Disseminating Information to Facilitate User Safety

ABSTRACT

A method for disseminating information regarding a problem and administering medical interventions comprises providing a mobile device wirelessly connectable to a network, receiving and storing contact information corresponding to a designated list of information recipients, receiving, via the mobile device and via the wireless trigger transmitting to the mobile device, a signal from a user indicating the problem, receiving, via the mobile device, information regarding the problem, transmitting an indication of the problem to a rescue clearinghouse via the network, prompting a participant of the rescue clearinghouse, different from the user, to make a decision about a course of action regarding the problem, and at least one of transmitting the information regarding the problem to the information recipients from the designated list and transmitting the information regarding the problem to a government rescue organization, based at least in part on the decision.

REFERENCE TO RELATED APPLICATIONS

This application is a divisional application of U.S. Non-Provisionalpatent application Ser. No. 15/262,172 filed Sep. 12, 2016, which is acontinuation of U.S. Non-Provisional patent application Ser. No.14/587,140 filed Dec. 31, 2014, which is a continuation-in-part claimingthe benefit of U.S. Non-Provisional patent application Ser. No.14/043,531 filed Oct. 1, 2013, which is a continuation-in-part claimingthe benefit of U.S. Non-Provisional patent application Ser. No.13/928,110, filed Jun. 26, 2013, which claims the benefit of ProvisionalPatent Application No. 61/761,304, filed Feb. 6, 2013. The disclosuresof the prior applications are considered part of (and are incorporatedby reference in) the disclosure of this application.

BACKGROUND OF THE INVENTION

Throughout history, millions of people faced life-threatening crisessuch as abductions, rape, sudden medical crises, car-jackings,robberies, and countless other dangerous predicaments. When a personfound themselves in such a situation, it was impossible to instantly anddiscreetly alert loved ones and professional rescuers to the crisis,without alerting a potential attacker or abductor to the rescue attempt,and it was impossible to discreetly provide rescuers with data such asaudio, video, geographical location, and instant communication amongstthe various rescuers, needed to understand the nature of the crisis inorder to enable rescuers to locate and rescue the user. Often, policelack the vital information and evidence needed to identify, capture andprosecute attackers, or to understand the detailed circumstances of anycrisis from afar. Safety systems which require the user to engage in averbal conversation with the rescuers are dangerous and not usable in asituation such as abduction, because the attacker will hear thediscussion with the dispatcher and terminate the communication. Safetysystems which require users to interact with a smart phone screen totrigger a panic are impossible to discreetly and rapidly use during asudden attack, because it takes too long and is too indiscreet for usersto: A) awaken the phone screen, B) unlock the screen, C) locate theapplication, D) launch the application, and finally, E) trigger a panicwithin the application. No attacker would allow a user to retrieve theirphone from their pocket and do the above actions during an attack.

Even if people possessed a physical panic trigger device which didn'trequire the user to interact with their phone screen in order toactivate a panic, the user was still typically required to move theirlimbs and hands in such a manner as to be easily detected by attackers.Panic trigger devices are not readily available to people at all timesincluding while in bed or in the shower. If an attacker were to suddenlyappear behind someone and hold a knife to their throat, the victimpreviously had no ability to remain still while discreetly summoninghelp without alerting the attacker to the panic-triggering. If a personpossessed a physical panic trigger device, if the person forgot torecharge or otherwise replenish the power for the device, the person wasnot automatically reminded of the low power status, hence the panictrigger would not be available for the person to use during anunexpected crisis. If a person was on a journey alone and becameunconscious, there was very little likelihood that they would have beenrescued. Victims of rape do not have available ways to deter the rapistfrom proceeding with an attack by convincing the attacker that theiridentity and location is now known to the authorities. If a person wereto experience sudden cardiac arrest, there is a high likelihood that theperson would die without immediate defibrillation. If a person needs adose of medicine, it has been difficult for many people to administerthe correct dosage at the correct times, particularly if a medicalemergency rendered the user unconscious. If a person were to suffer froma seizure, stroke or other brain-related crisis, it has not beenpossible to instantly notify rescuers of the crisis, and it was notpossible to rapidly and automatically administer medicine needed toaddress the crisis.

When a person embarks on any journey alone, including journeys on footand in a car, if a sudden crisis were to emerge which caused the personto lose consciousness, subsequently causing the person to stopprogressing towards their destination, it was not previously possiblefor help to be automatically summoned to the person's location. Further,when people embark on any journey, if they were suddenly abducted andforcibly taken in a direction other than towards their intendeddestination, it currently is not possible for the deviation from theplanned route to be automatically detected or for the detected deviationto automatically summon rescuers to the person's location. Further, whenpeople are violently impacted by a projectile, fall to the ground, crashtheir automobile, or experience any dangerously abnormal level ofg-forces and rapid deceleration, it was not previously possible for aportable and discreet safety system to automatically detect the violentmovements and to automatically summon medical assistance to the locationof an unresponsive user.

As can be seen, there is a need for solutions to these and otherproblems.

SUMMARY OF THE INVENTION

In one aspect of the present invention, a method for disseminatinginformation regarding a problem, comprises: providing a mobile devicewirelessly connectable to a network; receiving and storing contactinformation corresponding to a designated list of informationrecipients; receiving, via the mobile device, a signal indicating theproblem; receiving, via the mobile device, information regarding theproblem; transmitting an indication of the problem to a rescueclearinghouse via the network; prompting a participant of the rescueclearinghouse, different from the user, to make a decision about acourse of action regarding the problem; and at least one of transmittingthe information regarding the problem to the information recipients fromthe designated list and transmitting the information regarding theproblem to a government rescue organization, based at least in part onthe decision.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprising a plurality ofwireless panic trigger devices each comprising a button, whereinreceiving the signal indicating the problem is activated by the user atleast double pressing the button on one of the panic trigger devices,which signals the mobile device wirelessly.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprising a ring comprising abutton, wherein receiving the signal indicating the problem is activatedby the user at least double pressing the button on the ring, whichsignals the mobile device wirelessly.

In another aspect of the present invention, methods and systems foradministering medical interventions.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem comprises: providing a mobile devicewirelessly connectable to a network; receiving and storing contactinformation corresponding to a designated list of informationrecipients; receiving, via the mobile device, a signal from a userindicating a safe time period; measuring an elapsing of the safe timeperiod; and either a) or b) but not both: a) within the safe timeperiod, receiving a completion indication from the user; b) transmittingan indication of a problem to a rescue clearinghouse via the network;prompting an operator of the rescue clearinghouse, different from theuser, to make a decision about a course of action regarding the problem;and at least one of transmitting the information regarding the problemto the information recipients from the designated list and transmittingthe information regarding the problem to a government rescueorganization, based at least in part on the decision.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprising a head mounted cameracomprising a button, wherein receiving the signal indicating the problemis activated by the user double pressing the button on the head mountedcamera, which signals the mobile device wirelessly.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem wherein receiving the signal indicatingthe problem is activated by the mobile device detecting a preprogrammedspoken phrase.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprising a plurality ofwireless panic triggers, wherein receiving the signal indicating theproblem is activated by the wireless panic trigger devices detecting apreprogrammed spoken phrase.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem wherein at least one of the mobiledevice, the panic ring, the attachable panic key fob and otherwirelessly connected panic trigger devices may contain a vibratefunction in order to automatically notify the user of informationpertinent to the problem.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprising receiving and storinga specified area, wherein receiving the signal indicating the problem isactivated by the mobile device either entering, not entering, exiting ornot exiting the specified area(s) at the designated time(s).

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprising the step of providinga g-force detector attached to the cell phone; and receiving and storinginformation of a threshold g-force amount, wherein receiving the signalindicating the problem comprises the mobile phone reaching the thresholdg-force amount.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprising providing anaccelerometer connected to the mobile device, wherein the signalindicating the problem is activated by reaching a threshold change inthe rate of speed.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprising providing a familyplan comprising a plurality of mobile devices owned by multiple membersof the same family.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprising the step of detectingthe location of the plurality of mobile devices on the family plan anddisplaying the locations on a shared family Internet website.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprising providing detailedmonitoring of the locations and timing of a plurality of consentingusers' scheduled journeys and destinations, wherein receiving the signalindicating the problem is activated by the mobile device at least one ofarriving at a designated location at the designated time, not arrivingat a designated location at the designated time, departing from adesignated location at the designated time, and not departing from adesignated location at the designated time, wherein users who know thepassword retain the option to stop all monitoring.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprises a cycle mode, whereinas the cycle mode is active, the user arranges to confirm that they areOK at regular designated intervals, further comprising the mobile deviceand wireless trigger devices vibrating to remind the user to confirmtheir wellbeing via the mobile device and wireless trigger devices, andwhen the user fails to transmit the confirmation, thereby prompting thedesignated message recipients, different from the user, to make adecision about a course of action regarding the problem; and at leastone of transmitting the information regarding the problem to theinformation recipients from the designated list and transmitting theinformation regarding the problem to a government rescue organization,based at least in part on the decision.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprising providing aninstitutional mode comprising a plurality of mobile devices owned bynumerous different members of an institutional community, enablinginstitutional security managers to detect problems and communicate withindividual community members, further comprising the ability to overseeand detect problems from among thousands of institutional communitymembers on a shared institutional Internet website.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprising providing a recordingdevice connected to at least one of the plurality mobile devices andconfigured to record at least one of audio, video, and image; andrecording at least one of audio, video, and image in real time via therecording device to produce recording information, wherein theinformation is displayed on the shared family Internet website.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem wherein the signal indicating theproblem activates a silent panic or a loud panic, wherein the silentpanic comprises transmitting an indication of the problem to a rescueclearinghouse via the network without detection, wherein the loud paniccomprises transmitting an indication of the problem to a rescueclearinghouse via the network while the mobile device produces at leastone of a loud spoken warning, a loud siren and an emitting light.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprises a designated number ofbutton presses on the wireless panic trigger device causing the mobiledevice to trigger the designated panic mode, wherein any mode availablewithin the present invention may be activated by pressing the button thedesignated number of times.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem wherein activating the loud paniccomprises selecting a loud panic button icon displayed on a home screenof the mobile device.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprises a bad date alert,wherein the bad date alert comprises at least one of causing a phone toring loudly and notifying designated contacts that the user is having abad date or other problem, wherein the bad date alert further comprisesnotifying the designated contacts that the user perceives the problem tobe not physically dangerous.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprises providing an optionfor users to create multiple customized panic modes, wherein users witha distinct preexisting medical condition such as asthma may create acustomized asthma attack panic mode to be triggered at least one ofafter the wireless trigger button is pressed the designated number oftimes at least twice, and after selecting the customized asthma attackpanic option on the application screen, thereby informing rescuers as tothe nature of the problem without requiring the user to speak.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprises providing a healthmonitor via the ring device, wherein the ring automatically gathersnumerous health statistics during non-panics in order to monitor atleast one of pulse, activity levels, blood pressure, pedometerstatistics, sweat analysis, sleep analysis, and other health relatedtests, further comprising providing the resulting data from the healthmonitoring on an Internet website, and also transmitting the informationvia email and other available means of electronic communication to theuser and to the designated contacts.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprises providing a buffermode in the application, wherein during a safe period with buffer modeactive, the mobile device records and locally stores at least one oflocation information, video information, audio information and healthmonitor information for as long as the buffer mode remains active,further comprising deleting the earliest recorded information after therecording reaches the designated length of time, further comprising themobile device continuously replacing the earliest deleted informationwith the newly recorded information, to thereby provide the rescuerswith at least one of recorded location information, audio information,video information and health monitor information from the timeimmediately preceding the signal transmitting an indication of theproblem, in order to provide rescuers with details of the circumstancesleading up to the problem.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem, comprises: providing a mobile devicewirelessly connectable to a network; receiving and storing contactinformation corresponding to a designated list of informationrecipients; receiving, via the mobile device, coordinates of an intendeddestination; tracking the movements of the mobile device from a currentlocation to the intended destination; transmitting an indication of aproblem to a rescue clearinghouse via the network when the mobile deviceis either no longer moving or is deviating from routes which lead to theintended destination; prompting a participant of the rescueclearinghouse, different from the user, to make a decision about acourse of action regarding the problem; and at least one of transmittingthe information regarding the problem to the information recipients fromthe designated list and transmitting the information regarding theproblem to a government rescue organization, based at least in part onthe decision.

In another aspect of the present invention, a method for disseminatinginformation regarding a problem further comprising providing user with adecoy phone separate from the phone containing the application of thepresent invention, wherein the user allows the decoy phone to beconfiscated by an attacker, thereby enabling the user to continuetransmitting data to the rescue clearinghouse due to the attacker'serroneous belief that the active phone has been confiscated and renderedinoperable.

These and other features, aspects and advantages of the presentinvention will become better understood with reference to the followingdrawings, description and claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an exemplary representation of the test panic home screenwithin the smart phone application;

FIG. 2 is an exemplary representation of the application screen shownafter a test silent panic of FIG. 1 has been triggered;

FIG. 3 is an exemplary representation of the mobile rescue website ofthe present invention after a user has triggered a test panic of FIG. 1;

FIG. 4 is an exemplary representation of the desktop rescue websiteafter the user has triggered a test panic of FIG. 1;

FIG. 5 is an exemplary representation of the application home screen ofthe present invention;

FIG. 6 is an exemplary representation of the application screen whichappears after a silent panic of FIG. 5 has been triggered;

FIG. 7 is an exemplary representation of the application screen whichappears after a loud panic of FIG. 5 has been triggered;

FIG. 8 is an exemplary representation of the application screen whichappears after a medical panic of FIG. 5 has been triggered;

FIG. 9 is a perspective view of a designated physical panic triggerdevice of the present invention;

FIG. 10 is an exemplary representation of the user triggering silentpanic from FIG. 5;

FIG. 11 is is a perspective view of a user selecting silent panic on anexemplary ear-mounted video camera of the present invention;

FIG. 12 is an exemplary representation of the application screen whichappears after a silent panic of FIG. 9 through 12 has been triggered;

FIG. 13 is an exemplary representation of the user's designatedemergency contacts receiving a signal activated by the silent panic ofFIG. 9 through 12;

FIG. 14 is an exemplary representation of a designated Rescue Centerreceiving a signal activated by the silent panic of FIG. 9 through 12;

FIG. 15 is an exemplary representation of a user selecting the safejourney timer after the user selects the safe journey option from theapplication home screen of FIG. 5;

FIG. 16 is an exemplary representation of the application screen whichappears after the user selects the safe journey timer option of FIG. 15;

FIG. 17 is an exemplary representation of the application screen whichappears after the user starts the safe journey timer of FIG. 16;

FIG. 18 is an exemplary representation of the safe journey timercountdown screen of FIG. 17 reaching a designated countdown time, atwhich time the user may be notified that the countdown is nearlycomplete;

FIG. 19 is an exemplary representation of the silent panic screen whichappears after the timer of FIG. 18 runs to zero;

FIG. 20 is an exemplary representation of the user's designatedemergency contacts receiving a signal activated by the timer of FIG. 18;

FIG. 21 is an exemplary representation of a designated rescue centerreceiving a signal activated by the timer of FIG. 18;

FIG. 22 is a front view of the panic trigger device of FIG. 9;

FIG. 23 is a side view of the panic trigger device of FIG. 9 with anexemplary metal clip;

FIG. 24 is a bottom view of the panic trigger device of FIG. 9 with anexemplary USB port;

FIG. 25 is an perspective view of a a standard USB cord that may connectto USB port of the panic trigger device of FIG. 24;

FIG. 26 is an exemplary representation of the rescue website componentof the present invention.;

FIG. 27 is an exemplary representation of the rescue website displayedon a smart phone or other internet-enabled device;

FIG. 28 is an exemplary representation of the present invention after auser selects press for menu items of FIG. 27;

FIG. 29 is an exemplary representation of the present invention after auser selects the user location history button of FIG. 28;

FIG. 30 is an exemplary representation of the present invention after auser selects the audio from scene button of FIG. 28;

FIG. 31 is an exemplary representation of the present invention after auser selects the help me button of FIG. 28;

FIG. 32 is an exemplary representation of the present inventionproviding directions to the user after a different user enters a streetaddress into the field described in FIG. 31;

FIG. 33 is an exemplary representation of the present invention after auser selects the photo/video button of FIG. 28 or FIG. 32;

FIG. 34 is an exemplary representation of the present invention after auser selects the video currently streaming live of FIG. 33;

FIG. 35 is a perspective view of the ear mounted video camera of FIG. 11taking video of an exemplary attacker;

FIG. 36 is an exemplary representation of the transdermal medicinedistribution patch with the medicine shield closed, sealing off themedicine reservoir;

FIG. 37 is an exemplary representation of the transdermal medicinedistribution patch of FIG. 36 with the medicine shield open, exposingthe medicine reservoir;

FIG. 38 is an exemplary representation of a user selecting the safejourney button of FIG. 5 and FIG. 15;

FIG. 39 is an exemplary representation of a user selecting the safejourney monitor button;

FIG. 40 is an exemplary representation of a user starting the safejourney monitor after entering their designated destination;

FIG. 41 is an exemplary representation of a user failing to continuetraveling towards their designated destination;

FIG. 42 is an exemplary representation of the user's smart phonevibrating to warn them of the imminent panic triggering as a result ofFIG. 41;

FIG. 43 is an exemplary representation of the user's smart phonevibrating to warn them of the imminent panic triggering as a result ofthe smart phone detecting strong g-forces and rapid decelerationconsistent with dangerous situations, such as a car accident;

FIG. 44 is an exemplary representation of a silent panic triggering as aresult of completed countdowns from FIG. 42 or FIG. 43;

FIG. 45 is an exemplary representation of the user's designatedemergency contacts receiving a signal activated by the silent panic ofFIG. 44;

FIG. 46 is an exemplary representation of a designated Rescue Centerreceiving a signal activated by the silent panic of FIG. 45;

FIG. 47 is an exemplary representation of user speaking a designatedphrase in order to trigger a silent panic;

FIG. 48 is an exemplary representation of an attacker threatening theuser of FIG. 47;

FIG. 49 is an exemplary representation of the smart phone detecting thespoken designated panic trigger phrase, causing it to trigger a silentpanic;

FIG. 50 is an exemplary representation of a silent panic triggering as aresult of FIG. 49;

FIG. 51 is an exemplary representation of the user's designatedemergency contacts receiving a signal activated by the silent panic ofFIG. 50;

FIG. 52 is an exemplary representation of a designated rescue centerreceiving a signal activated by the silent panic of FIG. 50;

FIG. 53 is an exemplary representation of the rescue website displayingthe user to be located within a safe perimeter;

FIG. 54 is an exemplary representation of the rescue website displayingthe user to be located outside the designated safe perimeter;

FIG. 55 is an exemplary representation of the rescue website displayingthree members of one family, during a non-dangerous non-panic situation;

FIG. 56 is an exemplary representation of the rescue website after onefamily member triggered a silent panic;

FIG. 57 is an exemplary representation of a user selecting the instantlylaunched and activated loud panic from the smart phone screen;

FIG. 58 is an exemplary representation of the loud panic from FIG. 57,showing a camera flash and a loud audio alarm;

FIG. 59 is an exemplary representation of the complete softwareapplication launching after the instant loud panic from FIG. 57 istriggered;

FIG. 60 is an exemplary representation of the active loud panic screen;

FIG. 61 is an exemplary representation of the user's designatedemergency contacts receiving a signal activated by the loud panic ofFIG. 60; and

FIG. 62 is an exemplary representation of a designated Rescue Centerreceiving a signal activated by the loud panic of FIG. 60.

