Automatic emergency call activation and notification system and method using supporting emergency notification server

ABSTRACT

An Automatic Emergency Call Initiator (AECI) initiates an automatic emergency call protocol on a mobile communication system, which can be done using signaling messages. The user uses the AECI to initiate the call on a mobile station. GPS or other location data is automatically determined. Data is stored on an Emergency Notification Server (ENS) associated with an event identifier for easy retrieval or notification to emergency responders. The ENS generates an automated call to a call center and also supports the automatic emergency call protocol by storing GPS and identifying info on mobile stations meeting location criteria of the AECI initiated call. The ENS can also tag a mobile station to continue tracking mobile stations coming within a specified distance of the mobile station. A security alert protocol for predetermined mobile stations detected by a network can also be implemented using the ENS.

RELATED APPLICATIONS

This application claims benefit of U.S. Provisional Application61/018,617 filed Jan. 2, 2008, which is incorporated herein.

TECHNICAL FIELD OF THE INVENTIONS Background of the Inventions

Wireless communication device and network for automatically contactingemergency response services.

BACKGROUND OF THE INVENTION

Internet Protocol

The Internet Protocol (IP) has become the standard for packet-basedcomputer and wireless communications. The IP communication protocolgoverning data transmission between different networks is referred to asthe Internet Protocol (IP) standard. The IP standard has been widelyadopted for the transmission of discrete information packets acrossnetwork boundaries. In fact, the IP standard is the standard protocolgoverning communications between computers and networks on the Internet.Using the IP standard, computers on different networks communicate withother computers across their network boundaries.

The IP standard identifies the types of services to be provided to usersand specifies the mechanisms needed to support these services. The IPstandard also specifies the upper and lower system interfaces, definesthe services to be provided on these interfaces, and outlines theexecution environment for services needed in the system.

A transmission protocol, called the Transmission Control Protocol (TCP),was developed to provide connection-oriented, end-to-end datatransmission between packet-switched computer networks. The combinationof TCP with IP (TCP/IP) forms a suite of protocols for informationpacket transmissions between computers on the Internet. The TCP/IPstandard has also become a standard protocol for use in all packetswitching networks that provide connectivity across network boundaries.

In a typical Internet-based communication scenario, data is transmittedfrom an originating communication device on a first network across atransmission medium to a destination communication device on a secondnetwork. After receipt at the second network, the packet is routedthrough the network to a destination communication device, and theTCP/IP protocol determines this routing. Because of the standardprotocols in Internet communications, the IP protocol on the destinationcommunication device decodes the transmitted information into theoriginal information transmitted by the originating device.

TCP/IP Addressing and Routing

Under the TCP/IP protocols, a computer operating on an IP-based networkis assigned a unique physical address called an IP address. The IPaddress can include: (1) a network ID and number identifying a network,(2) a sub-network ID number identifying a substructure on the network,and (3) a host ID number identifying a particular computer on thesub-network. A header data field in the information packet will includesource and destination addresses. The IP addressing scheme imposes aconsistent logic addressing scheme reflecting the internal organizationof the network or sub-network. Each component node on the IP network canbe assigned a unique IP address.

A router is used to regulate the transmission of information packetsinto and out of the computer network. Routers interpret the logicaladdress contained in information packet headers and direct theinformation packets to the intended destination. Information packetsaddressed between computers on the same network do not pass through arouter on the boundary of the network, and as such, these informationpackets will not clutter the transmission lines outside the network. Ifdata is addressed to a computer outside the network, the router on thenetwork boundary forwards the data onto the greater network.

TCP/IP network protocols define how routers determine the transmissionpath through a network and across network boundaries. Routing decisionsare based upon information in the IP header and corresponding entries ina routing table maintained on the router. A routing table contains theinformation for a router to determine whether to accept an informationpacket on behalf of a device or pass the information packet onto anotherrouter.

The IP-Based Mobility System

The Internet protocols were originally developed with an assumption thatInternet users would be connected to a single, fixed network. With theadvent of cellular wireless communication systems using mobilecommunication devices, the movement of Internet users within a networkand across network boundaries has become common. Because of this highlymobile Internet usage, the implicit design assumption of the Internetprotocols (e.g. a fixed user location) is violated by the mobility ofthe user.

In an IP-based mobile communication system, the mobile communicationdevice (e.g. cellular phone, pager, computer, etc.) can be called amobile node or mobile station. Typically, a mobile station maintainsconnectivity to its home network while operating on a visited network.The mobile station will always be associated with its home network forIP addressing purposes and will have information routed to it by routerslocated on the home and visited networks. The routers can be referred toby a number of names including Home Agent, Home Mobility Manager, HomeLocation Register, Foreign Agent, Serving Mobility Manager, VisitedLocation Register, and Visiting Serving Entity.

IP computer networks also include one or more network elements orcomponents besides routers, such as hubs, switches, bridges, repeaters,gateways, and computer servers. Computer servers provide services toother computers and support the transfer and communication of data overthe network. Common servers include authentication, authorization, andaccounting activity (AAA) servers, Web servers, mail servers, gatewayservers, and Local Area Network (LAN) servers. The various componentscan also be referred to as nodes.

Cellular and Mobile Communication Technology

A typical cellular communication system is comprised of multiple cellsites, each covering an intended geographic region. Each of the cellsites can be assigned an address for routing information packets, andeach of the Mobile Stations can be assigned an address for theirphysical connectivity to the cell site.

Each cell site supports voice and data communication to the linkedMobile Stations present within that geographic area. A wirelesscommunication link is maintained by a transceiver at or very near thecenter of the cellular coverage area. The transceiver is coupled to abase station transceiver substation which is coupled to a base stationcontroller that controls the packet transmissions within the cell sitearea. The base station controller is also coupled to a mobile switchingcenter, which routes calls handled by the base station controller andbase transceiver station to a public switched telephone network or apacket data service node interface with the Internet.

Information packets on the communication system are processed by thebase station controller for transmission to the public switchedtelephone network or the Internet. The base station controller processesthe information packets for transmission to the public switchedtelephone network, the Internet, or the Mobile Station. As a MobileStation moves across cellular boundaries, it changes its connectivityand its connectivity address, which it updates using signaling messages.Routers on the communication network have to be updated with this newconnectivity address so that information packet can continue to beproperly routed. The address used for routing can be a single IPaddress, a combination of an IP address and a connectivity address, orsome other similar addressing scheme providing packet routing data onthe communication network corresponding to the physical connectivity ofthe Mobile Station.

Telecommunication networks are complex networks used to establishconnections between two or more telecommunication devices. Frequently,the devices involved with a telecommunications call or connection arereferred to as the originating device and the terminating device. Theuser typically enters an identifying number into the originating deviceof the terminating device to which a call is to be placed. The networkresponds to entry of the identifying number of the terminating deviceand performs a call setup procedure that establishes, among otherthings, a connection between the originating device and the terminatingdevice using IP addressing. Call data, voice or multimedia, is thenrouted between the two devices according the IP addressing assigned toeach device.

Voice and data transmitted according to the IP packet standard is theevolving and most current communication protocol for cellular telephonecommunication. With this migration to the IP standard andminiaturization of computer chip technology, with dramatic increases inclock speeds, computational power, and memory storage, has comeincreasingly sophisticated services such as email access, streamingvideo and audio data transfers, instant messaging, text messaging,multimedia applications, picture messaging, Internet website access,e-commerce applications, games, and other services. Cell phones andother mobile stations have accordingly evolved from relatively crudedevices limited to telephony communication to near mini-computers withoperating features and capabilities equal to if not superior to earlypersonal computers.

