System, Method, and Apparatus for Providing Help

ABSTRACT

A system for providing help includes at least one digital assistant and a wireless data interface for connecting the digital assistants to a server. A plurality of agent computers is connected to the server by a data network. Each of the at least one digital assistants is preprogrammed and centrally managed with at least one skill for recognizing a preprogrammed specific utterance and each of the at least one digital assistants is pre-configured to connect with the wireless data interface. After the preprogrammed specific utterance is detected by one of the digital assistants, that digital assistant initiates a request for help to the server and upon receiving the request for the help, the server assigns one of the agent computers and forwards the request for help to the one of the agent computers.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of U.S. provisional application No.62/643,487 filed on Mar. 15, 2018, the disclosure of which isincorporated by reference.

FIELD

This invention relates to the field of providing help to a user and moreparticularly to a system for requesting help for a medical ornon-medical emergency by way of voice activation.

BACKGROUND

In recent years, many companies have introduced devices that acceptvoice commands and take actions based upon those voice commands. Somesuch devices operate on smart phone, but lately, many companies areproducing what is known a digital assistants which are typicallystand-alone, smart speaker devices that are connected to a network (e.g.the Internet), listen for voice commands, and act on those voicecommands through the network. Often, such devices utilize a keyword toinitiate action. For example, one device from Amazon® is Alexa®. Inorder to issue a command to this device, the user must first say thekeyword, “Alexa”, or other optional Wake words, followed by the command.For example, “Alexa, what is the weather in Aruba today?” This keywordis important so the digital assistant does not overhear normalconversation and act on what is heard. For example, if you were on thephone and said, “did you turn off the lights,” without this keyword, thedigital assistant might just turn off the lights in your house. Thereare many uses for these digital assistants such as, reading/answeringemail or texts, operating connected appliances within the home,controlling the playing of music, looking up information/trivia, etc.

Unrelated to these digital assistants are medical emergencies,predicaments, or medical alerts. Many people of all ages, thoughconcentrated on those in their golden years, run into situations inwhich they need help, for example, after a fall, getting stuck in a homeelevator, or the onslaught of a serious medical condition such as astroke or heart attack. If another person is in the same home or nearby,the person having the medical emergency or other hazard can shout to getthat person's attention, but what about those who are alone, perhapsbecause others that live with them are out of the home, or they livealone. Shouting will not solicit help.

A medical alarm is an alarm system designed to signal the presence ofsuch an event that requires urgent attention and, if needed, to summonemergency medical personnel. Other terms for a medical alarm arePersonal Emergency Response System (“PERS”) or medical alert. Elderlypeople and disabled people who live alone commonly use/require medicalalarms.

Typical medical alarm systems in use today have a wireless pendant ortransmitter that is activated after an event has occurred. When thetransmitter is activated, a signal is transmitted and relayed to analarm monitoring company's central station. The central station isstaffed with trained personnel to assess the situation and contact otheremergency agency or other programmed phone numbers. In some cases,personnel are dispatched to the site where the alarm was activated.

Such medical alarm systems work well when properly installed, when thebatteries have sufficient charge and when the user remembers or agreesto wear them. However, since traditional medical alarm systems are, atleast in part, user operated, there are problematic drawbacks. Forexample, if a user gets up in the middle of the night to go to thebathroom without their device, and falls or becomes ill and cannot reachtheir emergency device, or telephone; then they cannot get the emergencyhelp they need, rendering the medical alert useless.

Furthermore, such medical alarm systems rely on user operations thatrequires users to change their behavior, making current medical alarmsystems inherently susceptible to users' personal limitations,proclivities, and flaws—putting reliance on the user to remember torecharge the battery and consistently wear a pendant, wrist band, panicbutton, or other device for the entire day and night. Some users,however, do not want to wear the alarm pendant or wrist band because ofaesthetics and/or inconvenience and/or privacy, rendering the deviceuseless when needed. Also, some users forget to don or wear the deviceand the device may not be within reach when they need it most.Additionally, some users forget to charge the device regularly and thedevice simply shuts down and ceases to operate until recharged. In fact,approximately 30% of all users of such devices cancel medical alertservice annually, possibly due to the fact that they no longer wear oruse the device, despite the fact that the user is still in need of amedical monitoring. In an independent research study, 83% of subscribersto medical alert services did not have their medical alert wearabledevice within reach in a slip and fall at home and resulted in five (5)minutes or longer stranded on the floor and unable to get up withoutassistance.

Additionally, as of this writing, both Amazon® Alexa® and GoogleAssistant® and other digital personal assistants (DPA) are not permittedto dial 911 by operating system programming. If a voice command is givento “Call for Police,” “Call for a Doctor,” “Call for an Ambulance,” fireor other emergency is given, those commands are blocked by the otherdigital personal assistant, by design. One of the issues with issuingcalls directly to 911 is that greater than 90% of all issued alarms fromelectronic alarm systems in the United States are deemed false alarms.This is a significant problem in the industry, and thus, any types ofdigital personal assistants are currently disabled form makingunverified calls to 911.

Privacy is also of the utmost importance. In the United States, there isa set of laws commonly called HIPAA, which stands for the HealthInsurance Portability and Accountability Act. HIPAA provides for stiffpenalties for offenses in which medical personnel divulge any privatemedical information regarding a patient. Therefore, anyone involved withproviding any part of a medical alarm system must be thoroughly trainedand monitored to treat any information confidentially, as release of anyhealth-related information is a possible violation of the law related toHIPAA.

As can be seen, there is a need for a system that provides help to auser that is monitored by a private, commercial system and activated byvoice command thereby not requiring a personal panic button or device ofany type that has to be worn by the users. Further, the system forproviding help needs to install easily, provide client privacy forProtected Medical Information (“PHI”), and alert medical staff should anemergency arise.

SUMMARY

The present invention relates to digital assistants and emergencycommunications and, more particularly, to a system for installation,configuration, and operation of a digital assistant connected to aprivate, commercial system. The system for providing help is activatedby voice command. In some embodiments, this triggers 2-way voicecommunication between agents (staff) and the user and requires no panicbutton or device that needs to be worn by the users.

The system for providing help includes keywords for a user to say/yellwhen help is needed, by simply using the appropriate voice commandspecified for the digital assistant, such as “Alexa, call for help.”Thereby, the system for providing help enables a hands-free solutionindependent of any battery operated, worn electronic device. In someembodiments, the digital assistants are powered by household power, e.g.from a wall outlet, eliminating the need for a user to initiaterecharging.

In other embodiments, the digital assistants are powered by acontinuously recharged battery-backup base unit which gives the userseveral hours of battery back-up in the instance of a power outage. Thebattery-backup base units are powered by household power, e.g. from awall outlet continuously eliminating the need for the user to rememberto recharge them.

In other words, the system for providing help monitors and waits for auser's call for help from anywhere in their home within listeningdistance of one or more digital assistants. The user is not required tochange their normal behavior by wearing an electronic device or worryabout battery charge levels in such electronic device.

