Method, device, and system for collecting and reporting minimally necessary real-time personal context

ABSTRACT

A wireless computing device collects and reports minimally necessary real-time personal context of a user. During a first period of time, collecting and storing one or more first personal context information elements associated with the user but not reporting them via wireless transmission. In response to determining that there is an increased probability of an incident occurring near the user, for a second period of time: continuing to collect the first personal context information elements and reporting them all via wireless transmission, and beginning collecting and storing second personal context information elements not collected during the first period of time but not reporting second personal context information elements via wireless transmission.

BACKGROUND OF THE INVENTION

As the market for the “Internet of Things” continues to advance, andsensors and information they collect becomes more prevalent, concernsregarding privacy and information overload begin to arise. This isespecially true for the connected first responder user as sensorinformation associated with the first responder him or herself, e.g.,personal context information including locationing, biometrics, andother sensors, may be particularly sensitive and may raise privacyconcerns. Further, as the number of sensors and other contextinformation that is possible to collect on and around a first responderincreases and becomes more prevalent, the need to distill this load ofcontext information into smaller actionable pieces of informationbecomes greater, as first responders and dispatchers who may receivethis information are commonly called on to act on the collectedinformation in a very quick manner, and the stakes involved with thedecision to act or not act are commonly high.

Thus, there exists a need for an improved method, device, and system forcollecting and reporting a minimum amount of real-time personal contextassociated with a user.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

The accompanying figures, where like reference numerals refer toidentical or functionally similar elements throughout the separateviews, which together with the detailed description below areincorporated in and form part of the specification and serve to furtherillustrate various embodiments of concepts that include the claimedinvention, and to explain various principles and advantages of thoseembodiments.

FIG. 1 is a system diagram illustrating a first responder user wearing awireless computing device and a plurality of personal contextinformation element generating devices that implement improvedcollection and reporting of a minimum amount of real-time personalcontext associated with the user in accordance with some embodiments.

FIG. 2 is a system diagram illustrating an infrastructure wirelessnetwork for supporting reporting of a minimum amount of real-timepersonal context associated with a user in accordance with someembodiments.

FIG. 3 is a device diagram showing a device structure of the wirelesscomputing device of FIG. 1 in accordance with some embodiments.

FIG. 4 illustrates a flow chart setting forth process steps for improvedcollection and reporting of a minimum amount of real-time personalcontext associated with a user in accordance with some embodiments.

Skilled artisans will appreciate that elements in the figures areillustrated for simplicity and clarity and have not necessarily beendrawn to scale. For example, the dimensions of some of the elements inthe figures may be exaggerated relative to other elements to help toimprove understanding of embodiments of the present invention.

The apparatus and method components have been represented whereappropriate by conventional symbols in the drawings, showing only thosespecific details that are pertinent to understanding the embodiments ofthe present invention so as not to obscure the disclosure with detailsthat will be readily apparent to those of ordinary skill in the arthaving the benefit of the description herein.

DETAILED DESCRIPTION OF THE INVENTION

Disclosed is an improved method, device, and system for collecting andreporting a minimum amount of real-time personal context associated witha user.

In one embodiment a method for collecting and reporting minimallynecessary real-time personal context of a user includes: collecting andstoring, by a wireless computing device during a first period of time,one or more first personal context information elements associated withthe user but not reporting the one or more first personal contextinformation elements associated with the user via wireless transmission;making a first determination, by the wireless computing device via theone or more first personal context information elements or via wirelessreception, that there is an increased probability of an incidentoccurring near the user and, for a second period of time after the firstdetermination: continuing to collect, by the wireless computing device,the one or more first personal context information elements andreporting the one or more first personal context information elementscollected during the first and second periods of time via wirelesstransmission; and collecting and storing, by the wireless computingdevice, one or more second personal context information elements notcollected during the first period of time but not reporting the one ormore second personal context information elements via wirelesstransmission.

In a further embodiment, a wireless computing device for collecting andreporting minimally necessary real-time personal context includes: oneor more wireless transceivers; a data store; and one or more processorsconfigured to: collect and store, in the data store, one or more firstpersonal context information elements associated with the user but notreporting the one or more first personal context information elementsassociated with the user via wireless transmission using the one or morewireless transceivers; make a first determination, via the one or morefirst personal context information elements or via wireless receptionover the one or more wireless transceivers, that there is an increasedprobability of an incident occurring near the user and, for a secondperiod of time after the first determination: continue to collect theone or more first personal context information elements and report theone or more first personal context information elements collected duringthe first and second periods of time via wireless transmission using theone or more wireless transceivers; and collect and store, in the datastore, one or more second personal context information elements notcollected during the first period of time but not reporting the one ormore second personal context information elements via wirelesstransmission using the one or more wireless transceivers.

Each of the above-mentioned embodiments will be discussed in more detailbelow, starting with example network and device architectures of thesystem in which the embodiments may be practiced, followed by anillustration of processing steps for achieving collection and reportingof a minimum amount of real-time personal context associated with a userfrom a wireless computing device perspective. Further advantages andfeatures consistent with this disclosure will be set forth in thefollowing detailed description, with reference to the figures.

1. System Architecture and Device Structure

Referring now to the drawings, and in particular FIG. 1, a systemdiagram illustrates a system 100 of wireless and/or wired devices that auser 102 (illustrated in FIG. 1 as a first responder) may wear,including a primary wireless computing device 104 (depicted in FIG. 1 asa mobile radio) used for narrowband and/or broadband communications, aremote speaker microphone (RSM) 106, a video camera 108, a biometricsensor device 110, a pair of smart glasses 112, a weapon status sensor114, and a mobility tracker 116.

The wireless computing device 104 may be any wireless device used forinfrastructure-supported media (e.g., voice, audio, video, etc.)communication via a long-range wireless transmitter (e.g., in comparisonto a short-range transmitter such as a Bluetooth, Zigbee, or NFCtransmitter) and/or transceiver with other mobile radios in a same ordifferent group of mobile radios as the wireless computing device 104.The long-range transmitter may have a transmit range on the order ofmiles, e.g., 0.5-50 miles, or 3-20 miles. While in this disclosure thewireless computing device 104 is described as an integrated computingdevice for storing personal context information elements (PCIEs)associated with the user first responder 102 and for reporting theinformation to an infrastructure via a wireless transmitter, in otherembodiments, the two functions may be divided into separate devicescommunicatively coupled via a wired or wireless connection as well.