Mobile Stations (MS) roam within and across cellular communicationsites. Each of the cells possesses one or more transceivers coupled to aBase Transceiver Station (BTS) on the communication network. The BTSsare in turn coupled to a Base Station Controller (BSC). As a MS migratesacross cellular borders, its BTS physical connection changes. A MS canbe physically located anywhere on the network or sub-network, and itsrouting address data will change and require updating on other nodes.Wireless IP networks handle the mobile nature of the MS with hand-offprocedures designed to update the communication network and sub-networkwith the location of the MS for packet routing purposes. Because the MScan move within sub-networks and between networks, hand-off proceduresare needed to insure that data packets are continually routed to therecipient MS as it moves from one network to another or from onesub-network to another. As the MS roams across the cells, the MSregisters its location with the BSC and its home agent with registrationmessages (e.g. signaling messages, also sometimes referred to as“pings”). Using header extension formats, mobile IP registrationmessages can be utilized to convey various different data elementsaccomplishing a variety of tasks.

Cellular and associated communication technology has progressed rapidly.Mobile IP devices have evolved integrating several communicationtechnologies, such as telephony (e.g. voice), messaging, presence,streaming video, and Internet. Global Positioning Satellite (GPS)technology has also been integrated into many mobile IP devices. Apresent-day mobile communication system is shown in FIG. 1, where thePublic Switched Telephone Network (PSTN) 60 is connected to a MobileSwitching Center/Visiting Location Register (MSC/VLR) 40 router. TheMSC/VLR 40 is coupled to a Base Station Controller (BSC) 35. The BSC 35controls the packet transmissions to Base Transceiver Stations (BTS) 20,25, and 30, which perform communications within the three cell sites 5,10, and 15.

Communications on the communication system are processed by the BSC 35for transmission to the PSTN 60, the Internet 70, or the mobile stations(MS) located within each cell site 5, 10, and 15 according todestination address data in the packet header. The MS 65 is coupled toBTS 20 by wireless signal 66. For communications being transmitted to MS65, the BSC 35 will transmit the communication to the BTS 20. The BTS 25and 30 are also connected to the BSC 35. Communication from the MSC/VLR40 flows to the BSC 35 and then to the BTS 20. The BTS 20 transmitscommunication via a wireless communication link 66 to the MS 65.Reciprocal communications from MS 65 will be processed by theabove-identified equipment in the reverse order described above. In thismanner, the MS 65 will be coupled to the communication system, the PSTN60, and the Internet 70 through these connections and system nodes.

The communication system's network core includes a Gateway GPRS SupportNode (GGSN) 45 coupled to the MSC/VLR 40 as well as a Serving GPRSSupport Node (SGSN) 50. The GGSN 45 is also connected to the Internet 70and provides communication to and from the Internet 70. The SGSN 50 isalso connected to a Home Location Register (HLR) 55, and the HLR 55 isconnected in turn to the MSC/VLR 40. The nodes can share the samephysical boxes, physically linked and separate, or even linked usingrouters.

Mobile IP Extensions

Extensions have been defined in the IP protocol, and extensions can beused in similar protocols, to support transmission of variable amountsand types of data in an information packet. This includes addressinformation for mobile nodes, routers, and networks. The extensionmechanism in IP permits appropriate addressing and routing informationto be carried by any information packet, without restriction todedicated message types such as discovery, notification, control,registration, and routing data packet formats.

Global Positioning Satellite Technology

Cell phones have incorporated Global Positioning Satellite (GPS)technology in recent years. Two versions for locating a cell phonebasically exist. In one, and a relative recent innovation, an actual GPSreceiver is incorporated into the phone, which receives signals fromorbiting satellites. The GPS phone tracks its location by interpretingthe data received from three or more orbiting GPS satellites to computeits longitudinal and latitudinal coordinates. In the second version, thenetwork takes advantage of the constantly broadcast radio signalingmessages (e.g. pings) used to passively register a cell phone on anetwork when roaming to estimate the longitudinal and latitudinalcoordinates. Mobile communication companies have been able to estimatethe location of a cell phone during an emergency call for several yearsusing triangulation information from the cell towers receiving thesignaling signal (i.e. radiolocation). Basically, a module at the cellsite base station records the time the caller's signal reached theantenna, and the location of the caller is determined by “triangulating”the caller's distance from several tower receivers. The resultingintersecting distance radiuses from at least three towers provide thelocation of the cell phone.

Variations and refinements to the triangulation method have beenproposed and implemented. Current locator protocols can include angle ofarrival (AOA) utilizing at least two towers to locate the cell phone atthe point where the reception lines along the transmission angles fromeach tower intersect. Time difference of arrival (TDOA) where thenetwork determines time difference between signal arrival to compute theresulting distance from three or more towers giving the location. TimeDivision Multiple Access (TDMA) and Global System for Mobile (GSM)systems, such as AT&T® and T-Mobile®, generally currently use the TDOAmethod. Location signature is another radiolocation technique thatstores and recalls signal characteristics that mobile phone signals areknown to exhibit at different locations in each cell to determinelocation. The more recent introduction of GPS technology into cellphones provides much more accurate geographic location data, but thebasic triangulation methods have improved to provide increasinglyaccurate geographic location data. Hybrid methods exist integrating bothGPS and network radiolocation methods, such as Assisted GPS, AdvancedForward Link Trilateration (A-FLT), Timing Advance/Network MeasurementReport (TA/NMR), and Enhanced Observed Time Difference (E-OTD). AssistedGPS allows use of GPS reliably indoors (GPS receivers often do notperform reliably indoors) and has been implemented by Verizon® andSprint®.

These locator protocols have been incorporated for 911 emergency callsor other emergency call systems to allow emergency responders access toaccurate location data, as well as other GPS location services. GPSequipped cell phones transmit actual GPS coordinates from the integratedGPS receiver chip. For non-GPS equipped cell phones, an emergency callfrom a wireless phone triggers an implemented location protocol on thenetwork, such as three modules at three or more nearby cellular antennasto implement a TDOA triangulation location protocol. Under a UnitedStates government mandate, enhanced 911 (E911) requires this data to beautomatically displayed to emergency center 911 operators with accuracyto within at least 100 meters. More recent developments andimplementations have reached resolutions of ˜10 m radius and less.Increasingly, GPS phones are being adopted by major cellularcommunication providers, and this trend is forecast to continue toinclude all mobile communication networks and providers. Other countriesuse similar emergency call numbers and communication protocols (e.g. 999in the United Kingdom, 112 in the European Union, 000 in Australia,etc). Herein, 911 will be used generically for the differing emergencycontact numbers.

Bluetooth® Communication Technology

Bluetooth® is a standard and communications protocol primarily designedfor low power consumption, short range (power-class-dependent: 1 meter,10 meters, 100 meters) communication using low-cost transceivermicrochips in each device. Bluetooth enables these devices tocommunicate with each other when they are in range. The devices use alow-power radio communications system (approximately 1 milliwatt) in the2.45 GHz frequency, so they do not have to be in line of sight of eachother as long as the received transmission is powerful enough. Using apower amplifier on the transmitter, improved receiver sensitivity, andoptimized antennas can boost ranges to 1 km.