Additionally, the system for providing help is 911-non-compliant, as anagent (e.g. trained emergency professional) within the process assesseswhat is needed so as to facilitate the 911 call after the extent of thesituation is known.

In one embodiment, a system for providing help is disclosed including atleast one digital assistant and a wireless data interface for connectingthe digital assistants to a server. A plurality of agent computers isconnected to the server by a data network. Each of the at least onedigital assistants is preprogrammed with at least one skill forrecognizing a preprogrammed specific utterance and each of the at leastone digital assistants is pre-configured to connect with the wirelessdata interface. After the preprogrammed specific utterance is detectedby one of the digital assistants, that digital assistant initiates arequest for help to the server and upon receiving the request for thehelp, the server assigns one of the agent computers and forwards therequest for help to the one of the agent computers.

In another embodiment, a method of providing help is disclosed includingcreating a user account which is centrally managed on behalf of the userwith a unique user email and cell phone number and allocating at leastone digital assistant to the user account. A provider account is createdwith a provider of the at least one digital assistants using the uniqueuser email and cell phone number and a skill is preprogrammed into theat least one digital assistant that recognizes a preprogrammed specificutterance. A connectivity between each of the at least one digitalassistants and a server is provided. Each of the at least one digitalassistants listen for the preprogrammed specific utterance and, uponrecognizing the preprogrammed specific utterance, the digital assistantssends a request for help to the server. Upon receipt of the request forthe help, the server forwards the request for help to an agent computer.

In another embodiment, a turn-key system for providing help is disclosedincluding at least one digital assistant. Each of the at least onedigital assistants is preprogrammed with at least one skill thatincludes recognizing a preprogrammed specific utterance (e.g. “Alexa,send help”) and each of the at least one digital assistants ispre-configured, through a centrally managed account on behalf of theuser, to connect with a mobile hotspot with an assigned cellular dataaccount for high-speed Wi-Fi connection. The mobile hotspot ispreprogrammed for connecting to a server. A unique user email iscreated, as part of the centrally managed service on behalf of the user,to protect privacy of a user of the turn-key system for providing helpand a provider account created using the unique user email to protectthe privacy of the user. A centrally managed account in the turn-keysystem for providing help for the user is provided with information forthe user and the account having the unique user email. After thepreprogrammed specific utterance is detected by one of the digitalassistants, one of the digital assistants initiates a request for helpto the server; and upon reception of the request for help, the serverassigns an agent computer and forwards the request for help to the agentcomputer.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention can be best understood by those having ordinary skill inthe art by reference to the following detailed description whenconsidered in conjunction with the accompanying drawings in which:

FIG. 1 illustrates a data connection diagram of system for providinghelp.

FIG. 2 illustrates an alternate data connection diagram of system forproviding help.

FIG. 3 illustrates a schematic view of a digital assistant of the systemfor providing help.

FIG. 4 illustrates a schematic view of a typical computer system.

FIG. 5 illustrates a schematic view of a typical hotspot.

FIG. 6 illustrates a view of a typical home configuration.

FIGS. 7-10 illustrate exemplary user database data.

FIG. 10A illustrates an exemplary digital assistant provider database.

FIG. 11 illustrates an exemplary system for providing help havingmultiple digital assistants connected to the call server using a mobilehotspot.

FIG. 12 illustrates an exemplary user database for translating betweenuser accounts and unique addresses of the mobile hotspot.

FIGS. 13 and 14 illustrate exemplary program flows of the system forrequesting help.

DETAILED DESCRIPTION

Reference will now be made in detail to the presently preferredembodiments of the invention, examples of which are illustrated in theaccompanying drawings. Throughout the following detailed description,the same reference numerals refer to the same elements in all figures.

Throughout this description, the term, “computer,” refers to any systemthat has a processor and runs software. One example of such is apersonal computer. The term, “digital assistant,” refers to any devicethat interprets voice commands and takes action or responds to thosecommands, for example, but not limited to, the Alexa® device fromAmazon®, the Google® Home device, smartphones, etc. The term, “user,”refers to a human that interfaces with the digital assistant throughvoice commands. The term, “agent,” refers to a person who receivesnotice of an issue with the user and determines the appropriate nextstep, for example, sending help or calling emergency services (e.g. 911or direct dispatch of emergency services from the appropriate nearbyfirst responder agency on behalf of the user.

Referring to FIG. 1 illustrates a data connection diagram of theexemplary system for providing help. In this example, agent computers 10(e.g., personal computers) communicates through a first network 506A(e.g. the Internet, local area network, etc.) to a call server computer500. The agent computers 10 are staffed with agents; people who havetools for dealing with medical or non-medical emergencies such as a userfalling, having a severe medical condition (e.g. stroke or heartattack), or being stuck in an elevator.

The call server computer 500 (e.g. a computer, a server or an array ofservers or computers) provides access security, allowing only thoseagents that are authorized to access the call server computer 500, andtherefore, to process incoming calls.

Although one path between the agent computers 10 and the call server 500is through the first network 506A as shown, though any known data pathis anticipated. For example, a local area network, Wi-Fi combined with awide area network, which includes the Internet.

The call server computer 500 transacts with the agent computers 10through the first network(s) 506A, presenting information regardingincoming requests for help, as permitted by privacy rules. In someembodiments, a two-way voice communication is set up between the agentcomputer 10 and the digital assistant 12 that initiated the request forhelp. In some embodiments, the agent computers 10 and/or the call server500 are equipped with tools to facilitate obtaining the proper help inresponse to the request for help including dispatch of private staff tothe residence and escalation contacts up to and including a connectionto emergency services (e.g. 911).

The call server computer 500 (and/or the agent computers 10) has accessto data storage 502. In some embodiments, the data storage includes adatabase, or managed account database, that contains data for each userand, preferably, anonymizes the user's identity to the digital assistantproviders as well as to potential hackers of the digital assistants 12.The database contains data used in routing from the digital assistants12 to the agent computers 10, historical data such as informationregarding prior requests from the same location (digital assistants 12),call logging such as dates, times, durations, content, etc., andsecurity to the users of the digital assistants 12 and access controls.

Any number of digital assistants 12 is anticipated. The digitalassistants 12 monitor sound and analyze the sound for specificutterances. Of interest to the system for providing help is specificutterances that are configured to request help such as “Alexa, Call forhelp” or similar. In the embodiment shown, the digital assistantscommunicate through the second network 506B to the call server 500,typically when and after the specific utterances 5 (see FIG. 6) thatrequest help are detected. The second network 506B is any single orcombination of network technologies, including, but not limited to localarea networks (e.g. Ethernet), wireless networks (e.g. Wi-Fi or802.11x), cellular data networks (e.g. GSM, CDMA, TDMA, LTE), of anytype and configuration of network(s).

