Emergency contact method and system

ABSTRACT

An emergency contact method and system to enable a person to access emergency contact information without unlocking a user&#39;s mobile device is described herein. The emergency contact information is able to be input by a user or automatically generated and then displayed to another user without requiring the other user to know the personal security code of the mobile device.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application claims priority under 35 U.S.C. § 119(e) of the U.S.Provisional Patent Application Ser. No. 62/101,274, filed Jan. 8, 2015and titled, “EMERGENCY CONTACT METHOD AND SYSTEM,” which is herebyincorporated by reference in its entirety for all purposes.

FIELD OF THE INVENTION

The present invention relates to the field of mobile devices. Morespecifically, the present invention relates to displaying emergencycontact information using a mobile device.

BACKGROUND OF THE INVENTION

If a person becomes incapacitated, such as after a car accident or amedical incident, medical personnel treating the person would like to beable to communicate with emergency contacts of the incapacitated person.However, if the person's mobile device is locked, it maybe difficult forthe medical personnel to locate the emergency contact information.

SUMMARY OF THE INVENTION

An emergency contact method and system to enable a person to accessemergency contact information without unlocking a user's mobile deviceis described herein. The emergency contact information is able to beinput by a user or automatically generated and then displayed to anotheruser without requiring the other user to unlock the mobile device or toknow the personal security code of the mobile device.

In one aspect, a method programmed in a non-transitory memory of adevice comprises receiving emergency contact information and displayingthe emergency contact information on the device without unlocking thedevice. The emergency contact information includes at least one of aname of an owner of the device, an address, a photograph, a scannableitem, an emergency contact information, a medical identification number,current medications of the owner of the device, and current healthconditions of the owner of the device. Receiving the emergency contactinformation includes automatically populating fields on the device byretrieving the information from a second device or from a socialnetworking site. Receiving the emergency contact information includesacquiring an image of an owner of the device by selecting a photo box onthe device which causes a camera of the device to be triggered to enablethe owner to take a picture of himself/herself which is displayed in thephotobox. Receiving the emergency contact information includes receivinga phone number and retrieving corresponding information based on thephone number. Displaying the emergency contact information includesscanning a code with a second device which causes the second device tosend a signal to unlock the device which displays the emergency contactinformation. Displaying the emergency contact information includesdetecting finger pressure and movement on a screen of the device beforedisplaying the emergency contact information. Displaying the emergencycontact information includes using a camera of the device to read a codeon an item to determine if a person is granted access to the emergencycontact information. Displaying the emergency contact information occursafter a physical device containing emergency credentials provided onlyto a select group of people is inserted into the device. The methodfurther comprises automatically contacting an emergency contact usingthe emergency contact information, and contacting one or more additionalemergency contacts using the emergency contact information in sequentialorder if a prior call does not result in an answered call. The methodfurther comprises editing the emergency contact information by detectingdeletion of a contact from the device and communicating with a medicaldatabase to determine changes in medical condition of an owner of thedevice. The method further comprises implementing a security measure toensure the emergency contact information is only accessed by emergencyor medical personnel.

In another aspect, an apparatus comprises a non-transitory memory forstoring an application, the application for: receiving emergency contactinformation and displaying the emergency contact information on theapparatus without unlocking the apparatus and a processing componentcoupled to the memory, the processing component configured forprocessing the application. Displaying the emergency contact informationincludes scanning a code with a second device which causes the seconddevice to send a signal to unlock the apparatus which displays theemergency contact information. Displaying the emergency contactinformation includes using a camera of the apparatus to read a code onan item to determine if a person is granted access to the emergencycontact information. Displaying the emergency contact information occursafter a physical device containing emergency credentials provided onlyto a select group of people is inserted into the device. The applicationis further for automatically contacting an emergency contact using theemergency contact information, and contacting one or more additionalemergency contacts using the emergency contact information in sequentialorder if a prior call does not result in an answered call. Theapplication is further for implementing a security measure to ensure theemergency contact information is only accessed by emergency or medicalpersonnel.