Bluetooth® has been incorporated in many products, such as phones,printers, modems and headsets. The technology is useful whentransferring information between two or more devices that are near eachother in low-bandwidth situations. Bluetooth® is commonly used totransfer sound data with cell phones (i.e. with a Bluetooth® headset) orbyte data with hand-held computers (e.g. transferring files). Bluetooth®simplifies the discovery and setup of services between devices, andBluetooth® devices advertise the services they provide much as mobilestations can. This simplifies using services because there is no need tosetup network addresses or permissions as in many other networks.

Any Bluetooth® device will transmit the following sets of information ondemand:

Device name;

Device class;

List of services; and

Technical information (e.g. device features, manufacturer, Bluetooth®specification, clock offset).

Any Bluetooth® device can perform a discovery inquiry to discover otherdevices to which to connect, and any device can be configured to respondto such an inquiry. If the device attempting to connect knows theaddress of the device, it responds to direct connection inquiries andtransmits the information shown in the list above as requested. Use ofdevice services can require pairing or acceptance by its owner, but thecommunication connection itself can be started by any device andmaintained until it moves out of range. Some devices can be connected toonly one device at a time, and connecting to one device prevents themfrom connecting to other devices and responding to discovery inquiriesuntil they disconnect from the other device.

Each device is identified by a unique 48-bit Bluetooth® device address(BD_ADDR), identical in nature to an Ethernet address. However, theseaddresses are generally not shown in inquiries. Instead, friendlyBluetooth® names are used, which can be set by the user. This nameappears when another user scans for devices and in lists of paireddevices. Most cell phones have the Bluetooth® name set to themanufacturer and model of the phone by default, and up to eightBluetooth® devices can be connected simultaneously. Bluetooth® systemscreate a personal-area network (PAN), or piconet, that may fill a roomor may encompass no more distance than that between the cell phone on abelt-clip and the headset on your head. Once a piconet is established,the members randomly hop frequencies in unison so they stay in touchwith one another and avoid other piconets that may be operating in thesame room.

The new E911 system, and other similar systems, still requires a user tophysically access a cell phone or other mobile station in an emergencyand initiate a regular call by dialing 911. This may be difficult orimpossible in certain situations, such as when an elderly person fallsand breaks a hip or a woman whose purse, with the mobile station, is outof reach after a vehicle accident or criminal attack. New communicationprotocols utilizing innovative cellular communication options to makeremote 911 calls, or automatic emergency calls, is an advantageousinnovation. Also, new innovations, such as using mobile stations as alocalized emergency notification system, or a security alert system,offer advantageous emergency contact options.

SUMMARY OF THE INVENTIONS

Some, but not all, embodiments of the invention utilize the GPS andsignaling message functions of a cell phone or other mobile stationdevice to implement several different emergency and securitycommunication services. In one exemplary embodiment, a small Bluetooth®device that can be attached to a set of car keys, easily carried in apocket, or even implemented as a locket around the person's neck, caninitiate an automatic emergency call over a wireless linked mobilestation, such as a cell phone. This automatic emergency call can alsoinitiate a tracking protocol to continually track and store the cellphone location in, for example, a kidnapping situation. This can includeautomatically initiated additional signaling from the cell phone or aserver/controller or other network node to keep responders apprised ofcell phone movement. Additionally, the tracking protocol can includerecording and tracking, or “tagging”, all mobile stations within aspecified radius.

In another exemplary embodiment, the BTS and/or BSC or EmergencyNotification Server (ENS) automatically performs a location andcommunication protocol to locate all mobile stations within a specifiedradius and record that information in a police accessible data base andautomatically contact those identified cell phones and providenotification that an emergency call was initiated nearby. This protocolcan also be initiated in a normal emergency call. In yet anotherexemplary embodiment, a sentry function can be implemented. The BSC,other computer servers, or nodes covering sensitive locations can beprovisioned with mobile station identifiers to tag if detected. Thistagging will notify a call center, such as a law enforcementnotification, in a security alert call, as well as starting storinglocation data.

Some, but not all, innovative exemplary embodiments can be summarized asfollows:

Automatic Emergency Call Initiator (AECI): A communication deviceactivates an automatic emergency contact protocol using a mobilestation. Location info is automatically determined and tracked. Data isstored associated with an event identifier for easy retrieval ornotification to emergency responders.

Emergency Notification Server (ENS):

Operates to capture location and identifying info on mobile stationswithin a specified distance (e.g. 50 m) of an emergency call.

Contacts a call center, formats, and transmits a message to the callcenter.

Server protocol for continually monitoring/tracking cells within aspecified distance (e.g. 10 m) of an automatic emergency call on amobile station (e.g. “tagging”).

Notification and location of specified mobile devices entering a cellcovered area serving a sensitive location.

Notify mobile stations within a specified radius (e.g. 100 m) and/or aspecified group of mobile stations of an emergency call—a virtual/mobileemergency alarm network.

BRIEF DESCRIPTION OF THE DRAWINGS

The objects and features of the inventions will become more readilyunderstood from the following detailed description and appended claimswhen read in conjunction with the accompanying drawings in which likenumerals represent like elements and in which:

FIG. 1 is a diagram of a prior art mobile IP based communication system;

FIG. 2 is a diagram of a mobile IP based communication systemimplementing an embodiment of the inventions;

FIG. 3A-D is a stylized depiction of a practical embodiment of theinventions;

FIG. 4 is a message flow diagram for an embodiment of the inventions;

FIG. 5 is process flow diagram showing operation of an embodiment of theinventions; and

FIG. 6 is a message flow diagram for an embodiment of the security alertfunction of the inventions.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

FIG. 2 shows an embodiment of a communication system compatible with theinventions. A Public Switched Telephone Network (PSTN) 160 is connectedto a Mobile Switching Center/Visiting Location Register (MSC/VLR) 140router. The MSCNLR 140 is coupled to a Base Station Controller (BSC)135. The BSC 135 controls the packet transmissions to Base TransceiverStations (BTS) 120, 125, and 130, which perform communications withinthree cell sites 105, 110, and 115.

Communications on the communication system are processed by the BSC 135for transmission to the PSTN 160, the Internet 170, or the mobilestations (MS) 165 located within each cell site 105, 110, and 115. TheMS 165 is coupled to BTS 120 by wireless signal 166, and an AutomaticEmergency Call Initiator (AECI) 180 is coupled to the MS 165 by wirelesssignal 186. For communications being transmitted to MS 165, the BSC 135will transmit the communication to the BTS 120. The BTS 125 and 130 arealso connected to the BSC 135. Communication from the MSC/VLR 140 flowsto the BSC 135 and then to the BTS 120. The BTS 120 transmitscommunication via a wireless communication link 166 to the MS 165.Reciprocal communications from MS 165 will be processed by theabove-identified equipment in the reverse order described above. In thismanner, the MS 165 will be coupled to the communication system, the PSTN160, and the Internet 170 through these connections and system nodes.

The communication system includes a Gateway GPRS Support Node (GGSN) 145coupled to the MSC/VLR 140 as well as a Serving GPRS Support Node (SGSN)150. The GGSN 145 is also connected to the Internet 170 and providescommunication to and from the Internet 170. The SGSN 150 is alsoconnected to a Home Location Register (HLR) 155, and the HLR 155 isconnected in turn to the MSC/VLR 140. The nodes can share the samephysical boxes, physically linked and separate, or linked using routers.