In the example of FIG. 1, the wireless computing device 104 forms thehub of communication connectivity for the user first responder 102,through which PCIEs associated with the user first responder 102 andgenerated by the wireless computing device 104 itself or by othersensors directly or wirelessly coupled to the wireless computing device104 are collected, stored, and/or reported in accordance with thedisclosure set forth herein.

In order to communicate with PCIE-generating sensors, which may beintegrated with the wireless computing device 104 or incorporated intoseparate distinct accessory devices, the wireless computing device 104may contain one or more internal electronic busses for communicatingwith sensors integrated in or on the wireless computing device 104itself, may contain one or more physical electronic ports (such as a USBport, an Ethernet port, an audio jack, etc.) for direct electroniccoupling with another wireless accessory device, and/or may contain ashort-range transmitter (e.g., in comparison to the long-rangetransmitter such as a LMR or Broadband transmitter) and/or transceiverfor wirelessly coupling with another wireless accessory device. Theshort-range transmitter may be a Bluetooth, Zigbee, or NFC transmitterhaving a transmit range on the order of 0.01-100 meters, or 0.1-10meters.

Accessory devices 106-116 communicate with the wireless computing device104 via their own direct electronic coupling or short-range transmitterand/or transceivers, and provide particularized PCIEs to the wirelesscomputing device 104.

For example, the RSM 106 may act as a remote microphone that is closerto the user first responder's 102 mouth, and under certain conditions,may record the user first responder's 102 words and/or ambient soundsand provide the recorded audio or text-transcription of the recordedaudio (filtered or un-filtered) as a PCIE to the wireless computingdevice 104. Although not relevant to generation of PCIEs, a speaker mayalso be provided in the RSM 106 unit such that audio and/or voicereceived at the wireless computing device 104 is transmitted to the RSM106 and played back closer to the user first responder's 102 ear.

The video camera 108 may be an always-on device or anactivated-on-demand video capture device that provides video and/oraudio, filtered or un-filtered, to the wireless computing device 104 asa PCIE to the wireless computing device 104.

The biometric sensor device 110 may be a device capable of sensingbiometric data of its wearer, such as heart rate, body temperature,etc., and may provide the biometric data, filtered or un-filtered, as aPCIE to the wireless computing device 104. Additionally oralternatively, an environmental sensor may be provided on or at thesensor device 110 to detect environmental parameters such as oxygenlevels, temperature, radiation, etc., and may provide the environmentaldata, filtered or un-filtered, as a PCIE to the wireless computingdevice 104.

The smart glasses 112 may maintain a bi-directional connection with thewireless computing device 104 and provide an always-on or on-demandvideo feed pointed in a direction of the first responder's gaze, and ina filtered or un-filtered state, back to the wireless computing device104 as a PCIE. Although not relevant to generation of PCIEs, the smartglasses 112 may also provide a personal display via a projectionmechanism integrated into the smart glasses 112 for displayinginformation such as text, images, or video received from the wirelesscomputing device 104. In some embodiments, an additional user interfacemechanism such as a touch interface may be provided on the smart glasses112 that allows the user first responder 102 to interact with thedisplay elements displayed on the smart glasses 112.

The weapon status sensor 114 may maintain state information regarding aweapon normally holstered within the user first responder's 102 weaponholster. The weapon status sensor may detect a change in state (presenceto absence) and/or an action (removal) relative to a weapon normallyholstered within the holster to which the sensor is coupled. Thedetected change in state and/or action may be reported to the wirelesscomputing device 104 as a PCIE. In some embodiments, the weapon statussensor 114 may also detect whether the first responder's hand is restingon the weapon even if it has not yet been removed from the holster andprovide such information as a PCIE to wireless computing device 104.Other possibilities exist as well.

The mobility tracker 116 device may include one or more movement sensors(such as an accelerometer, magnetometer, and/or gyroscope) that mayperiodically or intermittently provide to the wireless computing device104 indications of direction, steps, acceleration, and/or speed, perhapsaccompanying other additional information, as PCIEs. An accelerometer isa device that measures acceleration. Single and multi-axis models areavailable to detect magnitude and direction of the acceleration as avector quantity, and can be used to sense orientation, acceleration,vibration shock, and falling. A gyroscope is a device for measuring ormaintaining orientation, based on the principles of conservation ofangular momentum. One type of gyroscope, a microelectromechanical system(MEMS) based gyroscope, uses lithographically constructed versions ofone or more of a tuning fork, a vibrating wheel, or resonant solid tomeasure orientation. Other types of gyroscopes could be used as well. Amagnetometer is a device used to measure the strength and/or directionof the magnetic field in the vicinity of the device, and can be used todetermine a direction in which a person or device is facing. Other typesof movement sensors could additionally, or alternatively, be used aswell. Although the mobility tracker 116 is shown in FIG. 1 as a braceletworn around the wrist, in other examples, the mobility tracker 116 maybe worn around another part of the body, or may take a differentphysical form including an earring, a finger ring, a necklace, or someother type of wearable form factor.

FIG. 2 is a system diagram illustrating an infrastructure wirelesscommunication network for supporting wireless communication devicereporting of a minimum amount of real-time personal context associatedwith a user in accordance with some embodiments. In particular, FIG. 2illustrates an infrastructure wireless communications network 210including a wireless computing device 104, fixed terminal 220 (e.g. arepeater, base transceiver station (BTS) or eNodeB, hereinafter referredto as a base station (BS)), wireless link(s) 214, backhaul network 224,radio controller device 226, storage 228, communications connections230, 232, 236, dispatch console 238, and external networks 234. The BS220 has at least one radio transmitter covering a radio coverage cell(not shown). One or several mobile radios within radio coverage of theBS 220 may connect to the BS 220 using a wireless communication protocolvia wireless link(s) 214. The wireless computing device 104 maycommunicate with other mobile radios and with devices in theinfrastructure 210 (such as dispatch console 238), and perhaps otherdevices accessible external networks, using a group communicationsprotocol over the wireless link(s) 214. The wireless link(s) 214 mayinclude one or both of an uplink channel and a downlink channel, and mayinclude one or more physical channels or logical channels. Wirelesslink(s) 214 may implement, for example, a conventional or trunked landmobile radio (LMR) standard or protocol such as ETSI Digital MobileRadio (DMR), Project 25 (P25) standard defined by the Association ofPublic Safety Communications Officials International (APCO), or otherradio protocols or standards. In other embodiments, wireless link(s) 214may additionally or alternatively implement a Long Term Evolution (LTE)protocol including multimedia broadcast multicast services (MBMS), anopen mobile alliance (OMA) push to talk (PTT) over cellular (OMA-PoC)standard, a voice over IP (VoIP) standard, or a PTT over IP (PoIP)standard. Other types of wireless protocols could be implemented aswell.

