GB2602844A - A personal security device and method of personal security verification - Google Patents

A personal security device and method of personal security verification Download PDF

Info

Publication number
GB2602844A
GB2602844A GB2100705.9A GB202100705A GB2602844A GB 2602844 A GB2602844 A GB 2602844A GB 202100705 A GB202100705 A GB 202100705A GB 2602844 A GB2602844 A GB 2602844A
Authority
GB
United Kingdom
Prior art keywords
personal security
security device
user
reference data
personal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
GB2100705.9A
Other versions
GB202100705D0 (en
Inventor
Arafat Khalil
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB2100705.9A priority Critical patent/GB2602844A/en
Publication of GB202100705D0 publication Critical patent/GB202100705D0/en
Publication of GB2602844A publication Critical patent/GB2602844A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0438Sensor means for detecting
    • G08B21/0453Sensor means for detecting worn on the body to detect health condition by physiological monitoring, e.g. electrocardiogram, temperature, breathing
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/16Devices for psychotechnics; Testing reaction times ; Devices for evaluating the psychological state
    • A61B5/18Devices for psychotechnics; Testing reaction times ; Devices for evaluating the psychological state for vehicle drivers or machine operators
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/01Measuring temperature of body parts ; Diagnostic temperature sensing, e.g. for malignant or inflamed tissue
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/02Detecting, measuring or recording pulse, heart rate, blood pressure or blood flow; Combined pulse/heart-rate/blood pressure determination; Evaluating a cardiovascular condition not otherwise provided for, e.g. using combinations of techniques provided for in this group with electrocardiography or electroauscultation; Heart catheters for measuring blood pressure
    • A61B5/0205Simultaneously evaluating both cardiovascular conditions and different types of body conditions, e.g. heart and respiratory condition

Landscapes

  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Emergency Management (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Biophysics (AREA)
  • Heart & Thoracic Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Gerontology & Geriatric Medicine (AREA)
  • Cardiology (AREA)
  • Physical Education & Sports Medicine (AREA)
  • Physiology (AREA)
  • Pulmonology (AREA)
  • Child & Adolescent Psychology (AREA)
  • Biomedical Technology (AREA)
  • Developmental Disabilities (AREA)
  • Educational Technology (AREA)
  • Hospice & Palliative Care (AREA)
  • Psychiatry (AREA)
  • Psychology (AREA)
  • Social Psychology (AREA)
  • Pathology (AREA)
  • Computer Security & Cryptography (AREA)
  • Medical Informatics (AREA)
  • Molecular Biology (AREA)
  • Surgery (AREA)
  • Animal Behavior & Ethology (AREA)
  • Public Health (AREA)
  • Veterinary Medicine (AREA)
  • Measuring And Recording Apparatus For Diagnosis (AREA)

Abstract

A personal security device 1 which may be a wearable such as a smartwatch, and corresponding method for protecting a user against a threat to their person or property. The device 1 has one or more sensors (11, figure. 2) configured to measure physiological characteristics of the user. These physiological characteristics may include heart rate, blood pressure, blood oxygen levels, body temperature, hormone levels, pupil size or other retinal characteristics, voice pitch or other voice characteristics and bodily posture or patterns of movement. The device 1 also has memory (17, figure. 3) containing reference data, and a processing module (15, figure. 3) configured to compare the measurements against the reference data to classify the user’s physiological condition as normal or under threat. One or more security actions may be initiated in the event that the classification is under threat. Security actions initiated may include sounding an alarm, communicating with one or more external parties, shutting down the device 1 or shutting down access to the property.