The GGSN 145 acts as an interface between the GPRS backbone network andthe external packet data networks (e.g. Internet 170). The GGSN 145converts the GPRS packets coming from the SGSN 150 into the appropriatepacket data protocol (PDP) format (e.g. IP) and transmits them on thecorresponding packet data network. In the other direction, PDP addressesof incoming data packets are converted to the network address of thedestination user. These packets are then transmitted to the SGSN 150.For this purpose, the GGSN 145 is responsible for IP address assignmentand is the default router for the connected MS 165. The GGSN 145 canalso perform authentication and charging functions.

The SGSN 150 is responsible for the communication of data packets withthe MS 165 within its geographical service area. SGSN 150 tasks includepacket routing and transfer, mobility management (attach/detach andlocation management), logical link management, and authentication andcharging functions. The location register of the SGSN 150 can storelocation information (e.g., current cell, current VLR, etc) and userprofiles of all GPRS users registered with the SGSN 150.

An Emergency Notification Server (ENS) 175 of the inventive embodimentis shown implemented at several possible locations, and it iscontemplated that a communication network may have more than one ENS 175deployed, though in some embodiments only a single ENS 175 will be used.The ENS 175 can be implemented locally, integrated with or coupled tothe BSC 135 or centrally coupled to the MSC/VLR 140 or the GGSN 145. TheENS 175 can also be implemented remotely using the Internet 170. Otherimplementation options are possible with the ENS 175 as a physicallyseparate server or its function implemented on an existing server nodeon the network. The ENS 175 can also be implemented at a call server,either government operated or privately operated.

In one possible embodiment of the inventions, the AECI 180 includes acomputer microchip, a programmable memory, a transceiver, and a battery.The memory stores configuration information for communication with theassociated MS 165 and any necessary software programs. The AECI 180 canalso include a microphone/speaker for voice communication via the morepowerful MS 165, but it is contemplated that the AECI 180 primarilyinitiates an automatic emergency call in situations where voicecommunication is impractical or impossible. The AECI 180 transmits alow-powered signal possessing a short range of about 100 m and iscontemplated to be a Bluetooth® device transmitting packets to the MS165, though other embodiments are possible. Additionally, reducing thesize to the minimum can be an important consideration, because the AECI180 may take the form of a locket, subcomponent in a watch, attachmentto key chain, or other small discrete communication device, making aspeaker/microphone impractical. In some embodiments, the AECI 180 cancomprise a Bluetooth® headset wirelessly linked to a MS 165. Theactivating signal may be triggered by a configured switch, configuredvoice/sound input (e.g. cry for “help”, scream, sound of struggle, etc)or even noise recognized by software as a struggle.

The AECI 180 in operation transmits packetized data causing the MS 165to automatically initiate an automatic emergency call protocol. The MS165 automatic emergency call protocol initiate message data packet sentto the BSC 135 can include either the GPS coordinates, or the BTS 120and/or BSC 135 will perform a locator protocol to compute locationcoordinates by triangulation if GPS coordinates are missing. The locatorprotocol can be initiated at the BTS 120 or BSC 135, the ENS 175, oreven the MS 165. The “call” can actually be performed by the ENS 175, oranother node, with the MS 165 conveying an initiating data packetmessage as a data extension in a signaling message such as an agentsolicitation message, router solicitation message, binding updatemessage, registration request, registration reply, or other signalingmessage. This enables an automatic emergency call to be placed withoutany noticeable sign that such a call was made on the MS 165, which canbe very important in some situations, such as an abduction. However,various local policies may interfere with fully implementing theseprocedures (e.g. mandatory call backs to the originating number, whichare potentially dangerous in an abduction scenario) directly with agovernment-operated call center (also referred to as a Public SafetyAnswering Point (PSAP)), so in certain embodiments, the emergency callcenter may be privately operated. Further, to enhance the reliabilityand minimize accidental activation, the activation of the AECI 180 canrequire two or more rapid depressions of an activation button switch.

The automatic emergency call to a recipient emergency call center can beformatted on the MS 165, the ENS 175, or another node and can include 1)an incident identifier, 2) a MS identifier, 3) a caller identifier (ifavailable), 4) location data, 5) an identifier or other indication thatthe call is an automatic emergency call, and 6) contact information forrapid retrieval of further information stored on the ENS 175. It ispreferable for the ENS 175 to perform the call and format the datapacket and/or generate and format any voice message. It also should benoted that an automatic emergency call, by definition, indicates thatthe person cannot physically access and use the MS 165, and thereforethe call should be interpreted by a recipient call center as indicatinga dire emergency for the individual initiating the emergency call. Theautomatic emergency call comprises a data packet message containing thedata which is set-up and routed normally through the network to the PSTN160 and the call center using existing mobile IP protocols. However,typically the call setup and actual communication is performed by theENS 175 rather than the MS 165, based on a signaling message protocolinitiating the communication. The ENS 175 generated call can be astandard voice data message with accompanying data, a message comprisedof text and location data, or some other data format.

The AECI 180 can also initiate a call answering message protocol toinform any callers that an automatic emergency call was initiated on theMS 165. This message can be locally stored for use on the ENS 175, theMS 165, or another message server, typically in a database entry. Themessage should basically inform any callers that an automatic emergencycall was initiated and that the police or the emergency call centershould be contacted. Any incoming callers are advised using thismessage, and the MS 165 can be effectively deactivated to incoming callsuntil a reset code is entered.

The ENS 175 supports the AECI 180 by performing several associatedsecurity and emergency protocols. The ENS 175 can receive an automaticemergency call initiation data packet message, which initiates severalactions. The ENS 175 initiates a location protocol to identify andrecord identifying data for all of the mobile stations located within aspecified distance of the location of the mobile station initiating theautomatic emergency call. If necessary, a message is transmitted to allthe cell phones requesting GPS coordinates and/or messages to adjoiningBSCs and/or BTSs to perform a triangular locator procedure. Informationfor each MS within a specified distance (e.g. 50 m) is logged into anevent entry database on the ENS 175 indexed against the incidentidentifier.

This information is not tied to individual phone call records, and infact has nothing to do with phone calls using the MS or its usage perse, and therefore should not constitute privacy information thatrequires a warrant for law enforcement access. The location protocol isbased only on the passive signaling messages and not active use of theMS and is analogous to a person being photographed at a signal light orby a surveillance camera at a public location. This information shouldbe easily retrievable by law enforcement agencies, can be limited toidentifying suspects or witnesses, and is associated with a specificevent and time as determined by the incident identifier. The stored datacan include 1) the incident identifier, 2) identifiers for each MS, 3) auser identifier (if available) for each MS, and 4) location data at timeof the incident. However, if required, this data can be stored for laterretrieval using a search warrant.

In another embodiment, the ENS 175 can also initiate a protocol taggingmobile stations identified within a specified close distance (e.g. 10 m)for continually monitoring and tracking the location of the mobilestations. This also includes the MS 165. Identifying data information isalso logged in the ENS 175 indexed against the incident identifier. Thisprotocol can be implemented using software or firmware operating on thetagged mobile station, which causes the mobile station to periodicallytransmit data packets containing the location data addressed to the ENS175. The ENS 175 continually stores the received location datainformation and other data indexed by the incident identifier in adatabase. The tagging protocol can also be implemented on network nodesusing software or firmware instructing other BSCs during hand-offs toupdate the ENS 175 with location data periodically. Registration orother signaling messages from the tagged MS can include extensions thatcommunicate mobile station identifier and location data to the ENS 175addressed to the ENS 175. This protocol can also be performed byperiodic signaling messages with imbedded extensions, or even adedicated message type, transmitted by the tagged mobile stationcarrying GPS or other location data (e.g. a Tagged Location Message(TLM)). Additionally, if a TLM, or other appropriate used signalmessaging, lacks GPS data, the message can initiate a locator protocolby the linked BSC and/or other nodes.