DETAILED DESCRIPTION OF THE INVENTION

The following detailed description is of the best currently contemplatedmodes of carrying out exemplary embodiments of the invention. Thedescription is not to be taken in a limiting sense, but is made merelyfor the purpose of illustrating the general principles of the invention.

The present invention is a safety/rescue system designed to facilitatethe user's survival and rescue from any number of predicaments rangingfrom uncomfortable situations to life-threatening crises. The presentinvention may be referenced as the Ultimate Life Protector (ULP). Incertain embodiments, the components of the present invention may includea smart phone software application, a panic button that may be aBluetooth® or other wireless enabled panic button which sends panicsignals to the smart phone application, a server/cloud database, arescue website, a dedicated 24/7 rescue center and additional optionalphysical accessories.

In all cases herein, the following may describe the formula for enteringtext within the websites, emails, applications, and the like, when wordsare shown in between the following symbols “[ ]”. In such cases, thecontent may be an unknown variable, and may be meant to be automaticallyinserted when the variable becomes known. For instance, “Hi [EMERGENCYCONTACT'S NAME],” In this example, the applicable message recipient'sname may be automatically inserted within the [ ]. For instance, “Hi BobJohnson.”

In certain embodiments, the software application for smart phones andportable Internet-enabled devices may be created in several codinglanguages required to be compatible with all widely used smart phoneoperating systems and all widely used operating systems forInternet-enabled devices, including but not limited to: Android, iOS,Blackberry, Java, Windows, Symbian, Bada, Maemo, Moblin, MeeGo, Palm,webOS and the like. When new smart phone operating systems become widelyused, the software code may be translated into the new language,enabling the algorithm of the present invention to function on the newsmart phones and other Internet-enabled devices. Regardless of theoperating system, the algorithmic functions of the present invention maybe utilized on all suitable smart phones and Internet-enabled devices.

The following includes exemplary embodiments of the application of thealgorithm of the present invention. After installation, during the firstlaunch of ULP, the user may be prompted to do the following tasks below:

If the user quits the application before entering the requiredinformation, when the user re-launches the application, the user may beautomatically returned to the signup process described below, and thesame continues to happen after application launch until the user enterscertain identifying information. For example, the user may enter aunique username, their own contact info, and the contact information forat least one emergency contact who may be invited to participate to helpfacilitate the user's rescue during a predicament.

The following may include the steps of an exemplary signup process. Theuser may be prompted to select a unique user name. If the entered username is already in use, the user may be prompted to create a unique username. The user name may be the element that makes the user's web linkunique. The user may be prompted to enter their own personal contactinfo, such as but not limited to, their cell phone number, emailaddress, and physical home address. The user may be prompted to take apicture of themselves, so rescuers can know what the user looks likeduring the rescue. The user may be prompted to enter at least oneemergency contact, and users may be encouraged to enter ten or moreemergency contacts. The emergency contacts may include trustworthy lovedones, campus security if applicable, a doctor if applicable, with phonenumbers capable of receiving SMS in addition to email messages. At theend of this initial sign up process, after all the user's informationhas been entered, the user may be sent to the test panic screen. A popup message may inform the user that they must trigger a designatednumber of test panics more than one, before gaining the ability totrigger a real panic. If the user quits the application at this time,before the designated number of test panics have been triggered, whenthe user re-launches the ULP application, the user may be returned tothe test panic screen.

In certain embodiments, until the user triggers the designated mandatoryminimum number of test panics required of all users who are justbeginning to use ULP, the user may be brought to the test panic modeeach time they launch the application. This may ensure that all usershave at least several experiences using the present invention in a testmode, to gain a basic understanding of how it functions beforeattempting to trigger a real panic during a true emergency. When theuser triggers the very first test panic, all emergency contacts may besent an email which formally invites them to participate as this user'semergency contact in case of a crisis.

An example of the invitation email may include the following:

-   Hi [RECIPIENT'S NAME],-   It's [NAME OF USER] here. I'm writing because I just signed up for a    safety/rescue service called Ultimate Life Protector®. I need to    enter contact info for 10 emergency contacts and I'm hoping you    won't mind being one of them.-   What I need is very simple. If I launch a panic to indicate that I'm    in great danger, my contacts (like you) will receive an SMS text    which has a web link. All I need you to do is to call the nearest    911 precinct to my location, and tell them to go to that link. The    phone number for the nearest 911 precinct to me is available right    at the top of the website. Simple! The link is    http://www.LocateLovedOne.com/[UNIQUE USER NAME]. You can also click    the link yourself right on your phone, to see where I am, hear live    audio and much more.-   Professional rescuers like the police can use this web link to track    my location, so they can rescue me. If you have any questions or you    don't want to be one of my emergency contacts, please let me know.-   Thanks either way!-   [User's Full Name]-   [User's phone #]-   [user's email address]-   Learn more about this safety/rescue service and sign up yourself at    http://www.UltimateLifeProtector.com

After the first test panic described above, during which time theemergency contacts may be first invited via email and SMS to participatewith the user, the user may be encouraged to remain in test mode for anextended period, and to continue to trigger test panics. Users may beencouraged to frequently trigger test panics before ever using ULP in atruly dangerous situation. ULP may encourage an extended period oftesting in order to help users and their emergency contacts to learn allabout the various functions and features within the present invention,without contacting the authorities, or falsely alerting personalemergency contacts to an ostensible crisis when, in truth, the user maycurrently be safe and may be testing and experimenting with the system.

An exemplary embodiment of the dedicated test panic screen isillustrated in FIG. 1. In certain embodiments, the dedicated test panicscreen may contain six main button options, which may include but arenot limited to, test silent panic 2, test loud panic 4, test medicalpanic 6, test safe journey 8, test call 911 10, and more menu 12. If theuser triggers a test silent panic 2, the active panic screen 14illustrated in FIG. 2 may appear, which may display the current panicstatus, and may contain four main button options, which may include butare not limited to, cancel panic 16, test call 911 18, sound alarm 20,and false alarm 22. In addition to accessing the test panic options viathe above dedicated test panic screen, after the user has triggered themandatory minimum number of test panics, users may retain the option tore-enter test mode voluntarily, and while test mode may be active theuser may press any applicable physical panic buttons the designatednumber of times, and may trigger a panic due to a deviation in a journeyduring test mode, and all other normal modes may be triggered withintest mode, including triggering any test panic from the applicationscreen.

After the user has triggered the designated mandatory minimum number oftest panics required for users as they initially begin to use thepresent invention, they may henceforth be authorized to trigger a real,non-test panic. In such a case after the user has triggered themandatory number of test panics, and test panic mode may be currentlyactive but the user unexpectedly determines that they may be facing atruly dangerous crisis, the user may override any presently active modeby pressing the wireless panic button on any applicable wireless devicea designated number of times, more than twice. For instance, the usermay press the panic button four times in order to trigger a differentpanic signal such as a real, non-test silent panic, in addition toseveral other potential triggering options which may be selected whenthe user presses the panic button a different, designated number oftimes. As mentioned above, the user may not initially have the abilityto override the requirement to trigger a designated minimum number oftest panics before triggering a real panic. The user's ability tooverride test mode by clicking the button a designated number of timesmay only be an option for users who have already triggered more than thedesignated number of minimum, mandatory educational test panics whenusers initially begin to use the present invention.

The functions of the test silent panic active screen 14 may act as itnormally would during a real panic, except the rescue center may neverbe contacted during a test panic, and during a test panic, the panic SMSand email messages may convey that this is not a real emergency. Thetest panic may be used to give the user and the emergency contactsexperience using the present invention, so they are prepared to assistwith a rescue in case of a real emergency. Also, test panic may allowthe user to confirm that all of the phone numbers and email addressesfor emergency contacts are current and correct. Recipients receive testpanic messages, at which time they may click directly on the user's weblink, with which they can repeatedly visit the website, to fully tounderstand all the various features available to aid with a rescue.Emergency contacts may click the web link on their Internet-enabledsmart phones, as well as from within email on their desktop, laptop andtablet devices.

In certain embodiments, the user's location may only be shown on thewebsite during active panics, unless the user actively selects an optionto share location during non-panics. If the SMS recipient clicks on theweb link during the active test panic, the recipient may be taken to theuser's personal mobile rescue website, and once the webpage opens, therecipient may view the user's current location, which may be displayedin the form of a blue icon which sits on the map, which may include amessage, such as “HELP ME”. The HELP ME icon 24 illustrated in FIG. 3may represent the present location of the user during a test panic onmobile smart phones. The HELP ME icon 24 illustrated in FIG. 4. mayrepresent a larger test panic display for desktop, laptop and tabletdevices. In certain embodiments, the user may cancel the active panicand the HELP ME icon may disappear from the website map, hence thewebsite viewer may no longer view the user's current location after theuser cancels a panic. However, in certain embodiments, emergencycontacts may still be able to view the user's past locations, recordedvideo, audio, among several other data gathered during the active panic.

An example of the test panic email may include the following:

-   Subject—“test panic from [USER'S NAME]-   Hi [EMERGENCY CONTACT'S NAME],

This email is a test panic message from a rescue service I use calledUltimate Life Protector. If this were a real emergency, I would need foryou to immediately call 911 and tell them to locate and rescue me at thefollowing website. You can click on it now to see where I'm located, tohear audio from my position, and to generally learn what the website canoffer in case of a real emergency.

-   http://www.LocateLovedOne.com/[UNIQUE USER NAME]

In a real emergency, I need for you to click on the link above, and thencall the phone number you see at the top of the website. Tell thoserescuers (who will be nearest to me) to simply visit the web addressabove, and they'll be able to rescue me. In a real emergency, when youcall me to confirm, you can ask me for my password. It is [INSERTPASSWORD] If I don't tell you the correct password, it means that I amunder duress.

-   Thank you for agreeing to help me if I'm in danger!-   [User's full name]-   [User's phone number]-   [User's email address]

In certain embodiments, when the user first installs and signs up forthe present invention, the default mode for the rescue center may bedisarmed. In such embodiments, the user may actively arm the presentinvention by pressing the “arm” button within the application. A pop upscreen may appear which may convey that the present invention may bearmed, such as, “Warning! When rescue center is armed, the authoritieswill be notified when a panic is triggered, so arm rescue center withcaution. Once armed, the rescue center will remain armed until youdisarm it. Users are strongly encouraged to leave the system disarmedand in test mode for a long period of time at first, so you canexperiment with and learn all about how the system works withoutcontacting the authorities.” When the rescue center is armed, theapplication may display a message such as, “rescue center is currentlyARMED” which may appear at the top of the application screen. If therescue center is disarmed, the application may display a message suchas, “rescue center is currently DISARMED” which may appear at the top ofthe application screen.

In certain embodiments, after reading the warning pop up message, theselectable options may include arm rescue center or cancel. If the userchooses to arm the rescue center, the user may be prompted to entertheir correct password. After the correct password is entered, the ULPrescue center may be armed. In certain embodiments, the program mayremain armed every time the user uses the present invention, until theuser actively disarms it. Even when the user quits the application ofthe present invention and turns off the phone, when the phone is poweredon, and a panic is triggered, the previous armed or disarmed setting mayremain in effect until the user changes the setting.

In certain embodiments, the user may select either an advance warning ofan anticipated imminent emergency, or an advance warning of ananticipated non-emergency advance warning message button which may beavailable within the application, and these messages may also be sentafter the user clicks any applicable wireless panic button thedesignated number of times. When the user selects this option, messagesmay be sent to designated contacts which may notify them that the usermay be planning to trigger a non-emergency panic such as a bad datealert, a test silent panic, or other alerts which may be meant tosignify that the user perceives themselves to not be in physical danger,but they may choose to alert designated contacts that they may be in anuncomfortable situation. The non-emergency message may be sent via SMS,email and any other available messaging systems.

If the user triggers a bad date panic, emergency contacts may receiveSMS and email messages which may state that the panic is not lifethreatening, but the user does request their assistance. If users planahead of time to possibly trigger a non-emergency or bad date alert,before triggering a panic, users may be encouraged to notify theemergency contacts that the user is not facing a real crisis via a popup screen which appears after the user presses the non-emergency messagebutton on the smart phone screen, or after the user presses anyapplicable physical panic button a designated number of times, the popup screen may read, “If you intend to trigger a panic during anon-emergency, you are strongly encouraged to send advance warningmessages to all contacts.” The two button options which may appearunderneath the pop up screen may read, “send warning” and “cancel”. Ifthe user selects “cancel”, a new pop up screen appears which may read,“Non-Emergency Mode cancelled. Future panics will be treated as realemergencies.” If the user selects, “send warning”, SMS and emailmessages may be sent to all emergency contacts, which may state that theuser is currently safe, but they intend to trigger a non-emergencypanic. The contact's help might be requested by the user, but not for alife-threatening emergency.

In certain embodiments, non-emergency or bad date mode may be used togive adults the ability to constantly monitor their young children in avariety of intuitive and useful ways in non-life threatening situations,e.g., walking with young children at an outdoor festival. For example,the parent may enable location sharing during non-panics on thechildren's ULP devices before entering an outdoor festival, shoppingmall, or any number of other places where the guardian may be concernedthat they might lose sight of the children. With location sharing duringnon-panics active, the parents and children may walk around a largespace confidently, because if they suddenly lose sight of theirchildren, they simply awaken their smart phones, and instantly seeexactly where the child or children are located on a map, in addition tovarious other vital data. Such embodiments, may be used with children orindividuals suffering from mental illnesses such as dementia or othermental issues which call for their constant monitoring. However, in mostembodiments of the present invention, it may be the user who controlswhether or not their location and audio/video are being monitored. Itmay be the case that all users with knowledge of the password may cancelmonitoring during non-emergencies.

In certain embodiments, the non-emergency or bad date mode may be usedwith teen age children during non-life-threatening situations such as anunchaperoned teen age party, for instance. With bad date mode, the usermay press their panic trigger button the designated number of times ifthe user wishes to inform other friends who are present at the partythat they are uncomfortable with a situation, perhaps involving anintoxicated, aggressive male classmate. The user may retain the power todetermine whether or not they trigger a real panic or anon-emergency/bad date alert at any time, and whether or not thismessage is sent to rescue authorities or instead to only notifyspecified personal contacts, as in cases such as a party where the usermay perceive the situation to be uncomfortable but not physicallythreatening. Since the message recipients may be at the very same partyor event, the friends may instantly rescue the user who may be inanother room. If the user chooses, she may include her parents on thelist of panic recipients. If a panic has been triggered, the parents maybe able to listen to the audio and/or view video from the situation anddetermine their next course of action.

In certain embodiments, the user may wish to notify their predeterminedcontacts that they are uncomfortable in a situation such as a bad datewith a new acquaintance. Users may be advised to send a non-emergencymessage warning to their designated personal contacts before triggeringa bad date alert, in order to notify contacts that a bad date alert maybe coming soon.

In certain embodiments, before a potentially romantic date, the user maychoose from among preference options including having the user's phonering loudly after the user clicks the wireless panic button thedesignated number of times in order to trigger a bad date alert. Suchringing may be intended to help the user to interrupt the awkwardnesscommonly associated with bad dates, including as a method to interrupt aman as he attempts an unwanted kiss. In such a case, as soon as the userobserves the man moving in to initiate an unwanted kiss, the ringingphone may help the user to pull away from the kisser in order to answerthe phone. In such a case, the user may pretend to answer the ringingphone, and then they may pretend that something serious has come upwhich requires the user to politely end the date in order to address theproblem. If the user chooses, when triggering a panic in bad date mode,designated contacts who may potentially be different from the standardemergency contacts may receive the bad date alert, notifying only thisspecified group of contacts that the user may be uncomfortable withtheir situation, but they may not currently perceive themselves to be inphysical danger. Bad date mode may be intended to be an option for userswho desire an option to alert loved ones to any concern they may havewhich may be problematic enough to warrant notifying loved ones of theirdiscomfort with a particular situation, while the user may perceive thesituation to be not dangerous enough to warrant notifying professionalrescuers. Bad date mode may act as a middle option between user inactionand the user contacting the authorities.

In certain embodiments, one user might attend a social gathering alongwith two friends. The user might wish to be rescued from the awkwardconversation they may be engaged in, or in another case, a public figuremay trigger a bad date alert in order to discreetly notify her publicistthat she wants to stop giving an interview. In this case, the user maywant the publicist to rescue her from the interview. Therefore, afterthe user enters bad date mode, and if the user so desires, after shenotifies her emergency contacts that she may be planning to use ULP in anonthreatening situation by using the non-dangerous message featuredescribed above, the user may press the discreet panic trigger button inorder to be rescued from any socially delicate situation which isn'tperceived by the user to present a physical danger.

In certain embodiments, the bad date mode may be used for bad dates inwhich the user may be uncomfortable with a situation, but may alsobelieve themselves to be in no physical danger. Users might wish to havetheir close friends available, prepared to receive the ULP SMS if theuser becomes uncomfortable with their situation, even if they don'tnecessarily initially perceive the situation to be physically dangerous.The friend may receive the message, and after clicking on the rescuelink, the friend may immediately hear audio, live video, and the user'slocation, among other data provided. The message recipient may both callthe user, and go to the user's location. In such a situation, where theuser might initially have believed that there was no physical danger,but the panic message recipient listens to the ULP audio stream, and/orviews the user's video stream, and subsequently believes that the usermight be in actual physical danger, the message recipient may call thenearest professional rescue precinct shown on the rescue website, andtell the rescuers the user's unique web link. The nearby public rescuersmay use the link to locate and rescue the user, while gathering all thetimely data described herein. In other words, even if the user disarmedthe rescue center, and even if a user triggered a non-emergency panic orbad date alert, if the designated contacts listen to the user's audio,and view the user's video and other information, and the contacts havereason to believe that the user may be facing a dangerous crisis, theymay instantly contact professional rescuers nearest to the user'slocation, and by providing public rescuers with the user's web link, therescuers may treat the emergency as if the user intended for the rescuecenter to be armed, and for the alert to be more serious than thenon-emergency or bad date alert. FIG. 5 illustrates the home screen ofthe present invention's application. At the top of the screen, it maydisplay whether or not the rescue center is armed or disarmed 26. Inthis example, it reads, “Rescue Center is currently ARMED” 26. Directlyunderneath the arming status, the silent panic button 28 may bedisplayed. When the user selects the silent panic button 28, a silentpanic mode may be triggered. The present invention may further include aloud panic button 30, a medical panic button 32, and a safe journeybutton 34 displayed on the application home screen.