In some embodiments, the digital assistant(s) 12 respond to the specificutterances 5 (e.g. “Alexa, Call for help”) by interfacing with aprovider server 400, a server owned and maintained by the provider ofthe digital assistant 12 to initiate the call. The provider server 400has provider accounts stored in a provider data storage 402. Theprovider server 400 receives the request for the call from the digitalassistant 12 and initiates a phone call, e.g. by Voice over IP throughthe network 506B to the call server 500. The call server 500 receivesthe call from the provider server 400 and uses a caller-id of the callaccess user records (e.g. from data storage 502) to determine the name,phone number, and location of the user 4; history of this user's 4issues; medical information regarding the user 4 (e.g. heart conditions,medications, mobility); local support staff locations and contactinformation (e.g. roaming staff, staff in assisted living); etc.

Referring to FIG. 2 illustrates a data connection diagram of theexemplary system for providing help using mobile hotspots 14 which arepart of the centrally programmed and managed system. In this example,agent computers 10 (e.g., personal computers) communicate (as in FIG. 1)through a first network 506A (e.g. the Internet, local area network,etc.) to a call server computer 500. Although one path between the agentcomputers 10 and the call server 500 is through the first network 506Aas shown, though any known data path is anticipated. For example, alocal area network, Wi-Fi combined with a wide area network, whichincludes the Internet.

Although any number of digital assistants 12 is anticipated, three areshown for brevity reasons. The digital assistants 12 monitor sound andanalyze the sound for specific utterances. Of interest to the system forproviding help is specific utterances that are configured to requesthelp such as “Alexa, Call for help,” or similar. In the embodimentshown, two of the digital assistants connect to a first one of themobile hotspots 14 and a single other of the digital assistants connectsto a second of the mobile hotspots 14. It is anticipated that in asmaller location (e.g. home or office), a single mobile hotspot 14 issufficient to provide connectivity to all digital assistants 12 withinthat location (including a single digital assistant 12), while in largerlocations more than one mobile hotspot 14, connected as a repeater usingthe same SSID and access code, may be required to provide adequate localwireless coverage.

Each mobile hotspot 14 communicates through the cellular network 506C tothe call server 500, typically when and after the specific utterancesthat request help are detected.

Referring to FIG. 3, a schematic view of an exemplary digital assistant12 is shown as used as an end-point device in the system for providinghelp. The exemplary digital assistant 12 is a processor-based device forproviding voice recognition and command execution. The present inventionis in no way limited to any particular digital assistant 12 and manyother devices are anticipated that offer similar voice recognition andcommand execution. Such other processor-based devices that are equallyanticipated include, but are not limited to, Google® Assistant series ofsmart speaker digital assistants, Apple's® Siri® series of smart speakerdigital assistants, other smart speakers which have embodied a similaror licensed artificial intelligence powered digital assistant of anytype, smart phones, cellular phones, thermostats, fitness devices, etc.

The exemplary digital assistant 12 represents a typical device used foraccessing user interfaces of the system for providing help. Thisexemplary digital assistant 12 is shown in its simplest form. Differentarchitectures are known that accomplish similar results in a similarfashion, and the present invention is not limited in any way to anyparticular system architecture or implementation. In this exemplarydigital assistant 12, a processor 70 executes or runs programs in arandom access memory 75. The programs are generally stored within apersistent memory 74 and loaded into the random access memory 75 whenneeded. In some digital assistants 12, a removable storage 88 (e.g.,compact flash, SD) offers removable persistent storage. The processor 70is any processor, typically a processor designed for phones. Thepersistent memory 74, random access memory 75, and removable storageslot are connected to the processor by, for example, a memory bus 72.The random access memory 75 is any memory suitable for connection andoperation with the selected processor 70, such as SRAM, DRAM, SDRAM,RDRAM, DDR, DDR-2, etc. The persistent memory 74 is any type,configuration, capacity of memory suitable for persistently storingdata, for example, flash memory, read only memory, battery-backedmemory, etc. In some agent computers 10, the persistent memory 74 isremovable, in the form of a memory card of appropriate format such as SD(secure digital) cards, micro SD cards, compact flash, etc.

Also connected to the processor 70 is a system bus 82 for connecting toperipheral subsystems such as a wireless network interface 80 (e.g.Wi-Fi), an output port 84 for driving indicators 86, and an input port83 for reading switch inputs 85, though there is no restriction oninputs and outputs.

In general, some portion of the persistent memory 74 and/or theremovable storage 88 is used to store programs, executable code, anddata, etc.

The peripherals are examples, and other devices are known in theindustry such as Global Positioning Subsystems 91, the details of whichare not shown for brevity and clarity reasons.

The wireless network interface 80 connects the exemplary digitalassistant 12 to the second network 506B or cellular network 506C throughany known or future protocol such as Ethernet, WI-FI, GSM, TDMA, LTE,etc., through a wired or wireless medium 78. There is no limitation onthe type of connection used. The wireless network interface 80 providesdata and messaging connections between the exemplary digital assistant12 and the call server 500 through the second network 506B.

For receiving voice commands from a user, the digital assistant 12 hasan audio input device such as a microphone or microphone array 92.

For providing responses and information, the digital assistant 12 has atransducer device or speaker 93.

Referring to FIG. 4, a schematic view of a typical call server computersystem (e.g., call server 500) is shown. The example call server 500represents a typical server computer system used as in the system forremote computer control. This exemplary call server 500 is shown in itssimplest form. Different architectures are known that accomplish similarresults in a similar fashion and the present invention is not limited inany way to any particular computer system architecture orimplementation. In this exemplary computer system, a processor 570executes or runs programs in a random access memory 575. The programsare generally stored within a persistent memory 574 and loaded into therandom access memory 575 when needed. The processor 570 is anyprocessor, typically a processor designed for computer systems with anynumber of core processing elements, etc. The random access memory 575 isconnected to the processor by, for example, a memory bus 572. The randomaccess memory 575 is any memory suitable for connection and operationwith the selected processor 570, such as SRAM, DRAM, SDRAM, RDRAM, DDR,DDR-2, etc. The persistent memory 574 is any type, configuration,capacity of memory suitable for persistently storing data, for example,magnetic storage, flash memory, read only memory, battery-backed memory,magnetic memory, etc. The persistent memory 574 is typically interfacedto the processor 570 through a system bus 582, or any other interface asknown in the industry.

Also shown connected to the system bus 582 is a network interface 580(e.g., for connecting to a data network 506X—e.g. first network 506Aand/or second network 506B and/or cellular network 506C), a graphicsadapter 584 and a keyboard interface 592 (e.g., Universal SerialBus—USB). The graphics adapter 584 receives information from theprocessor 570 and controls what is depicted on a display 586. Thekeyboard interface 592 provides navigation, data entry, and selectionfeatures.

In general, some portion of the persistent memory 574 is used to storeprograms, executable code, data, contacts, and other data, etc.

The peripherals are examples and other devices are known in the industrysuch as pointing devices, touch-screen interfaces, speakers,microphones, USB interfaces, Bluetooth transceivers, Wi-Fi transceivers,image sensors, temperature sensors, etc., the details of which are notshown for brevity and clarity reasons.

