Safety systems and methods that use portable electronic devices to monitor the personal safety of a user

ABSTRACT

Methods, apparatus, systems and articles of manufacture to monitor the personal safety of a user of a portable electronic device are disclosed. Example safety managers disclosed herein include processor circuitry to determine whether data collected from a remote electronic device corresponds to a first usage context profile associated with the remote electronic device, obtain a threshold alert level corresponding to the first usage context profile when the collected data corresponds to the first usage context profile, the threshold alert level to indicate a degree of danger to which a user is exposed, adjust the threshold alert level based on information obtained from a data source different from the remote electronic device, monitor usage attributes reported by the remote electronic device to determine whether the threshold alert level has been satisfied, and actuate a safety alert associated with the remote electronic device when the threshold alert level has been satisfied.

RELATED APPLICATION(S)

This patent arises from a continuation of U.S. patent application Ser.No. 15/702,456 (now U.S. Pat. No. ______), which is entitled “SAFETYSYSTEMS AND METHODS THAT USE PORTABLE ELECTRONIC DEVICES TO MONITOR THEPERSONAL SAFETY OF A USER,” and which was filed on Sep. 12, 2017.Priority to U.S. patent application Ser. No. 15/702,456 is herebyexpressly claimed. U.S. patent application Ser. No. 15/702,456 is herebyincorporated by reference in its entirety.

This disclosure relates generally to portable electronic devices, and,more particularly, to safety systems that use portable electronicdevices to monitor the personal safety of a user.

BACKGROUND

In recent years, the sales of portable electronic devices, such asportable cellular telephones, smart watches, fitness trackers, personaldigital assistants, etc., have exploded. The increased sales of suchdevices are due, in large part, to the ever expanding functionality ofthe devices. While a decade ago most portable electronic devices wereable to do little more than communicate phone calls, today's portableelectronic devices perform a multitude of tasks aimed at improving thelives and lifestyles of the user.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram of a safety system having a plurality of safetymonitors in example portable electronic devices that communicate with aremote safety manager.

FIG. 2 is a block diagram of an example implementation of the examplesafety monitor of the example portable electronic device of FIG. 1.

FIG. 3 is a block diagram of an example implementation of the exampleremote safety manager of the example safety system of FIG. 1.

FIG. 4 is a flow chart representative of example machine readableinstructions which may be executed to implement the example safetymonitor of FIG. 1 and FIG. 2.

FIG. 5 is a flow chart representative of example machine readableinstructions which may be executed to implement the example safetymonitor and the example remote safety manager of FIG. 1, FIG. 2, andFIG. 3.

FIG. 6 is a flow chart representative of example machine readableinstructions which may be executed to implement the example safetymonitor of FIG. 1 and FIG. 2.

FIG. 7 is a flow chart representative of example machine readableinstructions which may be executed to implement the example safetymonitor and the example remote safety manager of FIG. 1, FIG. 2, andFIG. 3.

FIG. 8 is a flow chart representative of example machine readableinstructions which may be executed to implement the example safetymonitor of FIG. 1 and FIG. 2.

FIG. 9 is a flow chart representative of example machine readableinstructions which may be executed to implement the example safetymonitor of FIG. 1 and FIG. 2.

FIG. 10 is a flow chart representative of example machine readableinstructions which may be executed to implement the example remotesafety manager of FIG. 1 and FIG. 3.

FIG. 11 is a flow chart representative of example machine readableinstructions which may be executed to implement the example safetymonitor of FIG. 1 and FIG. 2, and the example remote safety manager ofFIG. 1 and FIG. 3.

FIG. 12 is a flow chart representative of example machine readableinstructions which may be executed to implement the example safetymonitor of FIG. 1 and FIG. 2, and the example remote safety manager ofFIG. 1 and FIG. 3.

FIG. 13 is a block diagram of an example processor platform capable ofexecuting the instructions of FIGS. 4-9, 11 and 12 to implement theexample safety monitor of FIG. 1, and FIG. 2.

FIG. 14 is a block diagram of an example processor platform capable ofexecuting the instructions of FIGS. 5, 7, 10, 11, and 12 to implementthe example remote safety manager of FIGS. 1 and 3.

The figures are not to scale. Wherever possible, the same referencenumbers will be used throughout the drawing(s) and accompanying writtendescription to refer to the same or like parts. Further, devices thatare referenced using a same number followed by different letters (e.g.,110A versus 110B) will have all or at least some of the same components(e.g., the example second safety monitor 110B and third safety monitor110C described below include the same components as the example firstsafety monitor 110A described below).

DETAILED DESCRIPTION

Although previously limited to a set of communication-directedtechnologies (e.g., telephone communication, text communication,Internet access, etc.), portable electronic devices of today are capableof performing an ever-expanding set of tasks directed to improving thelives and lifestyles of the user. For example, modern cell phones andother portable electronic devices can be used to perform a variety oftasks including, count calories and track exercise, map a route to adestination, provide real-time traffic updates, manage a financialbudget, access banking institutions, access video and non-videoentertainment, etc. As a result of these capabilities, usersincreasingly carry their portable electronic devices throughout the day.

Many users also carry a portable electronic device when they expect tobe in a potentially dangerous situation (in a high crime area, anisolated area, a riotous area, a crowded area susceptible to nefariousactivities such as pick pocketing, terrorism, etc.) in the hopes that,if assaulted or faced with trouble, they will be able to use the deviceto summon assistance from the police department, the fire department, afriend, and/or another entity. Unfortunately, a user being assaulted,threatened or even impaired often lacks the time and/or clarity of mindneeded to reach assistance via the portable device. Likewise, users willoften rely on portable electronic devices when faced with a medicalemergency. However, such users but may be unconscious or otherwisephysically unable to use the portable electronic device to summonassistance. As a result, there is a need for safety systems that useportable electronic devices to detect a threat to a user's safety and/ora medical emergency and to respond to the threat and/or emergency in anautomated fashion.

An example personal safety monitor disclosed herein is located in aportable electronic device and accesses remote safety managers that canbe disposed in the cloud, in communication network devices, in a user'shome/work, in one or more other portable electronic devices associatedwith other users. The personal safety monitor of some such examplesdetermines a threshold alert level that indicates a degree (high,medium, low, etc.) of danger (or risk) to which a user of the portableelectronic device is exposed. Based on sensor information collected byone or more sensor(s) disposed on and off the portable electronicdevice, as well as information received from information resourcesexternal to the portable electronic device, the personal safety monitoradjusts the threshold alert level as needed to account for thecircumstances surrounding (or otherwise affecting) the user. In someexamples, the sensor(s) are carried by the portable electronic deviceand include an array of biological sensor(s), a microphone, a stillimage camera, a video camera, a humidity detector, a heat sensor, aliquid sensor, a global positioning system (GPS) sensor, an array ofmotion sensing detectors (e.g., an accelerometer, a gyroscope, etc.),etc. In some examples, the sensor(s) that are not carried by theportable electronic device can be carried in other devices (e.g., smartwatch, fitness monitor, biological monitors, headphones, earbuds) wornor carried by the user of the portable electronic device. In some suchexamples, the other devices are in communication with the portableelectronic device. In some examples, the other devices are notnecessarily associated with the physical person of the user of theportable electronic device but are in the surroundings of the user(e.g., surveillance audio recorders, surveillance video cameras, smoke,sensor(s), fire sensor(s), heat sensor(s), liquid sensor(s), carbondioxide sensor(s), etc.). In some examples the other devices communicateinformation to the portable electronic device via Bluetooth, RFID,cellular telephony, Wi-Fi, etc.)

In some examples, sensor information collected by the portableelectronic device is analyzed by the safety monitor of the portableelectronic device using a machine-learning algorithm. Themachine-learning algorithm uses information such as one or more of thesensor information, time and date information, location information,portable device usage information, etc., to determine one or more daily,weekly, and/or monthly routines engaged in by the user. Themachine-learning algorithm can also use information about which, if any,of the routines corresponds to a higher threshold alert level or a lowerthreshold alert level, (e.g., based on a degree of danger and/or risk).In some examples, the portable electronic device can be configured toidentify deviations from a daily, weekly, or monthly routine and toraise (or lower) a threshold alert level in response to such deviations.

In some examples, the machine learning algorithm of the safety monitoruses the collected sensor information to pre-emptively predict apossible threat to the user or infer a possible threat. In some suchexamples, the safety monitor can notify the user of the possible threatso that user can device how to proceed in light of the threat. In somesuch examples, the machine learning algorithm assigns a threshold alertlevel to the predicted threat and identifies attributes to be monitoredand used to identify when (if) the threat becomes a reality.

In some examples, the safety monitor determines that the user is in needof assistance based on a current threshold alert level and based on thedetection of one or more sensor indications associated with abnormalactivity. Abnormal activities are activities that are detectable by theportable electronic device sensor(s) and that can be associated with athreat, injury and/or assault on the user. Some such abnormal activitiescan include the portable electronic device being dropped or thrown tothe ground, the portable electronic device having an unusual trajectory,the user having an increased heart rate, the user having an increasedrespiratory rate, the user (or a by-stander) screaming, or saying a“trigger” word designed to trigger a safety/safety alert, etc. Suchabnormal activities can be detected by one or more of the motionsensor(s) on or off the portable electronic device, one or more of thebiological sensor(s) on or off the portable electronic device, and/orone or more of the audio detectors on or off the portable electronicdevice, and/or any of the sensor(s) described above. As furtherdescribed above, in some examples, the sensor(s) disposed off theportable devices are disposed in one or more other portable devicesassociated (worn, carried, driven) with the user, including, forexample, an electronic watch, an electronic pedometer, an electronicheart monitor, headphones, earbuds, jewelry, a water bottle, a bicycle,a steering wheel of an automobile, etc. In some examples, the sensor(s)disposed off the portable devices are disposed in one or more stationarydevices including, for example, a surveillance camera, a surveillancemicrophone, a fire alarm, a heat sensor, a smoke sensor, a motionsensor, etc. In some examples, the safety monitor analyzes informationcollected at the sensor(s) to determine if an abnormal activity isdetected. In some examples, the safety monitor analyzes audio capturedat an audio sensor (e.g., a microphone) to determine whether the audiocorrelates to a cry for help, a keyword used to signal a need forassistance, a voice characteristic corresponding to the user being indistress, etc. In some examples, the safety monitor analyzes motioninformation captured by one or more sensor(s) (e.g., a gyroscope, anaccelerometers, etc.) to determine whether the motion informationcorresponds to the portable electronic device being dropped, thrown,tossed, being carried while the user is running, being carried while theuser is walking, being carried when the user is or has fallen down, tothe user making a body gesture/movement associated with distress, etc.The motion information may also indicate that a body part of the userexperienced an unusual acceleration due to, for example, being struck byan object (e.g., motion sensors disposed in headphone worn by userindicate user's head accelerated but sensors disposed elsewhere on thebody indicate the body generally did not experience the sameacceleration). A sensor disposed in the steering wheel of the user'sauto may indicate the user suddenly gripped the steering with force thatexceeds or reaches a threshold value, thereby indicating the auto mayhave struck an object or is otherwise out of control.

In some examples, when the safety monitor makes a determination that oneor more abnormal activities has been detected and that the one or moreabnormal activities satisfy a threshold alert level, a safety alert isactuated. The actuation of the safety alert can result in theperformance of any of a variety of tasks, the transmission of a messageto a police dispatch center, a fire dispatch center, a medical dispatchcenter, a set of emergency contacts, the generation of an audible alarm,and/or any other action seeking to obtain assistance. In some examples,the parties to be notified in the event of a safety alert can varydepending on the context in which the phone is being used at the time ofthe alert, the type of abnormal activities detected, the biologicalparameters of the user at the time of the alert, etc. Actuation of thesafety alert can also result in the automatic initiation of a recordingand/or a live-stream transmission of audio being captured at theportable electronic device to one or more of the parties receiving thesafety alert. Actuation of the safety alert can additionally oralternatively result in the automatic (e.g., without human approvaland/or action) transmission of a message to be published via a socialmedium platform, a private safety monitoring company, an Internetinformational platform, etc. Any of the information to be transmitted bythe portable electronic device can be transmitted via cellular telephoneservice, Wi-Fi service, radio waves, a texting application, a messagingapplication, an email application, a web browser, etc.

In some examples, the portable electronic device provides a notificationto the user before or after the safety alert is actuated. Thenotification, when generated before the safety alert is actuated, cangive the user an opportunity to cancel the safety alert. In someexamples, the notification, when generated after the safety alert isactuated, can inform the user that, if the alert was unnecessary, theywill need to notify the police, emergency contacts, etc., that the alertwas a false alarm. In some examples, the notification, when generatedafter the safety alert is actuated, can inform the user that, if thealert was unnecessary, the portable electronic device will notify therecipients of the safety alert of the false alarm, and/or take one ormore actions to rescind the alert (e.g., delete an alarm message postedto a social media site, cease generating an audible alarm, etc.).

In some examples, when the portable electronic device provides anotification to the user allowing the user to cancel the safety alert,the user can respond by entering and/or speaking a code word that causesthe portable electronic device to ostensibly cancel the safety alert(by, for example, emitting/displaying a message that says, “safety alertcanceled”) but that does not in fact cancel the safety alert. Such acode word can be used when the user is forced to cancel the safety alertunder duress.

In some examples, the type of abnormal activities that will result inthe actuation of a safety alert is dependent upon the context in whichthe device is being used (also referred as a “usage context”). In someexamples, when the user is exercising, sensed information indicating theuser has accelerated heart rate and/or increased perspiration may notresult in actuation of a safety alert. In contrast, the same informationdetected when the user is walking on a poorly lit street in a high crimearea may result in actuation of a safety alert. In some examples, theuser of the portable electronic device can actuate a safety alertthrough the user of an input device.

Example personal safety monitors disclosed herein communicate with anoff-device remote safety manager(s). The off-device remote safetymanager can be disposed in the cloud (or in the user's home or at theuser's place of employment, etc.) and implemented using one or moreprocessors with access to one or more public, private and/orgovernmental services/databases. In some examples, the remote safetymanager includes multiple processors disposed at various locations thatcollaborate to collect and analyze information supplied by: 1) the oneor more services/databases, 2) safety monitors of other portableelectronic devices, 3) a plurality of sensor(s) disposed near, on and/orremotely from the portable electronic device.

In some examples, the remote safety manager receives past usage historyfrom the safety monitor as well as real-time usage data. In some suchexamples, the remote safety managers include machine learning technologyto duplicate, supplement, and/or replace the machine-learning algorithmson the portable electronic device. In some examples, the remote safetymanager and the safety monitor receive and use information from aplurality of sources including governmental law enforcement and/or fireand rescue agencies, public utility agencies, private security agencies,social media platforms, weather monitoring agencies, other portableelectronic devices associated with other users, etc.

Thus, the safety system disclosed herein provides many advantagesincluding, automatic monitoring of a user's safety and well-being, andautomatic actuation of a safety alert when the safety of the user isdetermined to be (or might be) in jeopardy based on detected abnormalactivities and/or a usage context. Further, the accuracy of theautomatic monitoring and automatic actuation is enhanced through the useof information collected from a variety of sources and the use machinelearning technology disposed both on a user portable electronic deviceand on a remote safety manager.

FIG. 1 is a diagram of an example safety system 100 having examplesafety monitors (e.g., a first safety monitor 110A, a second safetymonitor 110B, a third safety monitor 110C, etc.) in respective exampleportable electronic devices (e.g., a first portable electronic device120A, a second portable electronic device 120B, a third portableelectronic device 120C) that communicate with an example remote safetymanager 130. The remote safety manager 130 can be disposed in the cloud,in a communication network device, and/or disposed at one or morelocations associated with a user (e.g., the user's home, the user'sautomobile, the user's place of employment, etc.). In some suchexamples, the remote safety manager 130 can include multiple remotesafety manager sites that operate in a collective fashion and/or in areplicative fashion. The remote safety manager 130 is in communication(via communication network(s) 144) with a variety of electronicallyaccessible services and information resources 145 (e.g., social mediumplatforms/services 145A, governmental services/databases 145B,private/commercial services/databases 145C, public services/databases145D, communication network information centers 145E, etc.).

Users (e.g., a first user 150A, a second user 150B, a third user 150C,etc.) operate the portable electronic devices 120A, 120B, 120C,respectively. In some examples, the portable electronic devices 120A,120B, 120C are implemented using a smart phone having telephonecapabilities, texting capabilities, location tracking capabilities,Wi-Fi communication capabilities, Bluetooth communication capabilities,etc. In some examples, the safety monitors 110A, 110B, 110C areconfigured to track the locations of the respective users 150A, 150B,150C, and collect user input and sensor information from one or moresensor(s) disposed on (and/or off) the portable electronic device 120A,120B, 120C. In some examples, each of the safety monitors 110A, 110B,110C uses the collected information to generate and store a past usagehistory corresponding to the usage of the associated portable electronicdevice 120A, 120B, 120C. The past usage histories are used to identifyvarious contexts in which the corresponding user 150A, 150B, 150C usesthe respective portable electronic device 120A, 120B, 120C. In someexamples, the safety monitors 110A, 110B, 110C are configured to useinformation supplied by one or more of the electronically accessibleservices and information resources 145A, 145B, 145C, 145D to identifythe various contexts. In some examples, the safety monitors 110A, 110B,110C are configured to use information supplied by each other and by anyother portable electronic devices associated with other users toidentify the various contexts.

In some examples, the safety monitors (e.g., the first safety monitor110A, the second safety monitor 110B, the third safety monitor 110C,etc.) use a corresponding past usage history to identify a set of daily,weekly, and/or monthly routines of the first user 150A, the second user150B, the third user 150C, respectively. The respective safety monitors(e.g., the first safety monitor 110A, the second safety monitor 110B,the third safety monitor 110C, etc.) use any of the corresponding pastusage history, the routine information, the sensed information, userinput(s), time of day information, location information, informationobtained from the remote safety manager 130, etc., to determine arespective threshold alert level for the first user 150A, the seconduser 150B, and the third user 150C, respectively. Each threshold alertlevel generally corresponds to an amount or likelihood of danger orpotential danger to which the respective one of the first user 150A, thesecond user 150B, and the third user 150C is currently exposed. In someexamples, a high threshold alert level corresponds to a low level ofdanger because when the corresponding one of the users is exposed to alow level of danger the safety monitor has a higher threshold forabnormal activities before a safety alert will be actuated. Similarly, alow threshold alert level corresponds to a high level of danger becausewhen the user is exposed to a high level of danger, the safety monitorhas a lower threshold for abnormal activities before a safety alert willbe actuated. The first, second and third safety monitors 110A, 110B, and110C are also configured to adjust (e.g., raise or lower) the thresholdalert level based on changing sensor information, changing routines, achange in the time of day, a change in location, information obtained inreal-time from the remote safety manager 130, etc. Any number ofthreshold alert levels may be used to represent a spectrum of dangerlevels (e.g., a low threshold alert level, a medium threshold alertlevel, a high threshold alert level, a first threshold alert level, asecond threshold alert level, etc.)