In another aspect, a method programmed in a non-transitory memory of adevice comprises accessing emergency contact information and displayingthe emergency contact information on the device without unlocking thedevice. Accessing the emergency contact information includes authorizinga user. Authorizing the user includes: using a camera of the device toread a code on an item to determine if a person is granted access to theemergency contact information, using RFID to determine if the person isgranted access to the emergency contact information, using NFC todetermine if the person is granted access to the emergency contactinformation, or using a wireless technology to determine if the personis granted access to the emergency contact information. Authorizing theuser includes sending an unlock signal from a second device to thedevice which unlocks the emergency contact information. The unlocksignal is sent from the second device to the device using an applicationon the second device which is accessible only by medical or emergencypersonnel.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an exemplary input screen for inputting the emergencycontact information according to some embodiments.

FIG. 2 illustrates an exemplary display of the emergency contactinformation according to some embodiments.

FIG. 3 illustrates a flowchart of a method of implementing the emergencycontact system according to some embodiments.

FIG. 4 illustrates a block diagram of an exemplary computing deviceconfigured to implement the emergency contact method according to someembodiments.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

The emergency contact method and system is able to be used for firstresponders in case the owner of the mobile device (e.g., smart phone) isunable to communicate or for lost and found purposes. In someembodiments, the emergency contact method and system is implemented asan application (“app”) on the mobile device and is accessible via anicon (e.g., a red capital E or a capital E in the same color as the textof the device) placed in the top right corner of the phone, next to thebattery and the signal bar indicators. Accessing the emergency contactapp is able to be performed in any manner, and the icon for the app isable to appear in any manner and is able to be located anywhere on thescreen or device. In some embodiments, the emergency contact informationis accessible by scrolling down on the face of the mobile device beforethe lock screen (e.g., before unlocking the device with a personalaccess code or biometric input). This will assist emergency firstresponders or other medical personnel to find out who the person isand/or if there are any special needs or cautions, as well as emergencycontact information. The emergency contact app is able to be implementedon any type of device such as touch screen phones. In some embodiments,the emergency contact app is a standalone app, and in some embodiments,the app is included with all new phones as part of the operating system.The emergency contact app is able to be utilized with an Android®,iPhone® or any other type of phone.

The emergency contact information is able to include any kind ofinformation and is able to be displayed in any format. For example, theemergency contact information includes: the phone owner's name, address,photo, a scannable item (e.g., bar code, QR code), one or more emergencycontacts' names and phone numbers, a medical identification number,current medications of the phone owner, current health conditions of thephone owner (e.g., diabetes, deaf, epilepsy, HIV, heart condition),allergies (e.g., food, medicine), and/or emergency comments. In someembodiments, one or more of these fields are optional, and in someembodiments, one or more of the fields are required. In someembodiments, the fields are able to be filled out by the new owner ofthe phone upon purchase or at another time. In some embodiments, thefields are automatically populated, for example, by retrieving theinformation from a previous device, retrieving the information from adatabase (e.g., a dedicated database in the cloud), retrieving theinformation from a social networking site (e.g., Facebook®) or any othermanner.

FIG. 1 illustrates an exemplary input screen for inputting the emergencycontact information according to some embodiments. The input screen 100enables a user to input any personal information such as name, address,emergency contact information, medical identification number,medications, conditions, allergies, and/or additional comments. Theinput screen 100 allows a user to input the information using atouchscreen or any other input implementation. The input screen 100 isable to utilize text boxes, check boxes, radio buttons, menus, and/orany other input/selection implementation to receive data from a user. Insome embodiments, the input screen 100 includes automatically populatedinformation such as information retrieved from a database or anothersource. The input screen 100 is able to be implemented using voice inputor any other input implementation. Additionally, a photo/image and/or ascannable item are able to be included. For example, the user is able toselect the photo box, which causes a popup to display the imagesstored/accessible by the device (e.g., photo gallery, cloud photogallery). In another example, selecting the photo box causes the phone'scamera to be triggered to enable the user to take a photo of himselfwhich will be displayed in the photo box. The scannable item (orreadable item) is able to be any item such as a bar code, a QR code, oranother item that is able to be utilized by someone else (e.g., medicalpersonnel) to obtain information about the phone owner/user. Furtheringthe example, a medical personnel carries a smart phone with a bar codereader app, and when the medical personnel scans the bar code on theemergency page of the user's mobile device, the medical information(and/or other information) of the user is displayed on the medicalpersonnel's smart phone. In some embodiments, scanning the item causesthe medical personnel's smart phone to send a special signal to unlockthe user's device which displays or enables the display of the medicalinformation (and/or other information) of the user on the user's device.In some embodiments, the only items displayed are the bar code and/orthe photo for added protection, but with the ability of the appropriatepersonnel to unlock the hidden information (e.g., medical information).The scannable item is able to be added to the emergency contactinformation in any manner such as by a user visiting a website togenerate a bar code or QR code and dragging and dropping the generatedcode in the appropriate space on the emergency page. In another example,the user selects (e.g., presses on the touchscreen of the device) thebox of the code, and a prompt appears asking if the user would like togenerate a code to display with the emergency information. The code isgenerated by an app on the phone or in the cloud and then displayed.