Referring to FIG. 5, a schematic view of an exemplary mobile hotspot 14is shown as used in the system for providing help. The exemplary mobilehotspot 14 is a processor-based device for providing data connectivitythrough the cellular network 506C. The present invention is in no waylimited to any particular mobile hotspot 14 and many other devices areanticipated that offer similar connectivity.

The exemplary mobile hotspot 14 represents a typical device used forproviding data connectivity using the cellular network 506C (anycellular data network is anticipated including, but not limited to,CDMA, GSM, TDMA, LTE, etc. This exemplary mobile hotspot 14 is shown inits simplest form. Different architectures are known that accomplishsimilar results in a similar fashion, and the present invention is notlimited in any way to any particular system architecture orimplementation. In this exemplary mobile hotspot 14, a processor 970executes or runs programs in a random access memory 975. The programsare generally stored within a persistent memory 974 and loaded into therandom access memory 975 when executed. A subscriber identity module 988(SIM or SIM card) securely stores an international mobile subscriberidentity (IMSI) number and its related key, which are used to identifyand authenticate subscribers on the cellular network 506C. The processor970 is any processor, typically a processor designed for datacommunications. The persistent memory 974, random access memory 975, andsubscriber identity module 988 are connected to the processor by, forexample, a memory bus 972. The random access memory 975 is any memorysuitable for connection and operation with the selected processor 970,such as SRAM, DRAM, SDRAM, RDRAM, DDR, DDR-2, etc. The persistent memory974 is any type, configuration, capacity of memory suitable forpersistently storing data, for example, flash memory, read only memory,battery-backed memory, etc.

Also connected to the processor 970 is a system bus 982 for connectingto peripheral subsystems such as a cellular network interface 980 (e.g.cellular interface) and a local wireless network interface 981 (e.g.Wi-Fi). In some embodiments, an output port 984 is provided for drivingindicators 986, and an input port 983 is provided for reading switchinputs 985, though there is no restriction on inputs and outputs.

In general, some portion of the persistent memory 974 is used to storeprograms, executable code, and data, etc.

The peripherals are examples, and other devices are known in theindustry are anticipated, the details of which are not shown for brevityand clarity reasons.

The cellular network interface 980 connects the mobile hotspot 14 to thecellular network 506C through any known or future protocol such as GSM,TDMA, LTE, etc. There is no limitation on the type of cellularconnection used. The cellular network interface 980 provides data andmessaging between the exemplary mobile hotspot 14 and the cellularnetwork 506C.

The local wireless network interface 981 connects the mobile hotspot 14to a local wireless network through any known or future protocol such asWi-Fi (802.11x), Bluetooth, etc. There is no limitation on the type oflocal wireless connection used. The local wireless network interface 981provides data and messaging between the mobile hotspot 14 and thedigital assistants 12.

Referring to FIG. 6, a view of a typical turn-key, home configuration isshown. Within the home 1 (or office or any area), a digital assistant 12is powered, for example, by a wall transformer 3 plugged into a standardAC outlet 2. The digital assistant 12 communicates wirelessly (e.g. byWi-Fi) with a mobile hotspot 14, shown in this example as being poweredby the same wall transformer 3. It is anticipated that the componentswithin the home 1 of FIG. 6 (except the standard AC outlet 2) beprovided as a turn-key solution, each pre-configured to functionproperly with each other.

The mobile hotspot 14 communicates with the call server 500 through awide area wireless network such as a cellular network 506C (a singlecell tower 8 is shown as a representation of such).

In this example, a user 4 has fallen and utters the preprogrammedspecific utterance 5 (e.g., “Alexa, Call for help” or similar). that isreceived by the microphone array 92 of the digital assistant 12. Thedigital assistant 12, recognizing the utterance as the preprogrammedspecific utterance 5 communicates with the mobile hotspot 14 (e.g. viaWi-Fi). After receiving the communication, the mobile hotspot 14contacts the call center server 500 through the cellular network 506C(and/or any other networks) as represented by the cell tower 8.

In some embodiments, the call center server 500 assigns an agentcomputer 10 and associated call center agent, connecting to that agentcomputer 10 and displaying information related to the user 4, byassociating the caller ID number associated with the smart speakersystem to the database of the provider centrally managed system, so thatthe agent is able to identify the name and exact location of the caller,and is able to understand the issue and determine the extent of theemergency, should an emergency exist.

In some embodiments, the agent computer 10 is placed in voicecommunication with the digital assistant 12 and, as the agent speaks,digitized speech is sent from the agent computer 10 to the digitalassistant 12 and the user 4 hears what the agent is saying through oneor more speakers 93 of the digital assistant 12. Likewise, when the user4 speaks, digitized speech is sent from the digital assistant 12 to theagent computer 10 and the agent hears what the user 4 is saying throughone or more speakers of agent computer 10. In this way, the agent iscapable of determining the identity of the caller from the centrallymanaged database, and determine the extent of the emergency and able todetermine what course of action is needed, for example, verbal help,sending private responders (e.g. at an assisted living location),contacting an emergency response resource (e.g. calling 911 in the USA),etc.

As many users 4 that may need emergency help often lack technicalskills, those users 4 that are in greatest need of the system forproviding help, it is desired to provide a “turn-key” system forproviding help, in that, the user 4 need not be concerned withconfiguring wireless networks, home internet services, phone services,smartphone app downloading, and programming a digital assistant etc. Thedesire is that the user 4 only need to plug in the system for providinghelp to a wall power outlet and the system for providing helpself-configures and operates. As many users 4 have no wireless internetaccess, one such pre-configuration includes one or more digitalassistants 12 and one or more mobile hotspots 14, pre-configured tocommunicate with each other to provide services of the system forproviding help (in addition to other services available from the digitalassistant 12 such as answering questions, playing music, etc.). In this,the digital assistant(s) 12 is/are pre-configured to connect with themobile hotspot(s) 14, the digital assistant(s) 12 is/are preprogrammedwith the preprogrammed specific utterance 5, and the digitalassistant(s) 12 have a private identity 102 (see FIG. 7) that is uniqueand known to the call server 500 based on the proprietary centrallymanaged program database. By having a private identity 102 such as1112223333@gmail.com, the digital assistant(s) 12 do not disclose theidentity of the user 4 in outside communications unless the user 4explicitly discloses such information. Therefore, until an emergency isdetermined, the agent might only be provided with a first name of theuser 4 for polite addressing, thereby not releasing any privateinformation until it is determined that an emergency exists. Suchidentity hiding is important for HIPAA compliance.

Note that many available digital assistants 12 have a wake-up work suchas “Alexa,” and such has been included in the preprogrammed specificutterance 5, for example, “Alexa, Call for help.” The main reason isthat should someone on the radio or television say, “send help,” thesystem for providing help need not interpret this as an emergency.