In certain embodiments, there may be a call 911 button 36. When the userpresses this button, the user may have instant access to the outgoingphone call screen of the user's phone with 911 pre-dialed. In certainembodiments, 911 may be dialed with two taps of the screen. The firsttap may be to select the call 911 button 36, and the second tap may toselect the call button on the standard phone outgoing call screen. Theuser may arm or disarm the present invention by selecting the arm ordisarm button 38. In certain embodiments, the user may select the moremenu button 40 to view various available options as described below.

In certain embodiments, there may be multiple panic modes within theapplication of the present invention. As mentioned above, there may be asilent panic, a loud panic, and a medical panic. FIG. 6 illustrates thesilent panic active screen 42, which may be accessed by selecting thesilent panic button 28 on the application home screen. The status andtype of the panic may be displayed in the upper half of the applicationscreen. The user may cancel the active panic by selecting the cancelpanic button 44. The silent panic active screen 42 may further include asound alarm button 46, a call 911 button 36, and a false alarm button48. In certain embodiments, prior to canceling any “real” panic, i.e.non-test panic, the user may have to enter their correct password forsafety precautions.

The loud panic active screen 42 is illustrated in FIG. 7. The buttonoptions may be similar to the silent panic active screen 42, however thealarm may sound automatically when the loud panic button 30 istriggered. In certain embodiments, the loud panic active screen 42 mayfurther include a mute alarm button 50. When the user selects the mutealarm button 50, the alarm may be silenced.

FIG. 8 illustrates the medical panic active screen 42. This screen 42may include the same button options as the silent panic active screen 42from FIG. 6. However, the color, text and graphics on the medical panicscreen 42 may be different from the silent panic screen, which may bedifferent from the silent panic screen 42 to easily distinguish themfrom each other. Further, the panic status may read medical panic active42.

In certain embodiments, when the panic modes are activated, the user'slocation may be pinpointed and the map position may be sent immediatelyto the server/website. SMS and email messages may be sent to the user'semergency contacts, which may include campus security if applicable, asillustrated in FIG. 13, and the designated ULP rescue center asillustrated in FIG. 14, if the application of the present invention isin the armed mode. If the user has no cell phone signal when triggeringthe panic, repeated automatic attempts to send the panic messages andother data may be made until adequate cell tower or WIFI signal becomesavailable. Within the SMS and email, a clickable web link may bedisplayed with the user's own unique web address configured, using theuser's unique username within the URL. Rescuers may click the link ontheir smart phones to view the mobile website as well as a desktopwebsite such as for rescue dispatchers. In certain embodiments, the URLformat may be simple and easily shared verbally on the phone withprofessional rescuers. In certain embodiments, audio and video may beginto stream from the user, directly to the server/website for rescuers tohear and see in near real time. A photo may be taken at the moment thepanic is triggered and may be uploaded to the server/website.

In certain embodiments, on the application panic screens, buttons areavailable which read, “take new photo”, “stop video” and/or “startvideo. When pressed, new photos and/or video may be taken, and then sentto the website, and in the case of “Stop Video” the video stopsrecording and transmitting. While a loud panic is active, as the userrepeatedly selects the take new photo option, the bright camera flashmay repeatedly shine, and the simulated sound of an analog camera may berepeatedly heard from the speaker of the mobile device in order tofurther prove to a potential attacker that their photos have been sentto the authorities. In addition to these buttons, photos and/or videomay be automatically captured and transmitted during typical use after apanic has been triggered, because the default setting may be such thatvideo and/or photo are automatically captured and transmitted during anypanic, without requiring that these screen buttons are selected. Theuser may have the option to disable the default video recording duringpanics in the application preferences, for instance, if the user'slocation is such that their phone signal is expected to be too weak tosuccessfully carry the data-heavy video transmission. In such cases, theuser may select the “Low Resolution Video” option within the applicationpreferences, so that the default setting mandates that video may berecorded during all panics, with highly compressed, lower resolution, tominimize the amount of data that must be transmitted during a panic, inorder to maximize the successful transmission of the user's panicmessages, location and audio. The user may also choose to select theautomatically adjusting video resolution option within the applicationsettings. With this feature selected, the video may be set to alwaysrecord and transmit during a panic, and the resolution of the video maybe automatically determined by the user's available bandwidth and cellphone signal, with the video transmitting automatically at a lowerresolution when the limited available bandwidth requires a smaller datasize to be transmitted. The default setting may be such that, during anactive panic, if the cell phone signal becomes significantly reduced,the first data to automatically cease transmission may be video. In suchcases, video may continue to record on the user's phone if local memoryis available, where it may be stored until stronger bandwidth allows forthe video transmission to the rescue clearinghouse to take place. If theavailable bandwidth has been reduced to such an extent where the audiorecording may be transmitting too much data, as with the video, theaudio may automatically continue to record locally on the user's smartphone, to be transmitted to the website when enough bandwidth becomesavailable to the mobile device. In other words, when available bandwidthbecomes limited, video may be the first data to be restricted, and aftervideo, audio may the second data stream to be restricted. Therefore, thepresent invention may prioritize the sending of the panic messages andthe ascertainment and transmission of the user's current and previouslocation, above all other data-heavy functions. In such a low-bandwidthsituation where video and audio are restricted, a still photograph maybe taken and transmitted to the website. In such a limited bandwidthcircumstance, the data may be recorded locally and may transmit when newbandwidth may become available.

In certain embodiments, the present invention may include accessoriesthat may be utilized. For example, the user may have a designated ear orhead mounted video accessory 54, in which live video from the user'svantage point may stream to the website for rescuers to view. In certainembodiments, the user may have a pulse monitor accessory such as thering panic device, and in such cases the user's pulse rate may bedisplayed on the website. In such embodiments, a dangerously abnormalpulse reading may automatically trigger a Medical panic. In certainembodiments, the user may have a breathing monitor, and thereby thestatus of the user's breathing may be shown on the website. In suchembodiments, dangerous breathing levels may automatically trigger amedical panic. In certain embodiments, a user may have a brainwavemonitor, such as a flexible cap which may be densely packed withelectrodes. In such embodiments, potential brain related issues such asa seizure, stroke, blunt impact, or other such issues are displayed onthe website. Serious brain related issues detected by the brainwavemonitor may automatically trigger a medical panic. In certainembodiments, the present invention may further include automaticallyactivated electrical cardiac resuscitation pads. In such embodiments,when the user experiences sudden cardiac arrest, the sensors recognizethis, and the pads administer the correct amount of electrical impulseto defibrillate the user's heart. A medical panic may be triggered. Theprocess may automatically cease as soon as the sensors determine that asafe heart rate has been restored. The user's heart may be monitored onthe main home screen of the rescue website automatically, as soon as theirregular heart-related issue is discovered by the heart sensor/pads.

In certain embodiments, the present invention may further include atransdermal medicine distribution patch, illustrated in FIGS. 36 and 37.When a user (in consultation with her doctor) determines that essentialmedicine should be administered at particular times each day, themedicine may automatically administer according to a predeterminedschedule. Medicine may also be withheld until designated nano-bloodprobes determine that the user is facing a potentially deadly crisissuch as a bee sting for users who are allergic to bee stings. In a casesuch as an allergic user suffering a bee sting, the medicinedistribution patch may release epinephrine automatically after theprobes determine that it may be medically necessary. A medical panic maybe triggered when the probes determine that this crisis has begun.

In certain embodiments, the present invention may further include adecoy phone. In cases where an attacker insists upon the confiscation ofthe user's phone in order to prevent the user from summoning help, theuser may provide the attacker with a decoy phone, separate from theactive smart phone which may contain the rescue application describedherein, and which may be hidden on the user's person. This deceptionwith the decoy phone may enable the user to continue transmitting datato rescuers discreetly via the hidden smart phone, while deceiving theattacker into falsely believing that the user's phone has beenconfiscated and rendered inoperable during the crisis.

In certain embodiments, the silent panic mode, the loud panic mode andthe medical panic mode may include the following differences: Whentriggering the silent panic mode, no camera flash may appear, and thephone may remain silent unless the user selects the sound the alarmbutton 46 on the application screen. If the user selects the sound thealarm button 46, a pop up message may appear to warn the user such as,“Are you sure? It will be loud.” The user may select cancel and no alarmmay be sounded. If the user confirms the sound alarm, the alarm may besounded. The user may silence the alarm by selecting mute alarm button50 on the application screen. Further, when triggering silent panicmode, the user's phone ringer may automatically switch to vibrate modeduring the panic, and may automatically switch to loud ringer mode whenthe panic is canceled. When triggering the loud panic, the camera mayflash brightly, and a loud noise may play such as a police siren, fromthe phone's speaker. A voice may also repeatedly play declaring, “Yourpictures have been sent to the authorities.” The user may silence thealarm by selecting the mute alarm button 50 on the application screen.

In certain embodiments, the default mode when triggering a silent panicmay be for the ULP application screen to be automatically pushed to thebackground during silent panics. The default silent panic modeadditionally may display a small notification icon visibly on the top ofthe user's phone screen, which may have been automatically switched awayfrom the ULP screen to the main home screen of the user's phone when thepanic was triggered. If an attacker were to take possession of thephone, they may see the user's standard phone home screen, and as aresult of the visible home screen, the attacker may not realize that ULPis actively running in the background. The user may access the runningULP application and view any current activity by selecting thenotification icon which may be viewable and selectable from the mainhome screen of the user's phone. If users so choose in the preferences,they may determine that the default notification symbol should notappear during active panics. If users choose to not display anotification symbol during active panics, users may access and view allULP activity by selecting the application icon on the application screenof the phone. Some users may choose to disable the appearance of thenotification symbol in order to prevent a potential attacker fromnoticing the notification symbol while a panic is active.

In certain embodiments, when default notification mode is active, asmall notification symbol may appear and remain visible on the user'sscreen for as long as any active feature of the application may berunning in the background, which may include features such as an activepanic, the ULP application running in the background, active sharing ofdata during non-emergencies, among other running features. The user mayview other services and applications on their phone, apart from ULP,such as the phone dialing feature, while ULP runs in the background. Ifthe user wishes to view the active ULP features while a differentnon-ULP screen is being displayed, they may select the abovenotification symbol in order to return to the ULP application screens.It may be possible for users to disable the appearance of notificationicons during active panics and when the application runs in thebackground, but there may be no offered way to eliminate thenotification symbol during the sharing of data during non-panics.

When triggering the medical panic, in certain embodiments, no camera mayflash and no noise may be made unless the user selects the sound alarmbutton 46. If the user selects the sound alarm button 46, audio from thephone's speaker may play such as a loud voice repeatedly declaringsomething such as, “Help me! I'm having a medical emergency!”

In certain embodiments, the silent panic may be triggered manually.Silent panic may be the default panic mode. In certain embodiments, thesilent panic may be triggered when the user presses a physicalBluetooth® or other wireless-enabled panic trigger button 52 thedesignated number of times more than once, as shown in FIG. 9, may betriggered if the user presses the panic button on the ear/head-mountedvideo camera 54 the designated number of times more than once, asrepresented in FIG.11, may be triggered if the user presses a panictrigger button contained on a ring which may be worn on the user'smiddle finger, may be triggered if the user presses any other designatedphysical panic trigger button, may be triggered if the user selects thesilent panic button 28 from within the ULP application as illustrated inFIG. 10, may be triggered automatically during an active safe journeymonitor if the user stops moving towards their designated destination asillustrated in FIG. 30, FIG. 40, FIG. 41, and FIG. 42, and may betriggered automatically if the accelerometer, g force monitor, pulsemonitor, and other described health monitors detect emergencyconditions.

In certain embodiments, the silent panic may be automatically triggeredwhen extreme g-forces and extremely rapid deceleration are detectedwhich may be consistent with a car accident or other potentiallyinjurious event as illustrated in FIG. 43, or may be triggered as ascheduled panic via the safe journey timer described below andillustrated in FIGS. 15 through 21. The user's phone may make no soundwhen triggering silent panic, and no camera flash may be seen. Whentriggering silent panic, the user's phone ringer may automaticallyswitch to vibrate mode in order to prevent unwanted attention directedat the user if the panic message recipients attempt to call or send SMSto the user. If the user chooses, they may select the sound alarm button46 from the active panic screen as illustrated in FIG. 6, if the userwishes to deter an attacker with sound of a police siren that may becoupled with a voice declaring, “Your pictures have been sent to theauthorities.” When the user first selects the sound alarm button 46, apop up screen may warn the user that it will be loud. If the userconfirms, the alarm may sound. This pop up warning may appear in orderto prevent the user from accidentally sounding the alarm, for instance,if the user may be hiding from an attacker. The user pay mute the alarmby selecting the mute alarm button 50. The same button may togglebetween the sound alarm button 46 and the mute alarm button 50,presenting the alternate option of the currently active mode.

In certain embodiments, when the user triggers a loud panic 30, eitherby selecting it from the ULP application as shown in FIG. 5 or bychoosing for loud panic to be the default panic mode in the generalpreferences, in certain embodiments when one of the physical panictrigger devices may be pressed the designated number of times more thanonce, all the sequential actions described above may take place. Inaddition to those above actions which may take place when triggering asilent panic, when triggering a loud panic, the phone's camera flash mayshine brightly, the audio sound which simulates the taking of aphotograph with a traditional physical camera may be played through thephone's sound speaker, and a recording of an authentic American policesiren may play through the phone's sound speaker, along with a loudvoice which repeatedly may declare, “Your pictures have been sent to theauthorities”. This may be meant to deter a potential date rapist, orother possible assailant whom the user believes might be deterred bythis camera flash and recorded warning. In such situations, the user maybe advised to tell the attacker that his picture has been sent to theauthorities, so he should not proceed with his illegal behavior if hewishes to avoid punishment.

In certain embodiments, the user may have the option to select either atake new picture button or a take new video option. During an activeloud panic, when the user selects the take new picture button, thecamera may shine brightly each time the button is pressed, to therebyinform potential attackers that the user likely has at least one clearpicture of the assailant which has already been sent to the authorities.

In certain embodiments, the user may choose to trigger a loud panic bypressing the wireless panic trigger button such as the panic ringbutton, the designated number of times more than once. The user may havethe option, within the smart phone application, to place a loud panicbutton icon 164 directly onto the home screen of the user's smart phone,as shown in FIG. 57. This onscreen loud panic icon 164 may be distinctand separate from the onscreen icon which may be selected by the user tolaunch the main ULP application. This loud panic icon 164 may visibly beeasily recognized by the user as the loud panic, visually different fromthe ULP application icon.

When the user selects this loud panic button icon 164 which may resideon the home screen of the user's smart phone, the smart phone mayimmediately display a bright camera flash 168 as shown in the side viewof the phone in FIG. 58, a sound 172 which simulates the sound of aphysical camera taking a picture from the phone's speaker as shown withsimulated audio lines, a loud and authentic recording of an Americanpolice siren which may be repeatedly played, and a loud voice mayrepeatedly declare a statement such as, “Your pictures have been sent tothe authorities. After the previous actions take place, the main ULPapplication may be fully launched as shown in FIG. 59, and any audio,photos, video, location data or other data captured by the user's phoneat the instant when the user selected the onscreen loud panic icon 164may be transmitted to the rescue website, and all previously describedfunctions which take place during an active loud panic may be executed.

With the onscreen loud panic icon 164 present on the home screen of theuser's smart phone, and also with the ability to press the wirelesspanic button the designated number of times more than once, users may beable to rapidly deploy the loud panic as an instantly availabledeterrent against a potential attacker, without any requirement for theuser to launch the main application first. In such a case where a userbelieves that an attack may be imminent, the user may trigger theonscreen loud panic or may alternatively trigger a loud panic bypressing the wireless panic button the designated number of times morethan once in order to deter a potential attacker more quickly than ifthe user were to be required to launch the main application first. Insuch a case, it may be essential for the user to display the brightcamera flash and other functions from loud panic immediately aftertriggering the loud panic, so the button press at least twice and theonscreen loud panic icon 164 may allow the user faster access to theloud panic trigger than if the user were to be required to launch themain application first, because it may take several seconds for the mainapplication to launch, and then to trigger loud panic from within themain application.

The user may have the option, within the smart phone application, todesignate specific spoken phrases which, when spoken aloud by the user,the speaking of these designated phrases may cause specific panic modesto be triggered. For instance, if the user were to designate the phrase“Please don't hurt me” as a trigger phrase, when the user speaks thisphrase as illustrated in FIG. 47, via voice recognition software presentwithin the application as illustrated in FIG. 49, and also if themicrophones which may be present in the wireless panic trigger devicesdetect the designated phrase, a silent panic may automatically betriggered as illustrated in FIG. 50 which notifies and shares all datawith emergency contacts as illustrated in FIG. 51 and the rescue centeras illustrated in FIG. 52. When successfully triggering the panic, pulsevibrations may take place on the user's phone and on all connectedaccessories to the ULP system such as the Bluetooth® or other wirelesslyconnected panic trigger button(s), and/or the ear mounted audio/videocamera, and other wirelessly connected devices. These vibrations mayserve to notify the user that their designated spoken phrase hassuccessfully triggered a silent panic discreetly, without notifying apotential attacker.

In certain embodiments, the present invention may contain multiplemonitors capable of detecting a variety of circumstances. Anaccelerometer may be provided on the mobile device which may be used inorder to detect the user exceeding a threshold rate of deceleration. Itmay be the case that an extremely rapid deceleration from a previousrate of speed may be due to a car crashing into a tree, for example. Insuch a case, the accelerometer may detect the threshold change in therate of speed which may cause the mobile device and all panic triggerdevices to vibrate for a designated time period such as one minute.Further, if the user allows the vibrations to continue for thedesignated period without intervening, a signal indicating a medicalproblem may be automatically transmitted to the rescue clearinghouse. Asa different example, if the user's car collides with another car, butthe user and the passengers in both cars are uninjured, theaccelerometer may detect the threshold change in the rate of speed, andmay begin vibrating as described above. If the user determines that noinjuries were caused by the collision, as the mobile device vibrates,the user may either select pause journey on the mobile device, oralternatively the user may press the panic trigger button once in orderto pause the countdown to the imminent panic, thereby preventing thedetected rapid deceleration from transmitting a signal indicating amedical problem to the rescue clearinghouse.

In certain embodiments, in addition to an accelerometer, the mobiledevice and wireless panic trigger devices may also contain at least oneof: a magnetometer, a gyroscope, a barometer, a thermometer, a GPSlocation monitor, an assisted GPS monitor, a terrestrial transmitterassisted location monitor, an ultrasonic location monitor, a Bluetooth®beacon monitor, a cell-tower and WIFI-assisted location monitor, abio-sensor, a toxin detector, a radiation detector, a g-force monitor, apedometer, a sleep monitor,a brainwave monitor, a heart pulse monitor, abreathing monitor, an activity monitor, nano-probe blood monitors, amongother monitoring capabilities. At least one of the aforementionedmonitors and other monitors may be provided in order to detect a varietyof problems which, when detected, and after the designated period ofwarning time elapses, during which time the devices may vibrate in orderto warn users of an imminent panic, the detection of the problem maycause the mobile device to automatically transmit a signal indicatingthe problem to the rescue clearinghouse.