In addition to determining and, as needed, adjusting the threshold alertlevel, the first, second, and third safety monitors 110A, 110B, and 110Care each configured to automatically actuate a safety alert and/orrespond to user input that actuates a safety alert. In some examples, asafety alert, when actuated (or shortly thereafter to give the user anopportunity to counteract), results in the transmission of a message ormessages summoning assistance from any or all of a governmental agencyenforcement agency, a private security agency, any of a set of useremergency contacts stored in the smart phone 120, a message transmittedto electronic devices determined to be located near (e.g., within athreshold distance of, within a same building as, at a same venue as,etc.) the user, etc. In some examples, a safety alert, when actuated,instead (or also) results in the generation of an audible alarm. Asafety alert can also (or instead) result in the capture and livestreaming of video and/or audio to a source of assistance. In someexamples, a safety alert can also (or instead) result in the capture ofa device ID from an assailant's smartphone for usage by police. In someexamples, the type(s) of actions to be taken when a safety alert isgenerated depend on the types and values of attributes that caused thesafety alert to be actuated, a location of the user, the surroundings ofthe user, and/or any other factor. In some examples, the first, second,and third safety monitors 110A, 110B, 110C are configured to actuatesafety alerts based on any or all of the sensed information, the pastusage history, routines of the user, time, date and locationinformation, user inputs, etc.

FIG. 2 is a block diagram of an example implementation of the firstsafety monitor 110A of FIG. 1. In this example, the safety monitor 110Ais implemented on the example first portable electronic device 120A ofFIG. 1. The example first safety monitor 110A of FIG. 2 includes anexample threshold alert level monitor 202, an example safety alertactuator 204, and an example usage context generator 206. In someexamples, all or some of the aspects of the safety monitor 110A can beimplemented as a System on a Chip (SoC).

In some examples, the threshold alert level monitor 202 monitors a setof usage attributes of the first portable electronic device 120A. Insome examples, the usage attributes include sensor information,time/date information, and/or information about usage of the portableelectronic device 120A (e.g., whether, when, how frequently, and/or howlong the portable electronic device 120A is used to make a call, text,surf the Internet, take photos, record audio, record video, accesssocial media, watch video, listen to audio, execute softwareapplications, play video games, user viewing habits, user readinghabits, user listening habits, etc.). The usage attributes can begenerated by one or more of a set of on-device sensor(s) 210 (e.g.,biological sensor(s) 210A, audio sensor(s) (a microphone 210B),video/still-image sensor(s) (camera 210C), liquid sensor(s) 210D, motionsensor(s) 210E, fire sensor(s) 210F, grip sensor(s) 210G (to detect gripor touch of user), location sensor(s) 210H, etc.) and/or off-devicesensor(s) (e.g., wearable sensor(s) 211A, stationary sensor(s) 211B,sensor(s) disposed on other portable electronic devices 211C, etc.), aclock device 212, any of a set of user input devices 214, any of a setof output devices 216 (e.g., speaker, display, haptic devices, etc.),etc. In some examples, some of the usage attributes are associated withan “abnormal” user activity and some are associated with “normal” useractivities. In some examples, whether a usage attribute is associatedwith an abnormal user activity or a normal user activity issituation-dependent (e.g., context-dependent). For example, usageattributes that indicate that the user is running, sweating, and/or hasan accelerated heart rate that are detected during a time of day whenthe user typically exercises and/or when the user is located in a gymare not associated with an abnormal activity. In contrast, the sameusage attributes that are detected at a time immediately after a userwas determined to be asleep in bed or while the user is walking ordriving on a poorly lit street at night in a high crime area areassociated with an abnormal activity. In some examples, the same usageattributes, detected when the user is in the parking lot at the user'splace of employment in the evening hours, may be associated with anabnormal activity. As a further example, on the fourth of July, thedetection of a concussive sound typically associated with detonation ofan explosive device will not generate a safety alert, yet the same sounddetected on other days of the year may result in a safety alert.Similarly, the detection of a concussive sound while the user is at anamusement park known to have pyrotechnic shows may not result in asafety alert, whereas the same sound detected while the user is in anairport would generate a safety alert.

When a threshold number of usage attributes that are associated with anabnormal activity have been detected and/or have met a threshold value,the threshold alert level monitor 202 determines that a threshold alertlevel has been satisfied. In some examples, the threshold alert levelmonitor adjuster 202 may be at a low threshold alert level therebyindicating that the user is possibly in jeopardy. When one or moremonitored usage attributes indicate that the user is no longer injeopardy, the threshold alert level monitor 202 may raise the thresholdalert level from a low threshold to a medium threshold alert level or ahigh threshold alert level. In some examples, the threshold alert levelmonitor 202 may be at a high threshold alert level thereby indicatingthat the user probably not in jeopardy. When one or more monitored usageattributes indicate that the user's safety status has changed and theuser may be in jeopardy, the threshold alert level monitor 202 may lowerthe threshold alert level from a high threshold to a medium thresholdalert level or a low threshold alert level. Although low, medium andhigh threshold alert levels are described herein, the safety monitor110A may use any number of thresholds in connection with the usagecontext profiles.

In some examples, when the threshold alert level has been satisfied, thethreshold alert level monitor 202 sends a signal to the safety alertactuator 204. The safety alert actuator 204 responds to the signal byactuating one or more of the set of output device(s) 216 of the portableelectronic device 120A and/or wireless communication devices 218 (e.g.,a Wi-Fi transceiver, an RFID transceiver, a Bluetooth transceiver, acellular and/or satellite transceiver, etc.). In some examples, one ormore of the output device(s) of the portable electronic device 120A arenot installed in the portable electronic device but are insteadinstalled in devices associated with (or otherwise in communicationwith) the portable electronic device 120A. Some such devices can includea smart watch, an electronic device embedded on a piece of jewelry (orclothing) worn by the user, an electronic game, and/or any other type ofelectronic device. The safety alert actuator 204 can be configured toactuate any of the output devices 216 in any desired fashion to notifyothers of the user's need for assistance. In some examples, the outputdevice(s) 216 to be actuated and the manner in which they are actuatedcan differ with the type(s) of abnormal activity detected, the time ofday, the location of the user, etc. In some examples, a threshold alertlevel is associated with a user input (e.g., the microphone, the camera,a keypad, a touch screen) such that the threshold alert level issatisfied (and a safety alert is actuated) when a designated type ofuser input (e.g., a user's scream, a user speaking a safety alertactuation code word, a user making a motion in view of the camera, auser selecting an input at a keypad or a touch screen, a user actuatinga pressure sensor, etc.) is detected.

The example usage context history generator 206 of FIG. 2 includes anexample current usage detector 220, an example threshold alert leveladjuster 221, an example past usage history analyzer 222, an examplepast usage history storage 224, an example usage context profile storage226, an example threshold override device 228 and an example firstinterface bus 230. In some examples, the example current usage detector220 receives usage attributes from any of 1) the example sensor(s)(e.g., the biological sensor(s) 210A, the microphone 210B, the examplecamera 210C, the example liquid sensor(s) 210D, the example motionsensor(s) 210E, the example fire sensor(s) 210F, the example gripsensor(s) 210G, the example location sensor(s) 210H , 2) the exampleremote safety manager 130 (see FIG. 1), 4) the example output devices216, 5) the example input devices 214, the example communication devices218, etc., and causes the usage attributes to be stored in the pastusage history storage 224. In this manner, the current informationcollected at the current usage context detector 206 becomes past usagehistory. In some examples, the current usage detector 220 may generate auser query to be output by one of the output devices 216. The user querycan ask for information regarding an environment, habits of the user,routines of the user, preferences of the user, etc. The result of thequery can be treated as, for example usage information.

The example past usage history analyzer 222 (also referred to as a usagecontext analyzer), which can be implemented using any of a neuralnetwork, machine learning algorithm(s), artificial intelligence, orprogrammed logic, etc., is configured to analyze the past usage historystored in the past usage history storage 224 and determine variouscontexts in which the portable electronic device is used by the user150A. Based on the analysis, the past usage history analyzer 222generates usage context profiles and corresponding threshold alertlevels. Each usage context profile corresponds to a context in which theportable electronic device 120A is used and includes a set of usageattributes that characterize the usage. In some examples, the past usagehistory analyzer 222 generates the usage context profiles based on acombination of the past usage history, information received from theelectronically accessible services and information resources 145 (e.g.,social medium platforms/services 145A, governmental services/databases145B, private/commercial services/databases 145C, publicservices/databases 145D, communication network information centers 145E,etc.), information received from the remote safety manager 130, andinformation received from other portable electronic devices (e.g., thesecond portable electronic device 120B, the third electronic device120C, etc.). In some examples, the past usage history analyzer 222continues to fine-tune/revise the usage context profiles as additionaldata is received from the electronically accessible services andinformation resources 145, the remote safety manager 130, the examplesensors 210, other electronic devices (e.g., the second portableelectronic device 120B, the third portable electronic device 120C, etc.)etc.

In some examples, the past usage history analyzer 222 analyzes the pastusage history to identify one or more daily, weekly, and/or monthlyroutines of the user and assigns usage context profiles based on theroutines. In some examples, the past usage history analyzer 222determines the user has a weekday morning routine associated with afirst location (e.g., the user's place of employment), and a first timerange (e.g., 9 AM-12 PM) in which usage of the portable electronicdevice 120A is fairly light. The past usage history analyzer 222 mayfurther determine that threats to the user's safety during this weekdaymorning routine are low. In some such examples, the past usage historyanalyzer 222 stores the usage attributes associated with the weekdaymorning routine (e.g., the location, time range, the level of usage) asa first usage context profile in the usage context profile storage 226and further assigns a high threshold alert level to the first usagecontext profile. The high threshold alert level indicates that the levelof risk while operating in the first context profile is low and, thus,the safety monitor 110A has a high threshold for abnormal activity(e.g., will tolerate a greater amount of abnormal activity beforeactuating a safety alert). In some examples, the past usage historyanalyzer 222 also determines a set of usage attributes that areassociated with abnormal activity (if detected when the portableelectronic device 120A is operating in the usage context of the usagecontext profile). The past usage history analyzer 222 further causessuch abnormal activity usage attributes to be stored with the usagecontext profile in the usage context history storage 226. In someexamples, the past usage history analyzer 222 also identifies individualvalues (or thresholds) of the abnormal activity usage attributes thatare to be met/satisfied in association with the usage context profilebefore a corresponding safety alert is actuated.

The example past usage history analyzer 222 continues to analyze thepast usage history as new usage data is added by the current usagedetector 220. Thus, the past usage history analyzer 222 continues tofine-tune the usage context profiles and corresponding threshold alertlevels as new information is received/collected. Further, as describedabove, the past usage history analyzer 222 continues to fine-tune theusage context profiles and corresponding threshold alert levels asinformation is received from the electronically accessible services andinformation resources 145, the remote safety manager 130, the examplesensors 210, other electronic devices (e.g., the second portableelectronic device 120B, the third portable electronic device 120C, etc.)etc.

In some examples, the example current usage detector 220 determines acontext in which the example portable electronic device 120A iscurrently being used by comparing the current usage attributes to usageattributes associated with the usage context profile(s) stored in theusage context profile storage 214. In some examples, the current usageattributes indicate that the portable electronic device 120A is locatedat the user's place of employment during a morning weekday and furtherindicate that usage of the portable electronic device 120A is fairlylight. In some such examples, the current usage detector 220 identifiesa match between the current usage attributes (e.g., place, date/time,usage activity) and the first usage context profile attributes. As aresult, the current usage detector 220 determines that the thresholdalert level corresponding to the first usage context profile (e.g., ahigh threshold alert level) is to be supplied to the threshold alertlevel monitor 202. In addition, the current usage detector 220 causesthe abnormal activity usage attributes (and any corresponding outputvalues/thresholds) stored with the first usage context profile to besupplied to the threshold alert level monitor 202.

In some examples, in response to receiving the high threshold alertlevel, and the abnormal activity usage attributes, the threshold alertlevel monitor 202 begins monitoring the sensor information supplied bythe sensor(s) 210 that collect the abnormal activity usage attributes.As described above, a high threshold alert level is used when the useris in a safe environment and unlikely to be threatened by danger (e.g.,assault) or a health threat. Thus, the safety monitor 110A has a highthreshold for sensor indications associated with abnormal activity(e.g., sensor indications that may indicate that an assault is takingplace). In some examples, abnormal activities that may indicate a threat(such as an assault) is occurring include the portable electronic device120A being dropped or thrown to the ground, the user 150A experiencingan accelerated heart rate, the user having an increased respiratoryrate, the user screaming (or saying a code word used to signal distressor using a vocal tone that corresponds to the user being in distress),the user experiencing increased perspiration, etc. Some such abnormalactivities can be detected by one or more of the sensor(s) including thebiological sensor(s) 210A, the microphone 210B, the camera 210C, themotion sensor(s), 210E, etc. In some examples, detection of any one ofthe abnormal activities will cause a safety alert to be actuated. Insome examples, detection of a threshold number of the abnormalactivities will cause a safety alert to be actuated. In some examples, asafety alert will be actuated when one or more (or any combination) ofthe usage attributes associated with the abnormal activity reaches athreshold value (e.g., the user's pulse reaches or exceeds a thresholdpulse rate, the user's voice volume reaches or exceeds a thresholddecibel level, etc.). In some examples, the threshold value is a rate ofchange of a usage attribute (e.g., a rate at which a user's pulseincreases or decreases over time, a rate at which a user's perspirationchanges, a rate at which a user's voice level changes, etc.).

In some examples, when the threshold alert level has been met/satisfied(e.g., a required number of the abnormal activities and/or associatedusage attributes have been detected), the example threshold alert levelmonitor 202 sends a signal to the safety alert actuator 204 whichresponds to the signal by actuating any or all of the output devices 216and/or any or all of the communication devices 218. In some examples thesafety alert actuator 204 causes one or more of the output devices totransmit a message summoning assistance, to record and/or live streamaudio and/or video, to emit a loud sound, to transmit a notification toother portable electronic devices (e.g., the second and/or thirdportable electronic device 120B, 120C) located within a geographicaldistance of the first portable electronic device 120A, etc. The safetyalert actuator 204 can be configured to actuate any of the outputdevices in any desired fashion to notify others of the user's need forassistance. In some examples, the past history usage analyzer 222 may benotified of the safety alert generated by the safety alert actuator 204.In some such examples, the history usage analyzer 222 can respond byanalyzing the current usage attributes of the current usage detector 220and/or any other information from any other source, and make adetermination in real-time as to which of the output devices 216 and/orcommunication devices 218 are to be actuated in response to the safetyalert.

In some examples, the types of output devices 216 to be actuated by thesafety alert actuator 204 vary depending on the current usage context(e.g., the location of the portable electronic device 120, the time ofday, the day of the week, etc.) In some examples, the types of theoutput devices 216 to be actuated by the safety alert actuator 204depends on the threshold alert level existing at the time of the safetyalert, the severity of the sensor outputs that caused the safety alert,etc. In some examples, the order in which the device outputs 216 and/orcommunication devices 218 are actuated and a manner in which the deviceoutputs 216 and/or communication devices 218 are actuated can differbased on the threshold alert level existing at the time of the safetyalert and/or outputs of the sensor(s) 210. In some examples, the safetyalert actuator 204 causes one of the output devices 216 to supply afirst message to one of the communication devices 218. In some suchexamples, the safety alert actuator 204 causes the communication device218 to transmit the message to a governmental law enforcement agency, toa governmental paramedic/fire department, to a list of emergencycontacts, etc. In some examples, the message is communicated via phonecall, a text message, an email, a social media platform, a streamingvideo file, a streaming audio file, a voicemail, etc., In some suchexamples, the first message can identify a current location of the user,the identity of the user and information regarding the type of threat towhich the user is exposed (e.g., “John Doe is located at theintersection of State and Main, may have been assaulted, and requiresimmediate assistance.”). The first message can also transmit anyadditional information about the user 150A and the portable electronicdevice 120A.

In some examples, the safety alert actuator 204 may additionally cause asecond message (or other indication) to be provided to the user 150A viaone of the output devices 216. The second message can inform the user150A of the transmission of the first message and can also provide theuser 150A with the option to send a safety alert cancellation message tothe recipients of the first message. In some examples, the user canselect the safety alert cancellation via one of the input devices 214,thereby indicating that a false alarm has been generated. In response tothe selection of the cancellation, the false alarm evaluator 208notifies the safety alert actuator 204. The safety alert actuator 204responds by causing one or more of the output devices 216 and/orcommunication devices 218 to transmit a cancellation message to therecipients of the first message, to cause a speaker to stop generatingan audible alarm, to cause the alert to be rescinded, etc.

In some examples, the second message can simply instruct the user 150Ato manually contact the recipients of the first message if the safetyalert was a false alarm. In other examples, before sending the firstmessage, the safety alert actuator 204 can cause one or more of theoutput devices 216 to generate a user alert indicating that a safetyalert has been detected and further asking the user to confirm the needto obtain assistance by activating an input device of the portableelectronic device 120. When the user confirms the need to obtainassistance, the safety alert actuator 204 can cause one or more outputdevices 216 and/or the communication devices 218 to contact one or moreof the entities identified above for assistance (e.g., to send the firstmessage).

In some examples, the safety alert actuator 204 can cause one or morethe output devices 216 to inform the user 150A that the safety alert hasbeen detected and further informing the user 150A that, unless the user150A instructs otherwise (e.g., within a time window such as 5 seconds,10 seconds, etc.), a safety alert message will be transmitted to one ormore of the entities identified above, an audible alarm will begenerated, audio/voice data will be live streamed to other devices, etc.In the absence of a user input indicating that the first message shouldnot be sent to one or more of the third parties who may provideassistance, the safety alert actuator 204 can cause one or more outputdevices 216 and/or the communication devices 218 to contact one or moreentities with a request for assistance as described above.