The tracking protocol should be continued for a specified period of time(e.g. 72-hours). This protocol is intended to help identify and trackwitnesses, suspects, and the individual initiating the emergency call ifthey are mobile (e.g. kidnapped). Collected information can be securedand released only with a warrant obtained by law enforcement. Periodictagging can also occur to tag mobile stations remaining within the closedistance radius for a specified time period.

In another embodiment, the ENS 175 and associated BSC 135 can be used toimplement a virtual, mobile emergency alarm system. The ENS 175initiates the location protocol to locate all mobile stations within aspecified radius (e.g. 100 m). The ENS 175 in coordination with the BSC135, or other nodes, notifies those mobile stations that an automaticemergency call has been initiated within the area and to be alert. Thiscould include a broadcast phone call from personnel at a call center, atext message generated by the call center, or automatic call or textmessage generated by the ENS 175 or another message server.Additionally, a group of mobile stations can be configured in acentralized or remote ENS 175, so that if an automatic emergency calloccurs all the mobile stations in the group are contacted. However, itmay be preferable to not notify those mobile stations within closeproximity otherwise meeting tagging parameters.

A further embodiment of the inventions is using the ENS 175 and/or theBSC 135 as a security alert system. An ENS 175 and/or BSC 135 isprovisioned with mobile station identifiers associated with individualson a watch list, such as a suspected terrorist or criminal suspect. Inone embodiment, the ENS 175 function can be incorporated into the BSC135 to perform the protocol or the two nodes can work together. Becauseof the logistics involved, it may be preferable for only BSCs or ENSsserving sensitive locations to be provisioned with the mobile stationidentifiers. If an associated MS enters the cell area or comes within aspecified distance (e.g. 250 m) of the location, the BSC 135 contactsthe ENS 175 to initiate an automatic security call giving identifyinginformation and location. Rather than an incident identifier, the datais associated with a security alert identifier pre-stored on the ENS 175associated with the MS identifier data, and can inform a call center ofthe identity of the MS, the reason the MS is on a watch list, andcontact notification data for a government agency or law enforcementagency. The ENS 175 can additionally tag the mobile station as earlierdescribed to continue tracking the mobile station after it leaves theBSC 135 coverage area. The MS identifier can include the SIM card'sunique International Mobile Subscriber Identity (IMSI) number and/or theInternational Mobile Equipment Identity (IMEI) number. The IMEI numberof the handset remains constant even if the SIM card is changed. It isfurther contemplated that either can be provisioned, triggering an alertin the event either is detected.

Additionally, the location of the mobile station can be tracked andadditional mobile stations tagged coming within a specified radius (e.g.10 m) for a specified elapsed time (e.g. 1 minute). In one embodiment,mobile stations meeting the specified criteria can be identified byperforming an automatic emergency call locator protocol according to theelapsed time, tagging any mobile stations still within the specifiedradius from the performance of a first locator protocol to the nextsubsequent one. Other methods are possible, including monitoring by theBSC 135 to collect GPS coordinates of all cell phones at leastperiodically and the system tagging those phones meeting the criteria.

FIG. 3A-D is a stylized depiction of a practical exemplary embodiment ofthe inventions. In FIG. 3A, a victim (V) 380 carrying cell phone (1) 381is attacked by a criminal (C) 382 carrying cell phone (2) 383. Witnesses(W1) 384, (W2) 386, (W3) 388, and (W4) 390 respectively carrying cellphones (3) 385, (4) 387, (5) 389, and (6) 391 are located nearby. InFIG. 3B, the C 382 flees, and the V 380 is laying on the ground, withonly one witness W3 388 remaining in the area. The other witnesses W1384, W2 386, and W4 390 have also left the area.

V 381 activated an AECI (not shown) during the attack, initiating theautomatic emergency call protocol to identify and locate the cell phones(CP) 1 381, 2 383, 3 385, 4 387, 5 389, and 6 391. The ENS 394 storesthe information in a database 395 associated with Incident 1. CP 1 and 2are tagged, and their location continually tracked. CP 3, 4, 5, and 6are identified and their location at the time stored as depicted. InFIG. 3D, police officer (01) 396 and police officer (02) arrest C 382,who is still carrying the tagged cell phone 2 383, located by the twoofficers using the ENS database 395, which continually tracks and storesthe location of the cell phone 2 383.

FIG. 4 is a message flow diagram for an exemplary embodiment of theinventions. These message types can be implemented as extensions toInternet Control Message Protocol (ICMP) message (e.g. agentsolicitation message, router solicitation message, binding updatemessage, registration request, registration reply, or other signalingmessage). In step 205, an automatic emergency call initiator (AECI)transmits an automatic emergency call initiate (AEC-I) data packet to amobile station (MS). The MS responds to the AECI with an initiateacknowledgement (I ACK) packet in step 210. The MS also transmits anautomatic emergency call initiate message (AECIM) to a BSC in step 215.In step 220, if no GPS coordinates are included in the AECI data packet,the BSC executes a locator protocol (LP) to obtain geographiccoordinates for the MS, which can include a message transmitted from theBSC or coordination with other BSCs controlling adjacent cellular sites.Once the geographic/GPS coordinates of the MS are known, the BSCexecutes a locator protocol involving broadcasting locator protocol(LP-B) messages that includes soliciting GPS coordinates from mobilestations (MS_(2-N)) in the cell and/or coordination with other BSCs toobtain location data for MS_(2-N) in the cell by triangulation or otheravailable means in step 225.

At the same time, the LP messages are transmitted in step 230. The BSCtransmits an automatic emergency call initiation message (AECIM) to theemergency notification server (ENS). In step 235, the ENS transmits anAECIM acknowledge (AECIM ACK) message to the BSC. In step 240, the BSCforwards the AECIM ACK message to the MS. The ENS generates an automaticemergency call message (AECM) to transmit to an emergency call system(ECS) in step 245. The AECM can include an incident identifier, mobilestation identifier, and location data, as well as other data. The ECS instep 250 transmits an AECM acknowledge (AECM ACK) message to the ENS.

In step 255, the ENS performs a tagging protocol (TP) with the MS, whichcan involve coordinating messages with the BSC to continually update theENS with location data, activating embedded firmware in the MS, or otherimplemented procedures and protocols to communicate updated locationcoordinates. This updating can be performed by periodic signalingmessages using imbedded extensions or a dedicated message, and it canutilize the BSC. In this exemplary embodiment, a tagged location message(TLM) addressed to the ENS is transmitted to the ENS from the MS in step260. In step 265, the BSC transmits location data in a location protocolresponse (LP RES) message that identifies MS_(2-N) within the cell areaserved by either the BSC or the BTS that the MS is located within. TheENS processes this data to compute and identify MS_(2-N) that meets thelocation criteria for tagging or storing in memory indexed by anincident identifier in a database.