Description

Intellectual Property Office Application No G1321007059 RTM Date:4 June 2021 The following terms are registered trade marks and should be read as such wherever they occur in this document: Bluetooth WiFi Intellectual Property Office is an operating name of the Patent Office www.gov.uk/ipo -1 -A personal security device and method of personal security verification
Field of the Invention
The present invention concerns personal security devices. More particularly, but not exclusively, this invention concerns personal security devices for protecting a user against a threat to their person or property. The invention also concerns a method of providing personal security with a personal security device.
Background of the Invention
Crime prevention products (i.e. personal security devices) include personal safety devices, anti-car theft devices and domestic and commercial building security systems.
Personal safety devices, like personal alarms and self-defence sprays, tend to be worn by a user, for example around the neck or wrist, or in clothing pockets. When triggered by the user, such devices act to deter attackers and/or alert friends, family and emergency services of a potential attack. A drawback with known devices is that they can be difficult to use in an inconspicuous manner if the user is under attack, and may not be reachable at all if the user is restrained.
Anti-car theft devices often take the form of physical restraints such as wheel clamps and steering wheel immobilisers. Anti-car theft devices can also be UPS-based car tracking and alert systems for use with smart devices. Such devices whilst beneficial in some circumstances do not provide protection against a theft under duress.
The present invention seeks to mitigate the above-mentioned problems.
Alternatively or additionally, the present invention seeks to provide an improved personal security device.
Summary of the Invention
The present invention provides, according to a first aspect, a personal security device for protecting a user against a threat to their person or property, comprising: one or more sensors configured to measure physiological characteristics of the user; a memory containing reference data; a processing module configured to compare the measurements against the reference data to classify the user's physiological condition as normal or under threat, and to initiate one or more security actions when the classification is under threat.
The personal security device may comprise a personal safety device, and/or an anti-vehicle theft device and/or a building security device. For present purposes, the term "property" includes any large or small unit capable of communicating with the personal security device, for example a building, an outbuilding, a vehicle or another connected device.
The personal security device may be wearable, for example around the user's neck, ankle, waist or wrist.
The one or more sensors may comprise two or more, for example four or more sensors. The sensors may be embedded in the personal security device. Such co-located sensors may be configured to read measurements from the same part of the user's body. Alternatively, one or more of the sensors may be distributed to read measurements from different parts of the user's body.
The sensors may be configured to output physiological characteristic data to the processing module. The physiological characteristics may comprise heart rate, blood pressure, blood oxygen levels, body temperature, hormone levels, retinal properties or other properties of the eye, patterns of speech or other vocal properties, body movement, or any other physiological parameters indicative of the physical condition of the user.
The reference data may be stored in local memory, for example in a database.
The reference data may be pre-loaded, or may be obtained gradually (learned) through use. The reference data may alternatively be stored remotely.
One or more results from the comparison of the measurements against the reference data and/or the classification of the user's physiological condition as normal or under threat may be stored, for example locally or remotely. Some or all of the results and/or classification data may be packaged and stored securely on a blockchain and may for example, be accessible to law enforcement agencies.
The classification may be a binary classification as "normal or "abnormal/ under threat".
The one or more security actions may include one or more of: shutting down any device in which the security device is integrated (or upon which the security device is positioned); blocking or disabling access to any such device; sending an alert; raising an alarm; disabling a lock; and/or otherwise preventing access to the property. The one or more security actions may include blocking or disabling access to a related device (i.e. an associated device in communication with the personal security device) or an application thereof for example to prevent a forced money transfer made under duress.
In an advantage over personal security devices of the prior art, when multiple sensors are used to measure several different bodily characteristics of a user of the device, an accurate determination can be made of the physical condition of the user, enabling a security response (i.e. security actions) to be initiated in an appropriate manner. Such security actions can be inconspicuous, and happen automatically without requiring any intervention from the user. In a further advantage, a classification of under threat may enable a related device in proximity to, or associated with, the personal security device, or an application loaded upon such a related device, to be blocked, disabled or shut down. Thus, in some applications, the invention may advantageously protect the user from theft, forced entry and/or unwanted access to personal data, money or other resources.
The processing module may be configured to automatically compare the measurements against the reference data. The processing module may be configured to compare the measurements against the reference data upon a user's command. The processing module may be configured to routinely (i.e. periodically) compare the measurements against the reference data The time period of the comparison may be a user defined interval, for example ranging from about 30 seconds, to about 3 minutes. The time period of the comparison may be adjustable throughout a 24 hour period and/or throughout a 7-day week, for example, comparing the data less frequently during the night. There may be a default setting for the time period of the comparison. The user may be able to pre-set the adjustments to the time periods of the comparison throughout a 24 hour period and/or throughout a 7-day week. The processing module may be configured to compare the measurements against the reference data sequentially, for each physiological parameter. -4 -
Comparing the measurements against the reference data may include assessing whether the measurements fall within an acceptable margin of the reference data.