In certain embodiments, the user may trigger a medical panic in at leasteight ways: Firstly, by selecting the medical panic button 32 in theapplication screen as illustrated in FIG. 5, second, by choosing formedical panic to be the default panic in the general preferences, inwhich case the medical panic made may be triggered when the user doubleclicks any of the physical panic trigger devices such as the thumb sizedbutton 66 as illustrated in FIG. 22, thirdly, if a designated medicalverbal phrase such as “I'm having chest pains” may be spoken, the phrasemay be detected by the voice recognition within the smart phone via amicrophone attached to the mobile device or via a wireless accessorywhich may contain a microphone and may connect wirelessly to the smartphone, fourthly, if general preferences are set to default to medicalpanic when the safe journey timer reaches zero, fifthly, if generalpreferences are set to default to medical panic when the safe journeymonitor detects a problem, sixthly, when the g-force and accelerometermonitors detect a problem, medical panic may be triggered, seventh, whenone of the medical monitors such as the pulse monitor or brainwavemonitor detects a medical problem, and eighth, when the user presses awireless panic trigger such as the panic ring button the designatednumber of times. For instance, the default panic mode to be triggeredwhen double pressing the button may be silent panic, but if the userunexpectedly experiences a medical crisis, they may press the button adifferent designated number of times more than two, such as four clicks.

As with all panic modes, the sequential actions described for the silentpanic mode may occur, and in addition to those sequential actions, theSMS and email messages, along with the rescue website, may notify therescuers that this may be a medical emergency. If the user has certainpreexisting medical conditions, rescuers may learn this key informationon the website in the user's medical info section. If the user possessesthe medical accessories listed above, the rescuers may do at least oneof the following on the user's rescue website: monitor the user's pulserate; monitor the user's breathing; monitor the user's key blood levels;monitor the user's brainwaves for possible seizures, stroke, bluntimpact, or other electrode-detectable brain issues; determine the amountand timing of, and monitor the automatic administering of vitalmedicine; monitor the activity of the automatically activated electricalcardiac resuscitation pads, among other features. With medical panic,the user may not be required to speak for assistance to be summoned. Forinstance, if a user experiences an asthma attack which may make itimpossible for them to speak, the user may either press the wirelesspanic trigger button the designated consecutive number of times totrigger an asthma attack medical panic, or the user may also press themedical panic button 32 and an ambulance may be set en route to rescuethe user within seconds after pressing either button 32. There may be noneed to speak or remain conscious once the panic has been triggered.

In certain embodiments, if the user has a serious recurring medicalcondition such as asthma or a heart condition, the user may be able tocreate multiple unique screen buttons of their choice, to reside on thescreen of the mobile device. The user may also program a certain numberof button clicks to trigger the newly customized panic mode such as“asthma attack panic” or any other distinct chronic condition the usermay have such as “chest pains”. The custom panic mode creation may beoffered in the application. The user may either select the asthma optionfrom the application screen or press the wireless panic trigger buttonthe designated number of times to trigger the asthma attack panic, inorder to inform rescuers of the specific nature of the crisis. In caseswhere the user may be unable to speak, the user may press the button thedesignated number of times at least twice or select the option from theapplication screen, instantly notifying rescuers of the nature of theemergency without requiring the user to speak. The user may createseveral different customized panic modes relating to multiple potentialhealth crises which might be anticipatable by users with particularpreexisting health conditions such as chest pains, feeling dizzy ornumb, asthma attack, and the like. In certain embodiments, if the userselects the sound alarm option from the application 46 as illustrated inFIG. 8, a loud voice may repeatedly declare something such as: “Help me!I'm having a medical emergency!”

Before the user embarks on any journey, the user may select the safejourney monitor from the application, as illustrated in FIG. 38 and FIG.39, and enter the address, location on a map, and/or latitude/longitudecoordinates, of their intended destination in the safe journey monitorwithin the application, as illustrated in FIG. 40. After the useractivates the safe journey monitor, the user may begin to travel towardstheir destination. If the user either deviates away from routes whichlead towards the intended destination, or if the user stops moving andstays in the same place for a designated period of time such as twominutes, as illustrated in FIG. 41, the user's smart phone, panic ringand any other wireless panic trigger devices may begin to pulse vibratefor a designated period of time such as one minute, as illustrated inFIG. 42. These vibrations may be meant as a warning to the user that thesafe journey monitor will trigger a silent panic soon, because the userhas either deviated away from and/or stopped progressing towards theirdesignated destination. If the user is safe and has stopped movingtowards their designated destination for a reason not associated with acrisis, for instance if the user may be stuck in gridlocked traffic,when the user notices the vibrating smart phone, panic ring or othervibrating panic trigger device, the user may pause the safe journeymonitor until they are ready to proceed with the remainder of theirjourney, as shown in FIG. 42, example 148. The user may choose in thepreferences to enable a single button press of the ring or otherwireless trigger to select the pause journey option. This may enable auser who is safe but has stopped progressing towards the designateddestination to press the button once to pause the journey afterdetecting the vibrating panic device, and press the button once againafter at least one minute has elapsed since the previous button presspaused the journey, to restart the journey. When the user is ready tocontinue with their journey, they may also be able to re-activate thesafe journey monitor by selecting the resume journey button as shown inFIG. 42, example 152. If the user wishes to cancel the safe journeymonitor, they may press a button labeled cancel journey 150. If the userwishes to trigger a silent panic, they may press the silent panic button154, and they also may trigger a silent panic by pressing the button onthe ring the designated number of times more than once. The speed of theuser's movement during the journey may be tracked and presented on thewebsite. After the user successfully arrives at their designateddestination, the user may have the option of automatically messaging theemergency contacts to automatically notify the contacts that the userhas safely arrived at their designated destination.

In cases where the user has stopped progressing towards their designateddestination while the safe journey monitor is active, after thedesignated vibration period has expired, if the user does not intervene,silent panic may be automatically triggered, as illustrated in FIGS. 44through 46. In cases such as car accidents, where the user may becomeunconscious or otherwise unable to access their phone, the silent panicautomatically triggered by the safe journey monitor may inform allemergency contacts and rescuers that the user has failed to completetheir journey, while providing the rescuers with the previouslydescribed data needed to understand details of the crisis in order torescue the user.

In certain embodiments, the application of the present invention mayfurther include a safe journey timer, which may set off an automaticpanic trigger. The user may activate the safe journey timer mode bypressing the safe journey timer button 34 as illustrated in FIG. 15. Theuser may then set the timer for the amount of time they choose. If itnormally takes 10 minutes for a student to walk home from the library,for instance, the user may set the timer 56 for ten minutes asillustrated in FIG. 16, select the start button 58 and then the user mayput the phone back in their pocket while the timer counts down, asillustrated in FIG. 17. When the timer reaches the final 30 seconds ofthe countdown, the smart phone may begin to pulse vibrate for each ofthe remaining 30 seconds of the countdown as illustrated in FIG. 18.This may be done to warn the user that the countdown may be almostfinished. If the user is safe, when the vibrations begin, the user mayselect the arrived safely button 60 to cancel the countdown, or the usermay select the reset timer button 62, as illustrated in FIG. 18. If,during the countdown, the user is conscious and suddenly discovers thatthey are facing a crisis, they may instantly trigger a silent panic bypressing the button on the panic ring trigger device the designatednumber of times at least twice, or alternatively by pressing the buttonon the attachable key fob panic trigger device 52 as illustrated in FIG.22. In certain embodiments, the users may press the panic button thedesignated number of times at least twice on the ear mounted videocamera 54 as illustrated in FIG. 11 and the user may also trigger apanic by selecting the silent panic button 64 from the safe journeytimer screen during the countdown, as illustrated in FIG. 18. If theuser loses consciousness or is otherwise incapacitated, when the timerreaches zero, the silent panic mode may automatically trigger asillustrated in FIG. 19, and the rescuers may be alerted with SMS andemail as illustrated in FIG. 20 and FIG. 21. As with other panictriggering, the sequential actions of the silent panic mode may beexecuted when the safe journey timer countdown reaches zero. Additionalaccessories may also contain physical panic buttons which the user canpress the designated number of times at least twice to manually triggera panic at any time, including during the safe journey timer countdown.

As illustrated in FIG. 43, in cases when the smart phone and wirelesspanic trigger devices detect a sudden and extreme variation of g-forcesand rapid deceleration such as the g-forces and rate of decelerationconsistent with a moving car crashing into a tree, for instance, thedesignated g-force threshold and the designated threshold for dangerousdeceleration, when observed by the accelerometer and g-force detector inthe phone and in the wireless panic trigger devices, may cause the phoneand devices to vibrate for one minute. At the end of that minute,medical panic may be automatically triggered. If, during the minute ofvibrations, the user selects the button labeled I am OK 156, as shown inFIG. 43, the safe journey monitor may be paused and no panic may betriggered. The user may also press the panic ring button once to pausethe journey after feeling the vibrations. If the user takes no actionafter the phone and the panic trigger ring begin to vibrate, at the endof the minute, medical panic may be automatically triggered.

In cases where the user chooses to provide the emergency contacts withupdates as to the user's location and speed of travel during thejourney, regardless of whether or not the user has stopped progressingtowards their designated destination, and regardless of whether or not apanic has been triggered, the user may be able to activate a functionwith which the user chooses to share their location data with theemergency contacts by transmitting the user's location data to thewebsite at regular, designated intervals, without any active panic. Insuch cases where the user may have chosen to transmit their locationdata to the rescue website during their journey, users may notifyemergency contacts such as parents that they may have the ability tomonitor and observe the user's location data on the rescue website asthe user travels towards their designated destination, even when nopanic mode is active, as illustrated in FIG. 55, examples 158, 160 and162. If the user chooses not to activate location data sharing duringnon-panics, it may not be possible for emergency contacts to view theuser's location data unless the user triggers a panic, and/or if theuser chooses to activate the location data sharing option duringnon-panics. If data sharing during non-panics is activated without theuser's knowledge, the user may see a prominent notification symbol inorder to inform the user that data sharing during non-panics is active.If the user selects the notification symbol, users with knowledge of thecorrect password may be able to deactivate all monitoring.

The user may have the option, within the application of the presentinvention, to designate a specified area considered to be a safe zone bythe user and the user's emergency contacts. The user, along with lovedones such as parents, may have the ability to set and reset the size andshape of the borders of this safe zone, to form the perimeter of adesignated safe area 157 as illustrated in FIG. 53. While the perimetermonitor is active, if the user remains within the designated safeperimeter as illustrated in FIG. 53, no panic may be triggered. If theuser crosses the border of the perimeter, exiting the designated safeperimeter as illustrated in FIG. 54, a perimeter breach panic may betriggered, and the rescue website may display a large text statementwhich may inform the designated recipients that the user has exited thesafe perimeter. Users may determine whether or not the perimeter breachshould result in the contacting of the ULP rescue center. For instance,in most cases, a user simply exiting the safe perimeter does not suggestthat the user is in mortal danger. For this reason, the default mode maybe for the designated contacts to receive messages when the userbreaches the safe perimeter. In other cases, such as a user with severedementia, the settings may be selected so that the ULP rescue center aswell as the designated contacts are notified of the perimeter breach.

In cases when a user is outside the safe perimeter, the user maydesignate the safe perimeter as the designated destination. When theuser arrives at the designated destination, if the user chooses, theymay select an option which enables all emergency contacts toautomatically receive messages such as SMS and email notifying theemergency contacts when the user has arrived at their designated safedestination.

In certain embodiments of the present invention, a family mode may beincorporated. Multiple users of the present invention may have theability to designate themselves as members of a single family unit. Eachfamily member may possess their own unique username. If each user withinthe family has enabled the location data sharing during non-panics, allthe participating users' location data may be transmitted to twodistinct websites; a) The user's primary website with a unique URL suchas www.locatelovedone.com/[USERMAME] as illustrated in FIG. 26, and b)www.locatethefamily.com/[shared family name] as illustrated in FIG. 56.

When the family initially enters their family name, if this name hasalready been entered into ULP by a different family, it may not bepossible for the user to register this name. A unique family usernamemay be required. For instance, Smith77 may be used instead of Smith.

If individual members of this family have activated the shared locationdata during non-panics, all family members may be able to navigate totheir family's unique web URL such as www.locatethefamily.com/nepo asillustrated in FIG. 56. When any viewer attempts to view the locationsof various individual members of a family, it may only be possible forthe viewer to see the locations of family members who have willinglyconsented to the activation of shared location data during non-panics.When users choose to enable the shared location data during non-panics,a pop up screen may appear which informs them that their location andother data may be monitored with this feature activated. All users whopossess the correct password may be able to activate and deactivate thisdata sharing feature.

If the user consents to share data during non-panics, a defaultnotification symbol may remain visible on the user's smartphone at alltimes while the sharing of location data during non-emergencies remainsactive. If sharing becomes activated without the knowledge of the user,the user may notice the presence of the notification symbol and byselecting the symbol, the user may be brought to a screen on which theymay clearly see that their location and other data are being shared. Ifthe user wishes to change the current data sharing status, users may berequired to enter their correct password. After entering the correctpassword, users may choose to deactivate data sharing during non-panics.Within the application preferences, users may choose for no notificationsymbols to appear during active panics, but there may be no offered wayto eliminate the notification symbol during the sharing of data duringnon-panics.

For those users who have activated the data sharing during non-panicsfunction, it may be possible for family members such as parents to viewthe locations of all participating family members on one website. Anyviewer to this website may have the option to commence direct videoand/or audio communications with any and all attendees on the website.For instance, a parent may have the ability to instantly communicate viavideo and/or audio with a sibling and also a friend of the user, withmultiple attendees present on a video/audio conference call. In caseswhere young children or severe dementia patients may need constantmonitoring, users may have the ability to choose to transmit audio,video, location data, and any other available data from the user'sposition, regardless of whether or not a panic has been triggered. Thismay require large amounts of bandwidth, therefore users may be awarethat transmitting such data might exceed their allotted monthlybandwidth allowance.

More commonly, in other cases, it may be possible for users to choose toonly transmit location data during non-panics, but not to transmitaudio, video and other data during non-panics. This may be commonly usedby families who wish to keep track of the users' locations in aminimally intrusive manner, without using excessive bandwidth requiredto transmit vantage point video and other data-heavy transmissions.

In other cases, such as severe dementia patients, it may be possible forusers to transmit all available data, but this may require that the useractively select this option before it transmits the data.

In a case where one or more family members trigger panics, the rescuersmay view location and all other vital data from multiple family memberson the same family website as illustrated in FIG. 56.

In a case where one or more family members enable the safe journeymonitor, viewers of the website such as parents may have the ability tomonitor the progress of multiple family members as they progress towardstheir respective destinations, all on the same website.

In certain embodiments of the present invention, parents may monitor thejourneys of their children and the users may preprogram for themselves avariety of consenting users' scheduled journeys and destinationsincluding planned after-school destinations, and the like. Forconsenting users such as children, various locations which comprise theusers' common travels may be stored and selectable as presetdestinations. Parents may choose to be alerted if one or more childreneither arrive or don't arrive at specified locations at the designatedtime, and conversely parents may also choose to be alerted if one ormore children either depart or don't depart from specified locations atthe specified time. In addition to the commonly visited destinations,parents may select new planned journeys and locations for consentingusers in order to monitor the user at any time within safe journeymonitor. In all cases where the user knows the password, it may bepossible for users to cease all journey monitoring and non-paniclocation monitoring after entering the correct password.

In certain embodiments of the present invention, a cycle mode may beincorporated. While the cycle mode is active, the mobile device andwireless panic trigger(s) may vibrate at scheduled times on designateddays in order to remind the user that the designated contacts areseeking a confirmation that the user is not experiencing a problem.Elderly users who live alone may confirm that they are OK at regulardesignated intervals, thereby enabling potentially distant loved ones tomonitor their elderly loved one from afar. If the user fails to eitherpress the ring or other wireless button device the designated number oftimes at least once, or if the user fails to select the “I'M OK” buttonat the designated time after the device vibrates as a reminder for theuser to confirm their wellbeing, the designated message recipients maydo at least one of listen to audio from the user, observe the user'spresent and recent locations and monitor the user's pulse, among otherinformation the message recipients may observe. After observing theavailable information on the non-responding user, the message recipientsmay determine the most appropriate course of action, includingpotentially notifying the rescue center, attempting to call the user, ortraveling to the user's location to confirm their wellbeing in person.

In certain embodiments of the present invention, an institutional modemay be incorporated. Instead of four or five users within a particularfamily as may be commonly used with family mode, with institutionalmode, hundreds or more individuals may be protected via a unifiedinstitutional structure such as that of universities, non-governmentalaid organizations, corporate communities with campuses, among otherlarge organizations which may require safety systems in place to monitormultiple crises from dozens or hundreds of users simultaneously, from asingle clearinghouse website. Institutional mode enables hierarchicalorganizations to effectively cope with major crises such as a campusshooter, severe weather events or other crises which may put hundreds orthousands of institution-members in danger due to a specific problem.Single abductions or other crises threatening a single or small numberof individuals may also be instantly detected with institutional mode,as well as crises which may endanger larger populations. The unifiedleadership of the institution may have access to medical, contact andother information relating to each participating member of theorganization. Institutional leaders may communicate emergency messageswith instructions on how members can protect themselves, which may besent to hundreds or more members in the case of a campus shooter orother major crisis which may involve an entire institutional community.

In certain embodiments of the present invention, a buffer mode may beincorporated. While the buffer mode is active, the user's phone mayconstantly record at least one of location information, audioinformation, video information, health monitor information, and otherinformation. The recorded information may be stored locally on themobile device. The recording of location information, audio informationand other information may take place during a safe period, and maycontinue for as long as the buffer mode remains active. When therecorded information accumulates for a designated period of time such asten minutes, the device may automatically delete the informationrecorded at the earliest portion of the recording, while the device maycontinuously record new information in order to replace the earliestdeleted information with the newly recorded information, therebyproviding a continuously updated fixed amount of locally stored recordedinformation. When the user triggers a panic mode while the buffer modeis active, the latest fixed amount of locally stored recordedinformation may be transmitted to the rescue clearinghouse, to therebyenable the information recipients to hear audio information, see videoinformation, see user location information and other recordedinformation from the designated fixed period leading up to the time whenthe panic mode may be triggered. The buffer mode may thereby enable theinformation recipients to learn useful details regarding the user'ssituation in the time leading up to a problem in addition to learningdetails regarding the user's situation after the panic mode may betriggered, providing the information recipients with a betterunderstanding of the circumstances which led to the problem.