Communications in accordance with any one or more of these protocols orstandards, or other protocols or standards, may take place over physicalchannels in accordance with one or more of a TDMA (time divisionmultiple access), FDMA (frequency divisional multiple access), OFDMA(orthogonal frequency division multiplexing access), or CDMA (codedivision multiple access) protocol. Mobile radios in RANs such as thoseset forth above send and receive media streams (encoded portions ofvoice, audio, and/or audio/video streams) in a call in accordance withthe designated protocol.

In the example of FIG. 1, wireless link(s) 214 are established betweenwireless computing device 104 and BS 220 for transmission of a wirelesscomputing device 104 or other device-sourced call including a mediastream (e.g., formatted bursts, packets, messages, frames, etc.containing digitized audio and/or video representing a portion of anentire call, among other possible signaling and/or other payload data)to one or more target devices (not shown), perhaps belonging to a samesubscribed group or talkgroup of mobile radios as the source wirelesscomputing device 104.

The wireless computing device 104 may be configured with anidentification reference (such as an International Mobile SubscriberIdentity (IMSI) or MAC address) which may be connected to a physicalmedia (such as a Subscriber Identity Module (SIM) card). The wirelesscomputing device 104 may be a group communications device, such as apush-to-talk (PTT) device, that is normally maintained in a monitor onlymode, and which switches to a transmit-only mode (for half-duplexdevices) or transmit and receive mode (for full-duplex devices) upondepression or activation of a PTT input switch. The group communicationsarchitecture in infrastructure wireless communications network 210allows a single mobile radio, such as wireless computing device 104, tocommunicate with one or more group members (not shown) associated with aparticular group of mobile radios at the same time.

Although only a single controller device 226 is illustrated in FIG. 1,more than one controller device 226 may be used and/or a distributedcontroller device 226 may be used that divides functions across multipledevices, perhaps for load balancing reasons. Finally, while storage 228is illustrated as directly coupled to controller device 226, storage 228may also be disposed remote from controller device 226 and accessible tocontroller device 226 via one or more of network 224 and/or externalnetworks 234.

Controller device 226 may be, for example, a call controller, PTTserver, zone controller, evolved packet core (EPC), mobile managemententity (MME), radio network controller (RNC), base station controller(BSC), mobile switching center (MSC), site controller, Push-to-Talkcontroller, or other network device for controlling and distributingcalls amongst mobile radios via respective BSs. The controller device226 may further be configured to provide registration, authentication,encryption, routing, and/or other services to BS 220 so that mobileradios operating within its coverage area may communicate with othermobile radios in the communications system.

The BS 220 may be linked to the controller device 226 via one or both ofnetwork 224 and communications connection 230. Network 224 may compriseone or more routers, switches, LANs, WLANs, WANs, access points, orother network infrastructure. For example, controller device 226 may beaccessible to BS 220 via a dedicated wireline or via the Internet. Inone example, BS 220 may be directly coupled to controller device 226 viaone or more internal links under control of a single communicationsnetwork provider.

Storage 228 may function to store PCIE information reported from mobileradios for evidentiary purposes, for access by a dispatcher at dispatchconsole 238, for access by other mobile radios via BS 220 and/or otherBSs (not shown), or for other reasons.

The one-to-many group communication structure may be implemented incommunications network 210 in a number of ways and using any one or moremessaging protocols, including multiple unicast transmissions (eachaddressed to a single group member wireless computing device), singlemulticast transmissions (addressed to a single group or multiplegroups), single broadcast transmissions (the broadcast transmissionperhaps including one or more group identifiers that can be decoded andmatched by the receiving wireless computing devices), or any combinationthereof.

External networks 234 may also be accessible to BS 220 (and thuswireless computing device 104) via network 224 and communicationsconnection 232 and/or controller device 226 and communicationsconnections 230, 236. External networks 234 may include, for example, apublic switched telephone network (PSTN), the Internet, or anotherwireless service provider's network, among other possibilities.

Dispatch console 238 may be directly coupled to controller device 226 asshown, or may be indirectly coupled to controller device 226 via one ormore of network 224 and external networks 234, or some other networkdevice in network 224.

Referring to FIG. 3, a schematic diagram illustrates a wirelesscomputing device 300 according to some embodiments of the presentdisclosure. Wireless computing device 300 may be, for example, the sameas or similar to the wireless computing device 104 of FIGS. 1 and 2. Asshown in FIG. 3, wireless computing device 300 includes a communicationsunit 302 coupled to a common data and address bus 317 of a processingunit 303. The wireless computing device 300 may also include an inputunit (e.g., keypad, pointing device, etc.) 306 and a display screen 305,each coupled to be in communication with the processing unit 303.

A microphone 320 captures audio from a user that is further vocoded byprocessing unit 303 and transmitted as voice stream data bycommunication unit 302 to other mobile radios and/or other devices viathe network 224. A communications speaker 322 reproduces audio that isdecoded from voice streams of voice calls received from other mobileradios and/or from an infrastructure device via the communications unit302.

The processing unit 303 may include a code Read Only Memory (ROM) 312coupled to the common data and address bus 317 for storing data forinitializing system components. The processing unit 303 may furtherinclude an electronic microprocessor 313 coupled, by the common data andaddress bus 317, to a Random Access Memory (RAM) 304 and a static memory316.

The communications unit 302 may include one or more wired or wirelessinput/output (I/O) interfaces 309 that are configurable to communicatewith networks 224 via BSs 220, with other mobile radios, and/or withaccessory devices 106-116.

The communications unit 302 may include one or more wirelesstransceivers 308, such as a DMR transceiver, a P25 transceiver, aBluetooth transceiver, a Wi-Fi transceiver perhaps operating inaccordance with an IEEE 802.11 standard (e.g., 802.11a, 802.11b,802.11g), a WiMAX transceiver perhaps operating in accordance with anIEEE 802.16 standard, and/or other similar type of wireless transceiverconfigurable to communicate via a wireless radio network. Thecommunications unit 302 may additionally or alternatively include one ormore wireline transceivers 308, such as an Ethernet transceiver, aUniversal Serial Bus (USB) transceiver, a Tip, Ring, Sleeve (TRS)connection, a Tip, Ring, Ring, Sleeve (TRRS) connection, or similartransceiver configurable to communicate via a twisted pair wire, acoaxial cable, a fiber-optic link, an audio jack, or a similar physicalconnection to a wireline network. The transceiver 308 is also coupled toa combined modulator/demodulator 310.