The processing unit may be configured to allow a "normal" range of values for each physiological parameter, indicative of a typical condition of the user. The 5 acceptable margin may be 5% above and below the mean or median value. The acceptable margin may be 10% above and below the mean or median value. The size of the margin may vary depending on the physiological parameter. The reference data may be personalised to the user or may be default population average data. The reference data may be input by the user, downloaded from a file, or recorded and stored in memory during day-to-day wear of the device.
The personal security device may additionally comprise a GPS module configured to determine the user's location.
The GPS module may be configured to send a position to the processing module. Instead of a GPS module, the personal security device may comprise another type of location-finding module.
The processing module may be configured to determine, for example periodically, whether the user is in a designated region. The region may correspond to a notional area around the user's home, or vehicle. The processing module may be configured to only initiate one or more security actions when the user is within the designated region. The designated region may be pre-set by the user.
The personal security device may additionally comprise a timer module.
The timer module may periodically communicate with the one or more sensors to initiate authentication of the user's identity. The timer module may periodically communicate with the sensors to request measurement data indicative of the user's physiological condition to be output to the processing module. The timer module may periodically communicate with the wireless communication module to instigate the sending of a GPS-obtained position to the processing module.
The time periods may be pre-set by the user.
The processing module may be configured to initiate one or more security actions when the user is at a pre-set location and/or at a pre-set time.
Advantageously, battery power is saved by only instigating one or more security actions when the user is in a predetermined region. -5 -
The physiological characteristics may comprise two or more of: heart rate, blood pressure, blood oxygen levels, body temperature, hormone levels, pupil size or other retinal characteristic, voice pitch or other voice characteristic and body posture or body movement. The above list is non-limiting, and the physiological characteristics may alternatively or additionally comprise any symptoms indicative of a high stress bodily response.
The personal security device may additionally comprise an audio output module, wherein the one or more security actions comprise sounding an alarm. Such a feature may advantageously surprise and deter any assailant, whilst simultaneously alerting passers-by to a potential threat.
The personal security device may additionally comprise a communication module, wherein the one or more security actions comprise communicating with one or more external parties.
The external parties may include emergency services or other officials. The external parties may include trusted persons known to the user.
The one or more security actions may comprise shutting down of the personal security device. The one or more security actions may comprise shutting down of a related device.
The one or more security actions may comprise disabling access to the 20 property.
The one or more security actions may comprise blocking or disabling access to a related device.
The personal security device may additionally comprise a user authentication module.
Advantageously, the security device may provide an accurate security assessment by ensuring that the physiological measurements taken correspond to the correct user.
The processing module is additionally configured to store the input data and/or comparison data in the memory.
The input data and/or comparison data may be stored locally. The input data and/or comparison data may be stored remotely.
The device may be embedded in a smart device. -6 -
The smart device may be a smartwatch. The smart device may be a smartphone or a pair of smart glasses/ spectacles. The smart device may be a face mask or head covering. The smart device may be a single device, or may include more than one device, such as a smartwatch in combination with a pair of smart glasses/ spectacles.
According to a second aspect of the invention there is provided a method of providing personal security, comprising the steps of: providing a personal security device, measuring one or more physiological characteristics of a user using one or more sensors; comparing the measurements against corresponding reference data; classifying the user's physiological condition as normal or under threat; initiating one or more security actions in the event that the classification is under threat.
The method may further comprise the step of adding to the reference data during use of the personal security device.
The dataset may therefore become larger during use, enabling a more accurate determination of the physiological condition of the user.
It will of course be appreciated that features described in relation to one aspect of the present invention may be incorporated into other aspects of the present invention. For example, the method of the invention may incorporate any of the features described with reference to the apparatus of the invention and vice versa.
Description of the Drawings
An embodiment of the present invention will now be described by way of example only, with reference to the accompanying schematic drawings of which: Figure 1 is a schematic front view of a personal security device according to the example embodiment of the invention; Figure 2 is a schematic rear view of the personal security device of Figure 1; Figure 3 is a schematic diagram of the inner components of the personal security device of Figure 1; and Figure 4 is a schematic diagram showing steps of a method of personal security verification using the personal security device of Figures 1-3 -7 -
Detailed Description
A personal security device 1 according to the example embodiment of the invention is a smartwatch (Figure 1). The hardware of the smartwatch 1 is known in the art. In an alternative embodiment, the personal security device is another form of smart device, for example a smart phone or pair of smart spectacles.
The smartwatch I has a housing 3 and strap 5, with buckle fastener 7. On the front side of the housing 3, a touchscreen display 9 provides a user interface to the device. On the rear side of the housing 3 (Figure 2), four bodily sensors 11 embedded in the smartwatch 1 are configured to sense body temperature, heart rate and movements of the user. In the present example embodiment of the invention, movements of the user are measured using an accelerometer and gyroscope. In an alternative embodiment, different bodily sensors may be used to measure movements of the user, or indeed to collect different physiological data. Such sensors may be embedded within the device as in the current embodiment, or may be remote from the device/distributed i.e. attached to various parts of the user's body.