In step 270, the ENS implements a tagging protocol (TP) to tag thoseMS_(2-N) meeting the predetermined criteria for tagging. In step 275,those tagged MS_(2-N) transmit a TLM to the ENS for tracking and storinglocation data indexed against the incident identifier in a database.Other data can also be transmitted in the TLM and stored in the ENS.Finally, in step 280, the ENS broadcasts an alert message (AM-B) textmessage data packet to the MS_(2-N) meeting a predetermined locationcriteria advising that an emergency call was initiated in the area.Those MS_(2-N) tagged in step 270 are not contacted.

FIG. 5 is a process flow diagram showing operation of the inventions inan exemplary embodiment. In step 305 the AECI initiate message isreceived by the MS. Then the MS initiates the automatic emergency callmessage in step 310, and in step 315, the BSC and ENS receive theautomatic emergency call message. In step 320, a locator protocol isperformed for the MS if required. The ENS generates and transmits theautomatic emergency call message in step 325. In step 330, the messageis processed and routed through the network MSCNLR to the PSTN. The PSTNconveys the message to a call center in step 335, with the ENS actuallymaking the emergency call rather than the MS. A locator protocol isperformed in step 340 to locate mobile stations within threepredetermined radiuses.

In step 345, the mobile stations within a first radius are identified,and then the location data for any mobile stations meeting the firstradius criteria are stored on the ENS in step 350. In step 355, atagging protocol tags the initiating mobile station and any identifiedmobile stations located within a second radius criteria. The taggedmobile stations are tracked to store location data on the ENS in step360. In step 365, the mobile stations within a third radius criteria areidentified to communicate an emergency alert message to.

FIG. 6 is a message flow diagram for an exemplary embodiment of thesecurity alert function of the inventions. In step 405, an InternetControl Message Protocol (ICMP) message (e.g. agent solicitationmessage, router solicitation message, binding update message,registration request, registration reply, or other signaling message) isreceived by the BSC from a MS. The BSC is provisioned with identifiersof mobile stations on a watch list, and the MS identifier in the ICMPmessage matches one of these provisioned identifiers. In step 410, theBSC transmits a security alert (SEC ALERT) message to the ENS with theMS identifier. The ENS transmits an automatic security call (ASC)message to a call center in step 415. The ASC message can include apre-stored security alert identifier, the mobile station identifier, andthe mobile station's current location, as well as other data. The ENSalso stores the information indexed by the security alert identifier ina database.

In step 420, the ENS performs a tagging protocol (TP) with the MS, whichcan involve coordinating messages with the BSC to continually update theENS with location data, activating embedded firmware in the MS, or otherimplemented procedures to communicate updated location coordinatesperiodically. This updating can be performed by periodic signalingmessages using imbedded extensions or a dedicated message, and it canutilize the BSC. In this exemplary embodiment, a tagged location message(TLM) addressed to the ENS is transmitted to the ENS from the MS in step425. In step 430, the ENS updates the call center on the location of thetagged MS in an ASC.

The ENS transmits a location protocol request (LP REQ) message to theBSC in step 435, which prompts the BSC to execute a locator protocolinvolving broadcasting locator protocol (LP-B) messages that includesoliciting GPS coordinates from mobile stations (MS_(2-N)) in the celland/or coordination with other BSCs to obtain location data for MS_(2-N)in the cell by triangulation or other available means in step 440. Instep 445, the BSC transmits location data in a location protocolresponse (LP RES) message that identifies MS_(2-N) within the cell areaserved by either the BSC or the BTS that the MS is located within. Thisshould be performed periodically according to a time criteria to detectMS_(2-N) remaining within a predetermined radius for a set time of thetagged MS. The ENS processes this data to compute and identify MS_(2-N)that meets the location and elapsed time criteria for tagging andstoring in memory indexed by an incident identifier. In step 450, theENS implements a tagging protocol (TP) to tag those MS_(2-N) meeting thepredetermined criteria for tagging. In step 455, those tagged MS_(2-N)transmit a TLM to the ENS for tracking and storing location data indexedagainst the security alert identifier. This tagging data is relayedperiodically to the call center in an ASC message in step 460.

As an example of a practical implementation of the inventions, arecreational vehicle (RV) operator is parked in an isolated location.The operator falls breaking his hip. In severe pain, there is no homephone and the cell phone is on the other side of the RV, but theoperator has an AECI watch subcomponent. The operator initiates anautomatic emergency call from the cell phone using the AECI. The ENS andsystem communicates GPS location coordinates and identifying data to alocal 911 call center, which determines from the communicated data thatthe operator cannot reach the cell phone because of the emergency. Thecall center dispatches a police patrol to the RV at the communicatedlocation. The ENS performs various supporting protocols as programmed,but the locator protocol fails to locate any mobile stations within thespecified radiuses. The ENS still stores incident, identifier, andlocation data for the cell phone and tags the stationary cell phone.

In another example, a young woman going to her car is attacked in aparking lot. Her cell phone is inaccessible in her purse, but she has anAECI locket that she activates. The AECI initiates an automaticemergency call via the cell phone with identifier and GPS data. Thesystem and associated ENS initiates the locator and tagging protocols,identifying the location of 12 mobile stations located within 50 m whichis stored into memory, and three mobile stations within 10 m, which theENS also stores in memory and tags for tracking. The collected data isstored in an ENS memory database associated with an incident identifierand includes identifying information for each mobile station and thelocation of the mobile stations at the time the automatic emergency calloccurred.

The emergency call center receiving the automatic emergency callreceives data that includes an incident identifier, a cell phoneidentifier, the GPS location, an automatic emergency call indicator, andcontact information for retrieving ENS data relevant to the incident.The emergency call center dispatches a police car to the location. Asthis occurs, the BSC and/or ENS has also performed a locator protocolidentifying all mobile stations within 100 m of the automatic emergencycall, and the ENS utilizes this location data to transmit the followingstored text message: “EMERGECY ALERT!!! AN EMERGENCY CALL HAS BEENINITIATED WITHIN 100 METERS OF YOUR LOCATION. BE ALERT. EXERCISECAUTION. REPORT ANYTHING SUSPICIOUS.” However, the three mobile stationslocated within 10 m do not receive the text alert.

As the police arrive, five witnesses are present and report observing awoman apparently being forced into a vehicle by two men. One of thewitnesses claims to have been in a car that was passing immediatelybehind the victim's car when she was attacked. The police on the sceneimmediately report the suspected kidnapping and request an inquiry as toany tracking and location data on an ENS.

Using the incident identifier, law enforcement quickly accesses the ENSinformation, which lists two mobile stations and the cell phone, whichthe ENS continually updates under the tagging protocol'slocation/tracking feature. Using the ENS, law enforcement ascertains allthree mobile stations are co-located and mobile as the tagging protocolcontinues tracking and storing location data. Witnesses provided adescription of the car and, using the location tracking information, thecar is quickly located by law enforcement with a successful rescue ofthe kidnap victim.

DEFINITIONS

The following specific definitions are provided:

Automatic emergency call: An automatic emergency call message used toconvey information relating to a mobile station in an emergency. Theconveyed data includes voice or data, including text, formatted intopackets transmitted to a call center that indicates an emergencysituation and that the user cannot access the mobile station.Information transmitted includes location data and identifier data ofthe mobile station. The automatic emergency call to a call center isperformed by an ENS (or other node performing the function) and does notrequire the mobile station.

Automatic emergency call initiator: A small, possibly hand-held,wireless device with a wireless communication link to a mobile stationused to initiate an automatic emergency call. It can be a Bluetooth®device or some other short-range communication device. The AECI canoptionally include voice communication capability via the mobilestation. In some embodiments, the AECI can be implemented on the mobilestation, such as by a programmable soft switch, or as a switch on aBluetooth® headset.

