US20170316676A1 - Personal emergency response system and method of operation - Google Patents

Personal emergency response system and method of operation Download PDF

Info

Publication number
US20170316676A1
US20170316676A1 US15/524,665 US201515524665A US2017316676A1 US 20170316676 A1 US20170316676 A1 US 20170316676A1 US 201515524665 A US201515524665 A US 201515524665A US 2017316676 A1 US2017316676 A1 US 2017316676A1
Authority
US
United States
Prior art keywords
mobile device
responders
personal
connection
personal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/524,665
Inventor
Rudolf King
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of US20170316676A1 publication Critical patent/US20170316676A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0438Sensor means for detecting
    • G08B21/0492Sensor dual technology, i.e. two or more technologies collaborate to extract unsafe condition, e.g. video tracking and RFID tracking
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/001Alarm cancelling procedures or alarm forwarding decisions, e.g. based on absence of alarm confirmation
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/30Transforming light or analogous information into electric information
    • H04N5/33Transforming infrared radiation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • H04W76/02
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/023Power management, e.g. system sleep and wake up provisions
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • Personal emergency response systems are currently based on the implementation of a call center; some are sending out text messages using standard communication means like cell phones, particularly with global positioning data (GPS, global positioning system) and information about the victim. While these systems have been very helpful in the past, however, first aid efforts among more than one first responders are hardly coordinated and the call centers need to check the availability of first responders first before deciding on each action plan; as this work is time consuming and time is of the essence, not only because of monetary restraints but also due to health issues directly connected to the passing of time after an emergency, they usually resort to calling only the closest family member and then the ambulance as they do not know immediately the whereabouts of other potential first responders even though one or more of them might be only meters away from the victim.
  • GPS global positioning data
  • the following invention is used only in an emergency and thus in stark contrast to geo-fencing systems.
  • GPS based PERS in particular those embedded on apps and widgets on smart phones, it is common to either send or display to the rescue team or person a GPS coordinate found after an alarm is triggered, or better still one that was found previous to the alarm triggered (see EP 1679672).
  • the coordinate is stored in the device.
  • the GPS chip inside the device is then set to a silent mode, until a certain, predefined time interval has passed and a new tracking sequence is started.
  • the problem of the first method is, that inside a building there is no way to detect GPS coordinates. We consider this method to be completely unreliable. If GPS coordinates are searched constantly in preset intervals, the accuracy becomes much better, but still can be improved.
  • An operation method for personal emergency response systems is provided combining a mobile device, e.g. a smartphone, and a personal device that is easy to carry for the user, e.g. a bracelet or pendant worn by the user on the body with genuine text, phone and mobile internet capability, both when and when no sensors are wirelessly connected to these devices, and methods to improve and automate personal emergency response systems by consistently supervising the users in case of an emergency by using mainly mobile Internet communication means and devices with immediate display of first responders and a possibility to coordinate ambulance and other official emergency response means omitting the need for geo-fencing in total and call centers is omitted unless desired by the users; method to facilitate the rescue of a person via PERS by displaying a line of two or more previous and potentially later GPS coordinates and to conserve energy while intermittently receiving GPS coordinates for rescue purposes.
  • a mobile device e.g. a smartphone
  • a personal device that is easy to carry for the user e.g. a bracelet or pendant worn by the user on the body with genuine text
  • GPS positioning is based on the triangulation of at least three satellites and using the time passed from emission of the wave sent from one satellite until received by the GPS chip, a so-called bounce back occurs mainly in said two scenarios, when the emitted radiowave first hits a large structure and then continues further to the GPS chip; in this case the time passed is slightly longer than in a straight line. Therefore, standard GPS chips in particular in smart phones describe GPS coordinates in the following manner:
  • first a coordinate center is given in Latitude and Longitude
  • the bracelet or pendant can send out the distress signal on its own, even if the smartphone is out of reach in order to ensure the longest possible time frame in which the user is protected, taking care even for forgetfulness.
  • this body-worn device may not be heavy; thus smaller batteries are to be used than potentially in a smartphone.
  • New, in particular mobile Internet communication means enable better solutions that work by immediately connecting an user of the system in case of an emergency with his or her friends, family, and other people using the same type of devices.
  • the following solution allows to immediately know where potential first responders are, and hands this information out to all potential first responders; by connecting them via mobile internet it is possible to strengthen and accelerate rescue efforts even without resorting to the assistance of call centers; the line display is to give the first responders a better grasp of the whereabouts of the person and still conserve energy using an intelligent way of triggering GPS chips in time intervals.
  • personal device will be used in the following both for bracelets, pendants and any other devices that are easy to carry for the user and do not need to be taken off during the day and potentially night.
  • sensor can mean one sensor with one measuring ability, a set of sensors measuring different states or one sensor capable of measuring more than one state. It is always meant in the sense of a body-worn sensor.
  • Bluetooth is meant to describe any wireless connectivity which can be used for a low distance media connection using little or no energy on at least one of the devices connected.
  • First responder means mainly family and friends of an user, whom he or she predefines to help him or her in an emergency. However, it can also mean police, fire brigades and ambulance services, if the user defines them to be contacted.
  • device and “mobile device” mean either a standalone, special device or a smartphone with embedded apps and service.
  • FIG. 1 depicts a flow chart of a method according to a first embodiment of the present invention.
  • FIG. 2 depicts a flow chart of a method according to a second embodiment of the present invention.
  • FIG. 3 depicts a flow chart of a method according to a third embodiment of the present invention.
  • FIG. 4 depicts a schematic view of a PERS according to a first embodiment of the present invention.
  • FIG. 5 is a logical diagram of an embodiment of the present invention.
  • FIG. 6 is a logical diagram of an embodiment of the present invention following the procedure of FIG. 5 .
  • FIG. 7 is a logical diagram of an embodiment of the present invention.
  • Bluetooth or other module for wirelessly and over short distances in low energy consuming ways transmitting data
  • RAM and ROM to collect, evaluate and store data
  • Wi-Fi chip and potentially, not necessarily, a Wi-Fi chip.
  • An alarm trigger for manual alarms which can be either a switch, a girometer to recognise particular movement patterns or any other like movement sensor must be embedded in the bracelet; the alarm can also be triggered by any other means, in particular by a touch sensitive screen which might display other information as well.
  • both devices are capable of sending out text messages, making phone calls over cell phone carrier networks and to receive and send data through mobile Internet connections; the bracelet is therefore considered “genuine” as it can fully functions on its own.
  • Every user of the new system has a device that consists of at least
  • a cell phone unit preferably a GSM unit, with loudspeaker and microphone
  • piezo loudspeaker
  • the system as depicted in FIG. 4 may furthermore comprise a remote server 100 , by means of which incoming calls can be set up in a conference call like setting.
  • the numbers of first responders in case of an emergency predefined by the user are stored; in particular of the first responders their respective cell phone numbers and other contact information are known.
  • the system also embeds a mobile Internet connectivity, which is generally set to “constantly on” but can manually be switched off by choice of the user.
  • FIG. 6 The following is also depicted in FIG. 6 and may be read with above mentioned embodiment and FIG. 5 of the present invention. The following may be constantly measured
  • the user can choose, if additional first responders beyond his direct predefinition are supposed to be contacted, in case that no first responder is able to help physically while additional first responders in the area are closer to him then his personally predefined first responders.
  • the use of socalled “LifeCircles” as described in patent WIPO 2014 170081 can be used.
  • the user can additionally predefine if he wants only predefined people in the LifeCircle in which the accident happened are to be called, and/or if in a certain LifeCircle it is generally not allowed to have more than his personally predefined first responders contacted.
  • the user can predefine if in case that no predefined first responder is able to administer the call, a call center to be contacted.
  • GPS, Wi-Fi, GPRS and GSM of personal device 300 can be switched off or put into a state of rest. Only active on personal device 300 remain the alarm trigger and the Bluetooth module.
  • GPS All data of GPS, potentially Wi-Fi data, potentially GPRS cell functionality, GSM functionality are found by mobile device 200 and, using Bluetooth connectivity with personal device 300 , important data are transmitted to personal device 300 .
  • This data is mainly the last position(s) of the mobile device 200 , as within functioning Bluetooth connection local proximity between the two devices can be presupposed. The transfer of data will be important, once the wireless connection between personal device 300 and mobile device 200 is lost.