Within the housing 3 (Figure 3) a processor (i.e. CPU) 15 communicates with a memory 17, wireless communications module 19 enabled for Bluetooth and WiFi communications, a GPS module 13, a display module 21 (and sensors 11 not shown in Figure 3). The smartwatch 1 is powered by a battery 25.
Aside from the typical functions of a smartwatch known in the art, for example displaying the date and time (not described), the smartwatch 1 of the present example embodiment is configured to perform a method of personal security verification (Figure 4).
In a first, (optional) authentication, step 27 of the method of personal security verification, the smartwatch 1 performs a biometric authentication to identify the user. The biometric authentication in the present example embodiment is performed as a gait analysis. In an alternative embodiment, biometric authentication may for example take the form of facial or voice recognition, or a combination of both. In the present example embodiment of the invention, the motion sensors 11 (i.e. accelerometer and gyroscope) continuously measure movements of the user and output to the CPU 15. Periodically, at a time interval pre-set by the user, the data is analysed to compare patterns of movement against previously recorded patterns of -8 -movement for the same user stored in the memory 17. If the data matches (within an acceptable tolerance) the previously recorded data, the authentication is deemed successful, and the method proceeds to the next step. If authentication fails, further steps of the method are not performed, and the authentication step is repeated. In alternative embodiments, additional variables such as the user's location, or the time of day, may be used such that authentication is only performed at certain specific locations or at certain specific times. In alternative embodiments, the user may be prompted to enter a pin or passcode, instead of biometric authentication.
Upon successful authentication, in a second, measurement, step 29 of the method, the CPU 15 obtains a plurality of further physiological readings from the sensors 11. In the present example embodiment of the invention, the temperature sensor and blood pressure sensor output values indicative of the user's body temperature and blood pressure to the CPU 15.
In a third, comparative, step 31 of the method, the readings are compared against comparable readings stored in the memory 17 representative of a normal physiological condition. If the measured values deviate from the pre-stored values by more than a pre-set margin, the CPU 15 infers that the user is in an abnormal, high stress, condition, and could be under attack. The method then proceeds to the next step. If on the other hand, the measured values are within the pre-set margin, the CPU infers that the user is in a "normal" condition and no further action is taken. The method reverts to the authentication step 27.
If the CPU 15 infers that the user could be under attack, in a fourth, (optional) checking step the physical location of the user is determined. The UPS module 13 is prompted by the CPU to output a position, which is checked by the CPU against potential high threat locations stored in the memory 17. Potential high threat locations include the user's home address, and the location where the user's car is parked (known to the device as the last location where the smartwatch I was Bluetooth connected to the user's car). If the user is deemed to be in a high risk location, the method proceeds to the next step. Otherwise, no further action is taken and the method reverts to the authentication step 27.
If the CPU 15 infers that the user is in a high stress condition and in a high risk location, in a fifth, actions, step 35, certain security measures are initiated. In the present example embodiment of the invention, the actions taken depend on the -9 -geographical position of the user. If the user is at their home address, entry to the home is prevented. In the present example embodiment of the invention, doors and gates to the property are locked and the locks disabled for a pre-set period of time, such that they cannot be opened using the user's smartwatch 1. If the user is adjacent their parked car (or other vehicle), entry to the car is prevented in a similar way. The doors are locked and the locks are disabled, such that they cannot be opened via the smartwatch I. To disable the locks, the CPU IS signals the wireless communications chipset 19 to send a Bluetooth signal to the house/car. The doors/gates are prevented from being opened. After the pre-set duration of time, it is assumed that security measures are no longer required, and the wireless communications chipset 19 send a further Bluetooth signal to enable the locks to be opened. In an alternative embodiment in which the sensors periodically report readings to the CPU at a pre-set time interval, the locks are not enabled until such time as the sensor readings report normal, within threshold, readings. In addition, access to the smartwatch 1 itself is prevented for the same pre-set duration of time, during which time an alert is issued to one or more emergency contacts.
Whilst the method is being performed, the touchscreen display 9 provides feedback to the user via visual alerts.
To set/ reset the smartwatch I, for example to adjust the pre-set time periods, an identity verification step is performed, similar to the authentication step 27 described above. In the present example embodiment, the user is prompted to enter a pin via the touchscreen display 9, to access the smartwatch 1.
The memory 17, which includes a database of information related to the "normal" physiological readings for the user, is continuously updated, such that the CPU 15 can progressively fine-tune its assessment of the condition of the user. In addition, the smartwatch t is configured to communicate via WiFi with other associated smart devices, to enable further information to be obtained and stored In an alternative embodiment, data is stored remotely from the smartwatch 1, for example in the cloud.
Whilst the present invention has been described and illustrated with reference to a particular embodiment, it will be appreciated by those of ordinary skill in the art that the invention lends itself to many different variations not specifically illustrated herein.
-10 -Where in the foregoing description, integers or elements are mentioned which have known, obvious or foreseeable equivalents, then such equivalents are herein incorporated as if individually set forth. Reference should be made to the claims for determining the true scope of the present invention, which should be construed so as to encompass any such equivalents. It will also be appreciated by the reader that integers or features of the invention that are described as preferable, advantageous, convenient or the like are optional and do not limit the scope of the independent claims. Moreover, it is to be understood that such optional integers or features, whilst of possible benefit in some embodiments of the invention, may not be desirable, and may therefore be absent, in other embodiments.