When it is determined that an emergency exists, the private identity 102is used by the call server 500 to access user records (e.g. from datastorage 502) to determine the name, phone number, and location of theuser 4; history of this user's 4 issues; medical information regardingthe user 4 (e.g. heart conditions, medications, mobility); local supportstaff locations and contact information (e.g. roaming staff, staff inassisted living); etc.

Although it is preferred to use a digital assistant 12 as a portal intothe system for providing help, parallel systems are also anticipatedincluding by phone in which the DNIS (Dialed Number IdentificationSystem) or caller ID methodology is used to determine the identity ofthe user, by matching the DNIS (caller ID) with the proprietarycentrally managed system database, or through programming one or morephone numbers of the system for providing help into a user's smartphone.

After installation and configuration, the user 4 typically makes aninitial test call using system, by saying the preprogrammed specificutterance 5, for example: “Alexa, Call For Help” or similar. Note thatin this preprogrammed specific utterance 5, the first word, “Alexa,”wakes up the digital assistant 12; the second word, “Call,” is a commandto instruct the digital assistant 12 to initiate a digital call; and theremaining words, “for help” identify the called party, which is that ofa monitored security number (e.g. the call server 500).

The system for providing help maintains a monitoring center (ULapproved) with trained operators preferably providing continualoperation with redundant back up. The system for providing helpmaintains an account for each user 4, with their address, emergencycontacts such as neighbors, friends, family and physicians contactnumbers, and a limited medical history and specialized instructions(Protected Medical Information or “PHI”). In some embodiments, thesystem for providing help offers additional services and solutions tomaintain contact with a user 4 on a daily basis, verify their wellbeingand operation of their digital assistant(s) 12. By removing a need forany industry standard PERS base station (which may broadcast a customeraccount identification number) or a PERS (mobile cellular pendant orwrist band) improved security and privacy is provided. When a phone orsmartphone is used to access the system for providing help, the DNIS(Dialed Number Identification System) or Caller ID is used as a uniqueindex into account information from a database each time a call isreceived from a registered user.

If a user 4 desires a body-worn device (not shown for brevity andclarity) such as a personal panic button, a pendant or a wrist band, itis anticipated that the digital assistant 12 and/or mobile hotspot 14 beconfigured to interface with the body-worn device and initiate aninteraction with the call server 500. An agent of the system forproviding help, interfaced to the call server 500, determines if theuser 4 needs assistance, and, if so, summons assistance by contactingfriends, neighbors or family who can help; or an ambulance if needed,fire rescue if needed, police if needed or other emergency response aswarranted.

Referring to FIGS. 7, 8, 9, and 10, exemplary user databases 100 areshown. In FIG. 7, each user 4 has a private identity 102 that is unique.When a request is received by the server computer 500, the call isassigned to one of the agent computers 10 and an agent associated withthat agent computer 10. As needed and allowed under privacy laws for PHI(HIPAA), the agent is provided other information regarding the user 4who has made the request, including the name 103 of the user 4, theaddress 104 of the user 4, the phone number 105 of the user 4, and adate of the last request/call 106 made by the user 4.

When it is determined that an emergency exists, the private identity 102is used by the call server 500 to access user records (e.g. from datastorage 502) to determine the name, phone number, and location of theuser 4. If the agent requires further information and such is needed andallowed under privacy laws, the agent gains access to medicalinformation 114 regarding the user 4 (e.g. heart conditions,medications, mobility) as shown in FIG. 8, indexed by the privateidentity 102. If the agent needs further information regarding priorrequests/calls and such is needed and allowed under privacy laws, theagent gains access to a history 124 of the user 4 which includes, forexample, history of prior calls or other related information such asimportant medical events and diagnosis (e.g. hip replacement, knee scopeoperation, diagnosed with cancer).

If it is determined that the user 4 needs help, there is contactinformation 134 as shown in FIG. 10. The contact information 134includes, for example, global contacts, local contacts, and personalcontacts that are made available to the agent. Global contacts such asE911 are less effective in a distributed environment, as it isanticipated that the agent is not in the same location as the user 4,and therefore, dialing of 911 or emergency first responders by the agentwill not solicit help at the location of the user 4. Local contacts asshown in FIG. 10 provide contact information (e.g. phone numbers) foremergency services that are local to the user 4 (e.g. in the same town,zip code, etc.). Local contacts also include local support staff at thelocation of the user 4 (e.g. roaming staff, staff in assisted living).Personal contacts (as shown in FIG. 10) include contacts of care giversand loved ones specific to the user 4 (e.g. family members, clergy, andneighbors). Note that the contact information 134 includes any way knownto contact another including, but not limited to, phone numbers,addresses, email addresses, social media addresses, voice-over-IPaddresses, Ai powered digital assistants (Alexa to Alexa messaging orcalling or similar), etc.

In some embodiments, the private identity 102 is, or is part of, anemail address, as some digital assistants 12 require an email address atregistration and, most digital assistants 12 allow for multiple digitalassistants 12 to be associated with a single email address used increating the centrally managed system. Therefore, although the privateidentity 102 of the users 4 is shown as a 10 digit number, it isanticipated that, in some embodiments, the private identity 102 is anemail address such as 1112223333@gmail.com or 1112223333@aol.com or analpha-numeric combination such as CC1112223333, etc.

In some embodiments, the private identity 102 is, or is part of, a phonenumber, as some digital assistants 12 require a phone number be providedat registration and, most digital assistants 12 allow for multipledigital assistants 12 to be associated with a phone number that is usedin creating a provider account used by the provider server 400.Therefore, although the private identity 102 of the users 4 is shown asa 10 digit number, it is anticipated that, in some embodiments, theprivate identity 102 is phone number such as 1112223333 or 1112223333etc. In such, when the specific utterance 5 (e.g. “Alexa, Call forhelp”) is detected by the digital assistant 12, the digital assistant 12contacts the provider server 400 to make the call to a contact, in thisexample, “for help.” The phone number associated with “for help” in theuser's 4 contact list is the phone number of the service and the call ismade by the provider server 400 to the call server 500. The providerserver 400 accesses the provider account 410 of the user from theprovider data storage 402 (see FIG. 10A). The call server then calls thecall server 500 with the caller-id 434 from the provider account 410.The call server 500 then uses the caller-id 434 to recognize which user4 is associated with this incoming call. Note that the provider account410 is abbreviated for clarity reasons.

Configuration and installation of one or more digital assistants 12 in ahome is a daunting task, even for the technical literate. Many intendedusers of the system for providing help are low on the technical literacyscale or have an ailment/disability that makes it almost impossible tosetup, configure, and install the digital assistants 12 in theirfacility (e.g. home). Further, many users 4 live in locations wherethere is no wireless local area network coverage (e.g. Wi-Fi), furtherrequiring each user 4 to arrange Internet access and a wireless localarea network coverage, for example, from a cable or fiber opticprovider.

Now, assuming the user 4 arranges for installation of Internet access aswell as a wireless local area network within their facility, the user 4must activate “Phone Skills” for the digital assistant 12 and/or updatea contact list to include a contact that connects with the call server.For example, if the phone skills for the digital assistant 12 requirethe initiation word, “call”, the preprogrammed specific utterance 5 willstart with “Alexa, call” or “Hey XX, call.” Now the user 4 associatesthe remainder of the preprogrammed specific utterance 5 with anaddress/phone-number of the call server 500. For example, the user addsa contact of “for help” in their address book and provides the phonenumber (or IP address) of the server 500 as the primary contact for thiscontact. Therefore, the preprogrammed specific utterance 5 is, forexample, “Alexa, call for help,” or “Hey XX, call for help.” Now theuser 4 must try to initiate a request for help by saying, for example,“Alexa, call for help,” or “Hey XX, call for help,” and if an agentanswers, they are all set. Simple? Not really. Further, the aboveprovides for a one-way initiation of connectivity—from the digitalassistant (s) 12 of the user to the call server 500. There is no way forthe call server 500 to initiate contact with any equipment (e.g.Internet infrastructure and digital assistant(s) 12 within the facilityof the user 4). In some embodiments, it is important to provide“heartbeat” monitoring of the digital assistant(s) 12, as should adigital assistants 12 fail, some subset of the users 4 will not knowabout the failure until it is too late as some users will not use theirdigital assistant(s) 12 for any other purpose other than requestinghelp.

Although examples of the preprogrammed specific utterance 5 have been inEnglish with a known wake-up word, for example, “Alexa, call for help,”or “Hey XX, call for help,” it is fully anticipated that other languagesas well as custom wake-up words will be deployed. Note that because thedigital assistant 12 is typically listening for utterances all day long,it is wise to use a wake-up word that is uncommon. For example, if thepreprogrammed specific utterance 5 is simplified to “Get Help,” falsealarms might arise when watching television and an actor on thetelevision says, “Get Help.”

Some users 4 are capable if executing the steps of installing andconfiguring of one or more digital assistants 12. For users 4 that arenot capable or desire improved coverage, a preprogrammed system isprovided upon purchase or activation of a service agreement with themonitoring company. The preprogrammed system is ready to use uponactivation by a user simply plugging the digital assistants 12 into anavailable power outlet.

It is also anticipated that the system for requesting help beimplemented using a smartphone instead of or in addition to a digitalassistant 12, as voice recognition is often included in many android,Microsoft® and Apple® smartphones. Three limitations are present withsmartphones is that: they require recharging, in some instances must bewoken by a physical activity (e.g. pressing a wake button) and mostusers 4 will not want to deploy a plugged-in cellphone in each room ofthe facility (e.g. home). Further, as each will be a fully functionalsmartphone, cellular providers might not offer low-cost plans foremergency use only.

To use the system for requesting help an emergency, such as the onset ofsymptoms of a serious illness (chest pains in the case of aheart-attack) or other, the user 4 says the preprogrammed specificutterance 5, for example, “Alexa, call for help,” or “Hey XX, call forhelp,” loudly and clearly once. In a preferred embodiment, the digitalassistant 12 will respond, “Calling for Help Now”. The request will bereceived by the call server 500 and the request will be forwarded to oneof the agent computer 10 along with information of the user's 4 name andlocation from the centrally managed system database. A two-way voiceconnection is made between the agent computer 10 and the digitalassistant 12 that requested help (and, in some embodiments, with otherdigital assistants 12 with the same facility). As an example, the agentat the agent computer 10 will ask the nature of the emergency. If theuser 4 is unable to speak further, perhaps incapacitation due to theemergency or illness, the security call center detects that you made therequest for help and, if unable to gain a response, will either callE911 or local emergency first responders directly with your emergency orfollow other agreed upon protocol for this user 4 (as per their account)such as contacting a private duty help agent (e.g. a roaming agent localto the user 4), assisted living staff, neighbors, etc.

In some cases, the user has fallen and is having trouble getting back upon their bed or chair etc. in this case, the user does not need E911help, and instead, help is requested of a neighbor, friend or familymember that is local to the user 4 and able to assist the user 4.

Having one or more digital assistants 12 within a facility, other usesfor the digital assistants 12 are anticipated such as to remind theusers 4 when it is time to take medicines, to call for a ride shareservice, and to access a host of other resources available with eachdigital assistant 12 that will enhance the quality of life and safetyand well-being of the users 4.

Although disclosed for use in a facility such as a home or office, it isfully anticipated that the system for requesting help be deployed in ahospital, medical complex, group home, adult living facility or nursinghome. In such, the system for requesting help is capable of replacingthe Panic Button (typically tethered to the bed and useless if the user4 falls away from the bed). In such, the user 4 of such a facility isable to initiate a request for help using the preprogrammed specificutterance 5 from anywhere local to the digital assistant 12 and, afterassessing the issue, the agent will call a person at the monitoringstation (e.g. nurse, orderly) or a Central Monitoring station. Further,it is fully anticipated that the system for requesting help be deployedin hotels. In guest rooms equipped with the system for requesting help,in addition to summoning help should the guest have a medical emergency,sees a fire, or is being assaulted or robbed, the digital assistant 12will control televisions, music players, wake alarms, thermostats, etc.In such, each digital assistant 12 is associated with a room number.Likewise, it is fully anticipated that the system for requesting help bedeployed in commercial or business environments providing highersecurity and safety, distributed throughout buildings, elevators,restrooms, etc. In some embodiments, the digital assistant 12 willidentify the person speaking, as well as the location of the device,using voice recognition technology. With such, a call for local,internal building security or E911 emergency help is provided by theagent as needed. It is fully anticipated that the system for requestinghelp be deployed in schools and universities having digital assistants12 in classrooms and public spaces so that teachers or students are ableto call for help if an active shooter is present or medical emergencyoccurs. In such, the digital assistant 12 is associated with theclassroom number and/or location. It is also fully anticipated that thesystem for requesting help be deployed in vehicles of any type (e.g.,cars, buses, airplanes, cruise ships) and such include GPS locationcapability. This provides help to a user 4 during, for example, acar-jacking, medical emergency, sinking vessel, etc.

Referring to FIG. 11, an exemplary system for providing help havingmultiple digital assistants 12 connected to the call server 500 using amobile hotspot 14 is shown. There exists a large population of potentialusers of the system for providing help that have limited technicalabilities and, often, no Internet access or smartphone. This subset ofusers likely cannot setup and install the digital assistant(s) 12, evenif wireless internet is available. Further, the typical setup of adigital assistant 12 often requires a smartphone, an active emailaddress, Wi-Fi internet access, and a service account from the digitalassistant provider (e.g. Amazon® or Google®). Further, a greater levelof security is desired as this subset of users often is vulnerable tovarious intrusions. The centrally managed service described in thesystem and methodology provides all the required resource inpre-programmed solution which requires no installation by the userexcept for plugging the system into an available power outlet(s).