  • the alarm trigger on the personal device 300 needs to continually work, as both on mobile device 200 and on personal device 300 the alarm could be triggered. If the alarm is triggered on either of these two, the data is sent out using the mobile device's 200 modules.
  • the only data transferred in this case from personal device 300 to mobile device 200 is a potential alarm triggered on personal device 300 .
  • Bluetooth connection gets lost between mobile device 200 and personal device 300 , both act as a standalone system in the same way as described before, while continuing to attempt to regain Bluetooth connectivity.
  • Personal device 300 now re-starts the modules GPS, potentially Wi-Fi, GPRS and GSM.
  • the data received previously from mobile device 200 can be used in order to avoid so-called cold starts that would require more time and energy.
  • the alarm On which ever of the 2 devices the alarm trigger is pressed or the alarm otherwise executed, the alarm is sent out. So, if the alarm is triggered on mobile device 200 , it can be assumed that the user put away his personal device 300 , and mobile device 200 sends the alarm message. If it is pressed or otherwise executed on personal device 300 , it can be assumed, that the user is still wearing personal device 300 and the transmission is executed through personal device 300 GSM module.
  • the two devices re-establish connectivity via Bluetooth, they can be brought back to the state described in A1); however with the particularity, that now the data found by both personal device 300 and the smartwatch needs to be compared. This happens using the timestamps of the stored data. As the data found by the two devices are compared and collected on mobile device 200 , they get arranged in the order in which they have been received, as soon as personal device 300 has transmitted this data to mobile device 200 , and after comparison then in correct order fully or partially re-sent to personal device 300 , so that both personal device 300 and mobile device 200 are again in sync as far as these coordinates are concerned.
  • sensor 400 When sensor 400 is connected both to mobile device 200 and personal device 300 sensor 400 transmits data to mobile device 200 ; only this then transmits, if necessary, the data to personal device 300 . In the following it is presupposed that sensor 400 data is not only meant to trigger the alarm, but also to be transmitted in case of an alarm.
  • sensor 400 continues to send data to mobile device 200 and starts transmitting to personal device 300 , which in turn starts to receive this data now directly from sensor 400 .
  • sensor 400 has both capacity to send and receive data
  • data from sensor 400 can be sent to mobile device 200 as described in A2, then resent to sensor 400 as a channel to have it received by personal device 300 .
  • Bluetooth connection between mobile device 200 and sensor 400 exchanges data and compares data as described in A3, however not only coordinates, but also sensor 400 data retrieved, while sensor 400 and personal device 300 no longer exchange data, as the data is again sent from from mobile device 200 to personal device 300 .
  • sensor 400 can, for whatever reason possible, such as a malfunction of the bluetooth module of the smartphone, only establish wireless connection with personal device 300 , personal device 300 is used to receive data and transmit it directly to mobile device 200 , where all calculation processes in this case are affected.
  • mobile device 200 becomes a standalone system, that tries to regain connectivity with both sensor 400 and personal device 300 , while personal device 300 and sensor 400 stay in contact and personal device 300 receives the data emitted from sensor 400 .
  • sensor 400 can only transmit to mobile device 200 .
  • personal device 300 now functions on a standalone basis, trying to regain connectivity, but without the potential to transmit data from sensor 400 .
  • the manual alarm trigger can be used on personal device 300 , which should be made known to the user so he can get his smartphone for security reasons.
  • f mobile device 200 connects first with personal device 300 and then personal device 300 with sensor 400 before sensor 400 and mobile device 200 have re-connected, personal device 300 sends data received to mobile device 200 to have it compared and resent. After this, personal device 300 continues to transmit sensor 400 data received to mobile device 200 .
  • Mobile Device 200 Connects First with Personal Device 300 , Secondly Personal Device 300 with Sensor 400 and Finally Mobile Device 200 with Sensor 400
  • sensor 400 connects with mobile device 200 , the data is sent from sensor 400 to mobile device 200 , and from mobile device 200 to personal device 300 .
  • Mobile Device 200 Connects First with Personal Device 300 , then Mobile Device 200 with Sensor 400 and Finally Personal Device 300 with Sensor 400
  • GPS data is transferred via mobile Internet connection or WiFi to a remote data server 100 .
  • the said is also true for GPRS field connectivity during preset intervals within the said GPS intervals or in case that no GPS signals can be found, which is normal in particular inside buildings. If WifiBlink technology as described in WIPO 2014 170081 by the same author is used, the found data can also be transmitted.
  • sensor 400 data is collected and predefined to be sent out in case of an emergency, it can be stored as well. Instead of a particular device, the method can, using an application, be used on mobile devices 200 .
  • a voice over IP connection is then established between the telephone of the victim and server 100
  • a connection via mobile Internet connection using voice over IP is established between server 100 and all first responders predefined by the user, unless they have chosen “I am not available” and unless there is no mobile Internet connectivity to the respective device of the first responders.
  • server 100 attempts to place phone calls to the respective device or devices using standard cell phone connectivity; the first responder is in this case given the choice of options called USSD/MMI encoded functions, by which he can define if he is able to help, unable to help or physically unable to help but might like to administer the call, depending on which of these three options is chosen the phone connection is disabled or he or she participates in the conference call.
  • USSD/MMI encoded functions by which he can define if he is able to help, unable to help or physically unable to help but might like to administer the call, depending on which of these three options is chosen the phone connection is disabled or he or she participates in the conference call.
  • a call center can be informed, if the victim has chosen to do so.
  • the victim himself can chose to administer the call, for example if he is fully conscious yet cannot move (“broken leg”), then he himself can chose to administer the call.
  • the administrator can now use the device's three switches which are now to be relabeled as “call ambulance”, “call police” and “call fire police” and function accordingly, using global databases stored on server 100 which, depending on the whereabouts of the victim can direct the respective call to the next available police, ambulance and fire station.
  • the administrator is shown a random pin code and another telephone number which is to be given to the first responders, ambulance, police or fire brigade responding and which they can later use to trigger a loud signal on the victim's device to locate the victim, once they are closing in on his location.
  • the victim can choose to have more first responders outside his personal base invited to join the rescue effort. If the victim has allowed to use a second line of first responders, the system now searches the database with all the numbers of all the first responders anywhere predefined by the victim and then the database of first responders for all those persons, which are using the system and have been predefined by the victim's first line of first responders as their respective first responders, and invites them to join the rescue effort for the—possibly unknown to them at this point—victim, by sending them an invitation to join the rescue and their current distance to the place where the emergency happened. Once they confirm “I can help” they can join the conference call and are sent name and location and personal data etc. of the victim and are also sent the pin code by which they can later trigger the loud noise of the device.
  • the they can also be invited to become administrator of the conference call.
  • the victim can in general or for some areas choose to have
  • the differentiation will be according to his personal privacy requirements—when jogging in an open park, every help is welcome in case of an emergency, at home one might only trust his own family and friends and potentially one more line of first responders, but one would not like to invite a stranger into the house; in a gated community meanwhile, it makes sense only to ask those people with access to the community to join the effort, which excludes family and friends not within the enclosed compound but includes anyone known or unknown with access to the community. For a person with a particular health problem, only known and unknown first responders with a particular medical knowledge might be invited.
  • the data needed are sent to server 100 using an USSD/MMI code.
  • the method works the same as described in 1 with the particularity, that the victim is connected to the conference call only by phone connection and all additional data other than the latest and newest GPS coordinates is used from the server storage.
  • the device can try one more time to make an exact estimate of the location, in particular if the last position has been found at a point of time, which is more than 2 time of the predefined intervals, as this is a sign that the user has been inside a building; this is true both if and if not the display via said beeline is used or not.
  • a post alarm position If a post alarm position is found, it can be used by first responders to either rescale rescue efforts or to easier find the victim to be rescued.
  • the following embodiment is also shown in FIG. 7 .
  • the following logic can be applied for best results while saving energy; this is true both if and if not the display via said beeline is used or not. This is particularly important in case of a mobile device 200 and a personal device 300 , when both devices are not connected (see A2) and energy would be drained from personal device 300 .
  • the GPS chip can run for up to 2 minutes or the time recommended by the chip producer for a socalled “cold start”, which describes a start without any data of the whereabouts of the device, such as after starting a device new.
  • the Chip can be programmed to search for new coordinates for initially 5-10 seconds;
  • the chip if within this timeframe at least one GPS signal is received, the chip continues to locate more GPS signals in order to find a position, however only for a second predefined time frame, e.g. 20 seconds; this is either stopped