In certain embodiments, the present application may include menuselections. The following options and functions may reside the in themenu which may be reached by pressing the more menu button 12 within theapplication: quit ULP; I am OK/send false alarm message/non-dangerousemergency warning; conference call; panic message status; test panic;general preferences; 24/7 ULP rescue center; add/edit emergencycontacts; edit personal info; add/edit profile picture; pair ULP withdesignated physical devices including panic triggers, medical monitoringdevices, audio and video recorders, among other accessories; quick startinstructions; complete instructions; about ULP; and the like.

The following may include the description of options which may beselected from within the application. If no panic is currently activeand the user selects quit ULP from the application menu, or selects quitat the bottom of the application screen, the application may quitwithout requiring a password. If the user does not wish to quit theapplication, but instead wishes to cancel the active panic because theyhave safely emerged from a crisis, the user may select the cancel panicbutton 44 as illustrated in FIG. 6. The user may be prompted to entertheir password. When the correct password is entered, a pop upnotification may appear on the screen which may read the following: “Thepanic has been canceled and ‘I AM SAFE!’ messages have been sent.Contact rescuers to confirm your safe status.” After the user confirms,the pop up message may disappear, the user's smart phone screen mayautomatically display the mobile internet browser, and the user may beautomatically taken to their own rescue website where they may textand/or voice and/or video chat with rescuers and emergency contacts whowere involved with the rescue. Finally, after the correct password hasbeen entered in order to cancel an active panic, the user's phone ringermay automatically be turned to the highest volume. As explainedpreviously, when a silent panic is triggered, the user's phone ringerautomatically changes to vibrate mode for the duration of the silentpanic. When canceling a panic after entering the correct password, thephone ringer volume may automatically increase to the maximum volume inanticipation of likely incoming phone calls from rescuers and emergencycontacts who may likely wish to confirm the user's safe status, so theringer volume increase may prepare the user to receive thecommunications. An example of the “I AM SAFE!” SMS message may beprovided below:

-   “I AM SAFE! Situation is now stable but it was a crisis. U can call    me to confirm. If u called 911, call them & say I'm safe.”-   An example of the “I AM SAFE!” email message is provided:-   Subject line—“I AM SAFE!”-   Email body—“[FULL NAME OF EMERGENCY CONTACT]!-   I am safe! My situation is now stable but this was a crisis. Call me    ASAP to discuss it, and to confirm my safe status. If you called    911, call them back and tell them I'm safe.-   [USER'S FULL NAME]-   [USER'S PHONE #]-   [USER'S EMAIL]-   Learn more about this safety/rescue service and sign up yourself at    http://www.UltimateLifeProtector.com.”

If a panic is active, the panic may need to be canceled before theapplication can quit, and as explained above, a password may be requiredto cancel active panics. If the user attempts to quit the applicationduring an active panic, they may be prompted to enter their password. Ifthe correct password is entered, the same pop up notification as abovemay appear on the screen: “The panic has been canceled and ‘I AM SAFE!’messages have been sent. Contact rescuers to confirm your safe status.”After the user confirms, the pop up message may disappear, the ULPapplication may quit, and the user's smart phone screen may switch tothe internet browser, where the user may be taken to their own rescuewebsite where they can text and or voice and or video chat with rescuersand emergency contacts who were involved with the rescue. As furtherexplained below, the user may also start an audio and or videoconference call which can involve multiple rescuers.

In certain embodiments, if the user attempts to quit ULP during anactive panic, or if the user only attempts to cancel the active panic,and they enter a designated false password, for instance “1313”, a popup message appears which reads, “False Alarm Messages Have Been Sent andthe panic has been canceled.” The screen may subsequently read, “ULPQUITTING . . . ”, and finally the screen may switch over to the standardhome screen of the smart phone. As the ULP application screens disappearfrom view, the panic processes may continue in the background. Theuser's location may continue to update at regular intervals, audio,photo, video and all medical data may continue to stream to the rescuewebsite, and rescuers may continue with the rescue attempt. In certainembodiments, if the user wishes to deceive an attacker by falselyshutting off the power of the phone, the user may select the “powerphone off” button from the application menu. If the user enters thedesignated false password, the phone may appear to shut down as normal,with the standard shut-down process shown on the screen. The user mayshow this false power shutdown to an attacker, to convince them that thephone power has been turned off. As detailed above with the false quit,while the phone appears to have been powered off, all data including theuser's location, audio, video, medical data and the like, continue totransmit to the website. This power-off deception may be meant toconvince an attacker that the mobile device has been turned off, when inreality, the mobile device may still be on and continuing to providedata to the website in order to continue to facilitate the rescue.

The designated false password relating to quitting ULP, canceling thepanic modes or powering off the phone, may be used to deceive apotential attacker into falsely believing that the user has canceled thepanic, powered off the phone, or in the case of panic message status, todeceive the attacker into believing that no panic messages were eversent. However, if the user simply enters an incorrect password, they maybe prevented from canceling the panic, prevented from quitting theapplication, and continually prompted to enter the correct passworduntil they either stop attempting to access password-restrictedfeatures, or until the correct password is entered. Only after the userenters the designated false password may any of the above deception takeplace. As detailed above, the preferred method to deceive an attackermay be to hand them the dummy, or decoy phone, while keeping the truerescue phone safely hidden and quiet.

If the user suddenly discovers that they have accidentally triggered apanic while they are safe, the user may press the false alarm button 48on the application screen. If the user enters the correct password,false alarm messages are sent to all contacts.

The false alarm SMS message may be composed of the following informationand may be sent to all contacts and, if armed, to the rescue center:“FALSE ALARM! Disregard emergency message I sent. I'm not in danger. Ifu called 911, call them & say I'm safe. U can call me 2 confirm.”

Concurrently, the false alarm email message may be sent to all contactsand the rescue center, and may read as follows:

-   “SUBJECT LINE—“PLEASE IGNORE THE PREVIOUS PANIC MESSAGE”-   Email body—“FALSE ALARM! IGNORE EMERGENCY MESSAGE! Please disregard    the emergency message you received from me. I am not in danger. If    you called 911, call them back and tell them I'm safe. Feel free to    call or text me to confirm.-   [USER'S FULL NAME]-   [USER'S CELLPHONE NUMBER]-   Learn more about this safety/rescue service and sign up yourself at    http://www.ultimatelifeprotector.com.”

If the user did not accidentally trigger a panic, but the user simplywishes to inform their emergency contacts that they are safe, they mayselect the “I am OK” button which may be shown in the More Menu 2 area.When the user selects “I AM OK”, they may be prompted to enter theirpassword. If they enter the correct password, the following SMS may besent to all contacts. “I AM OK. You can call if you wish to confirm.”The following email may be sent to the same emergency contacts:

-   “Subject—I AM OK!” Email body, “[EMERGENCY CONTACT'S FULL NAME], I    am OK! If you want to confirm it, you can call or text. Don't worry!-   Love,-   [USER'S FULL NAME]-   [USER'S CELLPHONE NUMBER]”

If the user wishes, either during and/or after an active panic, if thecircumstances of their crisis are such that the user may be able tospeak out loud with the rescuers, the user may initiate a conferencecall to communicate with contacts and rescuers within the ULPapplication. After selecting conference call, the user may arrive at ascreen which may list the user's emergency contacts, the rescue center,and the number of the nearest public rescue service to the user. Next toeach contact, there may be a call button. After the user has selectedone contact to call, the buttons next to each remaining emergencycontact may change to add to call. When the user selects add to callnext to any particular contact, that contact's phone may be dialed andadded to the conference call. If available bandwidth is exceeded, thescreen displays an option to automatically reduce the bit rate of thecurrent phone connections. The user and rescuers can either engage in astandard audio phone call, and additionally they can engage in a videoconference call if the participants possess suitable devices andsufficient bandwidth capable of participating in video conference calls.If only certain rescuers possess a phone capable of conducting a videoconference call but other participants in the conversation do notpossess video conferencing capabilities, those participants maycommunicate with the video conferencing participants via their standardaudio phone, and are able to hear the audio and contribute audio to theconference call.

In addition to the user's capability to initiate a conference call,rescuers may also possess this capability to initiate video and audioconference calls via the mobile and desktop websites. On the emergencycontact info screen, as with the user's application, rescuers may selecta listed emergency contact and then press “add to call. If the rescuer'slaptop or other computer contains a video camera, microphone and atleast one sound speaker, any rescuer may have the ability to orallyspeak with and see live streaming video of several fellow rescuers. Aswith the user application, on the website, the bit rate of the phonecommunication may automatically adapt based upon the availablebandwidth.

In certain embodiments, when the user selects panic message status, theymay be prompted to enter their password. If they enter the correctpassword, a pop up screen may appear showing whether or not the panicSMS and email messages were successfully sent. For instance, if the useris in an area with low or no cell phone signal, it may be possible thatthe emergency messages were not yet successfully sent. In such cases,the application may constantly reattempt to send the messages as soon ascell tower, WIFI or other internet signals become available.

In certain embodiments, if the user enters the designated falsepassword, when the user selects panic message status, a pop up screenmay appear which may read, “no panic triggered—no messages sent.” Thismay be the case regardless of whether or not the user actually hasadequate cell tower or WIFI signal to send a message. This may be meantto deceive an attacker into believing that help is not on the way,regardless of the truth. If the user so chooses, they may change thepreferences for the designated false password, so that the pop up screenafter a false password has been entered may read, “photos and messagessent.”

In certain embodiments, when test panic mode is selected in theapplication, the user may be presented with the same panic modes as arenormally present on the ULP application home screen, but in this case,they may only be test versions of the panic modes. The test panic modemay include test silent panic 2, test loud panic 4, test medical panic6, and a test safe journey 8. When the test panics are triggered, thefunctionality may be nearly identical to the non-test version of thesame panic mode as mentioned above. However, in certain embodiments, thefollowing may include a set of differences:

A) Instead of the standard SMS panic message, in a test panic, thefollowing SMS panic message may be sent to the emergency contacts, butnot to the rescue center, and this message may contain the same uniqueclickable web link to locate the user:

-   “Only a test. If I were in true danger I'd need you 2 call 911 &    tell them 2 locate & rescue me @    http://www.LocateLovedOne.com/[UNIQUE USER NAME]

B) Instead of the standard email panic message, the following email maybe sent to all emergency contacts, but not to the rescue center:

-   Subject—“test panic from [USER'S FULL NAME]”-   Email body—“Hello [NAME OF EMERGENCY CONTACT],-   This email a test panic message from my rescue system called    Ultimate Life Protector®. This is not an emergency. If this were a    real emergency, I would need for you to immediately call 911 and    tell them to locate and rescue me at the following website below.    You can click on it now to learn my location, hear audio, among    other resources which could be used in a real emergency. Please    explore the website now so you can learn how you can help during an    emergency.-   http://www.LocateLovedOne.com/[UNIQUE USER NAME]-   Thanks for agreeing to help me if I'm ever in danger!-   [USER'S FULL NAME]-   [USER'S CELL PHONE NUMBER]-   [USER'S EMAIL ADDRESS]”

C) Even after arming the rescue center, if the user triggers any panicfrom the test screen, no test panic messages may be sent to the rescuecenter.

D) If the user selects test safe journey, the timer and monitor work asnormal, but if the countdown reaches zero, the above test panic messagesmay be sent to the emergency contacts but not to the rescue center.

In certain embodiments the user may view and alter the preferences byselecting general preferences from the more menu within the ULPapplication:

A) Screen sleep may be disabled during ULP use, to keep the applicationscreen at the ready by deactivating screen sleep in the preferences. Inthis case, the screen may dim, but may still remain on, so that when theuser taps the screen once, the screen brightness may return to theprevious brightness setting. This may allow the user to tap loud panicon the app screen whenever the user has the need to deter an attacker,such as a date-rapist, for instance. With the screen sleep disabled, theuser is not required to awaken the screen and unlock it before selectingloud panic, or any other function available on the screen. As previouslymentioned, the user may trigger a loud panic without interacting withthe smart phone screen if they possess a panic trigger device such asthe panic trigger ring. If the user clicks the panic button thedesignated number of times in order to trigger a loud panic, the usermay only be required to take their phone out of their pocket or purseand to aim it at an attacker after the button has been pressed thedesignated number of times, at which point the pictures and video may betaken, the audio alarm may sound and the light may be emitted, among theother loud panic functions previously described.

B) Default mode may be for a pop up screen to appear after the ULPapplication has been running for 60 minutes, to remind the user that ULPis still running. If the user is safe, they may quit the application.This notification may be deactivated in the preferences of theapplication.

C) Default mode may be for location pings to be sent at designatedintervals such as every 30 seconds during normal use, during a panic.When the battery runs below ⅓ remaining power, a low batteryconservation mode may automatically take effect, which may restrictlocation pings to be sent after longer time intervals have passed suchas once every 3 minutes, and may restrict further video, audio and otherinformation transmission. Further, during the active power conservationmode, the screen may sleep when the user is not using it, regardless ofthe screen sleep setting above in (A). The user may deactivate lowbattery mode in the general preferences. If deactivated, pings maycontinue to be sent at the designated interval such as every 30 seconds,and all other available functions may continue to operate until thebattery may be fully depleted.

D) Default mode may be for safe journey timer to not require a passwordto cancel the countdown when the user safely arrives at theirdestination. If the user wishes to require that the correct password beentered before canceling the safe journey timer countdown, they maychoose to require a password in the preferences of the application.

E) The default emergency service phone number may be 911. For users incountries other than the U.S. with different government emergency phonenumbers, such as 999 in the UK, users may enter the appropriateemergency phone number for their country within the preferences of theapplication.

F) The default panic when the button is double pressed may be silentpanic. If the user chooses, within the general preferences, they mayselect a different panic to trigger as the default. For instance, a userwith a severe heart condition might choose medical panic as default. Inthis case, after the user double presses any available panic button, amedical panic may be triggered, and if the user is wearing the pulsemonitor ring accessory, for instance, medical professionals can monitorthe user's pulse before they arrive on the scene. As an example of anappropriate time to set loud panic to be the default panic, a teen agegirl may set loud panic as the default before attending an unchaperonedparty, to deter potentially intoxicated and aggressive males if theywere to attempt to physically assault the user. If loud panic wasinitially set as the default panic mode to be triggered when the buttonis double pressed, but the user unexpectedly finds herself to be in apredicament which calls for a discreet silent panic, in such a case, theuser may override the default loud panic in order to trigger a silentpanic by pressing the button the designated number of times more thantwice.

G) The user may have the option to create customized panic modes, to beaccessed by pressing the panic trigger ring the designated number oftimes, and also for the related customized modes to be available asbuttons on the application screen which describe the anticipated crises.For instance, if the user suffers with a serious asthma condition, inthe preferences, as an example, users may create a custom asthma attackbutton which may appear on the screen. Further, the user may designate acertain number of button presses as the designated number of buttonpresses required to trigger a customized asthma attack panic. In caseswhere the user may be unable to speak during an asthma attack, they maypress the button the designated number of times in order to trigger thecustomized panic mode, instantly conveying the nature of the crisis torescuers without requiring the user to speak. The user may createmultiple customized panic modes for several possible crises such aspeanut exposure, bee sting, chest pains, and the like.

A preprogrammed SMS capable cell phone number and an email addressdirected to the rescue center may appear by default within theapplication of the present invention. When new software versions of ULPare released, if the rescue center phone number and email have changed,the new contact information may be updated into the software. ULP mayestablish the correct cell phone number and the correct email addresswith which the user may contact the rescue center. This contact info maybe automatically present within the software, and if any contact inforelating to the rescue center changes, the software may be automaticallyupdated to include these changes, so the rescue center may alwaysreceive panic messages after a panic is triggered while the rescuecenter is armed.

In certain embodiments, it may also be possible for the user tocustomize the rescue center phone number and email address. Onesituation in which it might be appropriate for users to customize thedefault rescue center contact info may be in cases where a studentenjoys 24/7 protection by a dedicated campus security organization. Insuch a case, the user may enter the contact information for theirspecific campus rescue authorities, so if the rescue center is armed asthe user triggers a panic in a case where the user enjoys 24/7protection by a dedicated campus security organization, campus securitymay be dispatched to rescue the user.

When the user triggers their very first test panic after signing up forthe service and entering emergency contact info, an invitation email maybe sent to all the new emergency contacts. In the aforementioned case ofa college student, campus security may receive the invitation email, thesecurity service may communicate with the user, and this campus securityservice may learn how to take advantage of ULP rescue features in orderto rescue the user if campus security receives a panic message from theuser in response to a crisis.

If the user determines her situation to be such that she may be able toorally speak with the rescue center during a crisis, the user may speakwith the rescue center directly by pressing the call rescue centerbutton in the menu items of the application. In such cases, the rescuecenter may talk to the user while providing instructions and comfortingthe user while arranging for the rescue to proceed.

In certain embodiments, there may be a light version. For users who signup for this light service, the ULP rescue center may not be available tothe user, but the user may be offered the option to enter contactinformation for a primary rescue center such as the aforementionedcampus security information.

In certain embodiments, if the light user disarms the primary rescuer,when the user triggers a panic, only the designated emergency contactsmay receive the panic messages. The designated rescue center, such ascampus security if applicable, may not receive panic messages duringpanics where the rescue center is disarmed. When the rescue center isarmed, either the default ULP rescue center, or for light users, thedesignated rescue center may receive the panic messages. In anothercase, when a light user arms the primary rescuer, for instance, if theuser has a known medical condition, they may enter their doctor'scontact information in the primary rescuer field, so it may beunderstood by the panic message recipients including the doctor that,after the user has pressed the panic button the designated number oftimes more than once, the message recipients including the doctor may beinformed that the user may be experiencing a medical emergency relatedto his known medical condition. In another example, a light user maylack access to a campus security organization and also not have accessto a doctor, such a user may enter their own parents or other relativesinto the customized rescue center field. In such a case, the user'sloved ones may comprise the designated responders if the user triggers apanic.

In certain embodiments, when the user first installs the application ofthe present invention, the user may be prompted to enter the cell phonenumbers and email addresses of their family and close friends whom theuser has determined to be the most appropriate people to receive panicmessages when the user triggers a panic, and these designated messagerecipients may agree to act in order to rescue the user during suchcircumstances. Within the preferences of the application, the user mayadd additional contacts to the list and edit the existing contactinformation at any time. Users may be required to enter the correctpassword before altering the contact list and before altering othersignificant settings.

When the user first installs the application of the present invention,the user may be prompted to enter their own key information in order forit to be available to rescuers in case of emergency. Users may updatethis information within the preferences. The information which the usermay be prompted to enter may include at least the following: the user'sfull name; a recent photo of the user's face, the user's home address;the user's email address; the user's cell phone number; any pertinentmedical information such the user's as blood type, allergies, bee stingallergies, asthma, and the like.

When the user first installs the application of the present invention,the user may be prompted to take a picture of themselves with theirphone. This user photo may be displayed on the rescue website, therebyenabling rescuers to identify the user during an emergency. After theuser takes the photo, before transmitting it to the ULP server, the usermay view the photo to determine if it is usable. If the user wishes,they may retake the picture until the user may determine that asatisfactorily clear picture has been taken.