The microprocessor 313 has ports for coupling to the input unit 306 andthe microphone unit 320, and to the display screen 305 and speaker 322.Static memory 316 may store operating code for the microprocessor 313that, when executed, performs one or more of the wireless computingdevice processing, transmitting, and/or receiving steps set forth inFIG. 4 and accompanying text. Static memory 316 may also store,permanently or temporarily, PCIE information disclosed herein as beinggenerated at wireless computing device 300 or provided via thecommunications unit 302 and collected at the wireless computing device300.

Static memory 316 may comprise, for example, a hard-disk drive (HDD), anoptical disk drive such as a compact disk (CD) drive or digitalversatile disk (DVD) drive, a solid state drive (SSD), a tape drive, aflash memory drive, or a tape drive, to name a few.

2. Processes for Collecting and Reporting a Minimum Amount of Real-TimePersonal Context Associated With a User

Turning now to FIG. 4, a flow chart sets forth process steps 400 forimproved collection and reporting of a minimum amount of real-timepersonal context associated with a user in accordance with someembodiments.

Process 400 begins at step 402, where a wireless computing device suchas wireless computing device 104/300 collects and stores first-levelPCIEs associated with a user for a first period of time. First-levelPCIEs are user-context elements considered to be of low-privacy impactand are collected and stored regardless of any heightened probability ofa future incident occurring near the user's location. First-level PCIEsmay be pre-configured at the wireless computing device, or set via anover-the-air provisioning process, and may include context elements suchas, but not limited to, location information collected via a locationsensor, presence information collected via a presence sensor, and weaponstatus information collected via a weapon status sensor, among otherpossibilities.

The wireless computing device may collect the first-level PCIEs fromsensors integrated into the wireless computing device itself, such asbut not limited to a global positioning system (GPS) location sensor anda presence information status switch or input indicating anonline/offline or on-the-clock/off-the-clock status indicator or similarstatus. Additionally or alternatively, the wireless computing device maycollect the first-level PCIEs from sensors external to the wirelesscomputing device itself and provided to the radio via a directelectronic connection or via a wireless connection, such as but notlimited to an external weapon status sensor wiredly or wirelesslycoupled to the wireless computing device. The collected first-levelPCIEs may be stored in a local storage of the wireless computing devicesuch as static memory 316 of wireless computing device 300. Thefirst-level PCIEs are stored locally at step 402 and are not reported tothe infrastructure network 210 via wireless transmission. In someembodiments, the collected first-level PCIEs may be conditioned andvalidated prior to storage.

At step 404, the wireless computing device determines whether there isan increase in probability of an incident occurring near the user'scurrent location. The determination of an increase in probability of anincident occurring near the user's current location is not a detectionof an actual occurrence of an incident near the user's current location(e.g., an actual robbery, high-speed chase, hostage situation, etc.),but instead, is a determination via analytics and/or context that thereis a heightened probability of a future occurrence of an actual incidentnear the user's current location. The determination may be made by thewireless computing device itself, or may be made in the infrastructure210 and reported to the wireless computing device via wireless link(s)such as wireless link(s) 214 of FIG. 2.

In one embodiment, the determination may be made as a function of thecollected first-level PCIEs. For example, the wireless computing devicemay maintain or be provided with a set of geofence definitionsidentifying geographic areas that have historically experienced highercrime rates than other lower crime areas. When a PCIE collected from aGPS sensor in the wireless computing device indicates that the wirelesscomputing device has passed into one of these higher crime geographicareas, the wireless computing device may determine that there is now aheightened probability of an incident occurring near the user's currentlocation. In some embodiments, the determination may be based on aplurality of PCIEs, such as a determination that the first responder ison-the-clock (presence information), has also passed into a higher crimegeographic area, has placed his or her hand on their weapon, and/or atime of day information indicates a lack of lighting (e.g., nighttime).

Additionally or alternatively, information provided to the wirelesscomputing device via the infrastructure (e.g., via wireless link(s) 214)may, alone or in combination with PCIE information collected at thewireless computing device, cause the wireless computing device todetermine that there is a heightened probability of an incidentoccurring near the user's current location. For example, theinfrastructure may transmit a notification that some actual incident hasalready occurred several miles away (and thus not near the user),however, the first responder/wireless computing device is within asearch area or an escape path from the actual incident. In anotherexample, the infrastructure may transmit a notification, in response tothe wireless computing device reporting its location, that the wirelesscomputing device has entered a high crime area. The information providedvia the infrastructure may be sufficient on its own to cause thewireless computing device to determine that there is a heightenedprobability of an incident occurring near the user's current location,or the wireless computing device may make such as determination usingthe infrastructure information and the collected PCIE information incombination.

If the wireless computing device determines that there is no increase inprobability of an incident occurring near the user's current location,processing returns to step 402 where first-level PCIEs are continued tobe collected and stored by the wireless computing device. On the otherhand, if the wireless computing device determines at step 404 that thereis an increase in probability of an incident occurring near the user'scurrent location, processing proceeds to step 406.

At step 406, the wireless computing device continues to collect andstore first-level PCIEs associated with the user for a second period oftime. Because there is a determined heightened probability of a futureoccurrence of an incident near the user's location, the wirelesscomputing device takes two actions, including, for the second period oftime: (i) beginning collecting and storing second-level PCIEs associatedwith the user and (ii) reporting the first level PCIEs previouslycollected and stored during the first period of time and reporting thefirst level PCIEs that the wireless computing device continues tocollect.

The second-level PCIEs are user-context elements considered to be ofsomewhat higher privacy impact than the low-privacy impact user-contextelements collected and stored during the first period of time. Similarto first level PCIEs, second-level PCIEs may be pre-configured at thewireless computing device, or set via an over-the-air provisioningprocess, and may include context elements such as, but not limited to,mobility information associated with the user. The second-level PCIEsmay be collected and stored in a similar manner to the first-levelPCIEs, and may be similarly sourced from sensors integrated into thewireless computing device or via external accessory devicescommunicatively coupled to the wireless computing device. At step 406,the collected second-level PCIEs are stored locally and are not reportedto the infrastructure network 210 via wireless transmission. In someembodiments, the collected second-level PCIEs may be conditioned andvalidated prior to storage.