Landscapes

  • Engineering & Computer Science (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Gerontology & Geriatric Medicine (AREA)
  • General Health & Medical Sciences (AREA)
  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An operation method is presented for personal emergency response systems (PERS) combining a mobile device, e.g., a smartphone, and a personal device that is easy to carry for the user, e.g., a bracelet or pendant with genuine text, phone and mobile internet capability, both whether or not sensors are wirelessly connected to these devices. A method may improve and automate PERS by consistently supervising the users in case of an emergency by using mainly mobile Internet communication means and devices with immediate display of first responders and a possibility to coordinate ambulance and other official emergency response means, thus omitting the need for geo-fencing, unless desired by the users. A method may facilitate the rescue of a person via PERS by displaying a line of two or more previous and potentially later GPS coordinates and may conserve energy while intermittently receiving GPS coordinates for rescue purposes.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • The present application claims priority of German Utility Model DE 20 2014 008 763.6 filed on Nov. 6, 2014 which is incorporated herein by reference.
  • BACKGROUND
  • The use of smart phones in personal emergency response systems (PERS) has been first described in 2005 in patent EP 1679672 and has become a widely accepted method. With the development of better sensor technologies, in particular sensors that are very easy to carry and light and can be connected wirelessly, in particular through Wi-Fi and Bluetooth technology and lately low-energy Bluetooth, to the device, which can use the data transmitted either for deciding if to trigger the alarm or as a data collection point for health information to be transmitted or both, and the coming of so-called “smart bracelets” or “smart watches”, which are devices worn constantly by the user, new potential for PER systems has evolved.
  • The development of battery power has not been in sync with these new developments. While it can be expected that within the next 5 to 9 years new and better resources with extended capability will be found, developed and commercially viable, in particular through lower production costs per mAh, there is a current discrepancy between the abilities of sensors, smart bracelets and smart phones on the one hand and the ability and power of batteries that are still light enough to be worn comfortably by the user.
  • Personal emergency response systems (PERS) are currently based on the implementation of a call center; some are sending out text messages using standard communication means like cell phones, particularly with global positioning data (GPS, global positioning system) and information about the victim. While these systems have been very helpful in the past, however, first aid efforts among more than one first responders are hardly coordinated and the call centers need to check the availability of first responders first before deciding on each action plan; as this work is time consuming and time is of the essence, not only because of monetary restraints but also due to health issues directly connected to the passing of time after an emergency, they usually resort to calling only the closest family member and then the ambulance as they do not know immediately the whereabouts of other potential first responders even though one or more of them might be only meters away from the victim.
  • Geo-fencing systems, on the other hand, which are being used to a very large extent in particular in senior residents PERS carry the disadvantage that an alarm call is triggered whenever the user leaves from, or enters into a certain area or place. This is surveillance which is understandably not liked in particular by very self-relying persons, the elderly and young alike, and takes the sense of freedom from the user. In the long run geo fencing acts like a virtual prison which the person will not want to leave; this might potentially be fine with people suffering from severe kinds of dementia, but to the normal person it is a restriction which is unacceptable. Thus, statistics show that once the user understands the limits this imposes on him or her he or she usually gets rid of the system, which counters the efforts desired by PERS.
  • The following invention is used only in an emergency and thus in stark contrast to geo-fencing systems.
  • In GPS based PERS, in particular those embedded on apps and widgets on smart phones, it is common to either send or display to the rescue team or person a GPS coordinate found after an alarm is triggered, or better still one that was found previous to the alarm triggered (see EP 1679672).
  • In the latter case, the coordinate is stored in the device. To save on battery power, the GPS chip inside the device is then set to a silent mode, until a certain, predefined time interval has passed and a new tracking sequence is started.
  • The problem of the first method is, that inside a building there is no way to detect GPS coordinates. We consider this method to be completely unreliable. If GPS coordinates are searched constantly in preset intervals, the accuracy becomes much better, but still can be improved.
  • SUMMARY OF INVENTION
  • An operation method for personal emergency response systems is provided combining a mobile device, e.g. a smartphone, and a personal device that is easy to carry for the user, e.g. a bracelet or pendant worn by the user on the body with genuine text, phone and mobile internet capability, both when and when no sensors are wirelessly connected to these devices, and methods to improve and automate personal emergency response systems by consistently supervising the users in case of an emergency by using mainly mobile Internet communication means and devices with immediate display of first responders and a possibility to coordinate ambulance and other official emergency response means omitting the need for geo-fencing in total and call centers is omitted unless desired by the users; method to facilitate the rescue of a person via PERS by displaying a line of two or more previous and potentially later GPS coordinates and to conserve energy while intermittently receiving GPS coordinates for rescue purposes.
  • Our research has shown, that a problem ensues once GPS coordinates are searched in areas with high building structures and while standing under a sunroof or similar roofs, such as the roofs typically found on petrol stations. As GPS positioning is based on the triangulation of at least three satellites and using the time passed from emission of the wave sent from one satellite until received by the GPS chip, a so-called bounce back occurs mainly in said two scenarios, when the emitted radiowave first hits a large structure and then continues further to the GPS chip; in this case the time passed is slightly longer than in a straight line. Therefore, standard GPS chips in particular in smart phones describe GPS coordinates in the following manner:
  • first a coordinate center is given in Latitude and Longitude;
  • then a perimeter as a measure of uncertainty; in this it is estimated that the real location of the person and device be.
  • This happens in particular if more than three waves—sometimes up to 25 can be found—have been received, but still no definite coordinate and/or central point can be calculated, but a mesh of coordinates is within reasonable likelihood within certain area; this area is then shown as perimeter around the point calculated as most probable.
  • Objective of the Invention
  • While using smartphones enables a low-cost entry level for PERS to be more widely used by a evermore ageing population, these devices are usually placed away by the user upon entering his home; once leaving home they can easily be forgotten. In both cases a sudden emergency leaves the user without a possibility to trigger an alarm. It is therefore preferable to wear an additional personal device, e.g. a pendant or bracelet, to trigger the alarm. In the best version, the bracelet or pendant can send out the distress signal on its own, even if the smartphone is out of reach in order to ensure the longest possible time frame in which the user is protected, taking care even for forgetfulness. In order to offer the user a large degree of comfort, this body-worn device may not be heavy; thus smaller batteries are to be used than potentially in a smartphone.
  • An operation method (or energy conservation method) needed to be developed in order to use to the most degree the battery power of the smart phone unit involved, where possible, and only to a lesser degree the power of the bracelet, as for wearing comfort the unit worn constantly by the user on his body needs to be small and light. It is not possible to say conclusively how large a sensor battery needs to be, as this depends largely on questions such as
      • how data is collected (e.g. by lightemitting sensor or by chemical reaction),
      • what size of data is collected per time unit etc, furthermore,
      • is data is transmitted constantly from the sensor and then evaluated in the receiving device, or
      • is data collected and evaluated in the sensor and only in case of an emergency a trigger is sent and/or corresponding data is sent to the device. This latter question is not part of the method herein described, as these methods are both well known.
  • New, in particular mobile Internet communication means enable better solutions that work by immediately connecting an user of the system in case of an emergency with his or her friends, family, and other people using the same type of devices.