Locator protocol: Any geographic location determining methodologyavailable to a wireless communication system and network to determinethe location geographic coordinates of a mobile station.

Security alert: A packet message transmitted when a predetermined mobilestation is detected containing at least a mobile station identifier dataand location data.

Security alert protocol: A protocol initiated upon detection of apredetermined mobile station identifier at a network node to contact acall center and report the location of the mobile station. The protocolcan also include tagging the mobile station and identifying mobilestations coming within a predetermined radius of the mobile station fora predetermined time period. The additional identified mobile stationscan also be tagged. The additional identifying and tracking data canalso be communicated to the call center.

Tag, tagging, or tagging protocol: A protocol performed by a wirelesscommunication system for continually monitoring and tracking geographiclocation data of an identified mobile station. The protocol can beimplemented using software or firmware operating on the tagged mobilestation causing periodic transmission of data packets with the locationdata addressed to an ENS, by network nodes instructing other BSCs duringhand-offs to update the ENS with location data periodically, or anyother methodology to continually update the ENS with location data,including use of a dedicated TLM or data extensions in signalingmessages.

Virtual, mobile emergency alarm protocol: A protocol that locates andidentifies all mobile stations within a predetermined radius of a mobilestation making an automatic emergency call, and/or a group ofpredetermined mobile station, and transmits a notification message tothose mobile stations that an automatic emergency call was initiated.Can also occur in a conventional emergency call.

MODIFICATIONS AND VARIATIONS

As will be recognized by those skilled in the art, the innovativeconcepts described in the present application can be modified and variedover a tremendous range of applications, and accordingly the scope ofpatented subject matter is not limited by any of the specific exemplaryteachings given. It is intended to embrace all such alternatives,modifications and variations that fall within the spirit and broad scopeof the appended claims.

One such specific variation is incorporating the disclosed ENS functionsinto an existing server node or nodes. Discussed variations specificallyidentify the BSC, but the MSC, VLR, HLR, or any other node can beprogrammed with one or more of the disclosed ENS functions, and claimsfor the ENS extend to these other nodes. Other nodes in variouscommunication standards, such as GSM, can be used to implement theinventions.

It is also readily apparent that the ENS and BSC can reside on differentnetworks or sub-networks. Furthermore, the BSC may require coordinationwith BTSs and BSCs on different networks or sub-networks to perform alocator protocol. The tagging protocol likewise can cross network andsub-network boundaries. The MS located and tagged can also be associatedwith a foreign network, and as the tagged MS moves across cell sites,regardless of network association, geographic location is tracked andstored.

It is also contemplated that some form of verification might be requiredin certain implementations. Verification procedures may be required bylocal policies at call centers. Various verification protocols can beimplemented as required or desired, such as a call back to the MS from acall center. However, an advantage of the some embodiment innovationsherein is that no indication may exist on the MS that an emergency callwas made, which is clearly advantageous in an abduction situation. Theautomatic emergency call initiation may likely occur when a person isnot otherwise able to access the MS, or the MS may in fact not becompatible with receiving a voice call back (e.g., a personal computeron a wireless network). Any practical implemented verification procedureused should consider and allow that the MS cannot be freely accessed oreven be compatible with voice communication. Even if local policiespreclude full implementation, various aspects, such as tagging, canstill be implemented.

The AECI can also be interfaced with a device monitoringbiological/medical or physical parameters, implementing the automaticemergency call protocol if a condition is met. This can be tied topulse, temperature, respiration, or other parameters, includingenvironmental conditions, such as G-force, temperature, or speed. Theinterfaced AECI (or multiple interfaced AECIs) can be used inconjunction with a non-interfaced AECI as a modular piconet. This canoffer advantages, as different sensors are added or removed, avoidingthe cost of multiple dedicated transmitters to a wireless network, sinceeach sensor is linked to a common MS. This could enable, as an example,a cross country runner to configure a pulse rate monitoring AECI,temperature monitoring AECI, and wristband mounted AECI with his cellphone when running.

Of course, one aspect of the embodiments is the ability to function witha variety of mobile communication devices having a wireless link to anetwork and an AECI (e.g., cellular phone, computer, Blackberry®, etc).This can include prepaid cellular phones, which are generally regardedas untraceable to a registered owner. A prepaid cellular phone can stillbe located, identified (e.g., by telephone number, IMEI, etc), andtagged. As a result, in certain implementations, a prepaid cell phonewill be handled the same as any other cell phone, equally susceptible tothe innovative protocols of the inventions. This should help alleviaterecognized concerns of police and security agencies world-wide thatprepaid mobile services allow anonymous users to engage in criminal orterrorist activities with relative impunity. Although the identity ofthe user may remain unknown, a tagged prepaid cell phone can be trackedand a user identified through standard investigative techniques.

None of the description in the present application should be read asimplying that any particular element, step, or function is an essentialelement which must be included in the claim scope: THE SCOPE OF PATENTEDSUBJECT MATTER IS DEFINED ONLY BY THE ALLOWED CLAIMS. The claims asfiled are intended to be as comprehensive as possible, and NO subjectmatter is intentionally relinquished, dedicated, or abandoned.

While the inventions have been particularly shown and described withrespect to preferred embodiments, it will be readily understood thatminor changes in the details of the inventions may be made withoutdeparting from the spirit of the inventions.