As noted above, at step 406 the first-level PCIEs collected and storedduring the first period of time are reported to the infrastructure. Forexample, wireless computing device 104 in FIG. 2 may wirelessly transmitfirst-level PCIEs collected and stored during the first period of timeto infrastructure 210 via wireless link(s) 214, for further storage atinfrastructure storage 228 and/or display at dispatch console 238. Bycollecting first-level PCIEs prior to the determination at step 404,additional context information leading up to the determination at step404 can be provided to the infrastructure for such diverse uses asanalytics, crime scene re-creation, etc. Also, any additionalfirst-level PCIEs that are collected during the second period of timeare also provided to the infrastructure.

At step 408, the wireless computing device determines whether there is afurther increase in probability of an incident occurring near the user'scurrent location. The determination of a further increase in probabilityof an incident occurring near the user's current location, again, is nota detection of an actual occurrence of an incident near the user'scurrent location, but instead, is a determination via analytics and/orcontext that there is a further heightened probability of a futureoccurrence of an actual incident near the user's current location. Thedetermination may be made by the wireless computing device itself, ormay be made in the infrastructure 210 and reported to the wirelesscomputing device via wireless link(s) such as wireless link(s) 214 ofFIG. 2.

In one embodiment, the determination may be made as a function of thecollected first and/or second-level PCIEs. For example, when asecond-level PCIE collected from a mobility sensor indicates that theuser is accelerating or running, the wireless computing device maydetermine that there is now a further-heightened probability of anincident occurring near the user's current location. In someembodiments, the determination may be based on a plurality of firstand/or second PCIEs, such as a determination that the first responder isnear a festival with high density of civilians and a weapon statussensor indicates that the user's hand has been placed on the weapon butnot yet removed from the holster.

Additionally or alternatively, information provided to the wirelesscomputing device via the infrastructure (e.g., via wireless link(s) 214)may, alone or in combination with PCIE information collected at thewireless computing device, cause the wireless computing device todetermine that there is a further heightened probability of an incidentoccurring near the user's current location. The information provided viathe infrastructure may be sufficient on its own to cause the wirelesscomputing device to determine that there is a further heightenedprobability of an incident occurring near the user's current location,or the wireless computing device may make such a determination using theinfrastructure information and the collected PCIE information incombination.

If the wireless computing device determines that there is no furtherincrease in probability of an incident occurring near the user's currentlocation, processing proceeds to step 410, where the wireless computingdevice determines whether the second time period has expired. The secondtime period may be preconfigured at the wireless computing device, ormay be set via an over-the-air provisioning from the infrastructure. Thesecond time period may be, for example, in the range of 1-20 minutes or5-10 minutes. If the second time period has not yet expired, processingproceeds back to step 406. On the other hand, if the second time periodhas expired, processing proceeds back to step 402. In some embodiments,expiration of the second time period may also cause the wirelesscomputing device to erase any second-level PCIEs collected and storedduring the second period (and not yet reported to the infrastructure).This maintains the privacy of the user while still maintaining theability to provide a limited history of second-level PCIE information tothe infrastructure if further circumstances warrant it. In otherembodiments, the second-level PCIEs collected and stored during thesecond period may be retained at the wireless computing device for athreshold period of time (e.g., 1-24 hours) past expiration of thesecond time period, or may be retained indefinitely until manuallydeleted by the user.

On the other hand, if the wireless computing device determines at step408 that there is a further increase in probability of an incidentoccurring near the user's current location, processing proceeds to step412.

At step 412, the wireless computing device continues to collect andstore first and second-level PCIEs associated with the user for a thirdperiod of time. Because there is a determined further heightenedprobability of a future occurrence of an incident near the user'slocation, the wireless computing device takes two actions, including,for the third period of time: (i) beginning collecting and storingthird-level PCIEs associated with the user and (ii) reporting the firstand second level PCIEs previously collected and stored during the firstand second periods of time and reporting the first and second-levelPCIEs that the wireless computing device continues to collect.

The third-level PCIEs are user-context elements considered to be of ahighest privacy impact relative to the low-privacy impact user-contextelements and higher-privacy impact user-context elements collected andstored during the first and second periods of time. Similar to first andsecond-level PCIEs, third-level PCIEs may be pre-configured at thewireless computing device, or set via an over-the-air provisioningprocess, and may include context elements such as, but not limited to,biometric readings associated with the user, among other possibilities.The third-level PCIEs may be collected and stored in a similar manner tothe first and second-level PCIEs, and may be similarly sourced fromsensors integrated into the wireless computing device or via externalaccessory devices communicatively coupled to the wireless computingdevice. At step 412, the collected third-level PCIEs are stored locallyand are not reported to the infrastructure network 210 via wirelesstransmission. In some embodiments, the collected third-level PCIEs maybe conditioned and validated prior to storage.

As noted above, at step 412 the first and second-level PCIEs collectedand stored during the first and second periods of time are reported tothe infrastructure. For example, wireless computing device 104 in FIG. 2may wirelessly transmit first and second-level PCIEs collected andstored during the first and second periods of time to infrastructure 210via wireless link(s) 214, for further storage at infrastructure storage228 and/or display at dispatch console 238. By collecting second-levelPCIEs prior to the determination at step 408, additional contextinformation leading up to the determination at step 408 can be providedto the infrastructure for such diverse uses as analytics, crime scenere-creation, etc. Also, any additional first and second-level PCIEs thatare collected during the third period of time are also reported to theinfrastructure. Because the first-level PCIEs collected during the firstand second periods of time were already reported to the infrastructureat step 406, the wireless computing device may refrain from re-reportingsuch first-level PCIEs at step 412, or may simply re-report suchfirst-level PCIEs at step 412 accompanying the additional PCIEs reportedat step 412.

At step 414, the wireless computing device determines whether there isan actual detected incident occurring near the user's current location.The determination of an actual incident occurring near the user'scurrent location may be made by the wireless computing device itself, ormay be made in the infrastructure 210 and reported to the wirelesscomputing device via wireless link(s) such as wireless link(s) 214 ofFIG. 2.