  • The following solution allows to immediately know where potential first responders are, and hands this information out to all potential first responders; by connecting them via mobile internet it is possible to strengthen and accelerate rescue efforts even without resorting to the assistance of call centers; the line display is to give the first responders a better grasp of the whereabouts of the person and still conserve energy using an intelligent way of triggering GPS chips in time intervals.
  • The three methods are best combined to enable the most comprehensive PERS currently possible. However each one of them can be used on its own and they all stand in their own right.
  • Definitions
  • The term “personal device” will be used in the following both for bracelets, pendants and any other devices that are easy to carry for the user and do not need to be taken off during the day and potentially night.
  • The word “sensor” can mean one sensor with one measuring ability, a set of sensors measuring different states or one sensor capable of measuring more than one state. It is always meant in the sense of a body-worn sensor.
  • The word “Bluetooth” is meant to describe any wireless connectivity which can be used for a low distance media connection using little or no energy on at least one of the devices connected.
  • The word “First responder” means mainly family and friends of an user, whom he or she predefines to help him or her in an emergency. However, it can also mean police, fire brigades and ambulance services, if the user defines them to be contacted.
  • The words “device” and “mobile device” mean either a standalone, special device or a smartphone with embedded apps and service.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The following figures are provided for a better understanding of the present invention.
  • FIG. 1 depicts a flow chart of a method according to a first embodiment of the present invention.
  • FIG. 2 depicts a flow chart of a method according to a second embodiment of the present invention.
  • FIG. 3 depicts a flow chart of a method according to a third embodiment of the present invention.
  • FIG. 4 depicts a schematic view of a PERS according to a first embodiment of the present invention.
  • FIG. 5 is a logical diagram of an embodiment of the present invention.
  • FIG. 6 is a logical diagram of an embodiment of the present invention following the procedure of FIG. 5.
  • FIG. 7 is a logical diagram of an embodiment of the present invention.
  • DESCRIPTION OF EMBODIMENTS Outline of the Solution
  • The minimum requirement for smart phones and bracelet alike to perform use of the energy conservation and/or operation method in the current invention are as follows
  • GPS chip
  • GPRS cell sensor
  • GSM module with loudspeaker and microphone attached
  • Bluetooth or other module for wirelessly and over short distances in low energy consuming ways transmitting data
  • Alarm trigger for manual alarms
  • RAM and ROM to collect, evaluate and store data
  • and potentially, not necessarily, a Wi-Fi chip.
  • An alarm trigger for manual alarms which can be either a switch, a girometer to recognise particular movement patterns or any other like movement sensor must be embedded in the bracelet; the alarm can also be triggered by any other means, in particular by a touch sensitive screen which might display other information as well.
  • In the following is presupposed, that both devices are capable of sending out text messages, making phone calls over cell phone carrier networks and to receive and send data through mobile Internet connections; the bracelet is therefore considered “genuine” as it can fully functions on its own.
  • B) This embodiment is also depicted in FIG. 5. Every user of the new system has a device that consists of at least
  • a display,
  • a cell phone unit, preferably a GSM unit, with loudspeaker and microphone
  • GPS and GPRS tracking,
  • and at least one switch, functioning to show
  • “Yes, I can help” or “no, I cannot help”.
  • In an alternate version of the invention one additional switch to show
  • “yes I can administer the emergency response, but cannot help physically” or “no I cannot adminster the call”.
  • In an alternate version of the invention one additional switch to show
  • “I cannot help/I cannot administer but still want to communicate with the victim.
  • This can be virtually shown on a mobile device 200 or a standalone device particularly built for that purpose.
  • In an alternative embodiment there is also a particular loudspeaker (“Piezo”) which cannot be used for listening to a conversation, however to emit high pitched noise of, say, more than −90 db.
  • The system as depicted in FIG. 4 may furthermore comprise a remote server 100, by means of which incoming calls can be set up in a conference call like setting.
  • In the devices and/or in a remote server 100 the numbers of first responders in case of an emergency predefined by the user are stored; in particular of the first responders their respective cell phone numbers and other contact information are known.
  • The system also embeds a mobile Internet connectivity, which is generally set to “constantly on” but can manually be switched off by choice of the user.
  • The following is also depicted in FIG. 6 and may be read with above mentioned embodiment and FIG. 5 of the present invention. The following may be constantly measured
  • GPS coordinates in certain, predefined intervals
  • potentially GPRS coordinates between these intervals and in cases, in which no mobile Internet connection is possible
  • is mobile Internet connectivity available or not
  • is standard cell phone connectivity available to a degree that allows at least text messaging and/or cell phone communication.
  • The user can choose, if additional first responders beyond his direct predefinition are supposed to be contacted, in case that no first responder is able to help physically while additional first responders in the area are closer to him then his personally predefined first responders.
  • In the reverse any user can
  • set his device to “I cannot help”, which means he or she is unable to help for a while;
  • predefine if he or she in general only wants to help people in his or her direct line, that is people he personally has set up to be his first responders,
  • if he wants to help all those people who set him up as first responder, even though he might not have the person set up as his one of his first responders
  • if he is willing to help a second line of first responders, that is people who are connected to the first responders that he set up,
  • and/or if he is willing to help any person in need, when he or she is in close proximity.
  • In an alternate version of the invention the use of socalled “LifeCircles” as described in patent WIPO 2014 170081 can be used. In this case the user can additionally predefine if he wants only predefined people in the LifeCircle in which the accident happened are to be called, and/or if in a certain LifeCircle it is generally not allowed to have more than his personally predefined first responders contacted.
  • The user can predefine if in case that no predefined first responder is able to administer the call, a call center to be contacted.
  • A) Energy Conservation Method for PERS Bracelets
  • Version 1: Connection Between the Mobile Device 200 and the Personal Device 300 without Use of One or More Sensor(s) 400
  • 1) Existing Connection Between Mobile Device 200 and Personal Device 300
  • Once a connection between the mobile device 200 and personal device 300 exists and is functional, GPS, Wi-Fi, GPRS and GSM of personal device 300 can be switched off or put into a state of rest. Only active on personal device 300 remain the alarm trigger and the Bluetooth module.
  • All data of GPS, potentially Wi-Fi data, potentially GPRS cell functionality, GSM functionality are found by mobile device 200 and, using Bluetooth connectivity with personal device 300, important data are transmitted to personal device 300. This data is mainly the last position(s) of the mobile device 200, as within functioning Bluetooth connection local proximity between the two devices can be presupposed. The transfer of data will be important, once the wireless connection between personal device 300 and mobile device 200 is lost.
  • The alarm trigger on the personal device 300 needs to continually work, as both on mobile device 200 and on personal device 300 the alarm could be triggered. If the alarm is triggered on either of these two, the data is sent out using the mobile device's 200 modules.
  • The only data transferred in this case from personal device 300 to mobile device 200 is a potential alarm triggered on personal device 300.
  • 2) Connection Lost
  • If the Bluetooth connection gets lost between mobile device 200 and personal device 300, both act as a standalone system in the same way as described before, while continuing to attempt to regain Bluetooth connectivity.
  • Personal device 300 now re-starts the modules GPS, potentially Wi-Fi, GPRS and GSM. For the GPS and GPRS modules, the data received previously from mobile device 200 can be used in order to avoid so-called cold starts that would require more time and energy.
  • Also, if the alarm is triggered on personal device 300 after the connection is lost yet before personal device 300 can establish GPS and or GPRS connection and would otherwise be without the potential to transmit a coordinates of personal device 300, these previous coordinates are used.
  • On which ever of the 2 devices the alarm trigger is pressed or the alarm otherwise executed, the alarm is sent out. So, if the alarm is triggered on mobile device 200, it can be assumed that the user put away his personal device 300, and mobile device 200 sends the alarm message. If it is pressed or otherwise executed on personal device 300, it can be assumed, that the user is still wearing personal device 300 and the transmission is executed through personal device 300 GSM module.
  • 3) Connection Re-Established