Further, users may return to the user photo section at a later time, totake a new photo of themselves. After the user may be satisfied with thenew picture, the user may upload the picture to the rescue website. Forsmart phones which include a self-facing camera enabling the user toview themselves on the mobile device screen while taking the picture,this mode may automatically be used when such a self-facing camera ispresent, and when the user arrives at the user photo screen via the moremenu, the existing user photo may be displayed. If the user selects thetake a new photo button, the screen may change to become a liveviewfinder, and when the user selects a take new photo button, the photomay be taken, at which time the user may assess the suitability of thenew photo, and if approved by the user, the photo may be sent to thewebsite.

For users with mobile devices which do not include a self-facing camera,the front-facing camera on the cell phone may be used. In such cases, apop up screen may appear which may read “It's easiest to take your photoin front of a mirror, so you can see the phone's screen in the mirror.This way, you can make sure your face is centered.” The user may closethis popup window after reading the message. When the user selects asnap photo button from the screen, the new photo may be taken. Once theuser transmits the approved photo, rescuers may see this photo on theuser's website after any panic is triggered.

In certain embodiments, when the user arrives at the “pair withBluetooth accessories” menu option, the user may be prompted to prepareall related Bluetooth® accessories for pairing. This may be done byplacing the devices in pairing mode. Once the accessories are findable,the ULP smart phone application may locate and pair with the devices.Once the devices are paired for the first time, the smart phone mayalways recognize these accessories whenever the accessories residewithin the Bluetooth® range of the smart phone. For example, the rangemay be within 15-30 feet.

The physical accessories which may be paired with the user's smart phonemay include, but are not limited to: a Bluetooth® or otherwireless-enabled panic ring trigger; a Bluetooth® or otherwireless-enabled attachable panic trigger device with the ability toclip onto the user's clothing or keychain, and the like 52; anear-mounted video camera 54 with panic button and microphone; a pulsemonitor bracelet with panic button, microphone, accelerometer, amongother features; a brainwave monitor; a breathing monitor; a medicinedistribution chamber; automatically activated electrical cardiacresuscitation pads; nano probe blood monitors; a wireless magneticcharging and blood probe interface pad; and a transdermal medicinedistribution patch.

The present invention may further include instruction. Within theinstructions which may take multiple forms including video, text, audio,animation, charts and various other media, users may be directed toexperiment with the test panic function numerous times in order for boththe user and the designated contacts to gain experience with the system.The instructions may also broadly explain what ULP does, and how eachfunction works in minute detail. The instructions may contain keyinformation needed for new users to begin learning more about ULP,crucially without contacting the rescue center as the user and theircontacts experiment with the present invention. Users may be providedwith a web link which they can use to view the instructional informationon desktop, laptop and tablet computers, and internet enabled TV screensfor easier viewing. Within the instructions, an invitation may beoffered for users to become active within the ULP user community, wherea plurality of ULP users may communicate with each other in order toanswer questions, share stories and the like. A ULP webmaster maymonitor the communications and provide solutions and insights to theuser members. Users may also be offered an email address where they maysend queries directly to Ultimate Life Protector, LLC, and also a phonenumber for verbal technical or other assistance.

The mission statement and contact info for the ULP company may appear asan option to be viewed within the more menu. Frequently asked questionsmay be listed along with answers. A web link may be provided to the ULPsales and company website which may be completely disconnected infunctionality and server origin from the rescue website.

In certain embodiments, the present invention may include a panictrigger ring which may be worn on one of the user's fingers, oralternatively it may be attached anywhere on their person. When userswear the ring on their middle or ring finger, this may allow the user totrigger a panic more discreetly than by any practical alternativephysical panic-triggering method, because the human thumb easily touchesthe middle and ring finger while being well hidden behind the user'sindex finger.

When worn on fingers as described above, the water proofed panic ringmay be constantly available to users at all times, including when theyare in bed or in the shower. If an attacker were to suddenly appearbehind the user and hold a knife to the user's throat, the ring mayallow the user to remain very still while discreetly tapping the buttonwith their thumb, without alerting the attacker to the movement. If anattacker were to demand that the user puts up their hands, with thepanic ring on the user's middle finger, ring finger and even pinkyfinger, the user may still discreetly click the button with their thumb,without making the attacker aware of the clicks because of theundetectably minuscule movement needed for the user to press their thumbagainst their fingers. This method of physically triggering a panic maybe extremely discreet and easily accessible at all times.

The ring may contain features similar or identical to features of otherpanic trigger devices described herein including at least one of thefollowing:

The ring may possess a low energy Bluetooth® or other wireless signalingcapability, allowing the ring device to send various distinct Bluetooth®or other wireless signals to the user's smart phone. The specific signalsent may be determined by the number of times the user presses the panicbutton, which may reside on the outside of the ring, and may ideally beworn on the middle or ring finger so that the user may discreetly pressthe button with their thumb at any and all times. As with all panictrigger devices designed for use with the present invention, it may benecessary for the user to click the button at least twice, to helpensure that the button press is intentional.

Further, when the user clicks the panic ring button, the device may bebuilt in such a way that the button is initially difficult to press,because there may be strong resistance via an object which may act as aspring mechanism, constantly providing outward pressure on the button.The user may be required to press the panic button with sufficient forceto counteract the outward pressure being exerted on the button before aclick may be registered by the device. This resistance may be includedto reduce the likelihood that the button may be clicked unintentionallyby the user. It may be intended that the click is only registered afterthe user consciously decides to click the panic button more than once.

The distinct wireless signal sent may be determined based upon thenumber of times the user clicks the button. For instance, when the userclicks the button twice, a standard panic may be triggered which adheresto the protocols of whichever mode is currently active, including modessuch as armed mode, test mode, silent panic mode, loud panic mode, baddate mode, medical panic mode, a plurality of customized panic modes,among others.

After the user clicks the button a designated number of times more thantwo, a different wireless signal may be sent to the user's smart phone,which may activate a different mode which overrides the originallyactive mode which may be activated when the button is clicked two times.The user may memorize multiple button-click numbers, so that during asudden crisis, the user is able to rapidly activate whichever specificpanic mode they deem to be most appropriate to cope with theirparticular situation.

Some panic modes which may be triggered when the panic button is clickeda designated number of times may include numerous different modes suchas; a loud panic which may be used to deter date-rapists; a bad datepanic which may be used to notify designated contacts that the user isuncomfortable with their present situation but the problem has not yetescalated to the point where the user may be thought to be in physicaldanger, hence the rescue center may not be contacted in such a mode;medical panic mode which may inform rescuers that the crisis is of amedical nature hence the summoning of an ambulance may be theappropriate response; among others.

The ring power, similar to other devices described elsewhere in thispatent application, may act in the following manner:

There may be no switch with which to power the ring on or off. The ringmay always be powered on, using extremely low battery power needed tomaintain a clock function during deep sleep, and to maintain aconnection to the user's smart phone. If the user presses the button atleast one time, or more times depending on the particular mode the userwishes to engage, the ring device may rapidly awaken from deep sleep,and may immediately send the desired Bluetooth® or other wireless signalto the user's smart phone device, triggering the designated functionfrom with the application.

After designated intervals of time in deep sleep elapse, the ring may beprogrammed to automatically awaken from deep sleep to perform adiagnostic test in order to determine the amount of power which remainsin the battery. If the test determines that the remaining power supplyis greater than one-third of the total power capacity, the device mayautomatically re-enter deep sleep mode, and remain in deep sleep untileither the next scheduled power diagnostic test, or until the userpresses the panic button. The use of deep sleep and low energyBluetooth® or other wireless signaling may enable the device to retain ausable power supply for several months before requiring a recharge orbattery replacement.

During any scheduled power diagnostic test, if the ring determines thatthere is less than one-third of power remaining, the ring may send aBluetooth® or other wireless signal to the user's smart phone which mayinitiate the sending of messages to the user and may include theirdesignated contacts, notifying the message recipient(s) that the ringbattery requires either recharging to replenish its dwindling powersupply, or additionally that the battery may need to be replaced. Themessages sent to the user and other designated contacts may betransmitted via any commonly used smart phone message transmissionmethods including SMS, email, and any other widely available methods.

As with other panic triggers described herein, the panic button may havesharp edges which allow the user to easily feel the contours of thebutton without requiring the user to look at the button to locate it. Bymerely feeling for the button with their thumb, the sharp contours ofthe protruding button edge may enable the user to locate and press thebutton without using their eyes.

When the user successfully depresses the button so that it may beregistered as clicked by the device, the act of pressing the button maycause a tactile click vibration which may enable the user to physicallyfeel and confirm that the click was successfully registered.

In certain embodiments, the ring may contain a vibrate function in orderto notify users when a panic has been successfully executed, as well asto notify them of other events which may include the arrival of rescuepersonnel, to notify the user that their smart phone or ring power isrunning low, among other useful notifications. Distinctly differentsequences of vibrations may differentiate various notifications receivedas the user feels the particular sequence of vibrations. The ring may bedesigned in a waterproof sealed casing, so that no internal electronicsare exposed to liquids if the user's hand enters water or other liquids.

In certain embodiments, the ring may contain a microphone and aprocessor which may detect designated verbal phrases, wherein adesignated phrase may cause a designated panic signal to be sent to theuser's mobile device. Further, the microphone on the ring may provideclearer audio when compared with a microphone on a mobile device whichmay be muffled due to being in the user's pocket when the verbal phraseis spoken.

In certain embodiments, if the user chooses to enable the pulsemonitoring capability of the device, the ring also may constantlymonitor the user's pulse, automatically triggering a medical panic bysending a Bluetooth® or other wireless signal to the user's mobiledevice if the user's pulse were to stop or become dangerously irregular.As with the previously described pulse monitor, the ring device mayautomatically determine that it is being correctly worn by the user, andin cases where the ring may be taken off, the ring may automaticallydetermine that it has been removed from the user's finger, rather thanfalsely determining that the user's pulse stopped.

In certain embodiments, users may also choose to activate the personalactivity and complex health statistics monitoring via the ring device,which may automatically gather and display numerous health statisticsand analysis which may be viewed at the following Internet website:www.healthprotector.us/[USER NAME]. In addition to viewing the Internetwebsite, users may also receive daily email which may include detailedstatistics gathered by monitoring the user's levels of physical activityand rest throughout the day, along with pedometer statistics, sleepanalysis, average blood pressure, and other related tests. Alongside thedetailed analysis, the user may be provided with a general summary oftheir basic activity levels throughout the day and night. Users whoseactivity levels may have fallen below certain targets may receive areminder to increase their activity, address high blood pressure, andthe like.

The following describes in detail one of several additional panictrigger devices of the present invention. In certain embodiments, thedevice may include a thumb or smaller than thumb sized, rechargeable,portable panic trigger device. The device as illustrated in FIG. 22, maybe designed to be highly portable. As shown in FIG. 22, a small LED 66may be present in the center of the panic trigger device 68. When thebattery needs recharging, in addition to other actions described below,the LED may blink with a red light continuously until the user rechargesthe device. When the user successfully pairs the panic trigger devicewith their smart phone, the LED 66 may flash with a green light forseveral seconds. The panic trigger 52 is illustrated in FIG. 22. Thispanic trigger or button may be the only button on the front of thedevice, so the user may never be confused as to which button todouble-press during an emergency.

The device may contain several physical elements with which the user canattach the device to their person. As illustrated in FIG. 23, a metalclip 74 is attached to the rear of the device, allowing the user to clipit to their belt, pocket, waistband, shirtsleeve, pocketbook strap,backpack strap, or anywhere else a clip can be attached. A tightly woundspring 70 may reside at the top of the clip, exerting constant pressureto close (or seal) the clip. A snap button 76, 78 may be present at thebottom of the clip 74. For example, the button 76, 78 may include a malesnap button 76, and a female snap button 78, which may abut theelectronic trigger device. The user may insert thin clothing in betweenthe button snaps, and then snap the button closed over the user'sclothing. This firmly attaches the device to the user's clothing. A usermay snap the button closed at the wrist area of their shirtsleeve, forinstance, and the device may remain securely in place, and alwaysreadily available to trigger a panic. Another option is for users toinsert a pocketbook or purse strap in-between the clip and close thebutton snaps. The device may be firmly attached to the pocketbook strap,backpack strap, or other object which the user always tends to have withthem at most times.

If the clothing material is too thick to enable the button snaps 76, 78to close, for instance if clipped to the waist of a user's denim jeans,the device may remain firmly in place because the clip 70 may have atightly wound spring that may exert constant pressure to close the clip.

As illustrated in FIG. 23, the metal clip 70 may also contain an opening72 which the user can attach to their keychain.

As illustrated in FIG. 24, a female USB port 80 may be present at thebottom of the device. This port 80 may be used to recharge the device byconnecting it to a computer or other USB charging station with astandard male-to-male USB cable as illustrated in FIG. 25. In additionto recharging the battery, this USB port can also be used to upgrade thefirmware of the device if and when company officials create anddistribute improvements to the firmware to the users.

The user may pair the device with their smart phone once, and after thisprecedent, the smart phone and designated trigger device may permanentlyrecognize each other when the smart phone enters the range of theBluetooth® or other wireless signal, enabling the smart phone to rapidlyreceive and act upon panic signals sent to it by the panic triggerdevice.

To trigger a panic with the physical button of the present invention,the user may double-press the panic button 52. It may not be necessaryto power the device on first, before pressing the panic button. This andother power related details are explained below. When the button isdouble-clicked, a panic signal may be sent to the pre-paired smartphone. Double-press, also known as double-click, may be used to preventmost accidental panic triggers. If the user sits on the button, forinstance, a panic is not be triggered. Once the panic signal issuccessfully received by the smart phone, the Bluetooth® or otherwireless trigger device 68 may vibrate. This vibration may serve asconfirmation that the panic has been successfully triggered. With thisfeature, the user can be discreetly reassured that professional rescuersare on the way, without alerting a potential attacker.

The panic button 52 on the device may be designed to be felt with theuser's fingers, without looking at the button. In other words, thedevice can be attached to the user's belt or outer pocket, and the usercan feel the button 52 without looking at it, because it may protrudeand may be tactile and sharp edged for the user's finger, so they canlocate it, feel it, and double press it to trigger a panic discreetly,without the user needing to turn their head to look at the button, so itcan be pressed discreetly, without a potential attacker noticing. Whenthe user presses the button 52 at least twice, the button may click in atactile, noticeable way. In other words, when the user presses thebutton, a physical click is felt by the user's fingers, so they can beaware that the button has been successfully pressed.

In certain embodiments, the panic trigger device 68 of the presentinvention may be designed to be smaller than a standard adult thumbsize. The size listed may enable it to conveniently attach to anydesired part of the user's clothing, for instance the wrist area of ashirtsleeve, for easy and constant access to the device in case ofemergency.

The trigger device of the present invention may only be used to triggerthe panic from the application on the smart phone. An additionaladvantage to housing the aforementioned features on the phone ratherthan on the trigger device is so, if a potential attacker notices thetrigger device, they can seize it and destroy it, but this does notinterfere with the rescue, because the location, audio and other datacontinue to stream from the user's smart phone, which may remain hiddenin their pocket or purse during the entire crisis. It may not benecessary for a user to physically interact with the user's smart phoneduring any portion of the crisis event, in order to trigger a panicwhich includes all the features described above. In short, attackers maybe most likely to notice and destroy or throw away the trigger devicebecause that is the device the user is using/interacting with, but afterthe panic has been triggered, there is no longer any need to possess thetrigger device for the rest of the rescue. An attacker may throw away ordestroy the trigger device, while the user's hidden smart phone maycontinue to silently gather and transmit all data needed to rescue theuser.

This panic trigger device of the present invention as illustrated inFIG. 22 may be designed to permanently remain in a deep hibernation,regarding the power. Therefore the device may never power off and may bealways powered on, at an extremely low level of power usage, only usingthe power needed to maintain a running internal clock, and to maintain awireless connection with the user's smart phone. When the user doubleclicks the panic trigger button 52, the following sequential events, asan example, may begin:

A) The device fully powers on.

B) The device sends the designated panic signal to the pre-paired smartphone via Bluetooth® or other wireless method.

C) The device vibrates when it receives confirmation from the smartphone that the signal has been successfully received. This vibrationinforms the user that the panic has been successfully triggered.

D) The device reenters deep power hibernation.

In certain embodiments, the device may be scheduled to periodicallyautomatically power itself fully on, to run a self-diagnostic process toassess the current state of the power supply. In certain embodiments, ifthe diagnostic process determines that the battery contains more than ⅓remaining battery power, the device may reenter deep power hibernation.In such embodiments, if the button contains less than ⅓ remainingbattery power, the device may not reenter power hibernation, and the LEDlight at the top of the device may constantly blink brightly with a redcolor, to notify the user that the battery is running low, and thedevice must be recharged or the battery must be replaced.

In certain embodiments, if the diagnostic test reveals that the batteryhas reached less than ⅓ remaining power, the panic button device maysend a signal to the user's smart phone, instructing the smart phone tosend an email and SMS to the user, reminding the user that it is time torecharge their panic button device or to replace the battery. After thepanic button has been fully charged, a different SMS and email messageis sent to the user, notifying them that the device is now fullycharged. This deep power hibernation solution may enable the device tofunction without recharging for several months, which may enable theuser to attach the device to an item which is with them and usable atall times for several months. As mentioned above, since the user isautomatically reminded when the device must be charged, the user may befree to ignore the existence of the device until it is needed, becausethe automatic reminders may help ensure that the device always containsadequate power with minimal user thought and minimal need for userintervention during extended safe periods where no panic may berequired.

In certain embodiments, the present invention may include a scalableserver. A web server may be commissioned and configured to facilitatedata exchange between the user, designated contacts, the ULP 24/7/365rescue center and a dedicated mobile/desktop website. The servercapacity may be predetermined to be instantly and automaticallyexpandable, so that a sudden increase in usage may cause an automatictransfer of the necessary resources to increase server capacitysufficient to serve the increased demand.

In certain embodiments, a dedicated mobile and desktop website may serveas the central data clearinghouse, where all data useful in facilitatingthe user's rescue may be available to rescuers and loved ones. When theuser triggers any panic, the designated contacts and the ULP 24/7/365rescue center may receive an SMS and email nearly instantly, indicatingthat the user is in grave danger.

Inside the SMS and email, the individual user's own unique clickable weblink may be automatically provided. As illustrated at the top of FIG.26, the user's unique web link may bring them to the rescue website. Anexample of the format of the web link may include:“www.LocateLovedOne.com/[UNIQUE USER NAME]”. Those who receive themessage with the embedded clickable web link may simply call either 911,or may also call the nearest governmental rescue precinct to the user ifthe user is in an area where the worldwide local database ofgovernmental rescue precincts provides for the user's particularlocation, to instruct them to visit the user's website. In other words,the ULP database of local governmental rescue precincts, such as policeand ambulance services, can provide the panic message-recipient with thenearest police and ambulance contact information 104 to the user'scurrent location, as illustrated in FIG. 26.