In one embodiment, the determination that there is an actual detectedincident occurring near the user's current location may be made as aresult of a user interface input at the wireless computing deviceoperated by the user. For example, the user may operate input 306 ofwireless computing device 300 illustrated in FIG. 3 to indicate that anincident has actually occurred, perhaps after witnessing or beinginformed of an actual incident, such as a robbery or hostage situation,in the vicinity of the user. In other embodiments, an accessory devicecoupled to the wireless computing device, such as the RSM 106, maydetect a voice instruction or contextual audio that may trigger anindication of an actual incident occurring, such as the user speaking aten-code associated with a particular type of incident occurring nearthe user.

Additionally or alternatively, information provided to the wirelesscomputing device via the infrastructure (e.g., via wireless link(s) 214)may, alone or in combination with local triggers at the wirelesscomputing device, cause the wireless computing device to determine thatthere is an actual incident occurring near the user's current location.The information provided via the infrastructure may be sufficient on itsown to cause the wireless computing device to determine that there is anactual incident occurring near the user's current location, and may takethe form of a data message indicating the type of incident and perhapsincluding additional information such as location or a description ofsuspects involved. In other examples, the information provided via theinfrastructure may be a dispatcher's voice indicating occurrence of aparticular incident near the user, which may be automatically recognizedby the wireless computing device to trigger an incident occurrence, orwhich may be received by the user of the wireless computing device, whommay then toggle an input of the wireless computing device to indicateoccurrence of an incident. Other possibilities exist as well.

If the wireless computing device determines that there is no actualincident occurring near the user's current location, processing proceedsto step 416, where the wireless computing device determines whether thethird time period has expired. The third time period may bepreconfigured at the wireless computing device, or may be set via anover-the-air provisioning from the infrastructure. The third time periodmay be, for example, in the range of 1-20 minutes or 5-10 minutes. Ifthe third time period has not yet expired, processing proceeds back tostep 412. On the other hand, if the third time period has expired,processing proceeds back to step 402, or in some cases not shown in FIG.4, back to step 406 (in which case the second time period may be resetto an initial value). In some embodiments, expiration of the third timeperiod may also cause the wireless computing device to erase anythird-level PCIEs collected and stored during the third period (and notyet reported to the infrastructure). This maintains the privacy of theuser while still maintaining the ability to provide a limited history ofthird-level PCIE information to the infrastructure if furthercircumstances warrant it. In other embodiments, the third-level PCIEscollected and stored during the third period may be retained at thewireless computing device for a threshold period of time (e.g., 1-24hours) past expiration of the third time period, or may be retainedindefinitely until manually deleted by the user.

On the other hand, if the wireless computing device determines at step414 that there is an actual incident occurring near the user's currentlocation, processing proceeds to step 418.

At step 418, the wireless computing device continues to collect andstore first, second, and third-level PCIEs associated with the user fora fourth period of time. Because there is a determined actual incidentoccurring near the user's location, the wireless computing device takestwo actions, including, for the fourth period of time: (i) reporting thefirst, second, and third-level PCIEs previously collected and storedduring the first, second, and third periods of time and (ii) reportingthe first, second, and third-level PCIEs that the wireless computingdevice continues to collect. For example, wireless computing device 104in FIG. 2 may wirelessly transmit first. second, and third-level PCIEscollected and stored during the first, second, and third periods of timeto infrastructure 210 via wireless link(s) 214, for further storage atinfrastructure storage 228 and/or display at dispatch console 238. Bycollecting third-level PCIEs prior to the determination at step 414,additional context information leading up to the determination at step414 can be provided to the infrastructure for such diverse uses asanalytics, crime scene re-creation, etc. Also, any additional first,second, and third-level PCIEs that are collected during the fourthperiod of time are also reported to the infrastructure. Because thefirst and second-level PCIEs collected during the first, second, andthird periods of time were already reported to the infrastructure atsteps 406 and/or 412, the wireless computing device may refrain fromre-reporting such first and second-level PCIEs at step 418, or maysimply re-report such first and second-level PCIEs at step 418accompanying the additional PCIEs reported at step 418.

Processing then proceeds from step 418 to step 420, where the wirelesscomputing device determines whether the fourth time period has expired.The fourth time period may be preconfigured at the wireless computingdevice, may be set via an over-the-air provisioning from theinfrastructure, or may be set to last indefinitely until the userindicates via a user interface of accessory device that the incident hasended and/or until information received via the infrastructure indicatesthat the incident has ended. If not indefinite, the fourth time periodmay be, for example, in the range of 5-120 minutes or 10-30 minutes. Ifthe fourth time period has not yet expired (automatically or manuallyvia user or infrastructure input), processing proceeds back to step 418.On the other hand, if the fourth time period has expired, processingproceeds back to step 402, or in some cases not shown in FIG. 4, back tostep 412 (in which case the third time period may be reset to an initialvalue). In some embodiments, expiration of the fourth time period mayalso cause the wireless computing device to report any first, second, orthird-level PCIEs to the infrastructure prior to erasing any first,second, or third-level PCIEs still locally stored at the wirelesscomputing device. This maintains the privacy of the user in ashared-radio environment, where the wireless computing device may behanded off to another user in the future. In other embodiments, thefirst, second, and third-level PCIEs collected and stored at thewireless computing device may be retained at the wireless computingdevice for a threshold period of time (e.g., 1-24 hours) past expirationof the fourth time period, or may be retained indefinitely untilmanually deleted by the user.

Although the above description provides examples of particular PCIEs atparticular first, second, and third levels, various network owners mayconfigure a different mix of PCIEs and may assign various PCIEsdisclosed herein to different levels, and the above description is notintended to be limiting in any way, but instead, to give some examplesof possible hierarchical structures of PCIEs.

Further, although there is a gradual iteration in heightenedprobabilities of incident occurrence illustrated in FIG. 4 from steps404 to 418, in other embodiments, a detected actual incident at step 414may in some embodiments take the place of step 408, and processing maycontinue directly from step 406 to step 414 and to step 418. Othervariations are possible as well.

3. Conclusion

In accordance with the foregoing, an improved method, device, and systemfor collecting and reporting a minimum amount of real-time personalcontext associated with a user is disclosed. As a result of theforegoing, a user of the wireless computing device may be assured ofimproved privacy protection and constraints. Further, the user and/ordispatcher may be provided with a reduced amount of context informationoverall, and with more relevant context information depending on adetermined likelihood of an incident or occurrence of an actualincident, allowing a first responder user or dispatcher who may receivethis information to act on the collected information in a quicker andmore confident manner. Other advantages and benefits are possible aswell.

In the foregoing specification, specific embodiments have beendescribed. However, one of ordinary skill in the art appreciates thatvarious modifications and changes can be made without departing from thescope of the invention as set forth in the claims below. Accordingly,the specification and figures are to be regarded in an illustrativerather than a restrictive sense, and all such modifications are intendedto be included within the scope of present teachings. The benefits,advantages, solutions to problems, and any element(s) that may cause anybenefit, advantage, or solution to occur or become more pronounced arenot to be construed as a critical, required, or essential features orelements of any or all the claims. The invention is defined solely bythe appended claims including any amendments made during the pendency ofthis application and all equivalents of those claims as issued.

Moreover in this document, relational terms such as first and second,top and bottom, and the like may be used solely to distinguish oneentity or action from another entity or action without necessarilyrequiring or implying any actual such relationship or order between suchentities or actions. The terms “comprises,” “comprising,” “has”,“having,” “includes”, “including,” “contains”, “containing” or any othervariation thereof, are intended to cover a non-exclusive inclusion, suchthat a process, method, article, or apparatus that comprises, has,includes, contains a list of elements does not include only thoseelements but may include other elements not expressly listed or inherentto such process, method, article, or apparatus. An element proceeded by“comprises . . . a”, “has . . . a”, “includes . . . a”, “contains . . .a” does not, without more constraints, preclude the existence ofadditional identical elements in the process, method, article, orapparatus that comprises, has, includes, contains the element. The terms“a” and “an” are defined as one or more unless explicitly statedotherwise herein. The terms “substantially”, “essentially”,“approximately”, “about” or any other version thereof, are defined asbeing close to as understood by one of ordinary skill in the art, and inone non-limiting embodiment the term is defined to be within 10%, inanother embodiment within 5%, in another embodiment within 1% and inanother embodiment within 0.5%. The term “coupled” as used herein isdefined as connected, although not necessarily directly and notnecessarily mechanically. A device or structure that is “configured” ina certain way is configured in at least that way, but may also beconfigured in ways that are not listed.

It will be appreciated that some embodiments may be comprised of one ormore generic or specialized electronic processors (or “processingdevices”) such as microprocessors, digital signal processors, customizedprocessors and field programmable gate arrays (FPGAs) and unique storedprogram instructions (including both software and firmware) that controlthe one or more processors to implement, in conjunction with certainnon-processor circuits, some, most, or all of the functions of themethod and/or apparatus described herein. Alternatively, some or allfunctions could be implemented by a state machine that has no storedprogram instructions, or in one or more application specific integratedcircuits (ASICs), in which each function or some combinations of certainof the functions are implemented as custom logic. Of course, acombination of the two approaches could be used.

Moreover, an embodiment can be implemented as a computer-readablestorage medium having computer readable code stored thereon forprogramming a computer (e.g., comprising an electronic processor) toperform a method as described and claimed herein. Examples of suchcomputer-readable storage mediums include, but are not limited to, ahard disk, a CD-ROM, an optical storage device, a magnetic storagedevice, a ROM (Read Only Memory), a PROM (Programmable Read OnlyMemory), an EPROM (Erasable Programmable Read Only Memory), an EEPROM(Electrically Erasable Programmable Read Only Memory) and a Flashmemory. Further, it is expected that one of ordinary skill,notwithstanding possibly significant effort and many design choicesmotivated by, for example, available time, current technology, andeconomic considerations, when guided by the concepts and principlesdisclosed herein will be readily capable of generating such softwareinstructions and programs and ICs with minimal experimentation.

The Abstract of the Disclosure is provided to allow the reader toquickly ascertain the nature of the technical disclosure. It issubmitted with the understanding that it will not be used to interpretor limit the scope or meaning of the claims. In addition, in theforegoing Detailed Description, it can be seen that various features aregrouped together in various embodiments for the purpose of streamliningthe disclosure. This method of disclosure is not to be interpreted asreflecting an intention that the claimed embodiments require morefeatures than are expressly recited in each claim. Rather, as thefollowing claims reflect, inventive subject matter lies in less than allfeatures of a single disclosed embodiment. Thus the following claims arehereby incorporated into the Detailed Description, with each claimstanding on its own as a separately claimed subject matter.

1. A method for collecting and reporting varying levels of real-timepersonal context of a user, the method comprising: collecting andstoring, by a wireless computing device during a first period of time,one or more first personal context information elements associated withthe user and having a lower privacy impact but not reporting the one ormore first personal context information elements associated with theuser via wireless transmission to an infrastructure network; making afirst determination, by the wireless computing device via the one ormore first personal context information elements or via wirelessreception, that there is an increased probability of an incidentoccurring near the user and responsively, for a second period of timeafter the first determination: continuing to collect, by the wirelesscomputing device, the one or more first personal context informationelements and reporting the one or more first personal contextinformation elements collected during the first and second periods oftime via wireless transmission to the infrastructure network; andbeginning collecting and storing, by the wireless computing device, oneor more second personal context information elements not collectedduring the first period of time and having a higher privacy impact butnot reporting the one or more second personal context informationelements via wireless transmission to the infrastructure network.
 2. Themethod of claim 1, further comprising: making a second determination, bythe wireless computing device via the one or more first or secondpersonal context information elements, via a detected external event, orvia wireless reception, that there is an actual incident occurring nearthe user and responsively, for a third period of time after the seconddetermination: continuing to collect by the wireless computing device,the one or more first and second personal context information elementsand reporting the one or more first and second personal contextinformation elements collected during the first, second, and thirdperiods of time via wireless transmission to the infrastructure network.3. (canceled)
 4. The method of claim 1, wherein the first personalcontext information elements comprise a location of the user, and thesecond personal context information elements comprise a mobility stateof the user.
 5. The method of claim 1, wherein the first determinationcomprises a determination, as a function of a first personal contextinformation element comprising a location of the user, that the locationof the user is a location associated with a historically higherprobability of an incident occurring.
 6. The method of claim 1, whereinthe first determination comprises one or more of: (i) a determinationthat a number of nearby first responders exceeds a threshold number ofnearby first responders, (ii) a determination that a time of day and/orday of week is associated with a historically higher probability of anincident occurring, (iii) a determination that a current weathercondition is associated with a historically higher probability of anincident occurring, (iv) a determination that a current location of theuser is near a musical, news, or political event, (v) a determinationthat a current location of the user is near another user pre-identifiedas high-importance, and (vi) a determination that an activity state ofthe user has increased.
 7. The method of claim 1, further comprising:making a second determination, by the wireless computing device via theone or more first or second personal context information elements, via adetected external event, or via wireless reception, that there is afurther increased probability of an incident occurring near the user andresponsively, for a third period of time after the second determination:continuing to collect by the wireless computing device, the one or morefirst and second personal context information elements and reporting theone or more first and second personal context information elementscollected during the first, second, and third periods of time viawireless transmission to the infrastructure network; and beginningcollecting and storing, by the wireless computing device, one or morethird personal context information elements associated with the user notcollected during the first or second periods of time but not reportingthe one or more third personal context information elements via wirelesstransmission to the infrastructure network.
 8. The method of claim 7,further comprising: making a third determination, by the wirelesscomputing device via the one or more first, second, or third personalcontext information elements, via a detected external event, or viawireless reception, that there is an actual incident occurring near theuser and responsively, for a fourth period of time after the thirddetermination: continuing to collect by the wireless computing device,the one or more first, second. and third personal context informationelements and reporting the one or more first, second, and third personalcontext information elements collected during the first, second, third,and fourth periods of time via wireless transmission to theinfrastructure network.
 9. The method of claim 8, wherein the firstpersonal context information elements comprise context elements having alower privacy impact including a location of the user, the secondpersonal context information elements comprise context elements having ahigher privacy impact including a mobility state of the user, and thethird personal context information elements comprise context elementshaving a still higher privacy impact including biological readings ofthe user.
 10. The method of claim 8, wherein the third determinationthat an actual incident is occurring comprises determining that theuser's weapon has been pulled out from its holster or that a weapon invicinity of the user has been discharged.
 11. The method of claim 7,wherein the first and second determinations are different and areselected from a list consisting of: (i) a determination that a number ofnearby first responders exceeds a threshold number of nearby firstresponders, (ii) a determination that a time of day and/or day of weekis associated with a historically higher probability of an incidentoccurring, (iii) a determination that a current weather condition isassociated with a historically higher probability of an incidentoccurring, (iv) a determination that a current location of the user isnear a musical, news, or political event, (v) a determination that acurrent location of the user is near another user pre-identified ashigh-importance, (vi) a determination that a current location of theuser is associated with a historically higher probability of an incidentoccurring, and (vii) a determination that an activity state of the userhas increased.
 12. The method of claim 7, wherein the third period oftime is a predetermined period of time, and after expiration of thethird period of time without a third determination that there is a stillfurther increased probability of an incident occurrence, at leasttemporarily halting collecting the one or more third personal contextinformation elements and halting reporting the one or more secondpersonal context information elements via wireless transmission to theinfrastructure network.
 13. The method of claim 1, wherein the secondperiod of time is a predetermined period of time, and after expirationof the second period of time without a second determination that thereis a further increased probability of an incident occurrence, at leasttemporarily halting collecting the one or more second personal contextinformation elements and halting reporting the one or more firstpersonal context information elements via wireless transmission to theinfrastructure network.
 14. A wireless computing device for collectingand reporting varying levels of real-time personal context of a user,the device comprising: one or more wireless transceivers; a data store;and one or more electronic processors configured to: collect and store,in the data store, one or more first personal context informationelements associated with the user but not reporting the one or morefirst personal context information elements associated with the user andhaving a lower privacy impact via wireless transmission to aninfrastructure network using the one or more wireless transceivers; makea first determination, via the one or more first personal contextinformation elements or via wireless reception over the one or morewireless transceivers, that there is an increased probability of anincident occurring near the user and responsively, for a second periodof time after the first determination: continue to collect the one ormore first personal context information elements and reporting the oneor more first personal context information elements collected during thefirst and second periods of time via wireless transmission using the oneor more wireless transceivers to the infrastructure network; and beginto collect and store, in the data store, one or more second personalcontext information elements not collected during the first period oftime and having a higher privacy impact but not reporting the one ormore second personal context information elements via wirelesstransmission using the one or more wireless transceivers to theinfrastructure network.
 15. (canceled)
 16. The wireless computing deviceof claim 14, wherein the first personal context information elementscomprise a location of the user, and the second personal contextinformation elements comprise a mobility state of the user.
 17. Thewireless computing device of claim 14, wherein the first determinationcomprises a determination, as a function of a first personal contextinformation element comprising a location of the user, that the locationof the user is a location associated with a historically higherprobability of an incident occurring.
 18. The wireless computing deviceof claim 14, wherein the first determination comprises one or more of:(i) a determination that a number of nearby first responders exceeds athreshold number of nearby first responders, (ii) a determination that atime of day and/or day of week is associated with a historically higherprobability of an incident occurring, (iii) a determination that acurrent weather condition is associated with a historically higherprobability of an incident occurring, (iv) a determination that acurrent location of the user is near a musical, news, or politicalevent, (v) a determination that a current location of the user is nearanother user pre-identified as high-importance, and (vi) a determinationthat an activity state of the user has increased.
 19. The wirelesscomputing device of claim 14, wherein the second period of time is apredetermined period of time, and wherein the set of functions furthercomprise: after expiration of the second period of time without a seconddetermination that there is a further increased probability of anincident occurrence, at least temporarily halting collecting the one ormore second personal context information elements and halting reportingthe one or more first personal context information elements via wirelesstransmission to the infrastructure network.
 20. A non-transitorycomputer readable media storing instructions that, when executed by aprocessor, perform a set of functions for collecting and reportingvarying levels of real-time personal context of a user, the set offunctions comprising: collecting and storing, in a data store, one ormore first personal context information elements associated with theuser and having a lower privacy impact but not reporting the one or morefirst personal context information elements associated with the user viawireless transmission to an infrastructure network; making a firstdetermination, via the one or more first personal context informationelements or via wireless reception, that there is an increasedprobability of an incident occurring near the user and responsively, fora second period of time after the first determination: continuing tocollect the one or more first personal context information elements andreporting the one or more first personal context information elementscollected during the first and second periods of time via wirelesstransmission to the infrastructure network; and begin to collect andstore, in the data store, one or more second personal contextinformation elements not collected during the first period of time andhaving a higher privacy impact but not reporting the one or more secondpersonal context information elements via wireless transmission to theinfrastructure network.