  • In case that the two devices re-establish connectivity via Bluetooth, they can be brought back to the state described in A1); however with the particularity, that now the data found by both personal device 300 and the smartwatch needs to be compared. This happens using the timestamps of the stored data. As the data found by the two devices are compared and collected on mobile device 200, they get arranged in the order in which they have been received, as soon as personal device 300 has transmitted this data to mobile device 200, and after comparison then in correct order fully or partially re-sent to personal device 300, so that both personal device 300 and mobile device 200 are again in sync as far as these coordinates are concerned.
  • Version 2: Connection Between Mobile Device 200 and Personal Device 300 with Use of Sensor(s) 400
  • 1) Existing Connection Between Mobile Device 200, Personal Device 300 and Sensor 400
  • As soon as a wirelessly connected sensor 400 is involved, matters become slightly more complicated.
  • a) Sensor 400 Connected to Both Mobile Device 200 and Personal Device 300
  • When sensor 400 is connected both to mobile device 200 and personal device 300 sensor 400 transmits data to mobile device 200; only this then transmits, if necessary, the data to personal device 300. In the following it is presupposed that sensor 400 data is not only meant to trigger the alarm, but also to be transmitted in case of an alarm.
  • b) Sensor 400 Connected to Both Mobile Device 200 and Personal Device 300, but Connection Lost Between Mobile Device 200 and Personal Device 300
  • Once mobile device 200 and personal device 300 loose contact to each other, yet both still have connectivity to sensor 400, sensor 400 continues to send data to mobile device 200 and starts transmitting to personal device 300, which in turn starts to receive this data now directly from sensor 400.
  • If sensor 400 has both capacity to send and receive data, data from sensor 400 can be sent to mobile device 200 as described in A2, then resent to sensor 400 as a channel to have it received by personal device 300.
  • c) Sensor 400 Connected to Both Mobile Device 200 and Personal Device 300, and Lost Connection Between Mobile Device 200 and Personal Device 300 Re-Established
  • Once connectivity between mobile device 200 and personal device 300 is re-established, Bluetooth connection between mobile device 200 and sensor 400 exchanges data and compares data as described in A3, however not only coordinates, but also sensor 400 data retrieved, while sensor 400 and personal device 300 no longer exchange data, as the data is again sent from from mobile device 200 to personal device 300.
  • 2) Sensor 400 Loses the Connection to Mobile Device 200 but Keeps Connection to Personal Device 300 a) Sensor 400 Connected to Personal Device 300, and Existing Connection Between Mobile Device 200 and Personal Device 300
  • As long as the connection between mobile device 200 and personal device 300 still exists, and sensor 400 can, for whatever reason possible, such as a malfunction of the bluetooth module of the smartphone, only establish wireless connection with personal device 300, personal device 300 is used to receive data and transmit it directly to mobile device 200, where all calculation processes in this case are affected.
  • b) Sensor 400 Connected to Personal Device 300, Connection Between Mobile Device 200 and Personal Device 300 Lost
  • Once now the connection between personal device 300 and mobile device 200 is lost, too, mobile device 200 becomes a standalone system, that tries to regain connectivity with both sensor 400 and personal device 300, while personal device 300 and sensor 400 stay in contact and personal device 300 receives the data emitted from sensor 400.
  • c) Sensor 400 Connected to Personal Device 300, Lost Connection Between Mobile Device 200 and Personal Device 300 Reestablished
  • As soon as personal device 300 and mobile device 200 reestablish contact, with sensor 400 still not able to establish contact with mobile device 200, the data received from sensor 400 on personal device 300 is again sent to the smartphone in the same way as described earlier with exchange of data according to the timestamps used.
  • 3) Sensor 400 Loses the Connection to Personal Device 300 and Keeps Connection to Mobile Device 200 a) Sensor 400 Connected to Mobile Device 200, Existing Connection Between Mobile Device 200 and Personal Device 300
  • As soon as sensor 400 loses contact with personal device 300, but keeps connection with mobile device 200 which is still connected to personal device 300, the data is transmitted from sensor 400 to mobile device 200, and then to personal device 300 from the smartphone.
  • b) Sensor 400 Connected to Smartphone, Connection Between Mobile Device 200 and Personal Device 300 Lost
  • As soon as the connection between mobile device 200 and personal device 300 is lost, sensor 400 can only transmit to mobile device 200. personal device 300 now functions on a standalone basis, trying to regain connectivity, but without the potential to transmit data from sensor 400. In this case only the manual alarm trigger can be used on personal device 300, which should be made known to the user so he can get his smartphone for security reasons.
  • c) Sensor 400 Connected to Smartphone, Lost Connection Between Mobile Device 200 and Personal Device 300 Reestablished
  • Once connectivity between mobile device 200 and personal device 300 is reestablished, the information is transmitted from mobile device 200 to personal device 300 as described earlier.
  • 4) Complete Sensor 400, Personal Device 300 and Smartphone Disconnect is Reestablished
  • In case that sensor 400, mobile device 200 and personal device 300 have all lost connection to each other, and can reconnect, it is important to manage the data stream according to the following principles; the exact time of re-establishment is crucial:
  • a) Mobile Device 200 Connects First with Personal Device 300, Secondly Personal Device 300 with Sensor 400
  • f mobile device 200 connects first with personal device 300 and then personal device 300 with sensor 400 before sensor 400 and mobile device 200 have re-connected, personal device 300 sends data received to mobile device 200 to have it compared and resent. After this, personal device 300 continues to transmit sensor 400 data received to mobile device 200.
  • b) Mobile Device 200 Connects First with Personal Device 300, Secondly Personal Device 300 with Sensor 400 and Finally Mobile Device 200 with Sensor 400
  • As soon as mobile device 200 now finally reconnects to sensor 400, the data received is transmitted to personal device 300, by effect of which the transmission between sensor 400 and personal device 300 is discontinued as described in A1.
  • c) Mobile Device 200 Connects First with Personal Device 300, Secondly Mobile Device 200 with Sensor 400
  • If sensor 400 connects with mobile device 200, the data is sent from sensor 400 to mobile device 200, and from mobile device 200 to personal device 300.
  • d) Mobile Device 200 Connects First with Personal Device 300, then Mobile Device 200 with Sensor 400 and Finally Personal Device 300 with Sensor 400
  • Once personal device 300 has reconnected to mobile device 200 and finally reestablishes contact with sensor 400 as well, no data is exchanged, as the data has been processed and transmitted in the most energy conserving way.
  • B) Automating PERS
  • Standard Functionality without Emergency
  • Day and night, every user is constantly monitored using his device; thus, in predefined intervals GPS data is transferred via mobile Internet connection or WiFi to a remote data server 100. The said is also true for GPRS field connectivity during preset intervals within the said GPS intervals or in case that no GPS signals can be found, which is normal in particular inside buildings. If WifiBlink technology as described in WIPO 2014 170081 by the same author is used, the found data can also be transmitted.
  • Changes to the personal data given by the user such as allergies can be stored in the database.
  • It is furthermore stored, if the user has set his system to “no I cannot help” in general settings.
  • If sensor 400 data is collected and predefined to be sent out in case of an emergency, it can be stored as well. Instead of a particular device, the method can, using an application, be used on mobile devices 200.
  • Functionality in Case of Emergency 1) User has Internet Connection
  • Once the user presses the alarm trigger or a remote sensor 400 triggers the alarm the following information is sent to server 100
  • last position, if GPS can be found very quickly, in particular between pressing the alarm trigger and the end of the initial data transfer
  • personal code of the user
  • strength of the mobile Internet connection and strength of the cell phone signal.
  • A voice over IP connection is then established between the telephone of the victim and server 100
  • In the next step the system now checks for the following information:
  • who of the first responders predefined by the user is in close proximity to the user; this happens using current or stored GPRS and/or stored GPS data of all of his predefined first responders.
  • A connection via mobile Internet connection using voice over IP is established between server 100 and all first responders predefined by the user, unless they have chosen “I am not available” and unless there is no mobile Internet connectivity to the respective device of the first responders.
  • If no mobile Internet connectivity is possible to one or more first responders, server 100 attempts to place phone calls to the respective device or devices using standard cell phone connectivity; the first responder is in this case given the choice of options called USSD/MMI encoded functions, by which he can define if he is able to help, unable to help or physically unable to help but might like to administer the call, depending on which of these three options is chosen the phone connection is disabled or he or she participates in the conference call.
