such conditional language is notgenerally intended to imply that features, elements and/or steps are inany way required for one or more embodiments or that one or moreembodiments necessarily include logic for deciding, with or without userinput or prompting, whether these features, elements and/or steps areincluded or are to be performed in any particular embodiment. Theheadings used herein are for the convenience of the reader only and arenot meant to limit the scope of the inventions or claims.

The term “eAddress” generally refers to the email or electronic emailaddress, electronic address, and/or electronic communications accountthat is automatically and/or axiomatically created for each globalphysical address and/or via geo coding coordinates based on latitude andlongitude. The term “Area” generally refers to the eAddresses located ina specific location(s) on a map, a single address and or the locationwhere the eAddresses are sent for the use of communication

What is claimed is:
 1. A computer-implemented method for generating anelectronic communications account based on latitude, longitude, and geocoding associated with a location of a user device, wherein the methodcomprises: receiving, by a computer system, a request to generate a newelectronic communications account and authorization to access locationservices; accessing, by the computer system, data related to thelocation of the user device, wherein the location of the user device isdetermined by: receiving data from a plurality of transmitters;triangulating a location based on the received data from the pluralityof transmitters; and identifying a latitude and longitude for thelocation; determining, by the computer system, whether the location isassociated with a pre-existing electronic communications account; inresponse to determining that the location is associated with thepre-existing electronic communications account: sending, by the computersystem, an electronic message to the pre-existing electroniccommunications account, wherein the electronic message to thepre-existing electronic communications account indicates that the userdevice is attempting to generate the new electronic communicationsaccount associated with the location; requesting, by the computersystem, verification information from the user device; initiating, bythe computer system, a fraud verification procedure to determine whetherthe request to generate the new electronic communications account is afraudulent request; and determining, by the computer system, whether togenerate the new electronic communications account associated with thelocation based at least in part on the electronic message sent to thepre-existing electronic communications account, the requestedverification information, and the fraud verification procedure; and inresponse to determining that the location is not associated with thepre-existing electronic communications account: automaticallygenerating, by the computer system, the new electronic communicationsaccount for the location; associating, by the computer system, thelatitude and longitude for the location to the new electroniccommunications account; and transmitting, by the computer system, dataassociated with the new electronic communications account to the userdevice, wherein the computer system comprises a computer processor andan electronic storage medium.
 2. The computer-implemented method ofclaim 1, wherein the plurality of transmitters comprise at least one of:a satellite, a Wi-fi base station, mobile Wi-fi base, or a cellular basestation.
 3. The computer-implemented method of claim 1, furthercomprising: transmitting, by the computer system, a request foridentification verification information associated with anidentification document; receiving, by the computer system, theidentification verification information associated with anidentification document; and verifying, by the computer system, whetherthe identification verification information associated with anidentification document is sufficient to authenticate the user device.4. The computer-implemented method of claim 3, wherein theidentification document comprises at least one of: a passport, adriver's license, or a social security number.
 5. Thecomputer-implemented method of claim 1, wherein the automaticallygenerated new electronic communications account for the location of theuser device comprises an indication of the latitude and longitude of thelocation associated with the user device.
 6. The computer-implementedmethod of claim 1, further comprising: determining, by the computersystem, whether the location of the user device is associated with alocation of interest; and in response to determining that the locationof the user device is associated with the location of interest,associating, by the computer system, the new electronic communicationsaccount with the location of interest.
 7. The computer-implementedmethod of claim 6, wherein the location of interest comprises at leastone of: a residence, a building, an infrastructure, or a vehicle.
 8. Thecomputer-implemented method of claim 1, further comprising: receiving,by the computer system, personal information of an individualindependent of the individual associated with the user device; andassociating, by the computer system, the new electronic communicationsaccount with the personal information of the individual as a secondaryindividual.
 9. The computer-implemented method of claim 1, furthercomprising: receiving, by the computer system, a selection to share theautomatically generated new electronic communications account to acomputing device; and transmitting, by the computer system, the newelectronic communications account to the computing device.
 10. Thecomputer-implemented method of claim 1, wherein initiating the fraudverification procedure comprises at least one of: initiating proceduresto identify an identify theft, a computer virus, or a credit card fraud.11. A system for generating an electronic communications account basedon a latitude and longitude associated with a location of a user device,wherein the system comprises: one or more computer readable storagedevices configured to store a plurality of computer executableinstructions; and one or more hardware computer processors incommunication with the one or more computer readable storage devices andconfigured to execute the plurality of computer executable instructionsin order to cause the system to: receive, from a user device, a requestto generate a new electronic communications account; access a locationof the user device, wherein the location of the user device isdetermined by triangulating a location based on received data from aplurality of transmitters; determine whether the user device isassociated with a pre-existing electronic communications account; inresponse to determining that the user device is associated with apre-existing electronic communications account: transmit, to a userdevice, a request identification verification information; receiveidentification verification information from the user device; determinewhether the user device is verified based on the identificationverification information; in response to determining that the userdevice is verified based on the identification verification information:automatically generate the new electronic communications account for thelocation of the user device; associate the user device to the newelectronic communications account; and transmit the new electroniccommunications account to the user device; in response to determiningthat the user device is not verified based on the identificationverification information: initiate a fraud verification procedure todetermine whether the request to generate the new electroniccommunications account is a fraudulent request; and in response todetermining that the user device is not associated with the pre-existingelectronic communications account: automatically generate the newelectronic communications account for the location of the user device;associate the user device to the new electronic communications account;and transmit the new electronic communications account to the userdevice.
 12. The system of claim 11, wherein in response to determiningthat the user device is verified based on the identificationverification information, the system is further caused to: transmit, tothe user device, a request to select whether the user device is to beassociated with the pre-existing electronic communications account or tothe generated new electronic communications account for the location ofthe user device; receive, from the user device, a selection of anelectronic communications account to be associated with the user device;and associate the user device with the selected electroniccommunications account.
 13. The system of claim 11, wherein theautomatically generated new electronic communications account for thelocation of the user device comprises an indication of the locationassociated with the user device.
 14. The system of claim 11, wherein thesystem is further caused to: determine whether the location of the userdevice is associated with a location of interest; and in response todetermining that the location of the user device is associated with thelocation of interest, identify the new electronic communications accountassociated with the location of interest and transmit the new electroniccommunications account to the user device.
 15. The system of claim 11,wherein the system is further caused to: receive, from the user device,personal information of an individual; and associate the new electroniccommunications account with the personal information of an individual asa secondary individual.
 16. The system of claim 15, wherein the personalinformation comprises at least one of: an email address, a phone number,a physical address, a first name, a last name, a phone number, a socialsecurity number, or a social media website.
 17. The system of claim 11,wherein the system is further caused to: receive, from the user device,a selection to share the automatically generated new electroniccommunications account to a computing device; and transmit the newelectronic communications account to a computing device.
 18. The systemof claim 17, wherein the computing device is associated with a differentuser than the user associated with the user device.
 19. The system ofclaim 11, wherein the automatically generating the new electroniccommunications account comprises identifying a channel of communicationfor the new electronic communications account.
 20. The system of claim19, wherein the channel of communication comprises at least one of: anemail, an SMS message, or executable code to initiate an alert on theuser device.