In certain embodiments, if the SMS panic message recipient lacks accessto the internet because they may use an older model of flip phone ornon-smart cellphone, the message recipient/rescuer may still receive theSMS text information including the URL for the rescue website, thereforenon-internet enabled flip phone SMS recipients may call 911, andinstruct 911 to view the user's aforementioned unique web addressbecause the user faces danger. Emergency contacts may explain to the 911operator that all ULP users understand that triggering a panic is anindication that they face danger, and that they need to be rescued.

Once professional rescuers have been rapidly notified of the crisis, andare given the user's unique web link, with their own smart phones anddesktop or tablet computers, the rescuers may be instantly armed withthe following array of data points and resources which can be used torapidly facilitate the user's rescue from any number of dangerous crisessuch as at least one of: user's current location; nearby emergencydispatch contact information; user's location history; user's previousroute path; audio; directions to the user; photo/video from the scene;ear-mounted vantage-point audio/video camera; tracking of multiple usersin family mode or institutional mode; photo of the user; emergencycontact info; instant text chat amongst rescuers and/or users, instantverbal and video communications amongst rescuers and/or users; usermedical info; panic status; user's home address; pulse monitor; toxinmonitor, bio monitor, accelerometer, pedometer, g-force monitor,barometer, thermometer, GPS and other location monitors, radiationmonitor, brainwave monitor; breathing monitor; nano-blood probes;medicine distribution patches; electrical cardiac resuscitation pads;and the like.

As illustrated in FIG. 26, the user's location 24 may appear in thecenter of the desktop website as a brightly colored icon labeled “helpme” which may appear in the center of the map. The mobile website withthe same information is shown in FIG. 27. Every few seconds, when theuser's location is updated, the help me icon may move to the user'supdated position. In certain embodiments, if the rescuer accidentallyscrolls away from the help me icon on the map and loses track of theicon, the user may select user's current location button 82, 108 on thedesktop website, as illustrated in FIG. 26 and on the mobile website, asshown in FIG. 27, after selecting the press for menu items button at thetop of the mobile screen, the mobile website menu items 132 may beshown, as illustrated in FIG. 28.

When selecting the user's current location option on the website, theHELP ME icon may center on the map. The local emergency dispatchdatabase may include the following: a comprehensive database may be usedwhich may contain contact information for all local, professional,governmental emergency dispatchers, which data are stored on thededicated server, for nearly all localities and municipalitiesworldwide. After the user's location has been determined during a panic,the nearest governmental rescue precinct contact info 104 may begathered from the server, and the phone number and other contactinformation for that local precinct may be displayed on the website, atthe top of the map, as illustrated in FIG. 26. The designated contactsand the 24/7 ULP rescue center may immediately contact the localgovernmental rescue dispatcher nearest to the user after seeing thecontact information as they arrive at the rescue website. For users incountries where governmental forces might be oppressive and antagonistictowards the user such as in war zones, the user may change thepreferences so that their own customized emergency contacts and chosenrescue centers may receive the panic messages rather than thegovernmental forces, when the user deems this to be appropriate.

In certain embodiments, when rescuers select the user location historybutton 84, 130 on the mobile and desktop websites, as illustrated inFIG. 26, and FIG. 28, a screen may appear which shows the user'sprevious locations, in increments of several seconds. An approximatestreet address and the latitude/longitude coordinates for the user'slocation may be shown with each data ping, as illustrated in FIG. 29.The user may adjust the frequency of the sending of the location pingswithin the preferences. A higher frequency of pings per minute mayimprove the rescuer's awareness of the user's latest location but it mayalso use additional battery power. The default setting may be for thepings to be sent in 30 second increments.

Using the present invention, rescuers may see colored lines on the mapwhich represent the user's past movements and current movements. On themobile website, as shown in FIG. 28, the user selects view route pathbutton 128 from the menu items, and the colored lines may appear on themap. On the desktop website, the colored lines representing the user'sprevious movements may appear on the map automatically. These coloredlines may be easily seen on the website.

After any panic is triggered, audio may be recorded live from the user'ssmart phone, and the audio signal may be streamed to the website. Eachseparate audio recording may be listed on the website with the time anddate of the audio recordings. Rescuers may listen in near real-time toaudio from the scene of a crisis, by selecting the audio from the scenebutton 86, 126 on the desktop website, as illustrated in FIG. 26 andFIG. 28, or by selecting the audio from the scene button on the mobilerescue website. When the rescuer selects the audio from the websites,they may view all listed audio files with the time and date shown. Whenthe rescuer selects any of the displayed audio files on the mobile anddesktop websites, the audio player appears as illustrated in FIG. 30.The audio counter on the audio player may appear as a clock. This mayenable listeners to note the time of day when each moment of the audiorecording took place, which can provide data to investigators, bothduring and after the crisis. When the rescuer rewinds the recording, theclock may also rewind, showing the time when that earlier portion ofaudio took place. Rescuers may be able to listen to the near-live audioas it continues to stream, and may also be able to rewind to earlierportions of the recording, as new audio continues to record andtransmit. The rescuer may return to the most recent, near-live audio byforwarding to the end of the available recording. From there, near-liveaudio continuously streams as long as the panic remains active, onto therescuers mobile smart phone, tablet, desktop, laptop or any otherInternet-enabled device.

Rescuers and emergency contacts may be instantly given directions to theuser's location. Rescuers may select/press the help me icon 24 on therescue website map as illustrated in FIG. 26. A blank address-field mayappear after the help me icon 24 is pressed, as illustrated in FIG. 31.The rescuer may enter their own current address, and the user may beprovided with turn-by-turn directions to the user's current location, asillustrated in FIG. 32. Colored lines on the map may represent thesuggested route to the user. These colored lines may be easily seen onthe website, but impossible to see in the submitted black and whitedrawings and screenshots herein.

In certain embodiments, when a panic is first triggered, the user'ssmart phone may take a photo and send it to the website. If the userpossesses the optional ear mounted video accessory, rescuers may viewnear real-time video from the user's vantage point. The video signal maybe transmitted from the ear-mounted device via Bluetooth® to the user'ssmart phone, and the smart phone may stream the video data to the mobileand desktop websites. When the rescuer selects the photo/video fromscene button 124 on the mobile and/or desktop websites, if video and/orphotos are available, they may be displayed as thumbnails, asillustrated in FIG. 33. When the rescuer selects one of the availablevideo thumbnails on either website, the video player screen appears, asillustrated in FIG. 34. On the desktop website, if the user has streamedvideo in a panic, the streaming video 98 may automatically appear on thewebsite, as illustrated in FIG. 26.

If the user possesses the designated ear-mounted audio/video/triggeraccessory, rescuers may be able to view near real-time video, from theuser's precise vantage point. This may be achieved by providing a small,ear-mounted video accessory. In certain embodiments, the camera lens maybe roughly the width of a paper clip, and may be designed to jut out infront of the user's ear, pointing forward. The device may snugly adhereto the wearer's ear. The camera angle may provide rescuers with videofrom the user's vantage point, which may greatly enhance the rescuer'sunderstanding of the user's predicament. In addition to the audio andvideo, the ear-mounted device may also serve as an additional panicbutton. In certain embodiments, a panic trigger button may be availableon the side of the device. The user may press the button the designatednumber of times for a panic signal to be transmitted to the user's smartphone via Bluetooth® or other wireless method. When the panic has beensuccessfully triggered, the ear-mounted device may vibrate, to give theuser confirmation that the panic was successfully triggered, and mayalso vibrate in distinct patterns in order to notify the user of usefulinformation, where the particular pattern of vibration may be known bythe user to mean that a particular notification may be conveyed by thevibration pattern.

In certain embodiments, the professional rescuers may be provided with aphoto of the user on the website, which may enable them to identify theuser during the rescue. As mentioned in the signup section, the user maybe prompted to take a picture of themselves as they set up theirprofile. To view the user's photo, rescuers may select photo of userfrom the menu items on the mobile website. The user photo may appearautomatically at the top of the desktop website. Underneath the photo,the time and date when the photo was taken may be listed.

When rescuers select “emergency contact info” on the mobile or desktopwebsite, rescuers and loved ones may see the email addresses and cellphone numbers of all designated emergency contacts, the nearestpolice/ambulance and rescue center. When the rescuer taps on any phonenumber on their smart phones, the rescuer may be presented with theoption to chat via text and or video, send an SMS or place a phone callto that person. If the rescuer selects SMS, they may be instantlytransported to an outgoing SMS screen with the emergency contact's phonenumber automatically entered. If the rescuer selects phone call, thestandard phone call screen may appear, and a call may be automaticallyplaced to that contact.

After receiving the SMS and email panic message, all emergency contactsand professional rescuers may instantly communicate with each other inthe designated text area on the home screen of the website, to sharevital information about the user's predicament and previous plans. Onthe mobile and desktop websites, rescuers may simply enter their name inthe chat field and then select a start button 106, as illustrated inFIG. 26. After selecting the start button 106, a standard chat windowmay appear. Various family, friends and professional rescuers mayinstantly share key information to help with the rescue. The emergencycontacts may enter text at the bottom of the window, and aftercompleting the message, they submit the text, and the message may besent to the upper chat window, as is the standard format for instantmessaging.

In certain embodiments, the user may initiate an audio and videoconference call between themselves and the various rescuers. In additionto the user's capability to initiate an audio or video conference callwith rescuers, the rescuers may also possess the capability to initiateaudio or video conference calls without the user's participation, viathe mobile and desktop websites. On the emergency contact info screen,as with the user's application, rescuers may select a listed emergencycontact and then press an “add to call” button. If the rescuer's laptopor other computer is fitted with a microphone, video camera andspeakers, they may orally and/or visually converse with several fellowrescuers at once. As with the user application, on the website, rescuersmay automatically reduce the bit rate of the phone communication, ifthis becomes necessary for any reason including reduced availablebandwidth reception.

In certain embodiments, on the mobile and desktop websites, rescuers andloved ones may be able to see medical information relating to the user,such as blood type, ailments, known allergies, and the like, byselecting the medical info button from the menu items screen. Afterselecting medical info, a separate window may open which contains allmedical information which the user previously entered via the smartphone application. As mentioned above, users may be instructed to enterrelevant medical information when they first sign up for application ofthe present invention, and the users may also update the text for thisscreen in the preferences section of the application.

As illustrated in FIG. 26, at the top of the website in an informationaldisplay box 96, the type of panic may be displayed (Silent, Loud orMedical Panic) the time the panic was triggered may be displayed, and itmay be displayed whether or not the panic is currently active orinactive. It may also be displayed if the user sent a false alarmmessage, indicating that they accidentally triggered a panic. It mayalso be displayed if the user entered a designated false password,intended to mislead an attacker into believing that the user hascanceled the panic.

As mentioned above, when the user has launched an “I am safe” signal,the following may be displayed in the panic status section of thewebsite: “I AM OK at 7:36 AM, on 02/15/13. Call to confirm if you wish.”

The informational display box 96 may be shown in the same area as allpanic status updates, in FIG. 26. When the user selects the I am safeoption or false alarm message option, the user's phone ringer mayautomatically increase to the maximum volume, to enable the user to hearphone calls from rescuers who will likely wish to call the user toconfirm that the user is indeed safe.

In certain embodiments, further information may be displayed on thewebsite. For example, the user's home address may be prominently shownon the website in addition to the user's cell phone number. The rescuermay tap the user's displayed cell phone number, thereby automaticallynavigating to the outgoing call screen on the rescuer's phone, with theuser's displayed cell phone number entered into the outgoing call field.The rescuer may only need to press the call button in order to place thecall to the user. On the mobile website, rescuers may learn the user'shome address by selecting the address of user button 114 as illustratedin FIG. 28. If the user has the optional pulse monitor, rescuers may beable to see the real time heart rate of the user in the medical infosection of the website. When the user's pulse exits the safe range, amedical panic may be automatically triggered and the website may flashred, indicating that the user's pulse has reached a dangerous level.This may be displayed on the front page in the panic status section ofthe website, regardless of whether the rescuer has navigated to themedical info section of the website. Therefore, when the user's pulsereaches a dangerous threshold, the user's pulse monitor status may beforced to the front of the website to instantly notify all rescuers ofthe user's current pulse status.

If the user wears the designated brain wave monitor, rescuers may beable to see if the user is having a seizure, a stroke, or many otherbrain conditions. The brainwave monitor may automatically send theuser's current brain status to the website, so rescuers may understandthe nature of the user's brain related issue. In addition to the visualbrainwave monitor, a basic text description of the user's brain-relatedcondition may be shown next to the brainwave monitor. As with the pulsemonitor described above, if the user is experiencing a brain relatedcrisis, a medical panic may be automatically triggered, and this issuemay be automatically diagnosed with the preliminary assessment displayedin the panic status section of the website, and the applicable visualmonitor may be automatically pushed to the front page of the website,regardless of whether or not the site viewer selects medical info.

If the user wears the optional breathing monitor, rescuers may be ableto determine whether or not the user is breathing, in the medical infosection of the website. If there is an indication that the user hasstopped breathing, or is not breathing within a safe range, a medicalpanic may be triggered and the user's breathing status may be pushed tothe front of the website.

If the user has injected the designated nano blood probes, the rescuersmay determine whether or not the user's vital blood levels are normal,including whether or not the user's blood reveals the need for a newdose of essential medication. This information may be shown on thewebsite in the medical info section, and if the situation becomesurgent, the front of the website may be notified with the current urgentstatus. The multiple blood probe monitors, which may be roughly the sizeof red blood cells, may continue to travel throughout the user's bloodstream until they are removed with a doctor's assistance. The bloodprobes and other optional accessories are detailed below.

If the user needs a dose of essential medication while the user iswearing the designated transdermal medicine distribution patch, theusers who have been instructed by their doctors to receive regular dosesof prescribed medicine may be able to program the medicine distributionpatch to release a predetermined dosage at predetermined time intervals.The user may also be able to have medicine automatically administered ifthe blood probes determine that a new dose is unexpectedly needed, andthe blood probes communicate with the medicine patch, instructing it torelease the correct dose of medicine to the user, which is distributedthrough the user's skin. The website may inform rescuers of the user'ssituation regarding their medicine in the panic status section of thewebsite and also in the medical info section on the website.

In certain embodiments, a medicine dispersal and containment chamber maybe surgically implanted in the user. When the blood probe determinesthat the user urgently requires large doses of the medicine in question,(such as the commonly large doses needed for anti epileptic seizures)the medicine distribution chamber may release the designated amount ofthe drug. The chamber may be surgically positioned so that the refillentrance may be readily accessible beneath the skin. The doctor mayinject the refill of the medicine directly through the user's skin, intothe distribution chamber. If, for instance, a user suffers from severeepileptic seizures, when the brainwave monitor determines that a seizurehas begun, the brainwave monitor signals the ULP application, and fromthe smart phone, the application may direct the proper dose of medicineto be released from the implanted large dose medicine distributionchamber. When the chamber releases the medicine, the user's medicinestatus may be displayed in large type font at the top of the home screenof the website, informing all rescuers. Also, if the user's medicinestatus is in crisis, this info may be sent via SMS and email to alldesignated contacts.

In certain embodiments, two portable pads may adhere to the user's chestwith an adhesive and also may cling to the user's chest via flexiblestraps which go fully around the user's body in order to hold the padsin the correct place. The pads, which contain sensors and local CPUprocessing capabilities to receive and interpret the sensor readings,may be able to discern whether or not they are correctly fastened to theperson's chest, and are also able to detect the user's heart rate at alltimes. When the heart stops beating, the sensors may recognize this, amedical panic may be automatically triggered, and the pads mayadminister the correct amount of electrical impulse to defibrillate theuser's heart. The process may automatically cease as soon as the sensorsdetermine that a safe heart rate has been restored. The user's heart ismonitored on the main home screen of the rescue website automatically assoon as the irregular heart-related issue is discovered by the heartsensor/pads. In addition to the visual heart monitor on the website, abasic text description of the user's medical issue may be shown on thefront of the website, along with a visual monitor of the user's heartfunctions. All defibrillation activity may be listed in the panic statussection of the website.

In certain embodiments, trained personnel may be utilized and may beprepared to receive a panic signal via methods such as SMS or email fromany user, at any hour, on any day, from the rescue center. These trainedpersonnel may await the panic messages from multiple computer centers,located hundreds of miles apart throughout North America. This may beused for continuous service in case a severe local disaster strikes,potentially causing one particular rescue center to lose power. If poweris lost in one or even several regional rescue centers, rescue servicemay not be disrupted because distantly located redundant centers mayseamlessly continue to provide service. In certain embodiments, therescue personnel may be instructed to adhere to the followingguidelines:

A) When any panic message is received, rescuers first must click on theuser's unique web link within the panic message, bringing them to theuser's rescue website.

B) Upon arriving at the website, rescuers should immediately beginlistening to streaming audio from the scene, and if available, video andor photos. If it is impossible to discern any information useful indetermining the severity of the user's situation, the rescuer shouldcontact the nearest rescue precinct to the user, with the correct phonenumber for this precinct automatically provided on the header of theuser's website. After the user's own location is determined, the nearestpolice and ambulance is displayed, with their contact info.

C) The rescuer tells the local rescue dispatcher that the user is inpotentially life threatening danger, and provides them with the user'sunique location and information website, “www.LocateLovedOne.com/[UNIQUEUSER NAME]”. The local professional rescue precinct may be instructed tofind and rescue the user immediately using the Internet website.

D) After notifying the local police precinct, designated rescuers remainavailable to communicate with the user's emergency contacts via multipleways including the chat text, SMS, audio and/or video section on thehome screen of the rescue website, described earlier.

E) The rescue center may maintain continuous communications with thepublic rescue dispatcher throughout the crisis and may relay all statusupdates to the designated contacts including campus security ifapplicable.

F) In cases where the user is able to speak freely, under no duress, ifthe user wishes, they may call the rescue center directly, and therescue center may connect the user's phone call as with a conferencecall, as detailed herein, so the user can simultaneously speak with therescue center, the local 911 precinct, and possibly with the user'sparent, guardian or other loved one if the user suggests it to therescue center. If the user initially believes that it is safe to place aphone call to the rescue center and rescuers, but suddenly learns thatit is not safe for this conference call to be audible, there is a large“MUTE” button on the user's screen during the call. When any participantselects mute, all audio from that participant's computer is silenced,and all other website attendees can see that this participant hassilenced their audible audio. To be clear, if the user selects mute asdescribed, audio from the user may still continues to be recorded and tostream to the website where it may be stored for current and or lateruse. Therefore, when the user selects mute, they are silencing audibleaudio from being heard in their present location, from the user's smartphone sound speaker. When this mute mode is activated, as normal duringpanics, sound from the user's position may be discreetly transmitted toand recorded on the website for rescuers to examine in near-realtime,and also at a later time.

G) If the rescue center receives a “False Alarm Message”, or if the usercancels the panic, the rescue center is directed to immediately call theuser's cell phone, to confirm that the user is safe. If the rescuecenter determines that the user is safe, all emergency contacts and 911may be immediately notified by the rescue center.