Having described the inventions, I claim:
 1. A method for automaticallytagging a mobile station, comprising the steps of: a) receiving anemergency call protocol packet from a first communicating device; b)after a), a node on a network performing a locator protocol as requiredto locate the first communicating device within a service area; c) afterb), the node on the network performing a locator and identifyingprotocol to locate and identify any mobile communicating device locatedwithin a specified first radius centered on the first communicatingdevice within the service area; d) executing a tagging protocol to trackand store the location of the first communicating device in real time;and e) executing a tagging protocol to track and store the location ofall the communicating devices within the service area located within aspecified second radius centered on the first communicating device, andtracking said communicating devices when said communicating devicesleave said second radius.
 2. The method of claim 1, further comprisingthe step of: storing identity and location data for tagged communicatingdevices on an emergency notification server.
 3. The method of claim 1,further comprising the step of: storing identity and location data forcommunicating devices located within at least the first radius of thefirst communicating device on an emergency notification server.
 4. Themethod of claim 3, further comprising the step of: indexing the storeddata using an assigned incident identifier.
 5. The method of claim 1,further comprising the step of: executing a virtual, mobile emergencyalarm protocol on an emergency notification server to communicate to aplurality of mobile communication devices that an emergency call hasbeen initiated.
 6. The method of claim 1, further comprising the stepof: executing a security alert protocol using an emergency notificationsever, wherein the emergency notification server stores at least onedetected communication device identifier indexed against an alertidentifier.
 7. The method of claim 1, further comprising the step of:identifying a second communicating device staying within a specifiedthird radius of the tagged communicating device for a predeterminedelapsed period of time.
 8. The method of claim 1, further comprising thestep of: tagging any second communicating device staying within aspecified third radius of a tagged communicating device for apredetermined elapsed period of time.
 9. A communication system forsummoning emergency aid, comprising: one or more nodes on a wirelesscommunication network, each node comprising memory and at least oneprocessor, configured to receive an automatic emergency call initiatedata packet, wherein the one or more nodes collectively, a) store dataassociated with the location of an originating communication devicegenerating the data packet and execute a tagging protocol for same; b)generate an automatic emergency call data packet; c) transmit saidautomatic emergency call data packet to a dispatching entity, saidautomatic emergency data packet comprising an indicator indicating auser cannot access the originating communication device; d) execute alocator protocol to locate the originating communication device, ifrequired, and any communication device meeting a first location criteriawithin a service area centered on the originating communication devicecomprising a first specified radial distance from the originatingcommunication device; and e) identify and store data relating to anycommunication device meeting a second location criteria comprising asecond specified radial distance from the originating communicationdevice location within a service area; wherein said automatic emergencycall data packet comprises an indication of an emergency situation, thata user cannot access the originating communication device, and includeslocation data and identifier data of the originating communicationdevice.
 10. The communication system of claim 9, further comprising: f)identify and tag any communication devices meeting a third locationcriteria comprising a third specified radial distance centered on theoriginating communication device location within the service area andstore data relating to same.
 11. The communication system of claim 9,wherein the automatic emergency call protocol initiate data packetcomprises a signaling data packet format.
 12. The communication systemof claim 9, further comprising: a small personally carried automaticemergency call initiator linked by a wireless connection to theoriginating communication device, the automatic emergency call initiatorinitiating the automatic emergency call protocol using a data packetreceived by the originating communication device, the automaticemergency call initiator transmitting a low-powered, short-range radiosignal.
 13. The communication system of claim 9, wherein at least one ofthe nodes comprises an emergency notification server node used in alocator protocol that uses at least partially a non-GPS method toidentify and store identifying data for all the communication deviceslinked to the system located within a first predetermined radius of theoriginating communication device within a service area.
 14. Thecommunication system of claim 13, wherein the emergency notificationserver node is used in a tagging protocol to store identifying andtracking location data for all the communication devices linked to thesystem located within a second predetermined radius of the originatingcommunication device within a service area.
 15. A communication systemfor summoning emergency aid, comprising: one or more nodes on a wirelesscommunication network, each node comprising memory and at least oneprocessor, configured to receive an automatic emergency call initiatedata packet, wherein the one or more nodes collectively, a) store dataassociated with the location of an originating communication devicegenerating the data packet and execute a tagging protocol for same; b)generate an automatic emergency call data packet; c) transmit saidautomatic emergency call data packet to a dispatching entity; d) executea locator protocol to locate the originating communication device, ifrequired, and any communication device meeting a defined locationcriteria; and e) identify and store data relating to any communicationdevice meeting a first location criteria comprising a first specifiedradial distance from the originating communication device location;wherein at least one of the nodes comprises an emergency notificationserver node used in a locator protocol that uses at least partially anon-GPS method to identify and store identifying data for all thecommunication devices linked to the system located within a firstpredetermined radius of the originating communication device; whereinthe emergency notification server node is used in a virtual, mobileemergency alarm protocol to locate all communication devices linked tothe system within a second predetermined radius of the originatingcommunication device and communicate with the located communicationdevices that an automatic emergency call has been initiated, and notcommunicate with any tagged communication devices.
 16. The communicationsystem of claim 13, further comprising using the emergency notificationserver node to implement a security alert protocol, wherein a systemnode is provisioned with at least one communication device identifierused to detect the originating communication device; the emergencynotification server node initiates an automatic security alert callafter the detecting the originating communication device identifier tocommunicate to a call center; and the at least one communication deviceis tagged to continue location tracking.
 17. A method for contacting acall center using a mobile communication network, comprising the stepsof: receiving at a network node a signaling message data packetincluding a predetermined identifier for a first mobile station, whereinsaid predetermined identifier is associated with an individualidentified on a watch list and the network provisioned with saidpredetermined identifier prior to the network receiving a signalingmessage from said first mobile station, and; responding to the signalingmessage data packet by initiating a security alert protocol, whichincludes at least a) executing a locator protocol for the first mobilestation if not known; b) storing the location data and the identifierfor the first mobile station indexed by a security alert identifier; andc) transmitting a data packet to a call center communication network,said data packet including stored data on an emergency notificationserver and an indicator that said data packet is a security alert datapacket.
 18. The method of claim 17, further comprising the steps of:receiving at the network node a signaling message data packet includingan identifier for a second mobile station and an indicator the packetcomprises an automatic emergency call packet; responding to the datapacket by initiating an automatic emergency call protocol, whichincludes at least a) executing a locator protocol for the second mobilestation if not known; b) storing the location data and the identifierfor the second mobile station indexed by an incident identifier; and c)transmitting a data packet to an emergency call center communicationnetwork, said data packet including stored data on the emergencynotification server and an indicator that said data packet is anautomatic emergency call data packet.
 19. The method of claim 18,further comprising the step of: executing a tagging protocol for thefirst and second mobile station.
 20. The method of claim 17, furthercomprising the steps of: identifying all mobile stations meeting atleast one location criteria relating to the stored data; executing atagging protocol for at least one mobile station meeting at least one ofsaid location criteria; and storing at least location data andidentifier data for each identified mobile station on said emergencynotification server indexed by an identifier.
 21. A method forcontacting a call center using a mobile communication network,comprising the steps of: receiving at a network node a signaling messagedata packet including an identifier for a first mobile station and anindicator the packet comprises an automatic emergency call data packetcomprising packet comprising an indication of an emergency situation,that a user cannot access the first mobile station, and includeslocation data and identifier data of the first mobile station;responding to the signaling data packet by initiating an automaticemergency call protocol, which includes at least a) executing a locatorprotocol for the first mobile station if not known using an enhancedradiolocation or GPS-based locator protocol as required; b) storing thelocation data and the identifier for the first mobile station indexed byan incident identifier; and c) transmitting a data packet to anemergency call center communication network, said data packet includingstored data on an emergency notification server and an indicator thatsaid packet comprises an automatic emergency call and the user cannotaccess the first mobile station and includes location data andidentifier data of the first mobile station.
 22. The method of claim 21,further comprising the steps of: receiving at the network node a datapacket including a predetermined identifier for a second mobile station;responding to the data packet by initiating a security alert protocol,which includes at least a) executing a locator protocol for the secondmobile station if not known; b) storing the location data and theidentifier for the second mobile station indexed by a security alertidentifier; and c) transmitting a data packet to a call centercommunication network, said data packet including stored data on theemergency notification server and an indicator that said data packet isan security alert data packet.
 23. The method of claim 22, furthercomprising the step of: executing a tagging protocol for the first andsecond mobile station.
 24. The method of claim 21, further comprisingthe steps of: identifying all mobile stations meeting at least onelocation criteria relating to the stored data; executing a taggingprotocol for at least one mobile station meeting at least one of saidlocation criteria; and storing at least location data and identifierdata for each identified mobile station on said emergency notificationserver indexed by an identifier.
 25. The communication system of claim16, wherein the system tags a communication device meeting a locationand time criteria in relation to an already tagged communication device.26. The method of claim 17, further comprising the step of: identifyingand tagging any second mobile station remaining within a predeterminedradius of the first mobile station for a predetermined elapsed period oftime.
 27. The method of claim 22, further comprising the step of:identifying and tagging any third mobile station remaining within apredetermined radius of the first or second mobile station for apredetermined elapsed period of time.
 28. The communication system ofclaim 13, wherein the emergency notification server node stores datarelating to a second communication device comprised of at least two ofthe following: incident identifier; identifier data for the secondcommunication device; and location data for the second communicationdevice.