Claims (1)

  1. Claims 2. 3. 4. 6.A personal security device for protecting a user against a threat to their person or property, comprising: one or more sensors configured to measure physiological characteristics of the user; a memory containing reference data; a processing module configured to compare the measurements against the reference data to classify the user's physiological condition as normal or under threat, and to initiate one or more security actions when the classification is under threat.
    A personal security device according to claim 1, wherein comparing the measurements against the reference data includes assessing whether the measurements fall within an acceptable margin of the reference data.
    A personal security device according to claim 1 or 2, additionally comprising a GPS module configured to determine the user's location.
    A personal security device according to any preceding claim, additionally comprising a timer module.
    A personal security device according to claim 3 or 4, wherein the processing module is configured to initiate one or more security actions when the user is at a pre-set location and/or at a pre-set time.
    A personal security device according to any preceding claim, wherein the physiological characteristics comprise two or more of heart rate, blood pressure, blood oxygen levels, body temperature, hormone levels, pupil size or other retinal characteristic, voice pitch or other voice characteristic and bodily posture or patterns of movement.
    -12 - 7. A personal security device according to any preceding claim, additionally comprising an audio output module, wherein the response comprises sounding an alarm.
    8 A personal security device according to any preceding claim, additionally comprising a communication module, wherein the response comprises communicating with one or more external parties 9 A personal security device according to any preceding claim, wherein the response comprises shutting down of the personal security device.10. A personal security device according to any preceding claim, wherein the response comprises disabling access to the property.11 A personal security device according to any preceding claim, additionally comprising a user authentication module.12. A personal security device according to any preceding claim, wherein the processing module is additionally configured to store the input data and/or comparison data in the memory.13. A personal security device according to any preceding claim, wherein the personal security device is embedded in a smart device.14. A method of personal security verification, comprising the steps of: * providing a personal security device; * measuring one or more physiological characteristics of a user using one or more sensors; * comparing the measurements against corresponding reference data * classifying the user's physiological condition as normal or under threat; * initiating one or more security actions in the event that classification is under threat.15. The method of claim 14 where the method further comprises the step of adding to the reference data during use of the personal security device.
GB2100705.9A 2021-01-19 2021-01-19 A personal security device and method of personal security verification Pending GB2602844A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB2100705.9A GB2602844A (en) 2021-01-19 2021-01-19 A personal security device and method of personal security verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB2100705.9A GB2602844A (en) 2021-01-19 2021-01-19 A personal security device and method of personal security verification

Publications (2)

Publication Number Publication Date
GB202100705D0 GB202100705D0 (en) 2021-03-03
GB2602844A true GB2602844A (en) 2022-07-20

Family

ID=74678885

Family Applications (1)

Application Number Title Priority Date Filing Date
GB2100705.9A Pending GB2602844A (en) 2021-01-19 2021-01-19 A personal security device and method of personal security verification

Country Status (1)