Digital assistant providers require a user account and an email address.To reduce the possibility of divulging private health information, anaccount and email address is created and both the account name and emailaddress is randomized as part of the centrally managed system. Forexample, the account name is AZ111222333 and the unique user emailaddress is AZ111222333@provider.com. In this way, there is no disclosureof a name, social security number, address, or any other identifyinginformation to the digital assistant provider and, therefore, even ifthere is a security breach and information is made available to/by thedigital assistant provider, it will not be associated with an identifiedperson. For example, if a communication is intercepted and disclosed, itwill be that user account AZ111222333 requested help due to chest pain,with no way for the digital assistant provider of perpetrator to knowthe identity of the user associated with the user account ofAZ111222333.

Therefore, as shown in FIG. 11, each digital assistant 12 in the samefacility (e.g. the home of J. Smith), has been pre-registered with thesame digital assistant provider account 152 (e.g. AZ111222333).

In this, if the user 4 already has wireless data access (e.g. Wi-Fi),one anticipated option is to provide one or more digital assistants 12that are preprogrammed and setup with that user's account (e.g.AZ111222333). This still requires each digital assistant 12 to recognizethe user's 4 private wireless network, typically requiring a smartphoneto provide a network access password to each digital assistant 12.

To further simplify both operation and installation, an improvedanticipated option is to provide a turn-key system for providing help asshown in FIG. 11, having one or more digital assistants 12pre-configured and pre-connected to a mobile hotspot 14. In this, eachdigital assistant 12 is associated with a digital assistant provideraccount 152, each digital assistant 12 is preprogrammed with thepreprogrammed specific utterance 5, and each digital assistant ispre-configured to connect to the call server 500 through the mobilehotspot 14. In addition, the mobile hotspot 14 has a unique address 150,typically known as a MAC address. When a request is received by the callserver 500, the call server 500 is aware of the unique address 150 and,for example, using a translation table as shown in FIG. 12, the callserver 500 is able to determine to source of the request (e.g. name 103of requester and the account number 102 of the requester.

Further, by having the unique address 150 of each mobile hotspot 14assigned to the user 4, additional features are enabled. One featurethat is anticipated is a polling feature to make sure each mobilehotspot 14 and associated digital assistants 12 are functioningproperly. For example, once per day or once per hour, the call server500 establishes a connection to each digital assistant 12, enabled bythe centrally managed system. If the connection fails, this signals apotential hardware problem and service is performed. Another featureanticipated is outward calling to each user 4. In this, the call server500 makes an unsolicited call to the digital assistants 12 and solicitsa verbal answer (e.g., “Hello J. Smith, is everything OK?”). If theappropriate verbal answer (e.g. “Yes,” or “Alexa Yes”) is not receivedwithin a predetermined time period, appropriate action takes place suchas calling the user 4 by phone, dispatching private staff, contactingloved ones or neighbors, etc.

It is further anticipated that some portion of the user's 4 address isprogrammed into the user's account to enable digital assistant featuresthat are location specific (e.g., “what is the weather?” or “what isplaying at nearby movie theatres?”). It is also anticipated that if theuser 4 has a smartphone, the user's smartphone be programmed with theuser's account information so that the user has the ability to adjustthe digital assistant, for example, by adding skills, contacts, etc.

Referring to FIGS. 13 and 14, exemplary program flows of the system forrequesting help are shown. In FIG. 13, a new digital assistant 12 andmobile hotspot 14 are being programmed. The first step is to get 200 adigital assistant(s) 12 and mobile hotspot 14. Now a new account isgenerated 202 (e.g. in the data storage 502 of the call server 500),creating the private identity 102 of the user 4 and adding userinformation such as the name 103 of the user 4, address 104, phonenumber 105, medical situations and medication information 114, andcontact information 134 (e.g. local emergency contacts, neighbors,dedicated staff, private staff, etc.

Now the account is created 204 at the provider of the digital assistant12 using private identity 102 of the user 4 and other information, forexample, including minimal identifying information of the user 4 such aszip code or possibly street name, but not street number.

The mobile hotspot 14 is associated 206 with the new account, adding aunique identifier/address of the mobile hotspot 14 (e.g., MAC addressand/or phone number) to the new account and, therefore, associating themobile hotspot 14 with the new account of the user 4. Note that eachmobile hotspot 14 has a unique address to the cellular network 506C,typically a phone number to which the call server 500 is able to addressuniquely, for example, by sending a text message to this phone number.

Next, each digital assistant 12 is configured to communicate with themobile hotspot 14 and to include the skills needed to provide the systemfor requesting help (e.g. at a minimum, the skill to recognize thepreprogrammed specific utterance 5, for example, “Alexa, call for help,”or “Hey XX, call for help”). As it is anticipated that a single userhave one or more digital assistants 12, likely depending upon the sizeand layout of the facility of the user 4 (e.g. home), a loop begins withthe first 210 digital assistant 12. The digital assistant 12 isprogrammed to be centrally managed by the provider and associated 212with the mobile hotspot 14. The programming includes adding the skillsneeded to provide the system for requesting help (e.g. at a minimum, theskill to recognize the preprogrammed specific utterance 5). Theassociation includes setting up the digital assistant 12 to properlycommunicate with the mobile hotspot 14. If this is the last 214 digitalassistant 12 for the user 4, the digital assistant(s) 12 and mobilehotspot(s) 14 are delivered/sold 220 to the user 4 and the process iscomplete. If this is not the last 214 digital assistant 12, the next 216digital assistant 12 is selected and the above steps 212/214 repeat.

In FIG. 14, a polling loop is shown, as the system for requesting helpis enabled to provide monitoring of the premise equipment (e.g. digitalassistant(s) 12 and mobile hotspot(s) 14). In order to provide suchmonitoring, the call server 500 (or other computer) needs the ability toconnect to the premise equipment. In prior systems, this ability was notpresent, so there was no ubiquitous way to check and make sure eachuser's premise equipment was functioning. Now, using the mobile hotspots14 and maintaining an address of each mobile hotspot 14, the system forrequesting help is enabled to periodically reach out and make sure thepremise equipment is functioning and/or make sure the user 4 isresponsive.

Testing of the mobile hotspots 14 is easily performed by sending a textmessage to the phone number associated with each mobile hotspot 14, butthis does not address each digital assistant 12.

For fully end-to-end testing, each digital assistant 12 associated withan account establishes a connection with the call server 500 (or othercomputer in the system) during initialization (power-up). Therefore, auser 4 that has three digital assistants 12 will have three activeconnections to the call server 500.

Polling of each digital assistant 12 on a list of digital assistants topoll is performed at a selected time or times of each day, for example,every day at 2:00 PM. At that time, the account on the list 240 isselected and a loop begins selecting the first 242 digital assistant 12for the account. The account is accessed in the database to get theconnection handle (e.g. connection id) and the connection is checked 244to make sure there was no disconnect. If the digital assistant 12 is notconnected 246, an escalation 248 is performed and the loop continues.The escalation 248 is, for example, an agent determines if other digitalassistants 12 at the user's 4 premise are working, calls the user 4 byphone, contacts a neighbor of the user 4, contacts a provider local tothe user 4, etc.