  • If either no first responder can be reached or no first responder can work as an administrator, a call center can be informed, if the victim has chosen to do so.
  • The victim himself can chose to administer the call, for example if he is fully conscious yet cannot move (“broken leg”), then he himself can chose to administer the call.
  • The administrator can now use the device's three switches which are now to be relabeled as “call ambulance”, “call police” and “call fire police” and function accordingly, using global databases stored on server 100 which, depending on the whereabouts of the victim can direct the respective call to the next available police, ambulance and fire station.
  • The administrator is shown a random pin code and another telephone number which is to be given to the first responders, ambulance, police or fire brigade responding and which they can later use to trigger a loud signal on the victim's device to locate the victim, once they are closing in on his location.
  • In an alternative embodiment of the invention, the victim can choose to have more first responders outside his personal base invited to join the rescue effort. If the victim has allowed to use a second line of first responders, the system now searches the database with all the numbers of all the first responders anywhere predefined by the victim and then the database of first responders for all those persons, which are using the system and have been predefined by the victim's first line of first responders as their respective first responders, and invites them to join the rescue effort for the—possibly unknown to them at this point—victim, by sending them an invitation to join the rescue and their current distance to the place where the emergency happened. Once they confirm “I can help” they can join the conference call and are sent name and location and personal data etc. of the victim and are also sent the pin code by which they can later trigger the loud noise of the device.
  • In an alternate version of the invention the they can also be invited to become administrator of the conference call.
  • In an alternate version of the invention, the victim can in general or for some areas choose to have
      • more lines of first responders, in particular predefined first responders of his own first responders, be they known or unknown to him, as the line of trust is extends over from the first line of trust to more remote lines of trust or
      • even anyone who is user of the system or users of the device with special characteristics invited to the rescue.
  • The differentiation will be according to his personal privacy requirements—when jogging in an open park, every help is welcome in case of an emergency, at home one might only trust his own family and friends and potentially one more line of first responders, but one would not like to invite a stranger into the house; in a gated community meanwhile, it makes sense only to ask those people with access to the community to join the effort, which excludes family and friends not within the enclosed compound but includes anyone known or unknown with access to the community. For a person with a particular health problem, only known and unknown first responders with a particular medical knowledge might be invited.
  • 2) The Victim is not Able to Communicate Via Mobile Internet Connection, but there is a Phone Connectivity
  • If the user is not connected via mobile, but there is possibility of a phone connection, the data needed are sent to server 100 using an USSD/MMI code. The method works the same as described in 1 with the particularity, that the victim is connected to the conference call only by phone connection and all additional data other than the latest and newest GPS coordinates is used from the server storage.
  • 3) Arrival of Rescue Forces
  • Once ambulance, police and fire brigades and/or first responders using the conference call tell the administrator about their arrival at the scene of the emergency, either they or the administrator trigger the loud noise on the victim's device in order to facilitate the search for the victim on the last meters.
  • C) The Display of Several Found Coordinates 1) “Beeline” Display of Coordinates—General
  • In personal emergency response system described above and in PERS in general, in order to recognize that a position person might be inside a building, it is sufficient to store the last position of the person. As GPS contact is under normal conditions immediately lost upon entering a building, it is sufficient to know the last position found in front of the building.
  • a) As it is possible, that one position cannot be specifically calculated but only with a perimeter and that a bounce back happened, which is even more likely with a person nearing a large building structure, a line of positions can be shown, which herein shall be called “beeline”, of at least n>=1 last positions.
  • We have found that a number of five last positions, found in intervals of 50 to 90 seconds is both sufficient, saves well on battery power and is for rescue purposes necessary.
  • b) As a person might move through a street and then sit down, for example on an open bus stop or in front of a coffee shop, it would not make sense to erase the previous positions and overwrite them with coordinates found of the person sitting in close proximity, even though the coordinates found might and will differ slightly, as this would only lead to a series of very close points; usually both the center point and diameter change slightly.
  • Therefore the following calculation is to be made to better the result without compromising previous, very helpful coordinates of the beeline:
  • aa) In general every new interval is added to the line of n=1, 2, 3, 4, 5 . . . coordinates to be shown to the first responder(s). Once a new coordinate is added, the first coordinates found is deleted. Thus old GPS(n=1) becomes GPS(n=2), old GPS(n=2) becomes GPS(n=3) and so on. If 5 positions are to be shown, GPS(n=5) is deleted from the beeline and GPS(n=4) becomes GPS(n=5) and thus the earliest position found to be shown.
    bb) If the last coordinate found has a very large perimeter and is thus deemed not very accurate,
    the following calculation can be made:
    if the center of the new position is within the perimeter of the old position and
    the perimeter of the new position is smaller than the last position GPS(n=1), the last position GPS (n=1) is about to be deleted instead of the earliest position found. The new position takes the place of the position GPS(n=1), and GPS(n=2) to—in the above example of 5 positions—GPS(n=5) remain untouched.
    cc) If a new coordinate is found, in which the center of the perimeter is inside the last GPS coordinate GPS(n=1), however the new perimeter is larger than the one of the last coordinate GPS(n=1) found, the new coordinate is not used and deleted; the time stamp used can be updated to the new time.
    dd) If the center of the perimeter of the newly found coordinate is outside the perimeter of the last position n=1, the new perimeter becomes the last perimeter found and all previous coordinates are moved down 1 each and the earliest GPS coordinate deleted as described in the general method aa).
  • 2) Post Alarm Positioning Attempt
  • In an embodiment of the invention, once the alarm has been triggered, the device can try one more time to make an exact estimate of the location, in particular if the last position has been found at a point of time, which is more than 2 time of the predefined intervals, as this is a sign that the user has been inside a building; this is true both if and if not the display via said beeline is used or not.
  • In this case the energy conservation restraints explained in 3) do not apply, but rather a longer time frame of ca 2 minutes; if a position is found in such a way it can be sent to the first responder(s) as additional information, with or without beeline. The calculation logic described in 1) b) does not apply, as it is just an additional posibility.
  • If a post alarm position is found, it can be used by first responders to either rescale rescue efforts or to easier find the victim to be rescued.
  • 3) GPS Chip Energy Conservation Management for Predefined Intervals
  • The following embodiment is also shown in FIG. 7. For conservation of energy, within the predefined intervals the following logic can be applied for best results while saving energy; this is true both if and if not the display via said beeline is used or not. This is particularly important in case of a mobile device 200 and a personal device 300, when both devices are not connected (see A2) and energy would be drained from personal device 300.
  • aa) Initially the GPS chip can run for up to 2 minutes or the time recommended by the chip producer for a socalled “cold start”, which describes a start without any data of the whereabouts of the device, such as after starting a device new.
  • If a position is found, the next step is already with the chip's approximate knowledge of the position and thus easier (“warm start”); if not, 1) bb) aaa) applies.
  • bb) After the initial positive attempt, the Chip can be programmed to search for new coordinates for initially 5-10 seconds;
  • aaa) if within this timeframe no GPS signal at all is received, the chip is set to silent and retriggered after the next interval time;
  • bbb) if within this timeframe at least one GPS signal is received, the chip continues to locate more GPS signals in order to find a position, however only for a second predefined time frame, e.g. 20 seconds; this is either stopped
  • once a position with very little perimeter can be established or
  • if within 20 seconds no position or only a very unclear position, i.e. one with a large perimeter can be found.