In some examples, the input indicating whether a safety alert islegitimate (or a false alarm) is received at the false alarm evaluator208. The false alarm evaluator 208 notifies the safety alert actuator204 as to whether the safety alert is legitimate and the safety alertactuator 204 responds, in the manner described above. In addition, thefalse alarm evaluator 208 supplies information identifying thelegitimacy (or lack thereof) of the safety alert to the past usagehistory and data analyzer 222 for use in improving, fine-tuning and/orupdating one or more of the usage context profiles. In some examples,the past usage analyzer 222 may respond to the information supplied bythe false alarm evaluator 208 by modifying (e.g., changing from low tohigh) the threshold alert level corresponding to the usage contextprofile in the usage context profile storage. In some such examples, thepast usage history analyzer 222 may modify (e.g., increase or decrease)the number of abnormal activity usage attributes to be met/satisfiedbefore a safety alert is to be generated. In some examples, the pastusage history analyzer 222 may change one or more of the types of usageattributes to be met/satisfied before a safety alert is to be actuated.In some examples, the past usage history analyzer 222 may modifythreshold values associated with usage attributes to be reached orexceeded before the safety alert is to be actuated.

In some examples, the example past usage history analyzer 222 isconfigured to analyze information indicating whether a false alarm hasbeen detected by the example safety alert actuator 204 in addition tothe past usage history information. In some such examples, the pastusage history analyzer 222 may determine that a usage context previouslyassigned a low threshold alert level has resulted in the generation ofone or more false alarms, and, in response, may change the thresholdalert level to a high. In contrast, the past usage history analyzer 222may determine that a usage context previously assigned a high thresholdalert level has consistently resulted in the generation of legitimatesafety alerts, and, in response, may change the threshold alert level toa low threshold alert level.

Thus, the example first safety monitor 110A of FIG. 1 and FIG. 2 (andlikewise the example second and third safety monitors 110B, 110C)determines a level of threat to which the user 150A of the portableelectronic device 120A is exposed. Based on the level of threat, adetection of a combination of abnormal activity usage attributes, and ausage context, the safety monitor 110A generates a safety alert toautomatically (e.g., without human assistance or approval) notifyauthorities, friends, and/or others of the user's need for immediateassistance, to stream audio and/or video to authorities, friends, and/orothers, to cause one or more of the output devices 216 (e.g., thespeaker or a light device) to generate an alarm (e.g., emit a siren-likenoise, flash a light), to transmit commands to devices in the vicinityof the user 150A (e.g., to transmit a command to actuate a stationarysiren in the vicinity of the user, to transmit a command to actuate astreet lamp in the vicinity of the user, to transmit a command (ormessage) to other portable electronic devices 150B, 150C in the vicinityof the user 150A), etc. In some examples, a command transmitted from thefirst portable electronic device 120A to the second and/or thirdportable electronic device 120B, 120C may cause the second and/or thirdportable electronic device 120B, 120C to contact authorities on behalfof the user 150A.

As described above, the example first safety monitor 110A determines aset of usage contexts and corresponding usage context profiles based oncurrent usage data collected by the first portable electronic device120A, and also based on past usage data collected by the first portableelectronic device 120A. In addition, the first safety monitor 110A usesartificial intelligence, machine learning and/or a neural network tocontinuously fine-tune the usage contexts, the usage context profiles,the usage context profile attributes, the abnormal usage attributes, thecriteria to be met by the abnormal usage attributes before a safetyalert is warranted, etc., as additional usage data is collected. In someexamples, the first safety monitor 110A revises/fine-tunes the usagecontexts, the usage context profiles, the usage context profileattributes, the abnormal usage attributes, the criteria to be met by theabnormal usage attributes before a safety alert is warranted, etc.,based on information received from the electronically accessibleservices and information resources 145 (e.g., the social mediumplatforms/services 145A, the governmental services/databases 145B, theprivate/commercial services/databases 145C, the publicservices/databases 145D, the communication network information centers145E, etc.). In some examples, the first safety monitor 110A canadditionally revise and/or fine-tune the usage contexts, the usagecontext profiles, the usage context profile attributes, the abnormalusage attributes, the criteria to be met by the abnormal usageattributes before a safety alert is warranted, etc., based oninformation received from the remote safety manager 130 (see FIG. 1 andFIG. 3). In some examples, as described further below, the remote safetymanager 130 revises and fine-tunes the usage contexts, the usage contextprofiles, the usage context profile attributes, the abnormal usageattributes, the criteria to be met by the abnormal usage attributesbefore a safety alert is warranted, etc., and supplies therevised/fine-tuned information to the first safety monitor 110A for usein operating. In some such examples, the revised/fine-tuned informationcan be supplied by the remote safety manager 130 to the example pastusage history and data analyzer 222 of the safety monitor 110A. In somesuch examples, the remote safety manager 130 may revise a usage contextprofile and a corresponding threshold alert level currently in use atthe safety monitor 110A. In some such examples, the remote safetymanager 130 may cause the past usage history and data analyzer 222 tosupply the revised threshold alert level and any other relevantinformation directly to the example threshold alert level adjuster 221for delivery to the threshold alert level monitor 202 for immediate usein monitoring the safety of the user 150A. In some examples, changes tothe threshold alert level includes changes to the abnormal activityusage attributes to be monitored, changes to the levels associated withthe abnormal activity usage attributes, changes to the number ofabnormal activity usage attributes that will result in a safety alertactuation, etc. In some examples, the usage contexts, the usage contextprofiles, the usage context profile attributes, the abnormal usageattributes, the criteria to be met by the abnormal usage attributesbefore a safety alert is warranted, etc., are revised and/or fine-tunedby either or both of the first safety monitor 110A and the remote safetymanager 130. In some examples, the revising/fine-tuning of the usagecontext profiles (by either of the remote safety manager 130 and/or thefirst safety monitor 110A) occurs in real-time as additional usage dataand/or data is received from electronically accessible services andinformation resources 145 (e.g., the social medium platforms/services145A, the governmental services/databases 145B, the private/commercialservices/databases 145C, the public services/databases 145D, thecommunication network information centers 145E, etc.), other portableelectronic devices, etc.

In some examples, the example safety monitor 110A includes an examplethreshold override device 228. In some such examples, the user 150A canuse one of the example input devices 214 of the example portableelectronic device 120A to manually activate the threshold overridedevice 228. In some such examples, the user 150A activates the thresholdoverride device 228 in response to feeling threatened in an environmentor feeling unwell. In response to actuation of the threshold overridedevice 228, the safety alert actuator 204 disregards the currentthreshold alert level and the associated abnormal activity usageattributes and instead uses, for example, a first default thresholdalert level that corresponds to one or more default abnormal activityusage attributes. When the first default abnormal activity usageattribute is detected, the threshold alert level monitor 202 signals thesafety alert actuator 204 which in turn actuates the appropriate outputdevices 216 and/or communication devices 218 to summon assistance onbehalf of the user 150A.

In some examples, when the user 150A has personal safety concerns (e.g.,when walking alone on a poorly lit street in a high crime area), theuser 150A actuates the threshold override device 228 by pressing aninput button, touching a touch screen, speaking a phrase into themicrophone, etc. In some examples, in addition to actuating thethreshold alert override device 228, the user 150A indicates whether thethreshold alert level is to be downgraded or upgraded. In some examples,if the threshold alert level is to be upgraded, the threshold overridedevice 228 causes the threshold alert level monitor 202 to change thecurrent threshold alert level (e.g., high or low) to a criticalthreshold alert level (also referred to as a first default thresholdalert level). When in the critical threshold alert level, the thresholdalert level monitor 202 causes the safety alert to be actuated when oneor more critical abnormal activity usage attributes are detected. Insome examples, the critical abnormal activity usage attributecorresponds to the portable electronic device 120A being dropped orthrown, tossed, etc., by the user 120. In some examples, the criticalabnormal activity usage attribute indicating that the portableelectronic device 120A has hit the ground may indicate that the fallingof the device corresponds to the user falling down, (e.g., when theportable electronic device 120A was stored in an article of clothingworn by the user at the time that the usage attribute was detected). Insome such examples, information supplied by the motion detectors (e.g.,the accelerometers, the gyroscopes, etc.) is monitored by the thresholdalert level monitor 202. When the information supplied by the motiondetectors indicates the portable electronic device 120A has been droppedor thrown, the threshold alert level monitor 202 causes the safety alertactuator 204 to actuate one or more of the output devices toautomatically summon assistance on behalf of the user 150A. In some suchexamples, the user 150A need not make any phone call, press any buttons,and/or speak any particular phrase; all actions that can be difficult todo when under attack. Instead, the user need only drop the portableelectronic device. Likewise, if the user is attacked and the portableelectronic device 110A falls to the ground, the safety alert willautomatically be actuated.

In some examples, the critical abnormal activity usage attributecorresponds to the portable electronic device 120A being tightly grippedby the user 150A. In some such examples, information supplied by apressure sensor is monitored by the threshold alert level monitor 202.When the information supplied by the pressure sensor indicates theportable electronic device 120A has been gripped tightly (e.g., theuser's grip tightens), the threshold alert level monitor 202 causes thesafety alert actuator 204 to actuate one or more of the output devicesto automatically summon assistance on behalf of the user 150A. In somesuch examples, the user 150A need not make any phone call, press anybuttons, and/or speak any particular phrase; all actions that can bedifficult to do when under attack. Instead, the user 150A need onlysqueeze the portable electronic device 120A tightly enough (with morethan a threshold amount of force) to actuate a pressure sensor. In somesuch examples, the pressure sensor may be embedded in the portableelectronic device. In some such examples, the pressure sensor may beembedded in a case in which the portable electronic device is held or ina sheet of material wrapped around a water bottle or other similarobject carried by the user. In some such examples, the pressure sensorincludes Bluetooth communication capabilities and transmits a Bluetoothsignal indicating the pressure sensor has been actuated to the Bluetoothtransceiver of the portable electronic device 120. In some suchexamples, the threshold alert level monitor 202 monitors the Bluetoothtransceiver for an input signal indicating that the pressure sensor hasbeen actuated and responds to such a signal by causing the safety alertactuator 204 to actuate the set of output devices.

In some examples, the user 150A can manually activate the thresholdoverride device 228 when the threshold alert level indicates the usermay be in danger (e.g., the threshold alert level is low) yet the user150A is in a safe environment. In some such examples, the user 150Aindicates that the threshold alert level is to be downgraded. In someexamples, if the threshold alert level is to be downgraded, thethreshold override device 228 causes the threshold alert level monitor202 to change the current threshold alert level (e.g., high or low) tothe second default threshold alert level. In some such examples, thesafety alert actuator 204 disregards the current threshold alert leveland the associated abnormal activity usage attributes and instead usesthe second default threshold alert level that corresponds to one or moresecond default abnormal activity usage attributes.

The example sensor(s) can be carried by the example portable electronicdevice 120A or can be carried by other items/devices associated with theuser 150A (e.g., earrings, clothing, watches, jewelry, an automobile, acase holding the portable electronic device, etc.) and/or at locationsthat the user frequents (e.g., the user's home, the user's place ofemployment, the user's health club, the user's school, etc.). In someexamples, the sensor(s) 211 carried by items/devices other than theportable electronic device 120A include a communication mechanism totransmit sensed information to the portable electronic device 120. Insome such examples, the communication mechanism can be implemented usingany types of wireless communication technology (e.g., Bluetooth, RFID,cellular telephony, satellite telephony, etc.). In some examples, thesensor(s) are coupled to and communicate via an Internet of Things. Insome examples, the off-device sensor(s) 211 include biological sensor(s)(e.g., pulse sensor, body temperature sensor, etc.), environmentalsensor(s) (e.g., temperature sensor, smoke sensor, liquid sensor, audiosensor, video sensor, light sensor, etc.), motion sensor(s) (e.g.,gyroscopes, accelerometers, etc.), location sensor(s), etc. Thesensor(s) 210 may be native to the portable electronic device 110A ormay be added (e.g., an after-market product) to the portable electronicdevice 110A. Likewise, the sensor(s) 211 may be native to the otherportable devices by which the sensor(s) 211 are carried or may be added(e.g., an after-market product).

The example on-device sensor(s) 210A-210H, and the off-device sensors218 can include apparatus that both detects information and thatconverts the information to a form suitable for usage by the safetymonitor 110A. For example, the motion sensor(s) 210 may detect amovement and may supply information identifying the magnitude,direction, speed, etc., of the movement to the safety monitor 110A.Likewise, the location sensor(s) 210H may detect satellite signals anduse the satellite signals to determine a location. The locationsensor(s) 210H transmits the location information to the safety monitor110A. Similarly, the audio sensor(s)/microphone 210B may detect soundand perform language processing on the sound to detect spoken words. Theaudio sensor(s)/microphone 210B transmit the words to the safety monitor110A. Likewise, any of the sensors 210A-210H may process raw data togenerate information to be transmitted to the safety monitor 110A. Insome examples, the raw data is supplied by the sensor(s) 210A-210H tothe safety monitor 110A and the safety monitor 110A can convert the rawdata to a suitable format.

In some examples, any of the information communicated from/to any of theexample threshold alert level monitor 202, the example safety alertactuator 204, the example false alarm evaluator 208, the examplethreshold override device 228, the example input sensor(s) 210A-210H,the example input devices 214, the example output devices 216, and/orthe example communication transceivers 218 is controlled by the examplecommunication controller 219 coupled to the example first interface bus230.

FIG. 3 is a block diagram of an example implementation of the exampleremote safety manager 130. In some examples, the remote safety manager130 includes an example past usage history collector 302, an examplesupplemental past usage history analyzer 304, an example current usagedata collector 306, an example current usage data analyzer 308, anexample portable device query engine 310, an example remote thresholdalert level adjuster 311, an example remote threshold alert levelmonitor 312, an example remote safety alert actuator 314, an exampleexternal source data collector 316, an example external source dataanalyzer 318, an example real-time event analyzer 320, an exampleassistance request manager 322, an example communication network datacollector 324, and an example communication controller 326, an exampleusage context history collector 328, an example supplemental usagecontext history analyzer 330, an example usage context profilecollector/analyzer 332, example storage(s) 334, and an example secondinterface bus 336. In some examples, the example communicationcontroller 326 controls communications occurring on the second interfacebus 336.

In some examples, the remote safety manager 130 enhances and supplementsthe safety monitoring functionality of the example first, second, andthird safety monitors 120A, 120B, 120C (see FIG. 2). In some suchexamples, the remote safety manager 130 receives, via a communicationnetwork(s) 144, information from the safety monitors (e.g., the first,second and third safety monitors 120A, 120B, 120C), and also collects(via the communication network(s)144) information from a variety ofexternal electronically accessible source 145 (e.g., the example socialmedium platforms/services 145A, the example governmentalservices/databases 145B, the example private/commercialservices/databases 145C, the example public services/databases 145D, theexample communication network information centers 145E, etc.). In someexamples, the example external source data collector 316 is responsiblefor collecting/receiving the external source data via a subscription, aninformation publishing service, periodic and/or aperiodic queries, etc.In some examples, the external source data collector 316 is equippedwith user login/account information that gives the external source datacollector 316 access to particular ones of the external data sources145. The remote safety manager 130 uses the collected/receivedinformation to further evaluate the safety/security of the respectiveportable electronic device users (e.g., the first user 150A, the seconduser 150B, third user 150C, etc.) (See FIG. 1) and to supplement thefunctionality of the safety monitors (e.g., the first, second, and thirdsafety monitors 120A, 120B, 120C) in the manner described below. In someexamples, one or more other devices associated with the user 150A (e.g.,the example wearable sensor(s) 211A (a smartwatch), the examplestationary sensor(s) 211B, sensor(s) disposed on other portableelectronic devices 211C, etc.,) also transmit information to the remotesafety manager 130. In some such examples, the remote safety manager 130is capable of communicating directly with such other devices andquerying such devices for information.

In some examples, the example remote threshold alert level monitor 312tracks the threshold alert level corresponding to a current contextprofile in use at the remote monitor 110A. In some such examples, theremote threshold alert level monitor 312 may replicate adjustments tothe threshold alert level made by the threshold alert level monitor 202(see FIG. 2) of the safety monitor 110A. In some examples, the exampleremote threshold alert level adjuster 311 may adjust the threshold alertlevel based on information received from one or more of the externaldata sources 145 and/or one or more other portable electronic devices(e.g., the second portable electronic device 120B, the third portableelectronic device 120C). In some examples, the remote threshold alertlevel monitor 312 monitors any of the current usage attributes suppliedby the safety monitor 110A, and the external source data to determinewhen the threshold alert level has been satisfied (and/or is to beadjusted). In some examples, remote threshold alert level monitor 312monitors the current usage attributes supplied by the safety monitor110A, the external data supplied by the external data sources 145,and/or external data supplied by other safety monitors (e.g., the secondsafety monitor 110B, the third safety monitor 110C) and notifies theremote threshold alert level adjuster 311 when the threshold alert levelis to be adjusted based on both types of information. In response, theremote threshold alert level adjuster 311 adjusts the threshold alertlevel. The remote threshold alert level monitor 312 determines when thethreshold alert level has been satisfied (based on sensor informationand/or external source data) and notifies the remote safety alertactuator 314 that an alert is to be actuated. In some examples, theremote threshold alert level monitor 312 and the remote safety alertactuator 314 notify the threshold alert level monitor 202 (see FIG. 2)and the safety alert actuator 204 (see FIG. 2) of the safety monitor110A when the threshold alert level is adjusted and/or a safety alerthas been actuated. In some examples, the threshold alert level monitor202 and/or the safety alert actuator 204 incorporate the threshold alertlevel and safety alert information into the safety monitoring operationsperformed by the safety monitor 110A.

In some examples, the past usage history collector 302 collects pastusage history data from the safety monitor 120A, the current usage datacollector 306 collects current usage data from the safety monitor 120A,and the example usage context history collector/analyzer 328 collectsusage context profile data from the remote safety monitor 120A. Asdescribed above, the usage context profile data, the past usage historydata, and/or the current usage data can include the user's emergencycontact information, the user's call history, the user's movement data,the user's location information, the user's browser history, the user'sexercise history, the user's medical information, the routines (e.g.,daily, weekly, monthly (or aperiodic) routines) the user's callinghabits, texting habits, media access habits, web-surfing habits, socialmedia contacts, social media habits, restaurant preferences, all (orsome) of the information supplied by the on-device sensor(s) 210A-210H,and the off-device sensor(s) 211A-211C, and/or any other information theusers (e.g., the first user 150A, the second user 150B, the third user150C) agree to share. In some examples, the amount of information sharedby the users may be identified in service level agreements between theusers and the operators of the safety system 100.