If the digital assistant 12 is connected 246, a flag is checked in theaccount to determine if the user 4 is configured to receive a voiceprompt 250. If the user 4 is configured to receive a voice prompt 250,the voice prompt is made 252 (e.g. a verbal request such as “Goodafternoon Mr. Smith. Please respond with a yes.”). If the user 4 doesnot respond 254 with a verbal answer “yes,” (perhaps within a given timeallotment, the above escalation 248 is performed and the loop continues.

If the user 4 responds 254 with a verbal “yes,” or “Alexa yes,” the loopcontinues with determining if this digital assistant 12 is the last 256digital assistant. If this digital assistant 12 is the last 256 digitalassistant, the polling for this account is performed (e.g., polling forthe next account is now performed, if any). If this digital assistant 12is not the last 256 digital assistant, the next digital assistant 258 isselected and the loop continues.

Equivalent elements can be substituted for the ones set forth above suchthat they perform in substantially the same manner in substantially thesame way for achieving substantially the same result.

It is believed that the system and method as described and many of itsattendant advantages will be understood by the foregoing description. Itis also believed that it will be apparent that various changes may bemade in the form, construction and arrangement of the components thereofwithout departing from the scope and spirit of the invention or withoutsacrificing all of its material advantages. The form herein beforedescribed being merely exemplary and explanatory embodiment thereof. Itis the intention of the following claims to encompass and include suchchanges.

What is claimed is:
 1. A system for providing help, the systemcomprising: at least one digital assistant; a wireless data interfacefor connecting the digital assistants to a server; a plurality of agentcomputers, each of the plurality of agent computers connected to theserver by a data network; whereas each of the at least one digitalassistants is preprogrammed with at least one skill, the at least oneskill including the skill for recognizing a preprogrammed specificutterance and each of the at least one digital assistants ispre-configured to connect with the wireless data interface; whereasafter the preprogrammed specific utterance is detected by one of thedigital assistants, the one of the digital assistants initiates arequest for help to the server; and whereas after receiving the requestfor the help, the server assigns one of the agent computers and forwardsthe request for the help to the one of the agent computers.
 2. Thesystem of claim 1, wherein the wireless data interface is a mobilehotspot.
 3. The system of claim 2, wherein the at least one digitalassistant is pre-configured to automatically connect to the mobilehotspot.
 4. The system of claim 1, wherein privacy is protected byassigning a generated, unique user email address, to identify an accountassociated with the at least one digital assistant.
 5. The system ofclaim 4, wherein a user account is created with a provider of the atleast one digital assistant using the unique user email address, therebyshielding from disclosure of identifying information to the provider ofthe at least one digital assistant.
 6. The system of claim 1, whereineach of the at least one digital assistant automatically connects to theserver through the wireless data interface.
 7. The system of claim 6,wherein the server periodically confirms that the at least one digitalassistant remains connected to the server and if the at least onedigital assistant is found not to be connected to the server, the serverinitiates an escalation.
 8. The system of claim 7, wherein if the atleast one digital assistant is found to be connected to the server, theserver initiates a vocal request to at least one of the digitalassistants and if the at least one of the digital assistants does notreceive a verbal answer to the vocal request within a predetermined timeperiod, the server initiates the escalation.
 9. A method of providinghelp, the method comprising: creating a user account and a unique useremail; allocating at least one digital assistants to the user account;creating a provider account with a provider of the at least one digitalassistants using the unique user email; preprogramming a skill into theat least one digital assistant, the skill recognizing a preprogrammedspecific utterance; providing a connectivity between each of the atleast one digital assistants and a server; listening for thepreprogrammed specific utterance by each of the at least one digitalassistants and, upon recognizing the preprogrammed specific utterance byone of the at least one digital assistants, the one of the at least onedigital assistants sending a request for help to the server; and uponreceiving the request for the help, the server forwarding the requestfor help to an agent computer.
 10. The method of claim 9, wherein theconnectivity between each of the at least one digital assistants and theserver includes a mobile hotspot.
 11. The method of claim 10, whereinthe mobile hotspot and each of the at least one digital assistants arepreprogrammed to connect to each other.
 12. The method of claim 9,further comprising the steps of: upon initialization, each of the atleast one digital assistants connects to the server.
 13. The method ofclaim 12, further comprising the steps of: periodically determining ifeach of the at least one digital assistants is connected to the serverand any of the at least one digital assistants is disconnected from theserver, initiating an escalation.
 14. The method of claim 13, furthercomprising the steps of: if all of the at least one digital assistantsis connected to the server, sending a vocal request to at least one ofdigital assistants and waiting for a predetermined time period for avocal answer; if the vocal answer is not detected within thepredetermined time period, initiating the escalation.
 15. A turn-keysystem for providing help, the system comprising: at least one digitalassistant; each of the at least one digital assistants is preprogrammedwith at least one skill, the at least one skill including recognizing apreprogrammed specific utterance and each of the at least one digitalassistants is pre-configured to connect with a mobile hotspot; themobile hotspot is preprogrammed for connecting to a server; a uniqueuser phone number is created to protect privacy of a user of theturn-key system for providing help; a provider account created using theunique user phone number to protect the privacy of the user; an accountin the turn-key system for providing help for the user, the accounthaving information for the user and the account having the unique userphone number; whereas after the preprogrammed specific utterance isdetected by one of the digital assistants, the one of the digitalassistants initiates a request for help and a call is made to the serverhaving a caller-id of the unique user phone number; and upon receptionof the request for help, the server recognizes the unique user phonenumber and assigns an agent computer and forwards the request for helpto the agent computer.
 16. The turn-key system of claim 15, wherein eachof the at least one digital assistant automatically connects to theserver through the mobile hotspot.
 17. The turn-key system of claim 16,wherein the server periodically confirms that the at least one digitalassistant remains connected to the server and if the at least onedigital assistant is found not to be connected to the server, the serverinitiates an escalation.
 18. The turn-key system of claim 17, wherein ifthe at least one digital assistant is found to be connected to theserver, the server initiates a vocal request to at least one of thedigital assistants and if the at least one of the digital assistantsdoes not receive a verbal answer to the vocal request within apredetermined time period, the server initiates the escalation.
 19. Theturn-key system of claim 15, wherein the account in the turn-key systemfor providing help for the user is indexed by the unique user phonenumber and the account includes an address of the user, health of theuser, medications prescribed for the user, and contacts for local helprelated to the user.
 20. The turn-key system of claim 15, wherein thecontacts for local help related to the user comprise a one or morecontacts selected from the group consisting of a contact for a relative,a contact for local emergency medical services, a contact for localpolice, a contact of a relative, a contact of a clergy, a contact of alocal fire department, and a contact of staff assigned to the user.