FIG. 2 illustrates an exemplary display of the emergency contactinformation according to some embodiments. The display of the emergencycontact information 200 is able to include any information input,retrieved and/or stored about the owner of the mobile device. Althoughthe emergency contact information 200 displayed in FIG. 2 shows aspecific display format, any format of the information is possible.Additionally, any color scheme or any other stylized components are ableto be utilized. For example, the information is able to be displayed ona white back ground and black letters with no graphics or colors. Insome embodiments, more or less information is displayed, and/or theorder of the information is modified.

FIG. 3 illustrates a flowchart of a method of implementing the emergencycontact system according to some embodiments. In the step 300, emergencycontact information is input/retrieved/stored. The information is ableto be input manually using the input screen of FIG. 1. The informationis able to be input automatically, for example, by retrieving theinformation from another device (e.g., old smart phone or sharing via adevice “bump”). As described herein, the information is able to beretrieved in any manner from any data source such as a cloud device,another user device, a medical device/system and/or any other device. Insome embodiments, some information is manually input, and someinformation is automatically input. For example, the user inputs hisname or phone number, and then relevant information is automaticallyretrieved. In some embodiments, the emergency contact information isupdated based on changes detected. For example, if it is detected that acontact is deleted from a user's phone, and the contact is one of theemergency contacts, the user is prompted or asked if they want to changetheir emergency contact information. In another example, the mobiledevice communicates with a medical/doctor database, and if a medicalcondition changes (e.g., doctor makes a new diagnosis), then the medicalconditions in the emergency contact information are updated. Similarly,a pharmacy database is able to communicate current medications of theuser, including any changes.

In the step 302, the emergency contact information is displayed on thedevice. In some embodiments, the information is displayed after a user(e.g., medical personnel) swipes down on the device display. Forexample, the device detects finger pressure and/or movement on thescreen. In some embodiments, the information is displayed after a userswipes down on the device display and then selects an emergency contacticon. Any other actions, motions, voice-commands, and/or inputs are ableto be implemented to display the emergency contact information. Theemergency contact information is able to be displayed before unlockingthe device. More specifically, the emergency contact information is ableto be displayed without inputting the user's personal unlock code orbiometric information. In some embodiments, in addition to/or instead ofdisplaying the emergency contact information, the first contact in theemergency contact list is automatically called and the phone number ishidden. For example, a medical personnel swipes down on the screen andtaps the emergency contact icon which automatically dials an emergencycontact phone number. In some embodiments, the emergency contacts arecalled sequentially in order if the previous call results in a hangupbefore a pickup. For example, if the call to emergency contact #1results in a hangup before the contact answers the phone, then emergencycontact #2 is automatically called. In some embodiments, the automaticcalling of emergency contacts does not occur until one or more of theadditional security steps described herein occur.

In some embodiments, the emergency contact information is displayed upondetecting an authorized user (e.g., medical personnel). For example, themobile device's camera is able to be activated while the device is stilllocked to enable reading a bar code on a nurse's badge. In anotherexample, Radio Frequency Identification (RFID), Near-Field Communication(NFC), Bluetooth, infrared, and/or any other wireless or wiredimplementation is able to be used to determine whether the personattempting to access the emergency contact information should haveaccess. For example, using NFC, the user's mobile device communicateswith a hospital device (e.g., the mobile device receives an unlocksignal from the hospital device) which unlocks the emergency contactinformation, so that the information is accessible only to those at thehospital. Similarly, a smart phone of medical personnel is able totransmit a special unlock signal that when positioned near a mobiledevice unlocks the emergency contact information. In another example,the mobile device is able to communicate with or detect a special app ona smart phone (or other device) of a medical personnel, and the app usedby the medical personal grants access to the emergency contactinformation (e.g., the app is password protected, and the password iscontrolled by a medical/emergency agency). In yet another example, aphysical device is able to be inserted into a mobile device port (e.g.,the battery charging port, a USB port, or any other port), whichprovides access to the emergency contact information. Furthering theexamples, the special app or the physical device (e.g., key) is able tobe provided to a nurses, doctors, police, fire, and/or other emergencyunits, so that only the appropriate people have these specialized keysor apps to view emergency contact information. These security measuresare able to be implemented to provide additional protection in case auser's mobile device is stolen but still grant access to those who mayneed it to help. In some embodiments, fewer or additional steps areimplemented.

FIG. 4 illustrates a block diagram of an exemplary computing deviceconfigured to implement the emergency contact method according to someembodiments. The computing device 400 is able to be used to acquire,store, compute, process, communicate and/or display information such asimages and videos. In general, a hardware structure suitable forimplementing the computing device 400 includes a network interface 402,a memory 404, a processor 406, I/O device(s) 408, a bus 410 and astorage device 412. The choice of processor is not critical as long as asuitable processor with sufficient speed is chosen. The memory 404 isable to be any conventional computer memory known in the art. Thestorage device 412 is able to include a hard drive, CDROM, CDRW, DVD,DVDRW, High Definition disc/drive, ultra-HD drive, flash memory card orany other storage device. The computing device 400 is able to includeone or more network interfaces 402. An example of a network interfaceincludes a network card connected to an Ethernet or other type of LAN.The I/O device(s) 408 are able to include one or more of the following:keyboard, mouse, monitor, screen, printer, modem, touchscreen, buttoninterface and other devices. Emergency contact application(s) 430 usedto perform the emergency contact method are likely to be stored in thestorage device 412 and memory 404 and processed as applications aretypically processed. More or fewer components shown in FIG. 4 are ableto be included in the computing device 400. In some embodiments,emergency contact hardware 420 is included. Although the computingdevice 400 in FIG. 4 includes applications 430 and hardware 420 for theemergency contact method, the emergency contact method is able to beimplemented on a computing device in hardware, firmware, software or anycombination thereof. For example, in some embodiments, the emergencycontact applications 430 are programmed in a memory and executed using aprocessor. In another example, in some embodiments, the emergencycontact hardware 420 is programmed hardware logic including gatesspecifically designed to implement the emergency contact method.

In some embodiments, the emergency contact application(s) 430 includeseveral applications and/or modules. In some embodiments, modulesinclude one or more sub-modules as well. In some embodiments, fewer oradditional modules are able to be included.

Examples of suitable computing devices include a personal computer, alaptop computer, a computer workstation, a server, a mainframe computer,a handheld computer, a personal digital assistant, a cellular/mobiletelephone, a smart appliance, a gaming console, a digital camera, adigital camcorder, a camera phone, a smart phone, a portable musicplayer, a tablet computer, a mobile device, a video player, a video discwriter/player (e.g., DVD writer/player, high definition discwriter/player, ultra high definition disc writer/player), a television,an augmented reality device, a virtual reality device, a homeentertainment system, smart jewelry (e.g., smart watch) or any othersuitable computing device.

To utilize the emergency contact method and system, a user inputsemergency contact information and/or the information is automaticallyretrieved and stored. Another person is then able to access theemergency contact information without having to unlock the mobile devicestoring the information. The person is able to access the information inany manner such as swiping the screen, and the emergency contactinformation is displayed.

In operation, the emergency contact information available before thelock screen so first responders and/or emergency personnel have accessto the information without trying to unlock a phone or scroll throughthe contact list.

The present invention has been described in terms of specificembodiments incorporating details to facilitate the understanding ofprinciples of construction and operation of the invention. Suchreference herein to specific embodiments and details thereof is notintended to limit the scope of the claims appended hereto. It will bereadily apparent to one skilled in the art that other variousmodifications may be made in the embodiment chosen for illustrationwithout departing from the spirit and scope of the invention as definedby the claims.

What is claimed is:
 1. A method programmed in a non-transitory memory ofa device comprising: a. receiving emergency contact informationincluding acquiring an image of an owner of the device by selecting aphoto box on the device which causes a camera of the device to betriggered to enable the owner to take a picture of himself/herself whichis displayed in the photobox; and b. displaying the emergency contactinformation on the device, wherein displaying the emergency contactinformation includes scanning a code with the camera of a second devicewhich causes the second device to directly send a signal to the deviceto unlock the device which displays the emergency contact information,wherein displaying the emergency contact information includes using thecamera of the device to read the code on an item to determine if aperson is granted access to the emergency contact information, whereinthe camera is activated while the device is still locked.
 2. The methodof claim 1 wherein the emergency contact information includes at leastone of a name of an owner of the device, an address, a photograph, ascannable item, an emergency contact information, a medicalidentification number, current medications of the owner of the device,and current health conditions of the owner of the device.
 3. The methodof claim 1 wherein receiving the emergency contact information includesautomatically populating fields on the device by retrieving theinformation from a social networking site.
 4. The method of claim 1wherein receiving the emergency contact information includes receiving aphone number and retrieving corresponding information based on the phonenumber.
 5. The method of claim 1 wherein displaying the emergencycontact information includes detecting finger pressure and movement on ascreen of the device before displaying the emergency contactinformation.
 6. The method of claim 1 wherein displaying the emergencycontact information occurs after a physical device containing emergencycredentials provided only to a select group of people is inserted intothe device.
 7. The method of claim 1 further comprising automaticallycontacting an emergency contact using the emergency contact information,and contacting one or more additional emergency contacts using theemergency contact information in sequential order if a prior call doesnot result in an answered call.
 8. The method of claim 1 furthercomprising editing the emergency contact information by detectingdeletion of a contact from the device and communicating with a medicaldatabase to determine changes in medical condition of an owner of thedevice.
 9. The method of claim 1 further comprising implementing asecurity measure to ensure the emergency contact information is onlyaccessed by emergency or medical personnel.
 10. An apparatus comprising:a. a non-transitory memory for storing an application, the applicationfor: i. receiving emergency contact information including acquiring animage of an owner of the apparatus by selecting a photo box on theapparatus which causes a camera of the apparatus to be triggered toenable the owner to take a picture of himself/herself which is displayedin the photobox; and ii. displaying the emergency contact information onthe apparatus, wherein displaying the emergency contact informationincludes scanning a code with a the camera of a second device whichcauses the second device to directly send a signal to the apparatus tounlock only a portion of the apparatus which only accesses and displaysthe emergency contact information, wherein displaying the emergencycontact information includes using the camera of the device to read thecode on an item to determine if a person is granted access to theemergency contact information, wherein the camera is activated while thedevice is still locked; and b. a processing component coupled to thememory, the processing component configured for processing theapplication.
 11. The apparatus of claim 10 wherein displaying theemergency contact information occurs after a physical device containingemergency credentials provided only to a select group of people isinserted into the device.
 12. The apparatus of claim 10 wherein theapplication is further for automatically contacting an emergency contactusing the emergency contact information, and contacting one or moreadditional emergency contacts using the emergency contact information insequential order if a prior call does not result in an answered call.13. The apparatus of claim 10 wherein the application is further forimplementing a security measure to ensure the emergency contactinformation is only accessed by emergency or medical personnel, whereinthe emergency or medical personnel comprise first responders.
 14. Amethod programmed in a non-transitory memory of a device comprising: a.accessing emergency contact information, wherein an image of an owner ofthe device is acquired by selecting a photo box on the device whichcauses a camera of the device to be triggered to enable the owner totake a picture of himself/herself which is displayed in the photobox;and b. displaying the emergency contact information on the device,wherein authorizing a user includes sending an unlock signal from asecond device to the device which unlocks the device including emergencycontact information, wherein the unlock signal is directly sent from thesecond device to the device using an application on the second devicewhich is accessible only by medical or emergency personnel, wherein themedical or emergency personnel comprise first responders, whereindisplaying the emergency contact information includes using the cameraof the device to read a code on an item to determine if a person isgranted access to the emergency contact information, wherein the camerais activated while the device is still locked.
 15. The method of claim14 wherein accessing the emergency contact information includesauthorizing the user.
 16. The method of claim 15 wherein authorizing theuser includes: using RFID to determine if the person is granted accessto the emergency contact information, using NFC to determine if theperson is granted access to the emergency contact information, or usinga wireless technology to determine if the person is granted access tothe emergency contact information.