Country Link
GB (1) GB2602844A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120068848A1 (en) * 2010-09-15 2012-03-22 Colorado State University Research Foundation Multi-sensor environmental and physiological monitor system and methods of use
US20170039833A1 (en) * 2015-02-24 2017-02-09 KiLife Tech, Inc. Locks for wearable electronic bands
US20170109990A1 (en) * 2015-10-20 2017-04-20 Micron Electronics LLC Method and system for fall detection
US9659477B1 (en) * 2015-12-09 2017-05-23 T-Mobile Usa, Inc. Wireless wearable device platform
US20170269556A1 (en) * 2015-10-09 2017-09-21 Huizhou Tcl Mobile Communication Co., Ltd Smart watches and associated systems and methods for lock-screen management thereof
US10075846B1 (en) * 2017-08-10 2018-09-11 The Florida International University Board Of Trustees Method for continuous user authentication with wearables
US20180357887A1 (en) * 2017-06-08 2018-12-13 Guardian Band, Inc. Wearable personal safety devices and methods of operating the same
US20190057189A1 (en) * 2017-08-17 2019-02-21 Innovative World Solutions, LLC Alert and Response Integration System, Device, and Process
CN109840775A (en) * 2018-12-25 2019-06-04 福建联迪商用设备有限公司 A kind of method and terminal improving wearable device safety
US20200327789A1 (en) * 2019-02-21 2020-10-15 Dr. Jung-Tang Huang Marathon timing and real-time accident notification method and system thereof

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120068848A1 (en) * 2010-09-15 2012-03-22 Colorado State University Research Foundation Multi-sensor environmental and physiological monitor system and methods of use
US20170039833A1 (en) * 2015-02-24 2017-02-09 KiLife Tech, Inc. Locks for wearable electronic bands
US20170269556A1 (en) * 2015-10-09 2017-09-21 Huizhou Tcl Mobile Communication Co., Ltd Smart watches and associated systems and methods for lock-screen management thereof
US20170109990A1 (en) * 2015-10-20 2017-04-20 Micron Electronics LLC Method and system for fall detection
US9659477B1 (en) * 2015-12-09 2017-05-23 T-Mobile Usa, Inc. Wireless wearable device platform
US20180357887A1 (en) * 2017-06-08 2018-12-13 Guardian Band, Inc. Wearable personal safety devices and methods of operating the same
US10075846B1 (en) * 2017-08-10 2018-09-11 The Florida International University Board Of Trustees Method for continuous user authentication with wearables
US20190057189A1 (en) * 2017-08-17 2019-02-21 Innovative World Solutions, LLC Alert and Response Integration System, Device, and Process
CN109840775A (en) * 2018-12-25 2019-06-04 福建联迪商用设备有限公司 A kind of method and terminal improving wearable device safety
US20200327789A1 (en) * 2019-02-21 2020-10-15 Dr. Jung-Tang Huang Marathon timing and real-time accident notification method and system thereof

Also Published As

Publication number Publication date
GB202100705D0 (en) 2021-03-03

Similar Documents

Publication Publication Date Title
US11689525B2 (en) System and apparatus for biometric identification of a unique user and authorization of the unique user
US20190228633A1 (en) Fall Warning For A User
US20060059364A1 (en) Bio-linking a user and authorization means
US20230190188A1 (en) Method and system for remote transdermal alcohol monitoring
US20230181108A1 (en) Method and system for remote transdermal alcohol monitoring
US20170148290A1 (en) Anti-theft alarm system and method
US20240172978A1 (en) Wrist-worn impairment detection and methods for using such
CN103957325A (en) Terminal alarm method and terminal
EP3193716B1 (en) Impairment detection with biological considerations
KR101825134B1 (en) System for crime prevention of drone using emotion recognition device
GB2602844A (en) A personal security device and method of personal security verification
CN111263940B (en) Wearable device with multiple biometrics
EP3193715B1 (en) Impairment detection
EP3193714B1 (en) Impairment detection with environmental considerations
FR3040521A1 (en) STRESS DETECTION FOR ACCESS CONTROL
KR20200094511A (en) Wrist band for safeguarding the old and weak
Sakthi et al. A Novel Holistic Safety System for Women using IOT
JP6810429B2 (en) Monitoring system and monitoring method
VYSHNAVI et al. Hybrid Driver Safety, Vigilance, Security and Alerting System for Vehicle
CN117542506A (en) Rescue method, device and equipment based on different physiological states of user
KR20200058811A (en) User care system
KR20200104707A (en) System and Method for Alarming Emergency Situation
WO2016124875A1 (en) Portable risk-determining apparatus