H) If the rescuer is able to reach the user via phone call, the rescuermay ask the user to say their password. If the user says the correctpassword, the local public rescue precinct may be immediately notifiedthat the user is now safe, and no longer in need of professional rescueservices.

I) If the user gives the designated false password, the rescuer notifiesthe public rescue precinct that the user is attempting to deceive anattacker by pretending to cancel a panic, but in reality, the user haspurposely given the designated false password, indicating that the usermay be under duress and may be attempting to deceive an attacker intobelieving that the user is canceling the panic mode. In reality, therescuers may continue to monitor data streamed from the user and tosearch for and rescue the user. Therefore, if the user enters a wrongpassword, the panic is not canceled, and the user is prompted to enterthe correct password. Only when the user enters the designated falsepassword do the actions described above take place.

In certain embodiments, the present invention may include the flexiblebracelet mentioned above. This flexible bracelet device may contain atleast one of sensors which constantly monitor information including theuser's pulse, accelerometer data and audio via an attached microphone.If the user's pulse stops or becomes dangerously irregular, the braceletmay send a signal via Bluetooth® or other wireless method to trigger amedical panic on the user's phone. From the website, the rescuers mayview the user's pulse via a visual pulse monitor which may appear on thefront of the website if the user's pulse enters a dangerous range. Ifthe user's pulse is within a normal range but the user suddenly findsthemselves in a dangerous crisis, they can press the panic triggerbutton attached to the bracelet the designated number of times at leasttwice, in order to trigger a panic. In addition to sensors which maydetect the user's pulse rate, the pulse monitor sensors also may detectwhether or not the monitor is being worn correctly by the user. In otherwords, if the user removes the pulse monitor from their wrist, nomedical panic is triggered, because the device may detect that it is nolonger correctly positioned on the user's wrist.

In certain embodiments, the present invention may include a flexibleelastic device meant to be worn on the user's head, containingelectrodes which constantly monitor the user's brain activity. If theuser has frequent seizures, for instance, when the user begins to have aseizure, the brainwave monitor may send a signal via Bluetooth® or otherwireless method to the user's smart phone to trigger medical panic, andto display the user's real time brainwaves for medical personnel tostudy, to better understand the nature of the brain-related crisis. Onthe main screen of the website, in large letters, it may be displayedthat the user is currently having a seizure. The brainwave monitor maydetect all brain-related crises such as stroke, blunt impact or seizure,and may automatically trigger a medical panic. Medical professionals mayview the user's brain waves in order to better understand the type andseverity of the brain issue. The sensors on the brainwave monitor alsomay detect whether or not the monitor is being worn correctly by theuser. Therefore, if the user removes the brainwave monitor from theirhead, no medical panic may be triggered, because the device hasdetermined that it is no longer correctly positioned on the user's head.If the user's brainwaves are safely within a normal range, but the usersuddenly finds themselves in a dangerous crisis, they may press thepanic button the designated number of times more than twice, which maybe attached to the side of the brainwave monitor hat, and a panic may betriggered. Therefore, as with other optional accessories, an alternatepanic trigger device may be contained on this accessory.

In certain embodiments, the present invention may include a breathingmonitor as mentioned above. The breathing monitor may rest in the user'sshirt pocket and remain in place with a sturdy metal clip. If the userstops moving/breathing, the device may send a medical panic signal tothe user's smart phone. The user's breathing status may be shown on thefront of the website if the breathing is dangerously abnormal or absent.The breathing monitor may contain sensors which are able to detectwhether or not the monitor is correctly positioned on the user. If theuser removes the breathing monitor, no panic may be triggered becausethe device may detect that it is not being worn. If the user isbreathing normally, but they suddenly find themselves in a dangerouscrisis, the user may double-press the small panic trigger button whichresides on the breathing monitor and a panic is triggered.

In certain embodiments, numerous nano blood probes may be surgicallyimplanted into the user's bloodstream. When, for instance, the bloodprobes sense that the user may be in need of large doses of a certainmedicine, (such as anticonvulsant medicine to treat a seizure) thesurgically implanted medicine distribution chamber may release the drugusing a similar mechanical procedure as the transdermal medicinedistribution patch. Namely, the medicine reservoir may remain sealedwithin the chamber until the robotic levers release the medicinedirectly into the user's bloodstream when it receives the designatedinstruction from the blood probes, brainwave monitor, other relatedhealth accessories, or at a predetermined time. If a doctor wishes toschedule a time for the medicine to be released, the user and doctor mayinterface with the device and program the desired instructions. Thechamber may be surgically positioned so that the refill entrance may bereadily accessible near the surface of the user's skin. The doctor mayinject the refill of the drug directly through the user's skin, into thedistribution chambers. There may be multiple, separate chambers designedto house different medicines, all separate from each other, and allsealed off from the user's bloodstream until the user needs them. Thematerial surrounding the reservoir may respond to the injection byforming a seal over the newly punctured hole. This is done to preventmedicine from seeping into the user's blood stream until it is desired.Therefore, after an injection is carried out, the puncture caused by theinjection may be automatically re-sealed, to prevent any medicine fromescaping the medicine reservoir until the chamber receives the commandfrom the user and doctor. As an example, if the user in question isallergic to bee stings, when the blood probe determines that the userhas been stung by a bee, the probe may signal the ULP application, andfrom the smart phone, the application may direct the proper dose ofepinephrine to be released from the implanted medicine chamber. Thechamber may include several sub-chambers, which may each containdifferent medicines to be released on different schedules. For instance,one chamber may contain epinephrine, and 4 chambers may contain insulin.Regarding the power for the device, as with the blood probes, themedicine chamber may be recharged with a wireless platform. When thebattery runs low on the chamber, the chamber may send a signal to theuser's phone, directing the user's phone to automatically send an SMSand email to the user in order to inform the user and doctor that it maybe necessary to recharge the medicine chamber. The user may hold thecharging platform near the location of the implanted device, and whenthe charge is complete, the chamber may instruct the user's phone tosend the user an SMS and email on their smart phone, which may notifythe user that the charge is complete. When the blood probes or otherdevices direct the chamber to release medicine, the user's medicinestatus may be displayed on the home screen of the website, informing allrescuers.

In certain embodiments, the present invention may include automaticallyenabled cardiac defibrillation pads. The two portable pads may stick tothe user's chest with an adhesive, and the pads alternatively may beheld against the user's chest via elastic straps which may firmly holdthe pads in place. The pads, which contain sensitive sensors and localCPU processing capabilities to receive and interpret the sensorreadings, may automatically detect whether or not they are correctlyfastened to the person's chest, and also may be able to detect theuser's heart rate. If the user's heart stops beating, the sensors maydetect this and the pads may administer the correct amount of electricalimpulse to defibrillate the user's heart. The process may automaticallycease as soon as the sensors determine that a safe heart rate has beenrestored. A medical panic may be triggered and all heart information maybe pushed to the front of the rescue website. The pads may be rechargedwith the wireless charging pad.

The ULP nano-blood-probes, as mentioned above, may circulate through theuser's body continuously until removed. The probes may be roughly 5micrometers in length, slightly smaller than standard red blood cells.The devices may be constructed with carbon atoms in a diamond pattern tomaximize their strength. They may contain CPU, robotic arms capable ofgrasping and analyzing various cells and other objects; with sensorscapable of detecting the presence and concentration of any physicalsubstance. The probes may be able to seek out and destroy certaindesignated cells with at least one of a robotic drill, a vise, anelectrical shock, the delivery of a particular substance to a designatedcell, among other techniques which may be used in order to destroy cellssuch as cancer cells, designated bacteria, designated viruses and anydesignated microbes as directed by the user and their authorized medicaladvisors. In addition to recharging the battery via the magneticcharging pad, the blood probes may have the ability to harness energypresent in glucose in the user's bloodstream. The probes may at leastpartially replenish their batteries by converting the available bloodglucose into usable electricity.

After injecting the blood probes, the user's blood levels may beconstantly monitored by the probes to ensure that proper levels of allsubstances are within healthy ranges. If, for instance, the userrequires a steady dose of medicine to prevent the onset of psychoticsymptoms if the user suffers from severe Schizophrenia, when the bloodprobes detect that the user's blood may be running low on the designatedmedicine, the probes may send a signal to the user's phone, which thenmay signal the user's medicine distribution patch or the implanted largedose medicine distribution chamber to administer the appropriate dose ofmedicine into the user's bloodstream. The blood probes may wirelesslyinstruct the surgically implanted large dose medicine distributionchamber to release larger doses of medicine than the transdermalmedicine distribution patch may contain and administer. The large dosechamber may also slowly release medicine as is necessary to maintainsymptom relief for a user with Schizophrenia, for instance, requiringfewer refills than the transdermal medicine patches.

The blood probes may constantly monitor all key blood levels, and if acrisis is detected because, for instance, the user's oxygen or insulinlevels are dangerously low, the probes may send a signal to the user'sphone, which then triggers a medical panic, notifying all emergencycontacts that the user is having a medical crisis. The known details ofthe crisis as determined by the probes may be sent to the rescueclearinghouse in order for rescuers to understand the nature of theemergency. In certain embodiments users and doctors may interface withand recharge the blood probes by using the wireless charging andinterface device in addition to the conversion of blood glucosementioned above.

To charge the battery contained within the wireless charging pad, it maybe plugged into a wall outlet. Once the charging pad's battery is full,the user may bring the charging pad with them in a mobile fashion,enabling the user to recharge and/or interface with the blood probes andother accessories while they are away from stationary power. It may alsobe possible to use the charger/interface pad when the battery fullydepletes if the pad is plugged into the wall outlet.

The blood probes may be magnetized to the opposite polarity of thecharging/interface pad, hence, when the probes arrive at the user's armduring normal blood circulation, and the user's arm is resting on thecharging and interface pad, the probes may remain stationary when theyreach the magnetic field from the charging interface pad. While theprobes remain suspended in the magnetic field, the probes may berecharged and may also be reprogrammed with new instructions by the userand their doctor.

The charging and interface pad may link via WIFI or other wireless meansto a computer terminal through a secure web portal, with which the userand doctor may be able to transmit new instructions to the probes, asthe batteries are being recharged. When the power has been fullyrestored, the probe may send a signal to the user's phone via thecharging pad. When the user's phone receives this signal, an SMS may besent to the user's phone along with the designated medical contact, tonotify them that the probes have been successfully recharged, and whenapplicable, when the probes have successfully received the newinstructions.

With the transdermal medicine distribution patches, users who may havebeen instructed by their doctors to receive regular doses of prescribedmedicine may program the patches to release a predetermined dosage afterpredetermined time intervals. The patches may be attached to the user'sskin via an adhesive 138, and once correctly attached, the patches mayremain in place even if the user enters water. As illustrated in FIG.37, before the patch has been instructed to distribute the medicine, themedicine shield 140 may block the medicine reservoir 142, fromcontacting the skin. As illustrated in FIG. 38, when the user and theirdoctor instruct the medicine shield 146 to move to the side on themotorized levers, the medicine reservoir 142 may be directly exposed tothe user's skin 144 where the medicine is absorbed into the skin at thepredetermined dosage. After the desired amount of medicine has beendispersed, the motorized levers may re-seal the medicine shield 140blocking further absorption. For example, with a Schizophrenic patientwhose doctor prescribes a steady dosage of a medicine, the medicinedistribution patch may automatically withhold and release medicinetransdermally, according to the instructions entered by the doctor.

The user and doctor may issue instructions for the transdermal medicinedistribution patch through the user's individual web page such as,“www.LocateLovedOne.com/[UNIQUE USER NAME]”. The following may includeexample instructions on how to use the patch:

A) The user and doctor, or anyone who may wish to modify the medicinedistribution settings, may prove that they are authorized to modifythese settings by being subjected to multiple layers of passwordsecurity.

B) After the correct passwords have been entered, the user and doctormay determine the dosages to be released after the appropriate timeintervals, or alternatively to instantly release medicine upon detectingthe onset of designated symptoms.

C) The doctor fills the drug reservoir for each patch. Users may utilizemultiple patches if there is enough skin available for patches withoutexcessive amounts of body hair. The drug reservoirs may be refilledwhile they are still adhered to the user's skin, and may also berefilled before the user attaches the patches.

D) Users may recharge the batteries in the patches without removing themfrom their skin by holding the wireless charging pad next to each patchuntil the patch sends an SMS to the user's phone, which may notify theusers that the devices have been fully charged.

E) The transdermal patches may be designed so that the medicine is keptin a separate compartment from the user's skin until it is needed.Therefore, the medicine may not make contact with the user's skin untilthe user has decided for their skin to make contact, and programmed thedevice to release the medicine at the desired times and under thedesignated detected circumstances via the user's unique web page, suchas: www.LocateLovedOne.com/[UNIQUE USER NAME]

When the patches receive an instruction to administer the medicine, athin barrier may slide to the side, enabling the drug reservoir to makecontact with the user's skin. Multiple compartments may be availablewith separate sliding barriers, so the medicine may be deliberatelyadministered in a staggered fashion, at whichever schedule the user anddoctor may have chosen via the web portal above. In certain embodiments,the patches may interface with the ULP application, website, emergencycontacts and the rescue center. For example, the patches may do thefollowing:

A) When all doses are administered, the patches may send a signal to theuser's cell phone, and the ULP application may notify emergencycontacts, the website and the rescue center that the medicine has beensuccessfully administered.

B) After any dose is administered, the current remaining amount ofmedicine in the drug reservoirs may also be transmitted to the website.When the sensors in the drug reservoirs determine that a refill isurgently necessary, the patches may trigger a medical panic, alertingall emergency contacts and the rescue center of the situation regardingthe medicine.

C) If the patch malfunctions and does not successfully administer themedicine, a medical panic may be triggered and the malfunction may bedescribed on the front of the website.

In certain embodiments, when users and doctors instruct the blood probesto assess levels of an important substance, and that substance hasfallen below safe levels, the blood probe may signal the ULP applicationwhich then may signal the medicine distribution skin patches to releasethe desired dosage of the medicine in question, directly through theuser's skin via the skin patches. For example, the sequential actionsmay include the following:

A) Blood probe determines that the user is in need of a dose of themedicine available in the skin patch.

B) The blood probe notifies the ULP application.

C) The user's smart phone signals the patches via Bluetooth® or otherwireless method, instructing it to administer the correct dose ofmedicine.

D) When the blood probes observe that the optimal levels of the drughave entered the blood stream, the patch sliding barrier closes, sealingoff the drug from the user's skin.

The computer-based data processing system and method described above isfor purposes of example only, and may be implemented in any type ofcomputer system or programming or processing environment, or in acomputer program, alone or in conjunction with hardware. The presentinvention may also be implemented in software stored on acomputer-readable medium and executed as a computer program on a generalpurpose or special purpose computer. For clarity, only those aspects ofthe system germane to the invention are described, and product detailswell known in the art are omitted. For the same reason, the computerhardware is not described in further detail. It should thus beunderstood that the invention is not limited to any specific computerlanguage, program, or computer. It is further contemplated that thepresent invention may be run on a stand-alone computer system, or may berun from a server computer system that can be accessed by a plurality ofclient computer systems interconnected over an intranet network, or thatis accessible to clients over the Internet. In addition, manyembodiments of the present invention have application to a wide range ofindustries. To the extent the present application discloses a system,the method implemented by that system, as well as software stored on acomputer-readable medium and executed as a computer program to performthe method on a general purpose or special purpose computer, are withinthe scope of the present invention. Further, to the extent the presentapplication discloses a method, a system of apparatuses configured toimplement the method are within the scope of the present invention.

It should be understood, of course, that the foregoing relates toexemplary embodiments of the invention and that modifications may bemade without departing from the spirit and scope of the invention.

What is claimed is:
 1. An apparatus comprising: a button included in aring worn on a finger, the button configured to be depressed by a thumbof a hand that includes the finger, and the ring configured to generatea non-telephonic signal indicating an event in response to depressing ofthe button; one or more processors; and a storage medium storinginstructions that, when executed by the one or more processors, areconfigured to cause the one or more processors to perform operationscomprising: receiving, through a network connection, contact informationcorresponding to a designated list of information recipients; receivinga non-telephonic signal indicating the event, wherein the signal isactivated by a user pressing the button a designated number of times;receiving information regarding the event; in response to receiving theinformation regarding the event, determining a predetermined user actionrequest based on the designated number of times the button is pressed;identifying a current mode of operation, wherein the current mode ofoperation comprises one of a real mode or a test mode, wherein the realmode corresponds to an operation of the ring to summon help for the userand the test mode corresponds to trial use to learn features of thering; in response to determining the user action request corresponds toactivating a transmission of information and upon identifying thecurrent mode of operation, determining whether to contact a rescuecenter, wherein determining whether to contact the rescue centercomprises: in response to determining that the current mode of operationis the real mode, performing at least one of (i) transmitting theindication of the event to the rescue center or (ii) transmitting theinformation regarding the event to the information recipients from thedesignated list, and in response to determining that the current mode ofoperation is the test mode, transmitting the information regarding asystem test to the information recipients from the designated list; andconditioned on determining to contact the rescue center, transmitting anindication of the event to the rescue center over the network connectionto prompt a participant of the rescue center, different from the user,to make a decision about a course of action regarding the event in orderthat the information regarding the event can be transmitted to at leastone of the information recipients from the designated list or a publicauthority, based at least in part on the decision.
 2. The apparatus ofclaim 1, wherein when the designated number of presses of the buttoncorresponds to a silent panic mode, the operations further comprising:in response to determining that the current mode of operation is thereal mode, transmitting the indication of the event to the rescue centerand the information recipients from the designated list withoutproducing an audible sound; and transmitting at least one of recordedaudio information, video information, image information, locationinformation or medical information to at least one of the rescue centeror the information recipients from the designated list.
 3. The apparatusof claim 1, wherein when the designated number of presses of the buttoncorresponds to a loud panic mode, the operations further comprising: inresponse to determining that the current mode of operation is the realmode, transmitting the indication of the event to the rescue center andthe information recipients from the designated list; transmitting atleast one of recorded audio information, video information, imageinformation, location information or medical information to at least oneof the rescue center or the information recipients from the designatedlist; and producing, using an audio speaker, a loud spoken warning thatstates that at least one of video, still images, audio or locationinformation has been successfully transmitted to a public authority. 4.The apparatus of claim 1, wherein when the designated number of pressesof the button corresponds to a medical panic, the operations furthercomprising: in response to determining that the current mode ofoperation is the real mode, transmitting a medical alert to at least oneof the rescue center or the information recipients from the designatedlist; displaying, on a graphical user interface, customized options thateach correspond to a description of a specific medical emergency,wherein upon user selection of a customized option, information about aspecific medical emergency corresponding to selected option is conveyedto at least one of the rescue center or the information recipients fromthe designated list; and transmitting at least one of recorded audioinformation, video information, image information, location informationor medical information to at least one of the rescue center or theinformation recipients from the designated list.