Claims (22)

1.-27. (canceled)
28. An operation method of a personal emergency response system (PERS), comprising:
constantly monitoring a user utilizing the PERS, comprising a remote server and a mobile device, by measuring and storing positioning data of the mobile device; and
transmitting the monitored data to the remote server in predetermined intervals where the data are stored; wherein
if an alarm is triggered, the method further comprises:
transferring a personal code of the user to the remote server;
establishing a voice over IP (VoIP) connection between the mobile device of the user and the remote server;
checking who of first responders predefined by the user is currently in close proximity to the user, by using current or stored positioning data of all predefined first responders, and who of said first responders is currently available;
establishing a voice over IP connection between the server and all proximate and available first responders predefined by the user, thus establishing a telephone conference between the user and available first responders,
wherein a signal of loud noise output by the mobile device is triggered automatically by the remote server recognizing proximity of one of the first responders to the mobile device if one of the first responders comes close to a last location of the mobile device.
29. The method according to claim 28, wherein
data regarding quality of a mobile internet connection, and data regarding strength of a cell phone signal of the mobile device are measured and stored, and if an alarm is triggered,
data regarding the quality of the mobile internet connection and the strength of the cell phone signal is transferred to the remote server.
30. The method according to claim 28, wherein if mobile device cannot establish a VoIP connection, the method further comprises:
using a phone number prestored in or transferred by text message or MIME from the remote server to the mobile device to call the remote server, or
using an external transferral communication device to connect the device to the remote server to allow communication functionality with first responders.
31. The method according to claim 28, wherein if one first responder's device cannot establish a VoIP connection, the method further comprises:
using a phone number prestored in or transferred by text message or MIME from the remote server to the first responder's device to call the remote server, or
using an external transferral communication device to connect the device to the remote server to allow communication functionality with other first responders and the mobile device.
32. The method according to claim 28, wherein, if none of the predefined first responders can be reached, the method comprises informing a call center of the alarm event and establishing a conference call among the mobile device, the call center and all available first responders' mobile devices.
33. The method according to claim 28, wherein, if none of the predefined first responders can be reached, the method comprises informing other non-predefined available first responders of the alarm event and establishing a conference call among all available first responders' mobile devices.
34. The method according to claim 28, wherein, if none of the predefined first responders can be reached, the method further comprises:
searching and contacting other non-predefined first responders in proximity to the emergency, if the user devices' preferences permit this.
35. An operation method of a personal emergency response system (PERS), the PERS comprising a personal device that is easy to carry for the user, a mobile device, and a remote server, wherein said personal device and said mobile device are each capable of:
acquiring a current location via an GPS chip;
acquiring current GPRS cell information via a GPRS cell sensor;
establishing mobile communication via a GSM module;
establishing a Bluetooth communication;
offering the possibility of triggering an alarm manually by the user; and
collecting, evaluating, and storing data through RAM and ROM;
wherein the method comprises:
establishing a connection between said personal device and said mobile device,
deactivating the GPS chip, the GPRS cell sensor, and the GSM module of said personal device as long as the connection with mobile device is active; and
transmitting positioning data, data regarding quality of a mobile internet connection, and data regarding strength of a cell phone signal from mobile device to said personal device, wherein, if an alarm is triggered on said personal device, a notification of the alarm is transmitted to mobile device, and the positioning data are transmitted to the remote server by the mobile device, wherein the PERS further comprises a monitoring sensor configured to monitor a state of the user, and wherein the method further comprises:
connecting the monitoring sensor to said personal device and said mobile device;
transmitting data acquired by the monitoring sensor to said mobile device, only;
transmitting said monitoring sensor data from the mobile device to said personal device; and
triggering an alarm immediately if said monitoring sensor data reach or pass a predefined threshold or after a time interval if another threshold is kept for a certain, predefined time interval, wherein,
if the connection between said personal device and said mobile device is lost, but the connection between said personal device and said monitoring sensor and the connection between said mobile device and said monitoring sensor, respectively, are active, the method further comprises:
transmitting said monitoring sensor data, positioning data, the data regarding the quality of the mobile internet connection, and the data regarding the strength of the cell phone signal from said mobile device to said personal device via said monitoring sensor.
36. The method according to claim 35, wherein, if an alarm is triggered on said personal device, data regarding the quality of the mobile internet connection and data regarding the strength of the cell phone signal are transmitted to the remote server by the mobile device.
37. The method according to claim 36, wherein, if the connection between said personal device and said mobile device is lost, the method further comprises:
re-activating the GPS chip, the GPRS cell sensor, and the GSM module of said personal device;
if an alarm is triggered on said personal device while the connection between said mobile device and said personal device is lost, transmitting the positioning data, the data regarding the quality of the mobile internet connection, and the data regarding the strength of the cell phone signal, to the remote server by said personal device; and
returning to the step of establishing a connection between said personal device and said mobile device if the connection between said personal device and said mobile device can be re-established.
38. The method according to claim 35, wherein, if the connection between said mobile device and said monitoring sensor is lost, but the connection between said personal device and said monitoring sensor and the connection between said mobile device and said personal device, respectively, are active, the method further comprises:
transmitting sensor data from said monitoring sensor to said personal device; and
transmitting sensor data from said personal device to said mobile device.
39. The method according to claim 38, wherein, if, in addition, the connection between said mobile device and said personal device is lost, procedures to be used if an alarm is triggered are conducted by said personal device.
40. The method according to claim 35, wherein, if the connection between said mobile device and said monitoring sensor, the connection between said personal device and said monitoring sensor, and the connection between said mobile device and said personal device are lost, respectively, the method further comprises:
if said mobile device is first connected with said personal device and then said personal device is connected with said monitoring sensor, transmitting received sensor data from said personal device to said mobile device; and
once said mobile device connects with said monitoring sensor, transmitting received monitoring sensor data from said mobile device to said personal device while direct transmission from said monitoring sensor to said personal device is discontinued.
41. The method according to claim 35, wherein said transferring data regarding the quality of the mobile internet connection and the strength of the cell phone signal to the remote server further comprises transferring data of GPRS cell coordinates to the remote server.
42. The method according to claim 35, further comprising:
using a number n of last positions acquired through said mobile device or said personal device in predefined time intervals to provide a line of said last positions to allow an estimation of the user's last known moving direction.
43. The method according to claim 42, wherein n is at least 5.
44. The method according to claim 42, wherein the predefined time intervals are 10 to 90 seconds.
45. A personal emergency response system (PERS), the system comprising:
a remote server having a central processing unit;
a mobile device of a user, comprising a GPS chip, a GPRS cell sensor, a GSM module having loudspeaker and microphone and a Bluetooth communication module;
a personal device; and
at least one mobile device of at least one first responder predetermined by the user, the mobile device of the at least one first responder comprising a GPS chip, a GPRS cell sensor, a GSM module having loudspeaker and microphone and a Bluetooth communication module;
wherein the mobile device and the personal device each are adapted to perform the following operations:
if an alarm is triggered, transferring a personal code of the user to the remote server; and
transferring data regarding quality of a mobile internet connection and strength of a cell phone signal to the remote server;
wherein the remote server is adapted to:
establish a voice over IP connection between the mobile device or the personal device and the remote server;
check which of mobile devices of potential first responders is currently in close proximity to the user by using current or stored positioning data of all predefined first responders and which of said first responders is currently available as defined in a setting of the first responders' mobile devices;
establish a voice over IP connection between the server and all proximate and available first responders predefined by the user,
wherein, if none of the predefined first responders can be reached, the server is adapted to alert a call center of the alarm event; and
establish a telephone conference between the mobile device and the available first responders' mobile devices;
wherein, when the first responders come close to a last location of the personal device, the mobile device or the personal device is adapted to send out a signal of loud noise.
46. The system of claim 45, wherein the remote server is further adapted to forward the mobile device's last known position to the available, allowed and proximate first responders' devices.
47. The system of claim 45, wherein the mobile device comprises one to three switches adapted to provide selection functions.
48. A personal emergency response system (PERS), the system comprising:
a remote server having a central processing unit;
a mobile device of a user, comprising a GPS chip, a GPRS cell sensor, a GSM module having loudspeaker and microphone and a Bluetooth communication module;
a personal device; and
at least one mobile device of at least one first responder predetermined by the user, the mobile device of the at least one first responder comprising a GPS chip, a GPRS cell sensor, a GSM module having loudspeaker and microphone and a Bluetooth communication module;
wherein the mobile device and the personal device each are adapted to perform the following operations:
if an alarm is triggered, transferring a personal code of the user to the remote server; and
transferring data regarding quality of a mobile internet connection and strength of a cell phone signal to the remote server;
wherein the remote server is adapted to:
establish a voice over IP connection between the mobile device or the personal device and the remote server;
check which of mobile devices of potential first responders is currently in close proximity to the user by using current or stored positioning data of all predefined first responders and which of said first responders is currently available as defined in a setting of the first responders' mobile devices;
establish a voice over IP connection between the server and all proximate and available first responders predefined by the user,
wherein, if none of the predefined first responders can be reached, the server is adapted to alert a call center of the alarm event; and
establish a telephone conference between the mobile device and the available first responders' mobile devices;
wherein, when the first responders come close to a last location of the personal device, the mobile device or the personal device is adapted to send out a signal of loud noise,
wherein the mobile device, personal device, and the at least one first responder's mobile device comprise means for carrying out the method according to claim 28.
US15/524,665 2014-11-06 2015-05-11 Personal emergency response system and method of operation Abandoned US20170316676A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE202014008763 2014-11-06
DE202014008763.6 2014-11-06
PCT/EP2015/060331 WO2016071006A1 (en) 2014-11-06 2015-05-11 Personal emergency response system and method of operation