In some examples, the example supplemental usage context historyanalyzer 330, the example supplemental past usage history analyzer 304,the external data source analyzer 318, and the example current usagedata analyzer 308 of the example remote safety manager 130 analyze thecollected information (collectively or individually) and, based on theanalyses, generate and/or revise/update usage context profiles and/orgenerate and/or revise/update threshold alert levels to be associatedwith any of the usage context profiles. In some examples, the usagecontext profiles are further generated/revised/updated based on externalsource data. In some such examples, the communication controller 326transmits the revised/updated usage context profiles to the safetymonitor 110A for usage by the safety monitor 110A in the mannerdescribed above. In some examples, the supplemental past usage historyanalyzer 304, the supplemental usage context history analyzer 330, theusage context profile collector/analyzer 332, the external data sourceanalyzer 318, and/or the current usage data analyzer 308, may usemachine learning techniques, neural networks, artificial intelligence,programmed logic, etc., to analyze the supplied information. In thismanner, the remote safety manager 130 uses the on-going collection ofinformation from the safety monitor 110A as feedback in understanding(and even predicting) the habits, routines, preferences, etc., of theuser 150A.

In some examples, the current usage data analyzer 308 analyzes thecurrent usage data collected by the current usage data collector 306 andcompares the current usage data to the usage context profiles obtainedby the example usage context profile collector/analyzer 332 to identifya usage context profile having a usage context that corresponds to thecurrent usage data. When a corresponding usage context profile isidentified, the current usage data analyzer 308 extracts the thresholdalert level, corresponding abnormal activity usage attributes to bemonitored in connection with the current usage, etc. from thecorresponding usage context profile and supplies the extractedinformation to the remote threshold alert level monitor 312 formonitoring the safety of the user 150A.

In some examples, the example remote safety manager 130 and/or theexample safety monitor 110A (see FIG. 1) also use information suppliedby one or more external data sources 145 (e.g., the example social mediaservices/platforms 145A, the example government services/databases 145B,the example private/commercial services/databases 145D, the examplecommunication network/information control centers 145E, and/orinformation supplied by other portable electronic devices (e.g., thesecond portable electronic device 120B, the third portable electronicdevice 120C, etc.). In some such examples, the safety monitor 110Aand/or the remote safety manager 130 accesses the external data sources145 to obtain information about, for example, locations occupied by theportable electronic device 120A during the daily routine of the user150A. In some such examples, one or more of the external data sources145 (e.g., law enforcement agencies, online message boards, real estatewebsites, real estate agencies, crime watch websites, etc.) provide dataidentifying locations having a high incidence of violent crimes and/oridentifying locations having a low incidence of violent crimes. In someexamples, the safety monitor 110A and/or the remote safety manager 130use the crime statistics to adjust the threshold alert levels associatedwith the usage context profiles associated with the locations and/or togenerate any of the information included in the usage context profiles.In some examples, the external data sources 145 supply information tothe safety monitor 110A and/or the remote safety manager 130 indicatingthat other portable electronic device users (e.g., the second user 150B,the third user 150C, etc.) have reported (at an earlier time) a locationas being potentially dangerous.

In some examples, the external data sources 145 and/or the safetymonitors 110B, 110C supply information to the safety monitor 110A and/orthe remote safety manager 130 indicating that an event happening inreal-time is causing a location to be a high risk area (e.g., a riot, ashooting, a car accident, a terrorist event, a fire, a natural disaster,an explosion, a mass transit accident, etc.). In some such examples, theexample social media platform 145A may determine that numerous users ofthe platform have posted information concerning such an event in alocation currently occupied by the user 150A. In some such examples, thepublic utility 145D may notify the safety monitor 110A or the remotesafety manager 130 that street lamps on a street currently beingtraversed by the user 150A are inoperable due to an electricity outage(thereby possibly increasing risk to the user 150A). In some examples,the external data sources 145 may include a law enforcement agency 145B.In some such examples, the law enforcement agency may supply informationidentifying a crime (e.g., a shooting, a mugging, a riot, etc.)happening in real-time near the user 150A (e.g., within a thresholddistance of the user 150A, within a same building as the user 150A, at asame venue as the user 150A, etc.). The real-time events describedherein represent only a few of the many types of real-time events thatcan be detected and reported by an external source to the remote safetymanager 130.

In some such examples, any or all of the real-time event informationsupplied by one or more of the external data sources 145 to the remotesafety manager 130 is supplied to the example real-time event analyzer320. The real-time event analyzer 320 can respond by causing the remotesafety alert actuator 314 to generate an alert, or by causing theexample remote threshold alert level adjuster 311 to adjust thethreshold alert level (either up or down depending on the real-timeevent information). In some examples, the remote safety manager 130analyzes the external data supplied by the external data sources 145 toevaluate the criticality of external data and, when found to be of ahighly critical nature, to immediately transmit the critical informationto the safety monitor 110A for use in revising/fine-tuning the thresholdalert levels associated with one or more usage context profiles that maybe affected by the information. In some examples, the past usage historyand data analyzer 222 (see FIG. 2) of the example safety monitor 110A(see FIG. 2) receives the critical information and uses the informationto revise/fine-tune the threshold alert levels associated with one ormore of the usage context profiles affected by the information. In someexamples, when the external data is not critical, the remote safetymanager 130 may transmit the information to the safety monitor 110A at alater time. In some examples, the remote safety manager 130 filters theexternal data from the external data sources 145 and only suppliesinformation relevant to the portable device 120A to the safety monitor110A.

As described above, in some examples, the remote safety alert actuator314 actuates a safety alert based on information supplied by the safetymonitor 110A, information supplied by one or more of the external datasources 145 and/or information supplied by one or more other safetymonitors 110B, 110C. In some such examples, the remote safety alertactuator 314 notifies the assistance request manager 322 which respondsby summoning assistance from law enforcement agencies, fire departments,private security firms, nearby portable device users, emergency contactsassociated with the electronic portable device 120A, a social mediasite, etc.) In some examples the summons for assistance is transmittedby the communication controller 326 to the communication network(s) 144for transmission to the intended recipients. The summons for assistancecan include the identity of the user 150A, the location of the user150A, information about the type of danger confronting the user 150A,information about traffic conditions in the vicinity of the user, etc.The information included in the summons can be extracted from thecurrent usage data (or any other data) collected by the example currentusage data collector 306 and/or from the communication networkinformation/control centers 145E (e.g., the communication networkinformation/control centers can supply the location of the portableelectronic device) or any of the external data sources 145. In someexamples, the assistance request manager 322 may also (or instead) causeinstructions to be transmitted to the safety monitor 110A to actuate oneor more of the example output devices 216 (see FIG. 2) of the portableelectronic device 120A.

In some examples, the example portable device query engine 310 sendsqueries to safety monitor 110A. In some examples, the queries includerequests for additional usage data, requests to be presented to the user150A regarding a current context in which the portable electronic device120A is being used, inquiries to be presented to the user 150A about theuser's current state of safety (e.g., whether the user feels threatenedor safe, etc.). Any of the information supplied by the safety monitor110A is supplied to one or more of the real-time event analyzer 320, thesupplemental usage context history analyzer 330, the examplesupplemental past usage history analyzer 304, the example current usagedata analyzer 308, etc., for analysis, and if needed, adjustment of ausage context profile, adjustment of a threshold alert level, actuationof a safety alert, etc.

In some examples, the safety system 100 (see FIG. 1) includes multipleremote safety managers 130 disposed at any of a variety of locations((e.g., in the cloud, at a communication services provider facility, ata network gateway, etc.) and includes some or all of the components ofFIG. 3. In some examples, the multiple remote safety managers 130 may beoperable at a same time or at different times, or more of the multipleremote safety managers 130 may be used in the event that a primarymultiple remote safety manager 130 fails, and/or the primary multipleremote safety managers 130 may operate in a distributed (e.g., differentones of the multiple remote safety managers 130 perform different onesof operations described above).

In some examples, the remote safety manager 130 supplies information tothe one or more external data sources 145. In some such examples, theremote safety manager 130 may supply usage data received from any of theexample safety monitors (e.g., the first safety monitor 110A, the secondsafety monitor 110B, the third safety monitor 110C, etc.) to theexternal data sources 145. Example usage data supplied to the externaldata sources 145 can include any of the past usage history data and/orcurrent usage data (e.g., sensor-supplied information, informationsupplied by one or more of the input devices, information about thedevice usage, etc.). In some examples, the remote safety manager 130evaluates (analyzes, aggregates, tallies, identifies trends, etc.) theusage data, real-time event data, external source data, data receivedfrom the other portable electronic devices 120B, 120C to identifyon-going events or make predictions of future events (e.g., toidentify/predict areas of high/low crime, to identify/predict theoccurrence of natural disasters, to identify crowds of people, toidentify/predict a riot, to identify/predict a mass transit event, toidentify/predict an electricity outage, to identify/predict astreetlight outage, etc.). The remote safety manager 130 can generatereports containing the evaluations/predictions and transmit the reportsto any of the external data sources 145 or any other desired entity.

In some examples, the real-time event analyzer 320 is configured toreceive real-time event data from the external source data collector316. When the real-time event analyzer 320 determines that the user 150Ais threatened or otherwise in jeopardy based on the real-time eventdata, the real-time event analyzer 320 actuates the remote safety alertactuator 314 which responds by summoning assistance (or actuatingdevices (e.g., sirens, surveillance cameras, etc.) in the vicinity ofthe portable electronic device 120A) in the manner described above.

In some examples, the example remote safety manager 130 acts as aback-up resource for the safety monitor 110A when the safety monitor110A becomes inoperable. In some such examples, the safety monitor 110Amay be operating at a low threshold alert level when the communicationscontroller 326 of the remote safety manager 130 determines thatconnectivity with the safety monitor 110A has been lost. In some suchexamples, the communications controller 326 can notify the remote safetyalert actuator 314 (and/or the remote threshold alert level monitor 312)which can respond by actuating a safety alert. In some examples, beforeactuating a safety alert in response to losing connectively, the remotethreshold alert level monitor 312 may evaluate, for example, a batterycharge usage attribute received from the safety monitor 110A prior tothe loss of connectivity. If the battery charge attribute was very lowwhen connectivity was lost, the remote threshold alert level monitor 312may, instead of actuating a safety alert, cause the remote safety alertactuator 314 to issue a “possible safety alert.” In response to the“possible safety alert,” the example assistance request manager 322 canrespond by transmitting a message to one or more sources of assistanceindicating that the user 150A is possibly in danger and providing anyadditional information such as, the current location of the user 150A,the circumstances that indicate the user 150A is possibly in danger,etc.). As used herein, sources of assistance include any remote ornear-by person, authority, agency (private or public), media, etc., thatmay be able to render assistance to the user 150A.

In some examples, the example user 150A enters into a service levelagreement with an operator of the safety system 100. The service levelagreement can identify information about the user's portable electronicdevice 120A, types of attributes to be monitored, types of informationto be shared with external data sources, types of assistance to beobtained in the event of an emergency, etc. The service level agreementcan additional identify other devices owned/operated by the user 150Athat will provide data to (and/or otherwise be accessible to) the remotesafety manager 130.

The safety system 100, the remote safety manager 130 and the safetymonitor 110A are generally described as being used to monitor the safetyof the user of a portable device and to summon assistance on behalf ofthe user 150A when needed. The safety of the user is not limited tosituations in which the user is subject to (or at risk of) an assault byanother person or entity, but can also include monitoring for situationsin which the safety of the user is in peril due to health related issues(e.g., the biological sensor(s) indicate the user 150A is not breathing,the user 150A is suffering a heart attack or cardiac arrest, the user150A is having an asthma attack, the user 150A is experiencinganaphylactic shock, the user 150A has been injured in a car accident,the user has fallen from a great height, the user has fallen and has notgotten back up, etc.

In some examples, instead of supplementing and/or replicating the safetymonitoring functionality of the example first, second, and third safetymonitors 120A, 120B, 120C (see FIG. 2), the example remote safetymanager 130 performs the bulk of data collection and data analysiswhereas the first, second, and third safety monitors 120A, 120B, 120Cprimarily operate to monitor current usage attributes supplied via thesensors 210 to determine whether a threshold alert level has beensatisfied. In some such examples, the remote safety manager 130 isresponsible for collecting data from the external data sources 145 andfor collecting usage data and usage history from the first, second, andthird safety monitors 120A, 120B, 120C of the first, second and thirdportable electronic devices 110A, 110B, 110C. In some such examples, theremote safety manager 130 uses any of machine learning, artificialintelligence, neural networks, programmed logic, etc. to analyze thecollected data and to develop a set of usage context profiles for eachof the first, second, and third safety monitors 120A, 120B, 120C. Theremote safety manager 130 supplies the usage context profiles to thefirst, second, and third safety monitors 120A, 120B, 120C for usage inmonitoring the safety of the user 150A in the manner described above(e.g., depending on the current usage attributes, a corresponding usagecontext profile and a corresponding threshold alert level areidentified, and the usage attributes associated with the threshold alertlevel are monitored to determine whether the corresponding thresholdalert level has been satisfied).

In some examples, the example remote safety manager 130 can commandeercontrol of (and/or request information from) sensor(s) disposed off ofthe first, second, and/or third portable devices 120A, 120B, 120C thatare located in proximity of the users 150A, 150B, 150C. Such off-devicesensors can include, for example, a surveillance camera, a surveillancemicrophone, a fire alarm, a heat sensor, a smoke sensor, a motionsensor, etc. In some examples, the remote safety manager 130 analyzesinformation collected from the sensor(s) to determine if an abnormalactivity is detected and, if so, actuates a safety alert. In some suchexamples, the remote safety manager 130 can take control of devices inthe vicinity of the user 150A when a safety alert is actuated (e.g., totransmit a command to actuate a stationary siren in the vicinity of theuser, to transmit a command to actuate a street lamp in the vicinity ofthe user, to transmit a command (or message) to other portableelectronic devices 150B, 150C in the vicinity of the user 150A), etc. Insome examples, the example remote safety manager 130 can commandeercontrol of (and/or request information from) sensor(s) disposed off ofthe first, second, and/or third portable devices 120A, 120B, 120C thatare located in proximity of the users 150A, 150B, 150C in response toany of the first, second, and/or third portable devices 120A, 120B, 120Ccoming within a threshold distance of the such sensors. In someexamples, the safety manager 130 requests control of such sensors viathe assistance request manager 322.

In some examples, the safety monitoring functionality of the safetysystem 100 is performed in a distributed manner that relies primarilyupon the monitoring functionality of the example first, second, andthird safety monitors 120A, 120B, 120C (see FIG. 2). In some suchexamples, the first, second, and third safety monitors 120A, 120B, 120Cperform the data collection, analysis and monitoring operationsdescribed with reference to FIG. 2. In some such examples, the first,second, and third safety monitors 120A, 120B, 120C communicate with eachother and with the external data sources 145 to monitor the safety ofthe users 150 and notify authorities (and/or others) when assistance isrequired.

In some examples, the current usage data includes data collected at thesensors as well as data collected from any of the external data sources.In some examples, the safety manager and/or the safety monitor cause asafety alert to be actuated in response to external source data receivedfrom one or more of the external data sources as well as (or instead of)sensor-supplied information.

While an example manner of implementing the safety system 100 of FIG. 1is illustrated in FIG. 2, one or more of the elements, processes and/ordevices illustrated in FIG. 2 may be combined, divided, re-arranged,omitted, eliminated and/or implemented in any other way. Further, theexample threshold alert level monitor 202, the example safety alertactuator 204, the example usage context generator 206, the example falsealarm evaluator 208, the example sensor(s) 210A-210H, the examplewearable sensor(s) 211A, the example stationary sensor(s) 211B, theexample portable device sensor(s) 211C, the example clock 212, theexample user input devices 214, the example output devices 216, theexample communication devices 218, the example communication controller219, the example threshold alert level adjuster 221, the example currentusage detector 220, the example past user history analyzer 222, theexample past usage history storage 224, the example usage contextprofile storage 226, the example threshold override device 228, and/or,more generally, the example first, second and third safety monitors110A, 110B, 110C and the example first, second and third portableelectronic devices 120A, 120B, 120C, may be implemented by hardware,software, firmware and/or any combination of hardware, software and/orfirmware. Thus, for example, any of the example threshold alert levelmonitor 202, the example safety alert actuator 204, the example usagecontext generator 206, the example false alarm evaluator 208, theexample sensor(s) 210A-210H, the example wearable sensor(s) 211A, theexample stationary sensor(s) 211B, the example portable device sensor(s)211C, the example clock 212, the example user input devices 214, theexample output devices 216, the example communication devices 218, theexample communication controller 219, the example threshold alert leveladjuster 221, the example current usage detector 220, the example pastuser history analyzer 222, the example past usage history storage 224,the example usage context profile storage 226, the example thresholdoverride device 228, and/or, more generally, the example first, secondand third safety monitors 110A, 110B, 110C and the example first, secondand third portable electronic devices 120A, 120B, 120C could beimplemented by one or more analog or digital circuit(s), logic circuits,programmable processor(s), application specific integrated circuit(s)(ASIC(s)), programmable logic device(s) (PLD(s)) and/or fieldprogrammable logic device(s) (FPLD(s)). When reading any of theapparatus or system claims of this patent to cover a purely softwareand/or firmware implementation, at least one of the example first,second, and third safety monitors 110A, 110B, 110C, the example first,second, and third portable electronic devices 120A, 120B, 120C, theexample threshold alert level monitor 202, the example safety alertactuator 204, the example usage context generator 206, the example falsealarm evaluator 208, the example sensor(s) 210A-210H, the examplewearable sensor(s) 211A, the example stationary sensor(s) 211B, theexample portable device sensor(s) 211C, the example clock 212, theexample user input devices 214, the example output devices 216, theexample communication devices 218, the example communication controller219, the example threshold alert level adjuster 221, the example currentusage detector 220, the example past user history analyzer 222, theexample past usage history storage 224, the example usage contextprofile storage 226, and/or the example threshold override device 228,is/are hereby expressly defined to include a non-transitory computerreadable storage device or storage disk such as a memory, a digitalversatile disk (DVD), a compact disk (CD), a Blu-ray disk, etc.including the software and/or firmware. Further still, the examplefirst, second, and third safety monitors 110A, 110B, 110C and examplefirst, second and third portable electronic devices 120A, 120B, 102C ofFIG. 1 may include one or more elements, processes and/or devices inaddition to, or instead of, those illustrated in FIG. 2, and/or mayinclude more than one of any or all of the illustrated elements,processes and devices.

While an example manner of implementing the safety system 100 of FIG. 1is illustrated in FIG. 3, one or more of the elements, processes and/ordevices illustrated in FIG. 3 may be combined, divided, re-arranged,omitted, eliminated and/or implemented in any other way. Further, theexample past usage history collector 302, the example supplemental pastusage history analyzer 304, the example current usage data collector306, the example current usage data analyzer 308, the example portabledevice query engine 310, the example remote threshold alert levelmonitor 312, the example remote safety alert actuator 314, the exampleexternal source data collector 316, the example external data sourceanalyzer 318, the example real-time event analyzer 320, the exampleassistance request manager 322, the example communication network datacollector 324, the example communication controller 326, the examplecontext usage history collector 328, the example supplemental contextusage history analyzer 330, the example usage context profilecollector/analyzer 332, the example storage(s) 334, and/or, moregenerally, the example remote safety manager 130, may be implemented byhardware, software, firmware and/or any combination of hardware,software and/or firmware. Thus, for example, any of the example pastusage history collector 302, the example supplemental past usage historyanalyzer 304, the example current usage data collector 306, the examplecurrent usage data analyzer 308, the example portable device queryengine 310, the example remote threshold alert level monitor 312, theexample remote safety alert actuator 314, the example external sourcedata collector 316, the example external data source analyzer 318, theexample real-time event analyzer 320, the example assistance requestmanager 322, the example communication network data collector 324, theexample communication controller 326, the example context usage historycollector 328, the example supplemental context usage history analyzer330, the example usage context profile collector/analyzer 332, theexample storage(s) 334, and/or, more generally, the example remotesafety manager 130 could be implemented by one or more analog or digitalcircuit(s), logic circuits, programmable processor(s), applicationspecific integrated circuit(s) (ASIC(s)), programmable logic device(s)(PLD(s)) and/or field programmable logic device(s) (FPLD(s)). Whenreading any of the apparatus or system claims of this patent to cover apurely software and/or firmware implementation, at least one of theexample safety manager 130, the example past usage history collector302, the example supplemental past usage history analyzer 304, theexample current usage data collector 306, the example current usage dataanalyzer 308, the example portable device query engine 310, the exampleremote threshold alert level monitor 312, the example remote safetyalert actuator 314, the example external source data collector 316, theexample external data source analyzer 318, the example real-time eventanalyzer 320, the example assistance request manager 322, the examplecommunication network data collector 324, the example communicationcontroller 326, the example context usage history collector 328, theexample supplemental context usage history analyzer 330, the exampleusage context profile collector/analyzer 332, the example storage(s)334, and/or, more generally, and/or the example remote safety manager130, is/are hereby expressly defined to include a non-transitorycomputer readable storage device or storage disk such as a memory, adigital versatile disk (DVD), a compact disk (CD), a Blu-ray disk, etc.including the software and/or firmware. Further still, the examplesafety manager 130 of FIG. 1 may include one or more elements, processesand/or devices in addition to, or instead of, those illustrated in FIG.3, and/or may include more than one of any or all of the illustratedelements, processes and devices.

Flowcharts representative of example machine readable instructions forimplementing the example first, second and third safety monitors 110A,110B, 110C of FIG. 1 and FIG. 2 are shown in FIGS. 4-9, 11 and 12. Inthese examples, the machine readable instructions comprise a program forexecution by a processor such as the processor 1312 shown in the exampleprocessor platform 1300 discussed below in connection with FIG. 13. Theprogram may be embodied in software stored on a non-transitory computerreadable storage medium such as a CD-ROM, a floppy disk, a hard drive, adigital versatile disk (DVD), a Blu-ray disk, or a memory associatedwith the processor 1312, but the entire program and/or parts thereofcould alternatively be executed by a device other than the processor1312 and/or embodied in firmware or dedicated hardware. Further,although the example program is described with reference to theflowcharts illustrated in FIGS. 4-9, 11 and 12, many other methods ofimplementing the example first, second and third safety monitors 110A,110B, 110C may alternatively be used. For example, the order ofexecution of the blocks may be changed, and/or some of the blocksdescribed may be changed, eliminated, or combined. Additionally, oralternatively, any or all of the blocks may be implemented by one ormore hardware circuits (e.g., discrete and/or integrated analog and/ordigital circuitry, a Field Programmable Gate Array (FPGA), anApplication Specific Integrated circuit (ASIC), a comparator, anoperational-amplifier (op-amp), a logic circuit, etc.) structured toperform the corresponding operation without executing software orfirmware.

Flowcharts representative of example machine readable instructions forimplementing the example remote safety manager 130 of FIG. 1 and FIG. 3are shown in FIGS. 10, 11 and 12. In these examples, the machinereadable instructions comprise a program for execution by a processorsuch as the processor 1412 shown in the example processor platform 1400discussed below in connection with FIG. 14. The program may be embodiedin software stored on a non-transitory computer readable storage mediumsuch as a CD-ROM, a floppy disk, a hard drive, a digital versatile disk(DVD), a Blu-ray disk, or a memory associated with the processor 1412,but the entire program and/or parts thereof could alternatively beexecuted by a device other than the processor 1412 and/or embodied infirmware or dedicated hardware. Further, although the example program isdescribed with reference to the flowcharts illustrated in FIGS. 10, 11,and 12, many other methods of implementing the example remote safetymanager 130 may alternatively be used. For example, the order ofexecution of the blocks may be changed, and/or some of the blocksdescribed may be changed, eliminated, or combined. Additionally, oralternatively, any or all of the blocks may be implemented by one ormore hardware circuits (e.g., discrete and/or integrated analog and/ordigital circuitry, a Field Programmable Gate Array (FPGA), anApplication Specific Integrated circuit (ASIC), a comparator, anoperational-amplifier (op-amp), a logic circuit, etc.) structured toperform the corresponding operation without executing software orfirmware.

As mentioned above, the example processes of FIGS. 4-12 may beimplemented using coded instructions (e.g., computer and/or machinereadable instructions) stored on a non-transitory computer and/ormachine readable medium such as a hard disk drive, a flash memory, aread-only memory, a compact disk, a digital versatile disk, a cache, arandom-access memory and/or any other storage device or storage disk inwhich information is stored for any duration (e.g., for extended timeperiods, permanently, for brief instances, for temporarily buffering,and/or for caching of the information). As used herein, the termnon-transitory computer readable medium is expressly defined to includeany type of computer readable storage device and/or storage disk and toexclude propagating signals and to exclude transmission media.“Including” and “comprising” (and all forms and tenses thereof) are usedherein to be open ended terms. Thus, whenever a claim lists anythingfollowing any form of “include” or “comprise” (e.g., comprises,includes, comprising, including, etc.), it is to be understood thatadditional elements, terms, etc. may be present without falling outsidethe scope of the corresponding claim. As used herein, when the phrase“at least” is used as the transition term in a preamble of a claim, itis open-ended in the same manner as the term “comprising” and“including” are open ended.

The program 400 of FIG. 4 begins at block 402 at which the examplecurrent usage detector 220 of the example usage context generator 206obtains current usage data from any of the example sensor(s) 210A -210H(e.g., location information from the example location sensor 210H,motion information from the example motion sensor(s) 210E, etc.) timeinformation from the example clock 212, date information from the clock212, and/or other usage information stored on the portable electronicdevice 110A (e.g., contacts information, web-usage history, callhistory, viewing habits, listening habits, etc.). The current usagedetector 220 supplies the obtained information to the past usage historystorage 224 (block 404). The past usage history analyzer 222 analyzesthe information stored in the past usage history storage 224 todetermine (and/or fine tune) contexts in which the portable electronicdevice 120A is used (usage contexts) and corresponding usage contextprofile information (block 406). In some examples, the correspondingusage context profile information includes a threshold alert level, ausage attribute, and abnormal activity usage attributes. In someexamples, the past usage history analyzer 222 additionally uses dataobtained from the remote safety manager 130 (e.g., external source datafrom the external data sources 145, results of analyses performed by anyof the external data source analyzer 318, the supplemental past usagehistory analyzer 304, the example supplemental usage context historyanalyzer 330, the example current usage data analyzer 308, etc.) todetermine (and/or fine tune) the usage contexts and to generate thecorresponding usage context profiles. The past usage history analyzer222 stores the usage context profiles in the usage context profilestorage 226 (block 408). Thereafter, the process returns to the block402 and is repeated until the safety monitor 110A is deactivated.

The process of FIG. 4 is continuously, semi-continuously, periodicallyor aperiodically repeated such that the past usage history analyzer 222continues to adjust/fine tune the usage context profiles based on thecontinuous or semi-continuous collection of past usage history data,external source data, sensor data, etc.. In some examples, a set ofdefault usage context profiles (e.g., a usage context profilecorresponding to times when the user 150A is at home, a usage contextprofile corresponding to times when the user 150A is at work, a usagecontext profile corresponding to times when the user 150A is at a healthclub, etc.) can be initially stored in the usage context profile storage226 and then revised/fine-tuned as past usage history data is collected.In some examples, the safety monitor 110A can supply a user interface bywhich the user 150A can initially assign usage threshold alert levels tothe usage context profiles.

The program 500 of FIG. 5 begins at block 502 at which the example pastusage history analyzer 222 of the usage context history generator 206supplies any of the current usage attributes collected by the currentusage detector 220, the past usage history stored in the past usagehistory storage 224, and/or the context profiles stored in the usagecontext profile storage 226 to the remote safety manager 130. The remotesafety manager 130 uses the supplied information to generate (and/orfine tune) the usage context profiles (block 504). In some examples, theremote safety manager 130 additionally uses data collected from any ofthe public, private, and/or governmental information sources to generate(and/or fine-tune) the usage context profiles. The remote safety manager130 transmits the newly generated (or fine-tuned) usage context profilesback to the remote safety manager 130 and causes the information to bestored in the usage context profile storage 226 (block 506). The processof FIG. 5 is continuously, semi-continuously, periodically oraperiodically repeated such that the usage context history generator 206continues to adjust/fine tune the usage context profiles based on thecontinuous or semi-continuous collection of usage history data.

The program 600 of FIG. 6 begins at block 602 at which the examplecurrent usage detector 220 obtains current usage attributes from theexample sensor(s) 224, the clock 212, and/or other information stored onthe portable electronic device 120A (e.g., contacts information,web-usage history, viewing habits, listening habits, calling habits,texting habits, email usage habits, etc.) and, in some examples,information from the remote safety manager 130. In some examples, theinformation from the remote safety manager 130 can include anyinformation from any of the external data sources 145 (e.g.,governmental, private/commercial, public and/or communication network).

The example current usage detector 220 compares the current usageattributes to the usage attributes associated with one or more of theusage context profiles and identifies a context profile having athreshold number of usage attributes that match the current usageattributes (block 604). The current usage detector 220 causes thethreshold alert level and the abnormal activity usage attributesassociated with the matching usage context profile to be transmitted tothe threshold alert level monitor 202 (block 606).

The example threshold alert level monitor 202 begins monitoring one ormore of the abnormal activity usage attributes transmitted by thecurrent usage context detector 220 (block 608). When a threshold numberof the one or more abnormal activity usage attributes are detected, thethreshold alert level monitor causes the safety alert actuator 204 toactuate one or more output devices and/or communication devices 218(block 610). In some examples, the threshold number (and/or values) ofabnormal activity usage attributes to be detected before a safety alertis to be actuated is based on whether the threshold alert level is highor low. In some examples, a high threshold alert level will require thedetection of a greater number of the abnormal activity usage attributesthan a low threshold alert level alert. In some examples, thevalues/levels corresponding to abnormal activity usage attributesassociated with a high threshold alert level will be different than thevalues/levels corresponding to such attributes associated with a lowthreshold alert level. In some examples, when the current usage detector220 transmits the threshold alert level and the abnormal activity usageattributes, the current usage detector 220 will also transmit an orderin which the abnormal activity usage attributes are to be detectedand/or respective threshold values (e.g., user's heartrate, accelerationof the user's heartrate, amount user is perspiring, change in user'sperspiration level, etc.), that respective ones of the abnormal activityusage attributes are to achieve before the abnormal activity usageattributes are to be considered “detected.” Thereafter, the program 600returns to the block 602.

The program 700 of FIG. 7 begins at block 702 at which the examplecurrent usage detector 220 obtains current usage attributes from theexample sensor(s) 210, the clock 212, and/or other information stored onthe portable electronic device 110A (e.g., contacts information,web-usage history, viewing habits, listening habits, calling habits,texting habits, email usage habits, etc.). In some examples, the currentusage attributes include an image or video clip and locationinformation. The current usage detector 220 supplies the information tothe remote safety manager 130 using any of the output devices 216 and/orcommunication devices 218 (block 704). The remote safety manager 130accesses the data collected from the external sources 145 (e.g., asocial media service/platform, an Internet search engine, anyInternet-based information resource, etc. (e.g., Facebook, Googleimages, Instagram, Snapchat, Google reviews, Yelp, etc. using an accountheld by the user 150A and compares the image and/video clip obtainedfrom the safety monitor 110A. In some examples, the remote safetymanager 130 determines that the image and/or video clip matches one ormore images and/or video clips posted by other users of the social mediaservice/platform. In some such examples, the matching images and/orvideo clips are associated with a location at which attendees are atrisk of injury due to an on-going situation (e.g., a riot, detonation ofan explosive in a public place, discharge of a firearm in a publicplace, a fire, etc.). In response to detecting the matching images/videoclips and determining the user is at risk of injury due to the on-goingsituation, the remote safety manager 130 may transmit one or moremessages on behalf of the user (that includes a summons for assistance)to one or more of the user's emergency contacts, to the authorities,etc. In some examples, the remote safety manager 130 may additionally orinstead cause the safety monitor 110A of the portable electronic device120A to transmit one or more messages on behalf of the user 150A andsummoning assistance to one or more of the user's emergency contacts, tothe authorities, etc. In some examples, the remote safety manager 130instead causes the threshold alert level monitor 202 of the safetymonitor 110A to be set to a low threshold alert level and/or a criticalthreshold alert level. Thereafter the program 700 ends.

The program 800 of FIG. 8 begins at block 802 at which the examplethreshold alert level monitor 202, in response to detecting an abnormalactivity usage attribute, causes the safety alert actuator 204 toactuate the example output devices 216. In response, one or more of theoutput devices 216 transmits a first message summoning assistance onbehalf of the user 150A and/or causes one or more of the output devices216 of the portable electronic device 120A to emit an alarm, or take anyother actions needed to alert others to the user's need for assistance,in the manner described above (block 804). After transmitting the firstmessage, the safety alert actuator 204 causes one of the output devices216 having display or audio generation capabilities to output a secondmessage notifying the user that the first message has been transmitted(block 806). In some examples, the second message also identifies theparties to whom the first message was transmitted.

The second message can further provide the user with an option toidentify the safety alert as a false alarm or as a legitimate alert. Ifthe user 150A identifies the safety alert as a false alarm (block 808)by, for example, entering an alarm cancellation code, saying an alarmcancellation phrases, etc., the safety alert actuator 204 responds bycausing the one or more output devices to generate a false alarm messageto the recipients of the first message (block 810). In some examples,the safety alert actuator 204 instead (or additionally) responds bycausing the display or speaker of the portable electronic device 120A totransmit a cancellation message instructing the user to contact therecipients of the first message to cancel the safety alert (also atblock 810). If the user indicates that the safety alert is legitimate(block 812), the program ends. In some examples, the user 150A canindicate the alarm was legitimate by entering/speaking a “fake”cancellation code (at the block 812) that will appear to outsiders asauthentic but will in fact indicate that the user is under duress. Inthe event a “fake” cancellation code is detected, the safety alertactuator 204 does not cancel the safety alert and may also cause one ofthe output devices 216 to output a “fake” message indicating the alerthas been canceled. In some such examples, when a “fake” cancellation isdetected, the authorities notified of the actuation of the safety alertmay be further notified that the safety alert is associated with acritically high emergency.

The false alarm evaluator 208 also notifies the past usage historyanalyzer 222 of the actuation of the safety alert and providesinformation regarding whether the safety alert was legitimate or a falsealarm (block 814). The past usage history analyzer 222 uses theinformation to update/fine tune the usage context profiles (also block814). In some examples, if the safety alert is a false alarm and if theusage context profile being used when the false alarm was generated hascaused a threshold number of false alarms in the past, the past usagehistory analyzer 222 may update/fine tune the usage context profile tomake the usage context profile less likely to result in a false alarm.In some such examples, the past usage history analyzer 222 may removeone or more of the abnormal activity usage attributes from the usagecontext profile. As a result of removing the abnormal activity usageattribute from the usage context profile, the abnormal activity usageattribute will instead be treated as a normal usage attribute and, thus,will not result in actuation of a safety alert when detected. In someexamples, the past usage history analyzer 222 can instead revise acriteria associated with an abnormal activity usage attribute in amanner that causes the criteria more difficult to meet.

If the safety alert actuation is not a false alarm, the past usagehistory analyzer 222 records any (and/or all) the information associatedwith the safety alert and further records that the safety alert waslegitimate. In addition, the information regarding the legitimate safetyalert is transmitted to the past usage history analyzer 222 for usage infine-tuning the context profiles, abnormal activity usage attributes,threshold alert levels, etc. (also at block 814). Thereafter the program800 ends.

The program 900 of FIG. 9 begins at block 902 at which the examplesafety monitor 110A determines that the user 150A has caused thethreshold alert level to be overridden and receives input regardingwhether overriding the threshold alert level is to result in a downgradeor an upgrade of the threshold alert level. In some such examples, theuser 150A can cause the threshold alert level to be overridden byselecting or more input devices 214 of the portable electronic device120A and the user 150A can indicate whether the threshold alert level isto be downgraded or upgraded via one or more of the input devices 214.For example, the safety monitor 110A may cause a display and/or aspeaker to present an option to override the threshold alert leveland/or indicate whether an upgraded or downgrade threshold alert levelis to be substituted for the existing threshold alert level. In someexamples, the user's input to change the threshold alert level and theupgrade/downgrade information is provided to the example thresholdoverride device 228. The example threshold override device 228 respondsby causing the example threshold alert level monitor 202 to beginmonitoring a set of abnormal activity usage attributes associated withthe upgraded or downgraded threshold alert level (block 904). In someexamples, the threshold alert level monitor 202 identifies the set ofabnormal activity usage attributes to be monitored by consulting theusage context profile storage 226.

Thereafter, the example threshold alert level monitor 202, upondetecting the abnormal activity usage attribute being monitored and/ordetecting that the abnormal activity usage attribute has reached athreshold value, the example safety alert actuator 204 causes one ormore of the example output devices 216 and/or example communicationdevices 218 to summon assistance on behalf of the user 150A in themanner described above (block 906). Thereafter the program 900 ends.

The program 1000 of FIG. 10 begins at block 1002 at which the remotesafety manager 130 obtains, via the example communication network(s)144, information from the example safety monitor 120A. The obtainedinformation can include current usage attributes detected at the examplesensor(s) 210, past usage history data, usage context profileinformation, device usage information (e.g., contacts information,web-usage history, viewing habits, listening habits, calling habits,texting habits, email usage habits, etc.) The remote safety manager 130also receives information from external data sources 145 (e.g., theexample social medium platforms/services 145A, the example governmentalservices/databases 145B, the example private/commercialservices/databases 145C, the example public services/databases 145D, theexample communication network information centers 145E, etc.) (block1004). In some examples, the example external source data collector 316is responsible for collecting/receiving the external source data via asubscription, an information publishing service, periodic and/oraperiodic queries, etc. In some examples, the example external sourcedata collector 316 of the remote safety manager 130 is equipped withuser login/account information that permits the external source datacollector 316 access to particular ones of the external data sources145. Any of the current usage data analyzer 308, the supplemental pastusage history analyzer 304, the example supplemental usage contexthistory analyzer 330, the external data source analyzer 318, thereal-time event analyzer 320, and/or the usage context profilecollector/analyzer 332 analyze the obtained information. In someexamples, based on the obtained information and/or the analysis of theobtained information, and/or based on a default set of queries, theexample portable device query engine 310 transmits additionalqueries/requests for additional information that may be stored in theportable electronic device 110A and/or entered by the user 150A (block1008). Based on the analyses and the responses to the queries, the usagecontext profile updates/fine-tunes the usage context profiles (block1010). In some examples, the updated/fine-tuned usage context profilesare transmitted by the remote safety manager 130 to the safety monitor110A for storage in the example usage context profile storage 226 (alsoblock 1010).

Referring still to FIG. 10, in some examples, the example remotethreshold alert level monitor 312 analyzes the obtained information toidentify a current monitoring threshold alert level in use at the safetymonitor 110A (block 1012). The remote threshold alert level monitor 312also monitors the current usage attributes to determine whether anyabnormal activity is detected (block 1014). In some examples, inresponse to detecting an abnormal activity, the remote threshold alertlevel monitor 314 adjusts the threshold alert level and/or notifies theremote safety alert actuator 314 that a safety alert is to be actuated,in accordance with the usage context profile currently in use at thesafety monitor 110A (block 1016). In some examples, the remote thresholdalert level monitor 312 detects an abnormal activity and, in response,notifies the example remote threshold alert level adjuster 311. In someexamples, the remote threshold alert level adjuster 311 notifies thepast usage history and data analyzer 222 that the threshold alert levelcurrently in use at the safety monitor 110A should be changed (e.g.,upgraded or downgraded) without delay. In some such examples, the pastusage history and data analyzer 222 causes the threshold alert leveladjuster 221 to change the threshold alert level (or an aspect of thethreshold alert level) currently being used by the threshold alert levelmonitor 202. Thus, the remote safety manager 130 can dynamically adjustthe threshold alert level, the threshold alert level values, theabnormal usage attributes to be monitored, the number of abnormal usageattributes required to actuate a safety alert, etc., in use at thesafety monitor 110A. After the blocks 1010, and 1016, the program 1000returns to the block 1002 to continue updating the usage contextprofiles and to continue performing safety monitoring activities.

The program 1100 of FIG. 11 and the program 1200 of FIG. 12 are intendedto illustrate different ways in which the safety monitoring system 100can respond to detection of a usage attribute that can be (but is notalways) associated with an abnormal condition. Referring to FIG. 11, theprogram 1100 begins at a block 1102 at which the example safety monitor110A (see FIG. 1 and FIG. 2) detects a concussive sound of a decibellevel that is typically associated with detonation of an explosivedevice. Assuming the usage context is such that a concussive alert isevidence of danger to the user (e.g., the user is not at an amusementpark, the concussive sound is not detected on July 4th, etc.), thesafety monitor 110A also generates a safety alert (also block 1102). Inaddition, the safety monitor 110A transmits the current usage attributescorresponding to the detection of the concussive sound, locationinformation and information indicating that a corresponding safety alertwas generated to the remote safety manager 130 (block 1104). The safetymonitor 110A may additionally supply any other information to the remotesafety manager 130. In response to receiving the information from thesafety monitor 110A (block 1106), the remote safety manager 130identifies other portable electronic devices (e.g., the second portableelectronic device 120B, the third portable electronic device 120C)located near the first portable electronic device 110A (block 1108). Insome examples, other portable electronic devices near the first portableelectronic device can include other portable electronic devices at asame location as the first portable electronic device, within athreshold distance of the first portable electronic device, at a samevenue as the first portable electronic device, within a same building,etc. If the nearby portable electronic devices (e.g., the secondportable electronic device 120B, the third portable electronic device120C) have not generated a safety alert, the remote safety manager 130may attempt to query the second and third safety monitors 110B, 110C todetermine whether the corresponding users 150B, 150C are affected by theexplosion and require assistance. If the corresponding first and secondusers 150B, 150C respond in the affirmative or do not respond at all dueto, for example, a loss of connectivity, the remote safety manager 130actuates safety alerts on behalf of the second and third users (block1110), and the program 1100 ends.

Referring to FIG. 12, the program 1200 begins at a block 1202 at whichthe example safety monitor 110A (see FIG. 1 and FIG. 2) detects aconcussive sound of a decibel level that is typically associated withdetonation of an explosive device. Assuming the usage context is suchthat a concussive alert can be (but is not necessarily) evidence ofdanger to the user 150A (e.g., the user is at an entertainment venue),the safety monitor 110A initially generates a safety alert. In addition,the safety monitor 110A transmits the current usage attributescorresponding to the detection of the concussive sound, locationinformation, and information indicating that a corresponding safetyalert was generated to the remote safety manager 130 (block 1204). Thesafety monitor 110A may additionally supply any other information to theremote safety manager 130. In response to receiving the information fromthe safety monitor 110A ((block 1206), the remote safety manager 130identifies other portable electronic devices (e.g., the second portableelectronic device 120B, the third portable electronic device 120C)located near the first portable electronic device 110A (block 1208). Inaddition, the remote safety manager 130 searches the external datasources 145 for contextual information that might explain the concussivesound (block 1210). In some examples, the safety manager 130 determines,when searching, that one or more of the nearby users has posted evidenceonline (e.g., Facebook, snapchat, Instagram) that they are witnessing afireworks display. In some examples, the remote safety manager 130determines that a venue at which the users are located is hosting a rockband that uses pyrotechnics. In some such examples, the remote safetymanager 130 may query the users via the portable electronic devices120B, 120C to confirm that the concussive sound is benign (also block1210). Depending on the type of contextual information received inresponse to the searching and querying, the remote safety manager 130actuates a safety alert for the second and third safety monitors 110B,110C or cancels the safety alert generated by the first safety monitor110A (block 1212). Thereafter the program ends.

As described above, the safety system 100 of FIGS. 1-3 monitor can beused to monitor the health and safety of a user. In some examples, thesafety system 100 can further be used by a parent to track children and,when the system detects that a child is in distress, outside of adefined boundary and/or otherwise in need of assistance, the either thechild or parent may then actuate a safety alert. Further, the safetysystem 100 may be used in the entertainment industry to gauge thereaction of an audience to a horror movie, for example. The system cantrack of audience members physical responses to the movie and detectedcues that indicate the user if frightened (e.g., the user gripped an armof a chair, the user jumped, the user screamed, etc.). The system canalso be used in a large lecture room to track the response of studentsduring a lecture. If the system determines that an audience member hasnot engaged/alert, the system can alert the lecturer who can choose towake them up by sending a notification. Other such exampleimplementations will be apparent to one of ordinary skill in the art.

FIG. 13 is a block diagram of an example processor platform 1300 capableof executing the instructions of FIGS. 3-9, 11, and 12 to implement anyof the example first, second and third safety monitors 110A of FIGS. 1and 2. The processor platform 1300 can be, for example, a server, apersonal computer, a mobile device (e.g., a cell phone, a smart phone, atablet such as an iPad™), a personal digital assistant (PDA), anInternet appliance, or any other type of computing device.

The processor platform 1300 of the illustrated example includes aprocessor 1312. The processor 1312 of the illustrated example ishardware. For example, the processor 1312 can be implemented by one ormore integrated circuits, logic circuits, microprocessors or controllersfrom any desired family or manufacturer. The hardware processor may be asemiconductor based (e.g., silicon based) device. In this example, theprocessor implements the example current usage detector 220, the examplethreshold alert level adjuster 221, the example past history usageanalyzer 222, the example threshold alert level monitor 202, the examplesafety alert actuator 204, the example false alarm evaluator 208, theexample threshold override device 228, the example communicationcontroller 219, and the example usage context generator 206.

The processor 1312 of the illustrated example includes a local memory1313 (e.g., a cache). The processor 1312 of the illustrated example isin communication with a main memory including a volatile memory 1314 anda non-volatile memory 1316 via a bus 1318. The volatile memory 1314 maybe implemented by Synchronous Dynamic Random Access Memory (SDRAM),Dynamic Random Access Memory (DRAM), RAMBUS Dynamic Random Access Memory(RDRAM) and/or any other type of random access memory device. Thenon-volatile memory 1316 may be implemented by flash memory and/or anyother desired type of memory device. Access to the main memory 1314,1316 is controlled by a memory controller. The example main memory 1314,1316 implements the example usage context profile storage 226.

The processor platform 1300 of the illustrated example also includes aninterface circuit 1320. The interface circuit 1320 may be implemented byany type of interface standard, such as an Ethernet interface, auniversal serial bus (USB), and/or a PCI express interface. In thisexample, the interface circuit 1320 implements the example firstinterface bus 230.

In the illustrated example, one or more input devices 1322 are connectedto the interface circuit 1320. The input device(s) 1322 permit(s) a userto enter data and/or commands into the processor 1312 and further permitdata to be sensed. The input device(s) can be implemented by, forexample, an audio sensor, a microphone, a camera (still or video), akeyboard, a button, a mouse, a touchscreen, a track-pad, a trackball,isopoint and/or a voice recognition system. The input device(s) 1332implements the example user input devices 214 and the example sensor(s)210.

One or more output device(s) 1324 are also connected to the interfacecircuit 1320 of the illustrated example. The output device(s) 1324 canbe implemented, for example, by display devices (e.g., a light emittingdiode (LED), an organic light emitting diode (OLED), a liquid crystaldisplay, a cathode ray tube display (CRT), a touchscreen, a tactileoutput device, a printer and/or speakers). The interface circuit 1320 ofthe illustrated example, thus, typically includes a graphics drivercard, a graphics driver chip and/or a graphics driver processor. Theoutput device(s) 1324 implement the example output devices 216.

The interface circuit 1320 of the illustrated example also includes acommunication device such as a transmitter, a receiver, a transceiver, amodem and/or network interface card to facilitate exchange of data withexternal machines (e.g., computing devices of any kind) via a network1326 (e.g., an Ethernet connection, a digital subscriber line (DSL), atelephone line, coaxial cable, a cellular telephone system, etc.). Theinterface circuit 1320 implements the example communication devices 218.

The processor platform 1300 of the illustrated example also includes oneor more mass storage devices 1328 for storing software and/or data.Examples of such mass storage devices 1328 include floppy disk drives,hard drive disks, compact disk drives, Blu-ray disk drives, RAIDsystems, and digital versatile disk (DVD) drives. The mass storagedevice(s) 1328 can implement the usage context profile storage 226.

The coded instructions 1332 of FIGS. 3-9, 11 and 12 may be stored in themass storage device 1328, in the volatile memory 1314, in thenon-volatile memory 1316, and/or on a removable tangible computerreadable storage medium such as a CD or DVD.

FIG. 14 is a block diagram of an example processor platform 1400 capableof executing the instructions of FIGS. 5, 7, 10, 11, and 12 to implementthe example remote safety manager 130 of FIGS. 1 and 3. The processorplatform 1400 can be, for example, a server, a personal computer, amobile device (e.g., a cell phone, a smart phone, a tablet such as aniPad), a personal digital assistant (PDA), an Internet appliance, or anyother type of computing device.

The processor platform 1400 of the illustrated example includes aprocessor 1412. The processor 1412 of the illustrated example ishardware. For example, the processor 1412 can be implemented by one ormore integrated circuits, logic circuits, microprocessors or controllersfrom any desired family or manufacturer. The hardware processor may be asemiconductor based (e.g., silicon based) device. In this example, theprocessor implements the example past usage history collector 302, theexample supplemental past usage history analyzer 304, the examplecurrent usage data collector 306, the example current usage dataanalyzer 308, the example portable device query engine 310, the exampleremote threshold alert level adjuster 311, the example remote thresholdalert level monitor 312, the example remote safety alert actuator 314,the example external source data collector 316, the example externaldata source analyzer 318, the example real-time event analyzer 320, theexample assistance request manager 322, the example communicationnetwork data collector 324, the example communication controller 326,the example context usage history collector 328, the examplesupplemental context usage history analyzer 330, the example usagecontext profile collector/analyzer 332.

The processor 1412 of the illustrated example includes a local memory1413 (e.g., a cache). The processor 1412 of the illustrated example isin communication with a main memory including a volatile memory 1414 anda non-volatile memory 1416 via a bus 1418. The volatile memory 1414 maybe implemented by Synchronous Dynamic Random Access Memory (SDRAM),Dynamic Random Access Memory (DRAM), RAMBUS Dynamic Random Access Memory(RDRAM) and/or any other type of random access memory device. Thenon-volatile memory 1416 may be implemented by flash memory and/or anyother desired type of memory device. Access to the main memory 1414,1416 is controlled by a memory controller. In this example, the mainmemory 1414, 1416 implements the storage(s) 334.

The processor platform 1400 of the illustrated example also includes aninterface circuit 1420. The interface circuit 1420 may be implemented byany type of interface standard, such as an Ethernet interface, auniversal serial bus (USB), and/or a PCI express interface. Theinterface circuit 1420 implements the example second interface bus 336.

In the illustrated example, one or more input devices 1422 are connectedto the interface circuit 1420. The input device(s) 1422 permit(s) a userto enter data and/or commands into the processor 1412. The inputdevice(s) can be implemented by, for example, an audio sensor, amicrophone, a camera (still or video), a keyboard, a button, a mouse, atouchscreen, a track-pad, a trackball, isopoint and/or a voicerecognition system. In this example, the input device(s) 1422 canimplement any of a set of input devices that can be added to the remotesafety manager 130 to permit system configuration, data entry, systemmaintenance, system control, etc.

One or more output devices 1424 are also connected to the interfacecircuit 1420 of the illustrated example. The output devices 1424 can beimplemented, for example, by display devices (e.g., a light emittingdiode (LED), an organic light emitting diode (OLED), a liquid crystaldisplay, a cathode ray tube display (CRT), a touchscreen, a tactileoutput device, a printer and/or speakers). The interface circuit 1420 ofthe illustrated example, thus, typically includes a graphics drivercard, a graphics driver chip and/or a graphics driver processor.

The interface circuit 1420 of the illustrated example also includes acommunication device such as a transmitter, a receiver, a transceiver, amodem and/or network interface card to facilitate exchange of data withexternal machines (e.g., computing devices of any kind) via a network1426 (e.g., an Ethernet connection, a digital subscriber line (DSL), atelephone line, coaxial cable, a cellular telephone system, etc.). Inthis example, the interface circuit 1420 implements the examplecommunication controller 326.

The processor platform 1400 of the illustrated example also includes oneor more mass storage devices 1428 for storing software and/or data.Examples of such mass storage devices 1428 include floppy disk drives,hard drive disks, compact disk drives, Blu-ray disk drives, RAIDsystems, and digital versatile disk (DVD) drives. In this example, themass storage device(s) 1428 implement the example storage(s) 334.

The coded instructions 1432 of FIGS. 5, 7, 10, 11, and 12 may be storedin the mass storage device 1428, in the volatile memory 1414, in thenon-volatile memory 1416, and/or on a removable tangible computerreadable storage medium such as a CD or DVD.

From the foregoing, it will be appreciated that example methods,apparatus and articles of manufacture have been disclosed thatautomatically summon assistance on behalf of a user when an abnormalactivity associated with a threat to the safety and/or health of theuser has been detected. Further, the disclosed methods, apparatus andarticles of manufacture include machine learning technology that learnsone or more routines of the user 150A and uses the learned routineinformation to better define the activities considered to be abnormaland to limit the detection of false alarms. Thus, the methods, apparatusand articles of manufacture disclosed herein, by eliminating the needfor a user of a portable electronic device to take manual action tosummon assistance, thereby enhancing the user's ability to obtainassistance when needed.

The following further examples are disclosed herein.

Example 1 is a safety monitor for use in a portable electronic device.The safety monitor of example 1 includes a usage context analyzer todetermine a usage context in which the portable electronic device isused, the usage context determined based on a history of past usageinformation; a current usage detector to determine whether the portableelectronic device is being used in the usage context at a current time,and, when the portable electronic device is determined to be used in theusage context at the current time, obtain a threshold alert levelcorresponding to the usage context, the threshold alert level indicatinga degree of danger to which a user of the portable electronic device isexposed; a threshold alert level monitor to determine whether thethreshold alert level has been satisfied; and a safety alert actuator toactuate an output device of the portable electronic device when thethreshold alert level is determined to be satisfied

Example 2 includes the subject matter of Example 1, wherein theactuation of the output device includes causing the output device tonotify a third party that the user requires assistance.

Example 3 includes the subject matter of Example 1, wherein the usagecontext analyzer is further to identify a daily routine of the user, theusage context analyzer to use the daily routine to determine the usagecontext.

Example 4 includes the subject matter of Example 1 or example 3, whereinthe usage context analyzer is to generate a usage context profilecorresponding to the usage context, the usage context profile includingthe threshold alert level, a set of first usage attributes and a set ofsecond usage attributes.

Example 5 includes the subject matter of Example 4, wherein the currentusage detector is to determine the portable electronic device is beingused in the usage context by monitoring information associated with theportable electronic device to identify current usage attributes, anddetermining whether a threshold number of the current usage attributesare included among the first usage attributes.

Example 6 includes the subject matter of Example 4, wherein the secondusage attributes, when detected, indicate that the portable electronicdevice is experiencing abnormal activity, the abnormal activity beingassociated with potential threat to the user.

Example 7 includes the subject matter of Example 6, wherein the abnormalactivity includes the portable electronic device being one of dropped orthrown, and a corresponding one of the second attributes is obtainedbased on information supplied by a motion detector of the portableelectronic device.

Example 8 includes the subject matter of Example 6, wherein the abnormalactivity includes being gripped by the user with more than a thresholdamount of force, and a corresponding one of the second attributes isobtained based on information supplied by a pressure sensor.

Example 9 includes the subject matter of Example 8, wherein the pressuresensor is carried by a carrying case, the carrying case is in physicalcontact with the portable electronic device, and the pressure sensorcommunicates information to the portable electronic device for usage bythe threshold alert level monitor.

Example 10 includes the subject matter of Example 1, wherein the usagecontext is further determined based on data received from a remotesafety manager, the data including information regarding a region withinwhich the portable electronic device is currently located.

Example 11 includes the subject matter of Example 1, wherein the usagecontext is further determined based on data received from a remotesafety manager, the data including information regarding environmentalfactors of a region within which the portable electronic device iscurrently located.

Example 12 includes the subject matter of any of Examples 1, 10 or 11,wherein the portable electronic device includes a transmitter, thetransmitter to transmit past usage history collected at the portableelectronic device to a remote processor, the remote processor to analyzethe information to revise the usage context based on informationobtained from one of a public, private and governmental informationservice.

Example 13 includes the subject matter of Example 1, wherein thethreshold alert is a first threshold alert level and the safety monitorfurther includes a threshold alert level override, the threshold alertlevel override to cause the threshold alert level monitor to replace thefirst threshold alert level with a second threshold alert level based ona user input.

Example 14 includes one or more non-transitory machine-readable storagemedia including machine-readable instructions that, when executed, causeat least one processor of a portable electronic device to at least:determine a usage context in which the portable electronic device isused, the usage context determined based on a history of past usageinformation; determine whether the portable electronic device is beingused in the usage context at a current time, and, when the portableelectronic device is determined to be used in the usage context at thecurrent time, obtain a threshold alert level corresponding to the usagecontext, the threshold alert level indicating a level of danger to whicha user of the portable electronic device is exposed; determine whetherthe threshold alert level has been satisfied; and actuate an outputdevice when the threshold alert level is determined to be satisfied.

Example 15 includes the subject matter of Example 14, wherein theactuation of the output device includes causing the output device totransmit a message to a third party, the message to request assistancefrom the third party.

Example 16 includes the subject matter of Example 14, and furtherincludes instructions to cause the at least one processor to identify adaily routine of the user, the usage context analyzer to use the dailyroutine to determine the usage context.

Example 17 includes the subject matter of Example 14 or example 16, andfurther includes instructions to cause the at least one processor togenerate a usage context profile corresponding to the usage context, theusage context profile including the threshold alert level, a set offirst usage attributes, and a set of second usage attributes.

Example 18 includes the subject matter of Example 17, and furtherincludes instructions to cause the at least one processor to determinethe portable electronic device is being used in the usage context bymonitoring information associated with the portable electronic device toidentify current usage attributes, and determining whether a thresholdnumber of the current usage attributes are included among the firstusage attributes.

Example 19 includes the subject matter of Example 17, wherein the secondusage attributes, when detected, indicate that the portable electronicdevice is experiencing abnormal activity.

Example 20 includes the subject matter of Example 19, wherein theabnormal activity includes the portable electronic device being one ofdropped or thrown, and a corresponding one of the second attributes isobtained based on information supplied by a motion detector of theportable electronic device.

Example 21 includes the subject matter of Example 20, wherein theabnormal activity includes being gripped by the user with more than athreshold amount of force, and a corresponding one of the secondattributes is obtained based on information supplied by a pressuresensor.

Example 22 includes the subject matter of Example 21, wherein thepressure sensor is in a carrying case, the carrying case is in physicalcontact with the portable electronic device, and the pressure sensorcommunicates information to the at least one processor for usage inmonitoring the threshold alert level.

Example 23 includes the subject matter of Example 14, wherein the usagecontext is further determined based on data received from a remotesafety manager, the data including information provided by policeregarding a region within which the portable electronic device iscurrently located.

Example 24 includes the subject matter of Example 14, wherein the usagecontext is further determined based on data received from a remotesafety manager, the data including information regarding environmentalfactors of a region within which the portable electronic device iscurrently located.

Example 25 includes the subject matter of any one of Examples 14, 23 or24, wherein the instructions further cause the at least one processor tocause a transmitter to transmit past usage history to a remoteprocessor, the remote processor to analyze the information to revise theusage context based on information obtained from one of a public,private and governmental information service.

Example 26 includes the subject matter of Example 14, wherein thethreshold alert is a first threshold alert level and the instructionsfurther cause the at least one processor to respond to a user input byoverriding the threshold alert level and monitoring a second thresholdalert level instead of the first threshold alert level.

Example 27 is a method to summon assistance for a user of a portableelectronic device. The method of Example 27 includes: determining, byexecuting an instruction with at least one processor, a usage context inwhich the portable electronic device is used, the usage contextdetermined based on a history of past usage information; determining, byexecuting an instruction with at least one processor, whether theportable electronic device is being used in the usage context at acurrent time, and, when the portable electronic device is determined tobe used in the usage context at the current time, obtaining a thresholdalert level corresponding to the usage context, the threshold alertlevel indicating a level of danger to which a user of the portableelectronic device is exposed; determining, by executing an instructionwith at least one processor, whether the threshold alert level has beensatisfied; and when the threshold alert level is determined to besatisfied, actuating an output device to transmit a message to a thirdparty, the message to request the assistance of the third party onbehalf of the user.

Example 28 includes the subject matter of Example 27, and furtherincludes identifying a daily routine of the user, and using the dailyroutine to determine the usage context.

Example 29 includes the subject matter of any of Example 27 and 28, andfurther includes generating a usage context profile corresponding to theusage context, the usage context profile including the threshold alertlevel, a set of first usage attributes and a set of second usageattributes.

Example 30 includes the subject matter of Example 29, wherein thedetermining that the portable electronic device is being used in theusage context includes monitoring information associated with theportable electronic device to identify current usage attributes, anddetermining whether a threshold number of the current usage attributesare included among the set of first usage attributes.

Example 31 includes the subject matter of Example 29, and furtherincludes detecting the second usage attributes based on informationsupplied by the portable electronic device, the second usage attributesindicating that the portable electronic device is experiencing abnormalactivity, the abnormal activity being associated with potential threatto at least one of the safety and health of the user.

Example 32 includes the subject matter of Example 31, wherein theabnormal activity includes the portable electronic device being one ofdropped or thrown, and a corresponding one of the second attributes isobtained based on information supplied by a motion detector of theportable electronic device.

Example 33 includes the subject matter of Example 31, wherein theabnormal activity includes being gripped by the user with more than athreshold amount of force, and a corresponding one of the secondattributes is obtained based on information supplied by a pressuresensor.

Example 34 includes the subject matter of Example 33, wherein thepressure sensor is in a carrying case, the carrying case is in physicalcontact with the portable electronic device, and the pressure sensorcommunicates information to the portable electronic device for usage bythe threshold alert level monitor.

Example 35 is an apparatus including the at least one processor toimplement the method of any one of Examples 27 to 34.

Example 36 is a non-transitory machine-readable storage media includingmachine-readable instructions that, when executed by the at leastprocessor, cause the least one processor to implement the method of anyone of Examples 27 to 34.

Example 37 is an apparatus to summon assistance for a user of a portableelectronic device. The apparatus of Example 37 includes: means fordetermining a usage context in which the portable electronic device isused, the usage context determined based on a history of past usageinformation; means for determining whether the portable electronicdevice is being used in the usage context at a current time; means forobtaining a threshold alert level corresponding to the usage contextwhen the portable electronic device is determined to be used in theusage context at the current time, the threshold alert level indicatinga level of danger to which a user of the portable electronic device isexposed; means for determining whether the threshold alert level hasbeen satisfied; and means for actuating an output device to transmit amessage to a third party when the threshold alert level is determined tobe satisfied, the message to request the assistance of the third partyon behalf of the user.

Example 38 includes the subject matter of Example 37, and furtherincludes means for identifying a daily routine of the user, and usingthe daily routine to determine the usage context.

Example 39 includes the subject matter of any of Examples 37 and 38, andfurther includes means for generating a usage context profilecorresponding to the usage context, the usage context profile includingthe threshold alert level, a set of first usage attributes and a set ofsecond usage attributes.

Example 40 includes the subject matter of Example 39, wherein the meansfor determining whether the portable electronic device is being used inthe usage context include means for monitoring information associatedwith the portable electronic device to identify current usageattributes, and means for determining whether a threshold number of thecurrent usage attributes are included among the set of first usageattributes.

Example 41 includes the subject matter of Example 39, and furtherincludes means for detecting the second usage attributes based oninformation supplied by the portable electronic device, the second usageattributes indicating that the portable electronic device isexperiencing abnormal activity, the abnormal activity being associatedwith potential threat to at least one of the safety and health of theuser.

Example 42 includes the subject matter of Example 41, wherein theabnormal activity includes the portable electronic device being one ofdropped or thrown, and a corresponding one of the second attributes isobtained based on information supplied by a motion detector of theportable electronic device.

Example 43 includes the subject matter of Example 41, wherein theabnormal activity includes being gripped by the user with more than athreshold amount of force, and a corresponding one of the secondattributes is obtained based on information supplied by a pressuresensor.

Example 44 includes the subject matter of Example 43, wherein thepressure sensor is in a carrying case, the carrying case is in physicalcontact with the portable electronic device, and the pressure sensorcommunicates information to the portable electronic device for usage bythe threshold alert level monitor.

Example 45 is a safety manager to manage a safety monitor of a remoteportable electronic device and includes a usage context analyzer todetermine a usage context in which the remote portable electronic deviceis used. The usage context is determined based on a history of pastusage information received from the safety monitor. The safety manageralso includes a current usage data analyzer to determine whether theremote portable electronic device is being used in the usage context ata current time, and, when the remote portable electronic device isdetermined to be used in the usage context at the current time, obtain athreshold alert level corresponding to the usage context. The thresholdalert level indicates a degree of danger to which a user of the remoteportable electronic device is exposed. The safety manager furtherincludes a threshold alert level monitor to monitor the threshold alertlevel, and, based on the monitoring of the threshold alert level,determine whether the threshold alert level has been satisfied.Additionally, the safety manager includes a safety alert that, when thethreshold alert level is determined to be satisfied, actuates a safetyalert. The safety alert includes at least one of notifying a third partythat the user is in need of assistance and causing the safety monitor tonotify the third party that the user is in need of assistance.

Example 46 includes the subject matter of Example 45. In Example 46, thenotifying of the third party includes transmitting a location of theremote portable electronic device to the third party.

Example 47 includes the subject matter of Example 45 and furtherincludes a past usage history analyzer to analyze the history of pastusage information, and at least one of the past usage history analyzer,the usage context analyzer and the current usage data analyzergenerates, based on at least one of the current usage data, the historyof past usage information, and external source data, a usage contextprofile corresponding to the usage context. The usage context profileincludes the threshold alert level, and a usage attribute. The usageattribute corresponds to sensor information collected at the remoteportable electronic device, and the threshold alert level monitormonitors the threshold alert level by monitoring the sensor information.

Example 48 includes the subject matter of Example 45, wherein the sensorinformation identifies a sensor threshold value and the threshold alertlevel is determined to be satisfied when the sensor threshold value issatisfied.

Example 49 includes the subject matter of any of Examples 45-48, whereinthe safety manager supplies the threshold alert level to the safetymonitor for use in monitoring the sensor information. In Example 49, theat least one of the past usage history analyzer, the usage contextanalyzer, and the current usage data analyzer generate a revisedthreshold alert level based on at least one of the current usage data,the history of past usage information, and external source data, and thesafety manager supplies the revised threshold alert level to the safetymonitor for use in monitoring the sensor information.

Example 50includes the subject matter of Example 47, wherein the usageattribute is a first usage attribute, the sensor information is firstsensor information, and the usage context profile further includes asecond usage attribute corresponding to second sensor informationcollected at the remote portable electronic device. In Example 50, thecurrent usage data analyzer determines whether the remote portableelectronic device is being used in the usage context at the current timeby monitoring the second sensor information.

Example 51 includes the subject matter of any of Examples 45-46. InExample 51, the current usage data analyzer determines whether theremote portable electronic device is being used in the usage context bymonitoring sensor information collected at the remote portableelectronic device and by determining, based on the monitoring of thesensor information, whether the sensor information corresponds to athreshold number of current usage attributes associated with the usagecontext.

Example 52 includes the subject matter of any of Examples 45-48. Example52 further includes an external source data collector to collectexternal source data from a plurality of external data sources. Theexternal data sources are remote from the safety manager and include atleast one of a social media service, a telecommunication network controlcenter, a governmental law enforcement entity, a private securityentity, and a commercial enterprise. Example 52 also includes anexternal data source analyzer to analyze the external source data andrevise the threshold alert level based on the external source data.

Example 53 includes the subject matter of any of Examples 45-48. InExample 53, the threshold alert level is a first threshold alert level,and the safety manager further includes a threshold alert leveladjuster. The threshold alert level adjuster replaces the firstthreshold alert level with a second threshold alert level in response toat least one of sensed information collected at the remote portableelectronic device, and external source data from an external datasource.

Example 54 includes the subject matter of Example 53. In Example 54, thesecond threshold alert level is associated with a higher degree ofdanger than the first threshold alert level, and the second thresholdalert level is associated with a lower threshold that the firstthreshold alert level.

Example 55 includes the subject matter of any of Examples 45-48. InExample 55, the current usage data analyzer causes the threshold alertlevel to be stored at the remote safety monitor, and the safety managerfurther includes a threshold alert level adjuster that revises thethreshold alert level stored at the remote safety monitor in response toat least one of sensed information collected at the remote portableelectronic device, and external source data from an external datasource.

Example 56 includes the subject matter of any of Examples 45-48, whereinthe safety alert actuator is further to actuate an output device of theremote portable electronic device when the threshold alert level isdetermined to be satisfied.

Example 57 includes the subject matter of Example 56. In Example 57, theremote portable electronic device is a first remote portable electronicdevice, the output device is a first output device, and the safety alertactuator actuates a second output device of a second remote portableelectronic device located within a threshold distance of the firstremote portable electronic device when the threshold alert level isdetermined to be satisfied.

Example 58 includes the subject matter of any of Examples 45-48. InExample 58, the safety manager further includes an assistance requestmanager to request control of a remote surveillance device when theremote portable electronic device comes within a threshold distance ofthe remote surveillance device.

Example 59 includes the subject matter of any of Examples 45-48. InExample 59, the safety alert actuator controls a remote surveillancedevice located within a threshold distance of the remote portableelectronic device when the threshold alert level is determined to besatisfied.

Example 60 includes the subject matter of any of Examples 45-48, whereinthe safety alert actuator is further to actuate an audio emitting devicelocated within a threshold distance of the remote portable electronicdevice when the threshold alert level is determined to be satisfied.

Example 61 includes one or more non-transitory machine-readable storagemedia having machine-readable instructions that, when executed, cause atleast one processor to at least identify a threshold alert levelcorresponding to a context in which a remote portable electronic deviceis being used. The threshold alert level indicates a degree of danger towhich a user of the remote portable electronic device is exposed and theremote portable electronic device is remote from the at least oneprocessor. The instructions further cause the at least one processor todetermine whether the threshold alert level is satisfied, and, based onwhether the threshold alert level is satisfied, notify a third partythat the user of the remote portable electronic device is in need ofassistance.

Example 62 includes the subject matter of Example 61. In Example 62, theinstructions further cause the at least one processor to analyze atleast one of usage data collected at the remote portable electronicdevice, and external source data to generate a usage context profilecorresponding to the context in which the remote portable electronicdevice is being used. The usage context profile includes the thresholdalert level, and sensor information corresponding to the threshold alertlevel.

Example 63 includes the subject matter of Example 61. In Example 63, thesensor information includes a sensor threshold value and the thresholdalert level is determined to be satisfied when the sensor thresholdvalue is satisfied.

Example 64 includes the subject matter of Example 61. In Example 64, theinstructions further cause the at least one processor to supply thethreshold alert level to a safety monitor of the remote portableelectronic device for use in determining when the sensor threshold valueis satisfied.

Example 65 includes the subject matter of any of Examples 61-64. InExample 65, the instructions further cause the at least one processor togenerate the threshold alert level based on an analysis of usage dataassociated with usage of the remote portable electronic device.

Example 66 includes the subject matter of any of Examples 61-64. InExample 66, the instructions further cause the at least one processor togenerate an upgraded threshold alert level based on external source datacorresponding to an event occurring within a threshold distance of theremote portable electronic device.

Example 67 includes the subject matter of Example 66. In Example 67, theremote portable electronic device is a first remote portable electronicdevice, and the external source data is supplied by a second remoteportable electronic device located within a threshold distance of thefirst remote portable electronic device.

Example 68 includes the subject matter of any of Examples 61-64. InExample 68, the instructions further cause the at least one processor toanalyze external source data collected from a plurality of external datasources, the external data sources including at least one of a socialmedia service, a telecommunication network control center, agovernmental law enforcement entity, and a private security entity, andadjust the threshold alert level based on the external source data.

Example 69 includes the subject matter of any of Examples 61-64. InExample 69, the instructions further cause the at least one processor toidentify the threshold alert level corresponding to the context byaccessing a usage context profile. The usage context profile includesthe threshold alert level and a set of usage attributes. The usageattributes, when detected, indicate the remote portable electronicdevice is being used in the context.

Example 70 includes the subject matter of Example 69. In Example 69, theinstructions further cause the at least one processor to determine thecontext in which the remote portable electronic device is being used bymonitoring a set of sensors associated with the usage attributes.

Example 71 includes the subject matter of any of Examples 61-64. InExample 71, the instructions further cause the at least one processor toadjust the threshold alert level in response to at least one of sensedinformation collected at the remote portable electronic device, andexternal source data from an external data source. At least one of thesensed information and the external source data indicate the degree ofdanger to which the user is exposed has changed.

Example 72 includes the subject matter of Example 71. In Example 71, theadjusting of the threshold alert level includes lowering the thresholdalert level when the degree of danger has increased and raising thethreshold alert level when the degree of danged has decreased.

Example 73 includes the subject matter of any of Examples 61-64. InExample 73, the instructions further cause the at least one processor toactuate an output device of the remote portable electronic device whenthe threshold alert level is determined to be satisfied.

Example 74 includes the subject matter of Example 73. In Example 74, theremote portable electronic device is a first remote portable electronicdevice, the output device is a first output device, and the instructionsfurther cause the at least one processor to actuate a second outputdevice of a second remote portable electronic device. The second remoteportable electronic device is located within a threshold distance of thefirst remote portable electronic device when the threshold alert levelis determined to be satisfied.

Example 75 includes the subject matter of any of Examples 61-64. InExample 75, the instructions further cause the at least one processor torequest control of a remote surveillance device when the remote portableelectronic device comes within a threshold distance of the remotesurveillance device.

Example 76 includes the subject matter of any of Examples 61-64. InExample 76, the instructions further cause the at least one processor tocontrol a remote surveillance device located within a threshold distanceof the remote portable electronic device when the threshold alert levelis determined to be satisfied.

Example 77 includes the subject matter of Example 61-64. In Example 77,the instructions further cause the at least one processor to actuate anaudio emitting device located within a threshold distance of the remoteportable electronic device when the threshold alert level is determinedto be satisfied.

Example 78 is a method to monitor the safety of a user of a remoteportable electronic device. The method of Example 78 includesidentifying a threshold alert level corresponding to a context in whicha remote portable electronic device is being used. The threshold alertlevel indicates a degree of danger to which a user of the remoteportable electronic device is exposed. The method also includesdetermining whether the threshold alert level is satisfied, and, basedon whether the threshold alert level is satisfied, notifying a thirdparty that the user of the remote portable electronic device is in needof assistance.

Example 79 includes the subject matter of Example 78. The method ofExample 79 further includes generating a usage context profile based onan analysis of at least one of usage data collected at the remoteportable electronic device, and external source data. The usage contextprofile corresponds to the context in which the remote portableelectronic device is being used, and includes the threshold alert level,and sensor information corresponding to the threshold alert level.

Example 80 includes the subject matter of Example 79. In Example 80, thesensor information includes a sensor threshold value and the thresholdalert level is determined to be satisfied when the sensor thresholdvalue is satisfied.

Example 81 includes the subject matter of Example 80. The method ofExample 81 includes supplying the threshold alert level to the remoteportable electronic device for use in monitoring a sensor to determinewhen the sensor threshold value is satisfied.

Example 82 includes the subject matter of any of Examples 78-81. Themethod of Example 82 includes generating the threshold alert level basedon an analysis of usage data associated with usage of the remoteportable electronic device.

Example 83 includes the subject matter of any of Examples 78-81. Themethod of Example 83 includes generating an upgraded threshold alertlevel based on external source data corresponding to an event occurringwithin a threshold distance of the remote portable electronic device.

Example 84 includes the subject matter of Example 83. In the method ofExample 84, the remote portable electronic device is a first remoteportable electronic device, and the external source data is supplied bya second remote portable electronic device located within a thresholddistance of the first remote portable electronic device.

Example 85 includes the subject matter of any of Examples 78-81. Themethod of Example 85 further includes analyzing external source datacollected from a plurality of external data sources, the external datasources including at least one of a social media service, atelecommunication network control center, a governmental law enforcemententity, a private security entity, and a commercial enterprise, and alsoincludes adjusting the threshold alert level based on the externalsource data.

Example 86 includes the subject matter of any of Examples 78-81. Themethod of Example 86 also includes identifying the threshold alert levelcorresponding to the context by accessing a usage context profile. Theusage context profile includes a set of usage attributes that, whendetected, indicate the remote portable electronic device is being usedin the context.

Example 87 includes the subject matter of Example 86. The method ofExample 86 further includes determining the context in which the remoteportable electronic device is being used by monitoring a set of sensorsassociated with the usage attributes.

Example 88 includes the subject matter of Example 85. In the method ofExample 88, the adjusting of the threshold alert level occurs inresponse to sensed information collected at the remote portableelectronic device, and the external source data from the external datasource. At least one of the sensed information and the external sourcedata indicates that the degree of danger to which the user is exposedhas changed.

Example 89 includes the subject matter of any of Examples 85 and 88. Inthe method of Example 89, the adjusting of the threshold alert levelincludes lowering the threshold alert level when the degree of dangerhas increased and raising the threshold alert level when the degree ofdanged has decreased.

Example 90 includes the subject matter of any of Examples 78-81. Themethod of Example 90 further includes, when the threshold alert level isdetermined to be satisfied, actuating an output device of the remoteportable electronic device.

Example 91 includes the subject matter of Examples 90. In the method ofExample 91, the remote portable electronic device is a first remoteportable electronic device, the output device is a first output device,and the method further includes, when the threshold alert level isdetermined to be satisfied, actuating a second output device of a secondremote portable electronic device. The second remote portable electronicdevice is located within a threshold distance of the first remoteportable electronic device when the threshold alert level is determinedto be satisfied.

Example 92 includes the subject matter of any of Examples 78-81. Themethod of Example 92 further includes requesting control of a remotesurveillance device when the remote portable electronic device comeswithin a threshold distance of the remote surveillance device.

Example 93 includes the subject matter of any of Examples 78-81. Themethod of Example 93 further includes, when the threshold alert level isdetermined to be satisfied, controlling a remote surveillance device.The remote surveillance device is located within a threshold distance ofthe remote portable electronic device when the threshold alert level isdetermined to be satisfied.

Example 94 includes the subject matter of any of Examples 78-81. Themethod of Example 94 further includes, when the threshold alert level isdetermined to be satisfied, actuating an audio emitting device. Theaudio emitting device is located within a threshold distance of theremote portable electronic device when the threshold alert level isdetermined to be satisfied.

Example 95 is a machine readable medium including code, when executed tocause a machine to perform the method of any one of Examples 78-94.

Example 96 is an apparatus comprising means to perform the method of anyof Examples 78-94.

Example 97 is a machine readable storage including machine readableinstructions. The instructions, when executed, implement the method ofany of Examples 78-94 or realize the apparatus of any of Examples 45-60.

Example 98 is a safety monitor to monitor the safety of a user of aremote portable electronic device. The safety monitor of Example 98includes means to determine a usage context in which the remote portableelectronic device is used. The usage context is determined based on ahistory of past usage information received from the remote portableelectronic device. The safety monitor also includes means to determinewhether the remote portable electronic device is being used in the usagecontext at a current time, and, when the remote portable electronicdevice is determined to be used in the usage context at the currenttime, obtain a threshold alert level corresponding to the usage context.The threshold alert level indicates a degree of danger to which a userof the remote portable electronic device is exposed. The safety monitorfurther includes means to monitor the threshold alert level, and, basedon the monitoring of the threshold alert level, determine whether thethreshold alert level has been satisfied. The safety monitor alsoincludes means to notify a third party that the user is in need ofassistance when the threshold alert level is determined to be satisfied.

Example 99 includes the subject matter of Example 98. In Example 99, themeans to notify cause a location of the remote portable electronicdevice to be transmitted to the third party.

Example 100 includes the subject matter of Example 98. In Example 100,the safety monitor further includes means to analyze the history of pastusage information, current usage information, and external source datato generate a usage context profile corresponding to the usage context.The usage context profile includes the threshold alert level, and ausage attribute corresponding to sensor information collected at theremote portable electronic device. The means to monitor the thresholdalert level monitors the threshold alert level by monitoring the sensorinformation.

Example 101 includes the subject matter of Example 100. In Example 101,the sensor information identifies a sensor threshold value and thethreshold alert level is determined to be satisfied when the sensorthreshold value is satisfied.

Example 102 includes the subject matter of Example 98. The safetymonitor of Example 102 further includes means to transmit the usagecontext profile to the remote portable electronic device for use inmonitoring the sensor information. The means to analyze generates arevised threshold alert level and revised sensor information based on atleast one of the current usage information, the history of past usageinformation and the external source data. The means to transmittransmits the revised threshold alert level and revised sensorinformation to the remote portable electronic device for use inmonitoring the revised threshold alert level.

Example 103 includes the subject matter of Example 102. In Example 103,the external source data include real-time event data, and the means toanalyze is to generate the revised threshold alert level based on thereal-time event data.

Example 104 includes the subject matter of Example 103. In Example 104,the remote portable electronic device is a first remote portableelectronic device, the external source data is supplied by a secondremote portable electronic device, and the real-time event datacorresponds to a real-time event occurring within a threshold distanceof the first remote portable electronic device and the second remoteportable electronic device.

Example 105 includes the subject matter of any of Examples 100 and 101.In Example 105, the usage attribute is a first usage attribute, thesensor information is first sensor information, the usage contextprofile further includes a second usage attribute corresponding tosecond sensor information collected at the remote portable electronicdevice. In Example 105, the means to analyze is to determine whether theremote portable electronic device is being used in the usage context atthe current time by monitoring the second sensor information.

Example 106 includes the subject matter of any of Examples 98 and 99. InExample 106, the safety monitor further includes means to collectexternal source data from a plurality of external data sources. Theexternal data sources are remote from the remote portable electronicdevice and the safety monitor and the external data sources include atleast one of a social media service, a telecommunication network controlcenter, a governmental law enforcement entity, a private securityentity, and a commercial enterprise. In Example 106, the safety monitorfurther includes means to analyze the external source data. The means toanalyze the external source data also revises the threshold alert levelbased on the external source data.

Example 107 includes the subject matter of Example 98. The safetymonitor of Example 107 further includes means to monitor sensorinformation collected at the remote portable electronic device, and,means to determine whether the sensor information corresponds to athreshold number of current usage attributes associated with the usagecontext.

Example 108 includes the subject matter of any of Examples 106. InExample 108, the threshold alert level is a first threshold alert level.The safety monitor of Example 108 further includes means to adjust thethreshold alert level. The means to adjust the threshold alert levelreplace the first threshold alert level with a second threshold alertlevel in response to at least one of the sensor information, and theexternal source data from the external data source.

Example 109 includes the subject matter of Example 108. In Example 108,the second threshold alert level is associated with a higher degree ofdanger than the first threshold alert level, and the second thresholdalert level is associated with a lower threshold that the firstthreshold alert level.

Example 110 includes the subject matter of any of Examples 108 and 109.In Example 110, the threshold alert level is stored at the safetymonitor and at the remote portable electronic device, and the means toadjust the threshold alert level is to adjust the threshold alert levelstored at the safety monitor and stored at the remote portableelectronic device.

Example 111 includes the subject matter of any of Examples 98-104. InExample 111, the safety monitor further includes means to actuate anoutput device of the remote portable electronic device when thethreshold alert level is determined to be satisfied.

Example 112 includes the subject matter Example 111. In Example 112, theremote portable electronic device is a first remote portable electronicdevice, the output device is a first output device, and the means toactuate is further to actuate, when the threshold alert level isdetermined to be satisfied, a second output device of a second remoteportable electronic device. The second remote portable electronic deviceis located within a threshold distance of the first remote portableelectronic device when the threshold alert level is determined to besatisfied.

Example 113 includes the subject matter of any of Examples 98-104. InExample 113, the safety monitor further includes means to requestcontrol of a remote surveillance device when the remote portableelectronic device comes within a threshold distance of the remotesurveillance device.

Example 114 includes the subject matter of any of Examples 98-104. InExample 114, the safety monitor further includes means to control aremote surveillance device located within a threshold distance of theremote portable electronic device when the threshold alert level isdetermined to be satisfied.

Example 115 includes the subject matter of any of Examples 98-104. InExample 115, the safety monitor further includes means to actuate anaudio emitting device located within a threshold distance of the remoteportable electronic device when the threshold alert level is determinedto be satisfied.

Although certain example methods, apparatus and articles of manufacturehave been disclosed herein, the scope of coverage of this patent is notlimited thereto. On the contrary, this patent covers all methods,apparatus and articles of manufacture fairly falling within the scope ofthe claims of this patent.

What is claimed is:
 1. An apparatus to communicate with a remoteelectronic device, the apparatus comprising: memory including machinereachable instructions; and processor circuitry to execute theinstructions to: determine whether data collected from the remoteelectronic device corresponds to a first usage context profileassociated with the remote electronic device; obtain a threshold alertlevel corresponding to the first usage context profile when thecollected data corresponds to the first usage context profile, thethreshold alert level to indicate a degree of danger to which a user ofthe remote electronic device is exposed; adjust the threshold alertlevel based on information obtained from a data source different fromthe remote electronic device; monitor usage attributes reported by theremote electronic device to determine whether the threshold alert levelhas been satisfied; and actuate a safety alert associated with theremote electronic device when the threshold alert level has beensatisfied.
 2. The apparatus of claim 1, wherein the information is firstinformation, and to actuate the safety alert, the processor circuitry isto transmit second information associated with the remote electronicdevice to a receiver.
 3. The apparatus of claim 2, wherein the secondinformation includes at least one of an identify of a user of the remoteelectronic device, a location of the remote electronic device or acondition associated with a location of the remote electronic device. 4.The apparatus of claim 1, wherein the data source corresponds to atleast one of a social media service, a telecommunication entity, agovernmental law enforcement entity, a private security entity, or acommercial enterprise.
 5. The apparatus of claim 1, wherein the remoteelectronic device is a first remote electronic device, and the processorcircuitry is also to adjust the threshold alert level based oninformation obtained from a second remote electronic device.
 6. Theapparatus of claim 1, wherein the safety alert is a first safety alert,and the processor circuitry is to: detect a loss of connectivity withthe remote electronic device; and when the loss of connectivity isdetected: actuate a second safety alert when a battery charge usageattribute obtained from remote electronic device prior to the loss ofconnectivity corresponds to a first value; and actuate a third safetyalert when the battery charge usage attribute obtained from remoteelectronic device prior to the loss of connectivity corresponds to asecond value.
 7. A safety manager to communicate with a remoteelectronic device, the safety manager comprising: a usage data analyzerto: determine whether data collected from the remote electronic devicecorresponds to a first usage context profile associated with the remoteelectronic device; and obtain a threshold alert level corresponding tothe first usage context profile when the collected data corresponds tothe first usage context profile, the threshold alert level to indicate adegree of danger to which a user of the remote electronic device isexposed; a threshold alert level adjuster to adjust the threshold alertlevel based on information obtained from a data source different fromthe remote electronic device; a threshold alert level monitor to monitorusage attributes reported by the remote electronic device to determinewhether the threshold alert level has been satisfied; and a safety alertactuator to actuate a safety alert associated with the remote electronicdevice when the threshold alert level has been satisfied.
 8. The safetymanager of claim 7, wherein the information is first information, andthe safety alert actuator is to transmit second information associatedwith the remote electronic device to a receiver.
 9. The safety managerof claim 8, wherein the second information includes at least one of anidentify of a user of the remote electronic device, a location of theremote electronic device or a condition associated with a location ofthe remote electronic device.
 10. The safety manager of claim 7, whereinthe data source corresponds to at least one of a social media service, atelecommunication entity, a governmental law enforcement entity, aprivate security entity, or a commercial enterprise.
 11. The safetymanager of claim 7, wherein the remote electronic device is a firstremote electronic device, and the threshold alert level adjuster is alsoto adjust the threshold alert level based on information obtained from asecond remote electronic device.
 12. The safety manager of claim 7,wherein the safety alert is a first safety alert, and further includinga communications controller to detect a loss of connectivity with theremote electronic device and notify the safety alert actuator when theloss of connectivity is detected, wherein when the loss of connectivityis detected, the safety alert actuator is to: actuate a second safetyalert when a battery charge usage attribute obtained from remoteelectronic device prior to the loss of connectivity corresponds to afirst value; and actuate a third safety alert when the battery chargeusage attribute obtained from remote electronic device prior to the lossof connectivity corresponds to a second value.
 13. One or morenon-transitory machine-readable storage media comprisingmachine-readable instructions that, when executed, cause at least oneprocessor to at least: determine whether data collected from a remoteelectronic device corresponds to a first usage context profileassociated with the remote electronic device; obtain a threshold alertlevel corresponding to the first usage context profile when thecollected data corresponds to the first usage context profile, thethreshold alert level to indicate a degree of danger to which a user ofthe remote electronic device is exposed; adjust the threshold alertlevel based on information obtained from a data source different fromthe remote electronic device; monitor usage attributes reported by theremote electronic device to determine whether the threshold alert levelhas been satisfied; and actuate a safety alert associated with theremote electronic device when the threshold alert level has beensatisfied.
 14. The one or more non-transitory machine-readable storagemedia of claim 13, wherein the information is first information, and toactuate the safety alert, the instructions, when executed, cause the atleast one processor to transmit second information associated with theremote electronic device to a receiver.
 15. The one or morenon-transitory machine-readable storage media of claim 14, wherein thesecond information includes at least one of an identify of a user of theremote electronic device, a location of the remote electronic device ora condition associated with a location of the remote electronic device.16. The one or more non-transitory machine-readable storage media ofclaim 13, wherein the data source corresponds to at least one of asocial media service, a telecommunication entity, a governmental lawenforcement entity, a private security entity, or a commercialenterprise.
 17. The one or more non-transitory machine-readable storagemedia of claim 13, wherein the remote electronic device is a firstremote electronic device, and the instructions, when executed, cause theat least one processor to also adjust the threshold alert level based oninformation obtained from a second remote electronic device.
 18. The oneor more non-transitory machine-readable storage media of claim 13,wherein the safety alert is a first safety alert, and the instructions,when executed, cause the processor circuitry to: detect a loss ofconnectivity with the remote electronic device; and when the loss ofconnectivity is detected: actuate a second safety alert when a batterycharge usage attribute obtained from remote electronic device prior tothe loss of connectivity corresponds to a first value; and actuate athird safety alert when the battery charge usage attribute obtained fromremote electronic device prior to the loss of connectivity correspondsto a second value.
 19. A method comprising: determining, by executing aninstruction with at least one processor, whether data collected from aremote electronic device corresponds to a first usage context profileassociated with the remote electronic device; obtaining, by executing aninstruction with the at least one processor, a threshold alert levelcorresponding to the first usage context profile when the collected datacorresponds to the first usage context profile, the threshold alertlevel to indicate a degree of danger to which a user of the remoteelectronic device is exposed; adjusting, by executing an instructionwith the at least one processor, the threshold alert level based oninformation obtained from a data source different from the remoteelectronic device; monitoring, by executing an instruction with the atleast one processor, usage attributes reported by the remote electronicdevice to determine whether the threshold alert level has beensatisfied; and actuating, by executing an instruction with the at leastone processor, a safety alert associated with the remote electronicdevice when the threshold alert level has been satisfied.
 20. The methodof claim 19, wherein the information is first information, and theactuating of the safety alert includes transmitting second informationassociated with the remote electronic device to a receiver.
 21. Themethod of claim 20, wherein the second information includes at least oneof an identify of a user of the remote electronic device, a location ofthe remote electronic device or a condition associated with a locationof the remote electronic device.
 22. The method of claim 19, wherein thedata source corresponds to at least one of a social media service, atelecommunication entity, a governmental law enforcement entity, aprivate security entity, or a commercial enterprise.
 23. The method ofclaim 19, wherein the remote electronic device is a first remoteelectronic device, and the adjusting of the threshold alert levelfurther includes adjusting the threshold alert level based oninformation obtained from a second remote electronic device.
 24. Themethod of claim 19, wherein the safety alert is a first safety alert,and further including; detecting a loss of connectivity with the remoteelectronic device; and when the loss of connectivity is detected:actuating a second safety alert when a battery charge usage attributeobtained from remote electronic device prior to the loss of connectivitycorresponds to a first value; and actuating a third safety alert whenthe battery charge usage attribute obtained from remote electronicdevice prior to the loss of connectivity corresponds to a second value.