Publications (1)

Publication Number Publication Date
US20170316676A1 true US20170316676A1 (en) 2017-11-02

Family

ID=53199958

Family Applications (2)

Application Number Title Priority Date Filing Date
US15/524,665 Abandoned US20170316676A1 (en) 2014-11-06 2015-05-11 Personal emergency response system and method of operation
US15/544,266 Expired - Fee Related US10169974B2 (en) 2014-11-06 2015-07-06 Home security system

Family Applications After (1)

Application Number Title Priority Date Filing Date
US15/544,266 Expired - Fee Related US10169974B2 (en) 2014-11-06 2015-07-06 Home security system

Country Status (4)

Country Link
US (2) US20170316676A1 (en)
EP (1) EP3224816B1 (en)
DE (1) DE112015004559T5 (en)
WO (2) WO2016071006A1 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202015005019U1 (en) 2015-07-18 2016-10-20 Rudolf King Method for connecting and using external server capacities for mobile personal and other security systems and separation of sensors, functional areas and computing capacities by means of alarm relocation to external computers and servers
DE202016000756U1 (en) 2016-02-04 2017-05-05 Rudolf King Assault switch for negative triggering of alarms by means of manual opening after upstream voltage of a radio-based switch combination
FR3053815B1 (en) * 2016-07-05 2018-07-27 Novia Search SYSTEM FOR MONITORING A PERSON WITHIN A HOUSING
DE202016006681U1 (en) * 2016-11-01 2018-02-20 Rudolf King Device and methods for the remote triggering of a mobile, personal emergency backup system by an external radio transmitter in conjunction with a loudspeaker with high sound pressure
CN106504473B (en) * 2016-11-24 2019-02-12 北京小米移动软件有限公司 The method, apparatus and equipment of wearable device state setting
WO2018107031A1 (en) * 2016-12-08 2018-06-14 Clutch Inc Personal emergency data capture and alerting
DE202016007978U1 (en) * 2016-12-27 2018-03-28 Rudolf King GPS-based method for effective, mobile neighborhood assistance in an emergency using static and / or dynamic and time-unlimited or defined social networks (SENI) and mobile devices
CN106981173A (en) * 2017-03-07 2017-07-25 广东乐源数字技术有限公司 A kind of monitoring method of the cell safety service platform based on property
JP2019079129A (en) * 2017-10-20 2019-05-23 トヨタ自動車株式会社 Vehicle and delivery system
DE202017005942U1 (en) 2017-11-16 2019-02-19 FreedStreet Ltd. Mobile security devices (mPERS) with alternative switching method for triggering pre-alarms and subsequent alarms
CN108243251A (en) * 2018-01-10 2018-07-03 安徽鼎信科技集团有限公司 A kind of apartment for elderly people intellectualizing system
DE202018001033U1 (en) 2018-02-27 2018-06-21 Rufolf King A system for ensuring safety for the elderly by means of portable user equipment and a functional sequence with or without the involvement of an operator
IT201800007350A1 (en) * 2018-07-19 2020-01-19 SYSTEM AND METHOD OF REMOTE AID
US20200349829A1 (en) * 2018-09-05 2020-11-05 Mobile Software As System and method for alerting, recording and tracking an assailant

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2363028B (en) * 2000-04-26 2002-06-12 Geoffrey Stubbs IRIS Intelligent Remote Intruder Surveillance
US7486183B2 (en) * 2004-05-24 2009-02-03 Eaton Corporation Home system and method for sending and displaying digital images
US20060232673A1 (en) * 2005-04-19 2006-10-19 Objectvideo, Inc. Video-based human verification system and method
PT2127964T (en) * 2008-05-27 2017-02-21 Viasat Spa Device installable in a vehicle for generating a rescue request and automatic sending of information on the geographical position of the vehicle
US20100267361A1 (en) * 2009-03-20 2010-10-21 Guardianlion Wireless, LLC Monitoring device and system
CA2780811A1 (en) * 2009-11-13 2011-05-19 Zoll Medical Corporation Community-based response system
CA2770933C (en) * 2011-03-11 2021-05-25 Intellacare Inc. A method and system for monitoring the activity of a subject within spatial temporal and/or behavioral parameters
JP2013008184A (en) * 2011-06-24 2013-01-10 Aska Creation Inc Instantaneous notification and search device
US10158391B2 (en) * 2012-10-15 2018-12-18 Qualcomm Incorporated Wireless area network enabled mobile device accessory
US20160049820A1 (en) * 2013-03-14 2016-02-18 Ramon Anthony Caamaño Electrical Energy Storage Systems, Electric Drive Systems, Controllers, and Electrical Power Management Systems
US8866606B1 (en) * 2013-07-16 2014-10-21 Rockwilli RMR LLC Systems and methods for automated personal emergency responses

Also Published As

Publication number Publication date
EP3224816A1 (en) 2017-10-04
WO2016071006A1 (en) 2016-05-12
DE112015004559T5 (en) 2017-07-13
EP3224816B1 (en) 2018-12-26
WO2016071009A1 (en) 2016-05-12
US10169974B2 (en) 2019-01-01
US20180025609A1 (en) 2018-01-25

Similar Documents

Publication Publication Date Title
US20170316676A1 (en) Personal emergency response system and method of operation
US20230360792A1 (en) System and method for monitoring activities through portable devices
US8116724B2 (en) System containing location-based personal emergency response device
US9332390B1 (en) Mobile device utilizing time of flight for personal security and localization
US9954995B2 (en) End to end design of personal emergency service utilizing M2M cellular, XMPP/XML technologies on mobile help button
CN204044980U (en) Multi-functional human body falling detection device and human body fall alarm
US20130331058A1 (en) Emergency alert system
CN202838608U (en) Human body action monitoring system
WO2011035390A1 (en) Tracking system
CN106658386B (en) Cloud service Bluetooth emergency rescue system
CN107038843A (en) Preventing child missing monitoring system and method based on electronic map
CN109379710B (en) Positioning method, device, equipment and system
US9215578B2 (en) Monitoring systems and methods
US11736925B2 (en) Low-power mobile telephony alert system
JPH09247730A (en) Method and device for position detection
US10117078B1 (en) Medical information communication method
US10440548B2 (en) mPERS with internal conversion of GPS
US10180489B2 (en) MPERS with remote conversion of GPS
US11044595B2 (en) Flip phone with direct access to emergency service providers
CN110602323B (en) Tumble monitoring method, terminal and storage device
CN109219033A (en) Emergency communication device
KR200295653Y1 (en) Wireless Terminal Apparatus for detecting the position of user
EP3357280B1 (en) Remote initiation of tasks on idle wireless computing devices
WO2021177853A1 (en) Reporting system
KR20130108819A (en) System and method for managing ward

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION