US20210084445A1 - Emergency alert systems with augmented location data - Google Patents
Emergency alert systems with augmented location data Download PDFInfo
- Publication number
- US20210084445A1 US20210084445A1 US17/023,761 US202017023761A US2021084445A1 US 20210084445 A1 US20210084445 A1 US 20210084445A1 US 202017023761 A US202017023761 A US 202017023761A US 2021084445 A1 US2021084445 A1 US 2021084445A1
- Authority
- US
- United States
- Prior art keywords
- mobile device
- location
- facility
- alert
- emergency
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/53—Network services using third party service providers
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B27/00—Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
- G08B27/006—Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations with transmission via telephone network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/10—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B3/00—Audible signalling systems; Audible personal calling systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B5/00—Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B6/00—Tactile signalling systems, e.g. personal calling systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B7/00—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
- G08B7/06—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B7/00—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
- G08B7/06—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
- G08B7/066—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources guiding along a path, e.g. evacuation path lighting strip
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/023—Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/024—Guidance services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/33—Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/50—Connection management for emergency connections
Definitions
- aspects of the disclosure relate generally to communication systems and more specifically to important and emergency alert systems.
- aspects described herein may address these and other problems, and generally improve the quality, efficiency, and speed of emergency alerts by improving the ability of a system to quickly and easily identify groups of people such that these people may be quickly contacted in the event of an emergency.
- aspects discussed herein relate to communicating with a community of people determined by a geofencing system to be physically in or near a location such as a building or property, wherein the system overrides any alert-inhibiting state in the people's mobile devices (or any other device) to deliver audio or visual alerts in emergencies.
- the present system may be used by building managers to communicate with people living or working in a building, by university administration to communicate with students or instructors on a university campus, by airport management to communicate with travelers passing through the airport, by a stadium operator to communicate with fans at a sporting game, and a variety of other uses.
- the present communication and emergency alert system may be used by many different groups of administrators to communicate with many different communities of people.
- certain individuals may be members of more than one community at the same time, and the communities themselves may change over time based both on the user's preferences and on their physical locations.
- the location of an individual may be determined based on location data provided by their mobile device and refined using known landmarks, such as beacons and/or access points, located in the location.
- a computer-implemented method includes obtaining an indication of an alert condition in a facility, determining that the alert condition includes an emergency condition in a first portion of the facility, determining a location for a plurality of mobile devices, each mobile device being located in the facility, determining, for each mobile device in the plurality of mobile devices, an exit location for the mobile device, generating, based on the emergency condition and the alert condition, an evacuation route for each mobile device in the plurality of mobile device, wherein the evacuation route includes a route from the location of the mobile device in the facility to the exit location for the mobile device, generating, for each mobile device based on the emergency condition and the evacuation route, an emergency alert for each mobile device, and transmitting each emergency alert to the corresponding mobile device, wherein the emergency alert causes the mobile device to display a notification irrespective of an alert-enabled setting of the mobile device.
- the evacuation route includes at least one hallway located in the facility as indicated in a route database for the facility.
- the notification for the emergency alert is selected from the group consisting of an audible notification, a visual notification, and a haptic notification.
- the computer-implemented method further includes determining that a second mobile device is located in the facility and automatically adding the second mobile device to a community for the facility, wherein the community includes the plurality of mobile devices.
- the computer-implemented method further includes identifying a mobile device in the plurality of mobile devices for which a location has not been determined, determining a proxy location for the mobile device, and using the proxy location for the mobile device as the location of the mobile device.
- the mobile device is associated with a user
- an access card is associated with the user
- the proxy location includes an access device at which the access card associated with the user was used.
- the proxy location includes a location of a wireless access point to which the mobile device is connected.
- Yet another embodiment of the invention includes a computing device including a processor and a memory in communication with the processor and storing instructions that, when read by the processor, cause the computing device to obtain an indication of an alert condition in a facility, determine that the alert condition includes an emergency condition in a first portion of the facility, determine a location for a plurality of mobile devices, each mobile device being located in the facility, determine, for each mobile device in the plurality of mobile devices, an exit location for the mobile device, generate, based on the emergency condition and the alert condition, an evacuation route for each mobile device in the plurality of mobile device, wherein the evacuation route includes a route from the location of the mobile device in the facility to the exit location for the mobile device, generate, for each mobile device based on the emergency condition and the evacuation route, an emergency alert for each mobile device, and transmit each emergency alert to the corresponding mobile device, wherein the emergency alert causes the mobile device to display a notification irrespective of an alert-enabled setting of the mobile device.
- the evacuation route includes at least one hallway located in the facility as indicated in a route database for the facility.
- the notification for the emergency alert is selected from the group consisting of an audible notification, a visual notification, and a haptic notification.
- the instructions when read by the processor, further cause the computing device to determine that a second mobile device is located in the facility and automatically add the second mobile device to a community for the facility, wherein the community includes the plurality of mobile devices.
- the instructions when read by the processor, further cause the computing device to identify a mobile device in the plurality of mobile devices for which a location has not been determined, determine a proxy location for the mobile device, and use the proxy location for the mobile device as the location of the mobile device.
- the mobile device is associated with a user
- an access card is associated with the user
- the proxy location includes an access device at which the access card associated with the user was used.
- the proxy location includes a location of a wireless access point to which the mobile device is connected.
- Still another embodiment of the invention includes a non-transitory machine-readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform steps including obtaining an indication of an alert condition in a facility, determining that the alert condition includes an emergency condition in a first portion of the facility, determining a location for a plurality of mobile devices, each mobile device being located in the facility, determining, for each mobile device in the plurality of mobile devices, an exit location for the mobile device, generating, based on the emergency condition and the alert condition, an evacuation route for each mobile device in the plurality of mobile device, wherein the evacuation route includes a route from the location of the mobile device in the facility to the exit location for the mobile device, generating, for each mobile device based on the emergency condition and the evacuation route, an emergency alert for each mobile device, and transmitting each emergency alert to the corresponding mobile device, wherein the emergency alert causes the mobile device to display a notification irrespective of an alert-enabled setting of the mobile device.
- the evacuation route includes at least one hallway located in the facility as indicated in a route database for the facility.
- the notification for the emergency alert is selected from the group consisting of an audible notification, a visual notification, and a haptic notification.
- the instructions when executed by one or more processors, further cause the one or more processors to perform steps including determining that a second mobile device is located in the facility and automatically adding the second mobile device to a community for the facility, wherein the community includes the plurality of mobile devices.
- the instructions when executed by one or more processors, further cause the one or more processors to perform steps including identifying a mobile device in the plurality of mobile devices for which a location has not been determined, determining a user associated with the identified mobile device, identifying an access card associated with the user, determining a proxy location for the mobile device based on the access card and an access device within the facility at which the access card was used, and using the proxy location for the mobile device as the location of the mobile device.
- the instructions when executed by one or more processors, further cause the one or more processors to perform steps including identifying a mobile device in the plurality of mobile devices for which a location has not been determined, determining an access point to which the identified mobile device is connected, identifying a location of the access point in the facility, and using the location of the access point as the location for the mobile device.
- FIG. 1 illustrates an example of an emergency alert system in which one or more aspects described herein may be implemented
- FIG. 2 illustrates an example computing device in accordance with one or more aspects described herein;
- FIG. 3 illustrates a process for providing an emergency alert in accordance with one or more aspects described herein;
- FIG. 4 depicts a flow chart for providing alerts via intermediate devices according to one or more aspects of the disclosure
- FIG. 5 depicts a flow chart for providing alerts according to one or more aspects of the disclosure
- FIG. 6 depicts a facility database according to one or more aspects of the disclosure
- FIG. 7 depicts a flow chart for generating alerts according to one or more aspects of the disclosure.
- FIG. 8 depicts a flow chart for routing alerts according to one or more aspects of the disclosure.
- Emergency alert systems may override any alert-inhibiting state in a person's mobile device to deliver an audio, visual, and/or haptic alert in an emergency.
- An alert-inhibiting state prevents a mobile device from playing a sound and/or visual indication of a notification received by the mobile device.
- Emergency alert systems provide a method of communicating with members of a community by using geofencing to determine the location of users such that they may optionally be automatically added to a community. Members may be auto-subscribed into the community based on their physical locations. These subscriptions may change from time to time as the mobile device moves. Users may also be added to a community based on their own user preferences. People may be members of more than one community and the communities may change over time.
- emergency alert systems in accordance with embodiments of the invention can communicate with members of a community by using geofencing to determine the location of users such that they can optionally be automatically added to a community.
- members may be auto-subscribed into the community based on their physical locations (which may change from time to time).
- Members or users can also be added to the community based on their own user preferences. People can be members of more than one community and the communities can change over time.
- Geofencing systems can be used to determine whether a particular mobile device is physically present in a geographic region or area or range (for example, in a building or on a property) based upon the physical location of the smartphone. If the user's phone is determined to be on the property, the user's phone can be automatically added to the property community.
- the user can be provided with the option of voluntarily subscribing to join the community.
- interested users e.g. building tenants who are away at work and/or persons working at different jobsites
- Emergency alert systems can determine the “alert state” of each of the individuals' smart devices. This can be accomplished by sending a signal to the user's mobile device to determine if the “silent” or “do not disturb” setting is on. If the mobile device setting is alert-enabled (e.g. the “do not disturb” or “silent” function is not turned on), then the mobile device is ready to receive alert messages at step 210 . However, in those cases where the mobile device is not alert-enabled (e.g. the “do not disturb” or “silent” function is turned on), then one of two options is possible. First, the user can be sent a message asking if the alert setting can be switched to alert-enabled.
- the alert enabled setting is enabled (e.g. the “do not disturb” or “silent” function is overridden).
- the present system may instead automatically override the “do not disturb” or “silent” function, thereby enabling the mobile device to receive alerts and communications from the emergency alert system irrespective of the “do not disturb” or “silent” function.
- an important advantage of the present system is that it can be prioritized over typical email, text, and notification traffic, even when the user's phone is set on silent, and warn building or property occupants in the event of an emergency situation such as a fire, crime, or medical emergency. In this way, the alert can be provided to the user irrespective of the alert-enabled setting of the device, including the playback of any audio, visual, and/or haptic notifications indicated in the alert as appropriate.
- emergency alert systems can send property-specific (and/or interest group-specific) messages and non-property-specific messages (e.g. messages appealing to more than one property or interest group-specific group).
- the property-specific messages and the non-property-specific messages may be sent with the smartphone's “do not disturb” or “silent” function overridden and turned off.
- the more likely desired setting may be to have the property-specific messages and non-property-specific messages are subject to the smartphone's “do not disturb” or “silent” settings.
- Emergency alert systems can be configured such that only safety alert messages will override the smartphone's “do not disturb” or “silent” settings while other messages (e.g.
- the settings used can optionally be set by members of the community themselves, by the manager or administrator of the community, or both. This is desirable such that users/community members receive safety alerts such as “fire” or “active shooter in the building” without such messages being silenced, but are able to block, silence, or turn off messages like “lunch specials in the building's cafe.”
- such advertising may be targeted and, for example, by being tailored to businesses within a 2 to 3 block radius around building.
- the user/community member when the user/community member first registers with the present system, they can be asked a series of questions to better target the advertising to their desires in addition to their location.
- FIG. 1 illustrates an emergency alert system 100 in accordance with an embodiment of the invention.
- the emergency alert system 100 includes at least one client device 110 and/or at least one emergency alert server system 120 in communication via a network 130 .
- the network connections shown are illustrative and any means of establishing a communications link between the computers may be used.
- the existence of any of various network protocols such as TCP/IP, Ethernet, FTP, HTTP and the like, and of various wireless communication technologies such as GSM, CDMA, WiFi, and LTE, is presumed, and the various computing devices described herein may be configured to communicate using any of these network protocols or technologies. Any of the devices and systems described herein may be implemented, in whole or in part, using one or more computing devices described with respect to FIG. 2 .
- Client devices 110 may provide data to and/or obtain data from the at least one emergency alert server system 120 as described herein.
- the client devices may determine their geographic location using a variety of location-determination techniques, including receiving positioning signals from positioning system satellites 140 , cellular tower triangulation, WiFi positioning systems, geocoding systems, and the like.
- Emergency alert server systems 120 may store and process a variety of data as described herein.
- the network 130 may include a local area network (LAN), a wide area network (WAN), a wireless telecommunications network, and/or any other communication network or combination thereof.
- the emergency alert system may also include a variety of virtual border transmitters 150 .
- Virtual border transmitters may broadcast a signal that is capable of determining when an object, such as a person, mobile device, vehicle, and the like, enters or crosses a particular geographic location.
- the virtual border transmitter may be able to determine its own location via a variety of technologies, such as via GPS, and/or be pre-programmed to know its location. In this way, the virtual border transmitter may be used to create a virtual fence around a particular geographic area.
- a number of virtual border transmitter are installed in a specific geographic region to create a virtual border around a particular geographic region.
- a virtual border transmitter is installed in a vehicle (or other moving object) that may detect movement in an area surrounding the vehicle. In this way, specific geofenced areas may be created, either in fixed locations or in moving locations.
- the data transferred to and from various computing devices in the emergency alert system 100 may include secure and sensitive data, such as confidential documents, customer personally identifiable information, and account data. It may be desirable to protect transmissions of such data using secure network protocols and encryption and/or to protect the integrity of the data when stored on the various computing devices. For example, a file-based integration scheme or a service-based integration scheme may be utilized for transmitting data between the various computing devices.
- Data may be transmitted using various network communication protocols. Secure data transmission protocols and/or encryption may be used in file transfers to protect the integrity of the data, for example, File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP), and/or Pretty Good Privacy (PGP) encryption.
- FTP File Transfer Protocol
- SFTP Secure File Transfer Protocol
- PGP Pretty Good Privacy
- one or more web services may be implemented within the various computing devices. Web services may be accessed by authorized external devices and users to support input, extraction, and manipulation of data between the various computing devices in the emergency alert system 100 . Web services built to support a personalized display system may be cross-domain and/or cross-platform, and may be built for enterprise use. Data may be transmitted using the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocol to provide secure connections between the computing devices.
- SSL Secure Sockets Layer
- TLS Transport Layer Security
- Web services may be implemented using the WS-Security standard, providing for secure SOAP messages using XML encryption.
- Specialized hardware may be used to provide secure web services.
- secure network appliances may include built-in features such as hardware-accelerated SSL and HTTPS, WS-Security, and/or firewalls.
- Such specialized hardware may be installed and configured in the emergency alert system 100 in front of one or more computing devices such that any external devices may communicate directly with the specialized hardware.
- the computing device 200 may include a processor 203 for controlling overall operation of the computing device 200 and its associated components, including RAM 205 , ROM 207 , input/output device 209 , communication interface 211 , and/or memory 215 .
- a data bus may interconnect processor(s) 203 , RAM 205 , ROM 207 , memory 215 , I/O device 209 , and/or communication interface 211 .
- computing device 200 may represent, be incorporated in, and/or include various devices such as a desktop computer, a computer server, a mobile device, such as a laptop computer, a tablet computer, a smart phone, any other types of mobile computing devices, and the like, and/or any other type of data processing device.
- I/O device 209 may include a microphone, keypad, touch screen, and/or stylus through which a user of the computing device 200 may provide input, and may also include one or more of a speaker for providing audio output and a video display device for providing textual, audiovisual, and/or graphical output.
- Communication interface 211 may include one or more transceivers, digital signal processors, and/or additional circuitry and software for communicating via any network, wired or wireless, using any protocol as described herein.
- Software may be stored within memory 215 to provide instructions to processor 203 allowing computing device 200 to perform various actions.
- memory 215 may store software used by the computing device 200 , such as an operating system 217 , application programs 219 , and/or an associated internal database 221 .
- the various hardware memory units in memory 215 may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data.
- Memory 215 may include one or more physical persistent memory devices and/or one or more non-persistent memory devices.
- Memory 215 may include, but is not limited to, random access memory (RAM) 205 , read only memory (ROM) 207 , electronically erasable programmable read only memory (EEPROM), flash memory or other memory technology, optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that may be used to store the desired information and that may be accessed by processor 203 .
- RAM random access memory
- ROM read only memory
- EEPROM electronically erasable programmable read only memory
- flash memory or other memory technology
- optical disk storage magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that may be used to store the desired information and that may be accessed by processor 203 .
- Processor 203 may include a single central processing unit (CPU), which may be a single-core or multi-core processor, or may include multiple CPUs. Processor(s) 203 and associated components may allow the computing device 200 to execute a series of computer-readable instructions to perform some or all of the processes described herein.
- various elements within memory 215 or other components in computing device 200 may include one or more caches, for example, CPU caches used by the processor 203 , page caches used by the operating system 217 , disk caches of a hard drive, and/or database caches used to cache content from database 221 .
- the CPU cache may be used by one or more processors 203 to reduce memory latency and access time.
- a processor 203 may retrieve data from or write data to the CPU cache rather than reading/writing to memory 215 , which may improve the speed of these operations.
- a database cache may be created in which certain data from a database 221 is cached in a separate smaller database in a memory separate from the database, such as in RAM 205 or on a separate computing device.
- a database cache on an application server may reduce data retrieval and data manipulation time by not needing to communicate over a network with a back-end database server.
- computing device 200 Although various components of computing device 200 are described separately, functionality of the various components may be combined and/or performed by a single component and/or multiple computing devices in communication without departing from the invention.
- Emergency alert system can override any alert-inhibiting state in a person's mobile device to deliver an audio or visual alert in an emergency situation.
- Members of a community can be determined by using geofencing to determine the location of users such that they can optionally be automatically added to a community. As such, members may be auto-subscribed into the community based on their physical locations, which may change from time to time. Members or users can also be added to the community based on their own user preferences. People can be members of more than one community and the communities can change over time.
- FIG. 3 illustrates a process for providing an emergency alerts to members of a community in accordance with one or more aspects described herein. Some or all of the steps of process 300 may be performed using any of the computing devices and/or combination thereof described herein. In a variety of embodiments, some or all of the steps described below may be combined and/or divided into sub-steps as appropriate.
- an emergency alert server system using a geofencing and/or GPS systems, can determine whether a mobile device associated with a particular user is physically present in a geographic region or area or range (e.g. In a building or on a property) based upon the physical location of the mobile device.
- the physical location of the mobile device can be determined based on a GPS location augmented using one or more beacons located in the geographic region.
- the user's mobile device can be automatically added to a community database.
- the mobile device can be added to the community database by the emergency alert server system.
- the user can be provided with the option of voluntarily subscribing to join the community (e.g. enter the user's mobile device into the community database) by providing a subscription request on the mobile device.
- interested users e.g. building tenants who are away at work, persons working at different job sites, and the like
- the process can end at step 324 .
- the alert state of each of the subscribed user's mobile devices can be determined. This can be accomplished by sending a signal to the mobile device to determine if the mobile device's “silent” or “do not disturb” setting is on. If the mobile device setting is alert-enabled (e.g. the “do not disturb” or “silent” function is not turned on), then the mobile device is ready to receive alert messages. However, in those cases where the mobile device is not alert-enabled (e.g. the “do not disturb” or “silent” function is turned on), then one of two options is possible. First, at step 320 , a message can be sent to the user asking if the alert setting can be switched to alert-enabled.
- a message can be sent to the user asking if the alert setting can be switched to alert-enabled.
- the alert enabled setting is enabled (e.g. the “do not disturb” or “silent” function is overridden). If the user does not agree to set the mobile device to an alert-enabled state, the process can end at step 324 .
- the system may instead proceed directly to automatically override the “do not disturb” or “silent” function, thereby enabling the mobile device to receive alerts and communications from system.
- a variety of messages can be sent using the emergency alert server system.
- the emergency alert server system also can send property-specific (or interest group-specific) messages using the property specific module and non-property-specific messages (e.g. Messages appealing to more than one property or interest group-specific group) using the non-property communication module.
- the property-specific messages sent by the property specific module and the non-property-specific messages sent by the non-property communication module may be sent with the “do not disturb” or “silent” function of the mobile device overridden and turned off.
- the more likely desired setting may be to have the property-specific messages sent by the property specific module and non-property-specific messages sent by the non-property communication module are subject to the “do not disturb” or “silent” settings of the mobile device.
- the emergency alert system can be configured such that only safety alert messages will override the “do not disturb” or “silent” settings of the mobile device, while other messages (e.g. Building advertisements and/or messages) will not override the “do not disturb” or “silent” settings.
- the settings used can optionally be set by members of the community themselves, by the manager or administrator of the community, or both.
- alerts such as “fire” or “active shooter in the building” without such messages being silenced, but can block, silence, or turn off messages like “lunch specials in the building's café.”
- These various alerts can be provided via the mobile device in step 326 .
- the alerts may be provided using any audible, visual, and/or haptic notifications indicated in the alert.
- the emergency alert server system can obtain, depending upon the alert condition, a user response to the delivered alert.
- the user response can include an indication that the user viewed the alert.
- the user having viewed the alert can be indicated by the user having interacted with their mobile device after the alert was delivered to and/or displayed by an emergency alert application executing on the mobile device, where the emergency alert application can display one or more notifications indicated in the alert by overriding any alert-inhibiting state of the mobile device as described herein.
- the user response can include any responses to prompts and/or questions provided in the alert, such as a request for additional information about an alert condition, the user's response to the alert condition, and the like.
- FIG. 4 depicts a flow chart for delivering alerts according to one or more aspects of the disclosure. Some or all of the steps of process 400 may be performed using any of the computing devices and/or combination thereof described herein. In a variety of embodiments, some or all of the steps described below may be combined and/or divided into sub-steps as appropriate.
- an alerting module of an emergency alert server system can determine that a mobile device is scheduled to receive an alert but the current location of the mobile device cannot be determined.
- the emergency alert system can determine if the mobile device is connected to an intermediate device, such as a WiFi router, cell tower, Bluetooth beacon, point of sale device, NFC card reader, and/or another computing device that may have a WiFi, Bluetooth or NFC connection with the mobile device. If the mobile device is not connected to another device, the process may provide the alert to the mobile device via a cellular communication channel in step 424 .
- the emergency alert server system can query a known device database to determine the properties of the intermediate device, including its geolocation and the device ability to deliver the alerts to the mobile device via its own communication channel, such as Bluetooth, WiFi, etc. If the intermediate device is not in the known device database, the emergency alert server system may provide the alert via cellular signal by an appropriate delivery module, such as a safety module, the property specific module, and a non-property communication module as described herein at step 424 .
- an appropriate delivery module such as a safety module, the property specific module, and a non-property communication module as described herein at step 424 .
- the emergency alert server system can query an alert database to determine if the geolocation of the connected device is consistent with the alert criteria.
- the alert can be delivered via cellular signal by the emergency alert server system at step 424 . If the connected device does not have its own alert delivery communication path, the alert is delivered via cellular signal by the emergency alert server system at step 424 . If the connected device does have an alert delivery communication path, such as WiFi, it is delivered by that path instead of, or in addition to the cellular path, at step 420 . Regardless of alert delivery path, the alert can be transmitted by the emergency alert server system via the appropriate communication channel (e.g. via an intermediate device and/or cellular communication channel) at step 422 .
- the appropriate communication channel e.g. via an intermediate device and/or cellular communication channel
- An emergency alert system may manage the directing of alerts to different subsets of the community based upon alert criteria input into the alert database by a system administrator and delivers these alerts to the appropriate mobile devices.
- a facility database may contain a history of devices present in the facility and/or scans by access sensors in the facility. In this way, the facility database can track each time an individual's credentials (usually in the form of an NFC card) are used at an access point, such as a door.
- any access sensors such as biometrics, fingerprint, facial recognition, retinal scan, etc. can be used as appropriate. Similarly, facial recognition of security camera footage can also be used.
- the emergency alert server system can compare mobile devices present at the facility with the access devices (e.g.
- a Routing Module of the emergency alert server system may identify the nearest (e.g. most accessible) exit to the mobile device and delivers the most efficient evacuation route from the routing database through the selected exit.
- FIG. 5 depicts a flow chart for providing alerts according to one or more aspects of the disclosure. Some or all of the steps of process 500 may be performed using any of the computing devices and/or combination thereof described herein. In a variety of embodiments, some or all of the steps described below may be combined and/or divided into sub-steps as appropriate.
- an emergency alert server system can obtain sensor data.
- sensor data can include a signal from a smoke detector that smoke is present in a facility. It should be noted that any signal from any device, such as a water detector, earthquake detector, and the like, can be obtained as appropriate.
- the emergency alert server system can determine if an alert condition is present based upon the sensor data. If alarm conditions are present in the sensor data, the system moves to step 520 . At step 514 , if the sensor data does not indicate an alert condition the network of authorized mobile devices are polled for user input of an alert condition. At step 516 , the emergency alert server system can obtain an alert notification from a mobile device. The emergency alert server system can store the user-defined alert to an alert database at step 518 .
- the user-defined alert can include any of a variety of data such as, but not limited to, text data, audible notifications, visual notifications, haptic notifications, and the like.
- an evacuation alert may be generated based on the alert condition.
- the evacuation alert can be generated by the emergency alert server system.
- the evacuation alert can include any of a variety of data such as, but not limited to, text data, audible notifications, visual notifications, haptic notifications, and the like.
- the evacuation alert includes a description of the alert condition and an evacuation plan.
- the evacuation plan can be customized to each mobile device present in the facility. For example, the evacuation plan targeted toward a mobile device can include an evacuation route from the last known location of the mobile device to the closest exit point to the mobile device. If the alert condition does not indicate an evacuation condition, an emergency alert can be generated indicating the alert condition.
- a chemical spill in one portion of a facility may not require the evacuation of a section portion of the facility, but users in the section portion of the facility can be advised to avoid the first portion of the facility.
- the location of all mobile devices in the facility can be determined. If there are any mobile devices with an unknown location in the facility, a location module can be used by the emergency alert server system to identify the location of those mobile devices at step 524 .
- the generated alerts can be provided to the mobile devices.
- a routing database may store the layout of a facility, images of all exits and relevant landmarks, as well as evacuation routes from each room in the facility.
- a third-party server may be a plurality of servers from which historical data events involving a credential associated with the user may be found.
- a CC transaction database may be a proxy for a credit card provider's transaction records for which a credit card that is associated with the user would include the time and location of any point of sale devices that engaged in transactions using the credit card(s) associated with users.
- a keycard access database may be a proxy for a building or organization access system historical records. This database may store the time and location of each time a near field communication chip associated with a user was used to attempt access at a card reader.
- a biometric recognition database may be a proxy for a building or organization biometric-based identification system. This database may store the time and location of a biometric recognition event, such as a facial recognition software being run against surveillance camera footage, or a fingerprint being used at an access point.
- the emergency alert server system may use any of these databases to determine the location of a mobile device and/or determine an exit route for the user associated with a mobile device as described herein.
- FIG. 6 depicts a facility database according to one or more aspects of the disclosure.
- the database 600 contains the history of scans by access sensors in the facility. For example, the database tracks each time an individual's credentials (such as an NFC card) are used at an access point, such as a door. The time, keycard identifier, and access point can be indicated in the alert code database.
- the database includes a table with a key column identifying the keycard id along with columns indicating each access point in a facility. Each row of the database indicates the most recent time at which the keycard id was present at a particular access point.
- An emergency alert system can use this information to determine where a mobile device is for providing alerts to the mobile device as described herein.
- FIG. 7 depicts a flow chart for generating alerts according to one or more aspects of the disclosure. Some or all of the steps of process 700 may be performed using any of the computing devices and/or combination thereof described herein. In a variety of embodiments, some or all of the steps described below may be combined and/or divided into sub-steps as appropriate.
- an emergency alert server system can obtain an indication of an evacuation alert and at least one mobile device whose location is not known.
- the emergency alert server system can provide targeted alerts to the mobile devices based on the specific location of the mobile device.
- the emergency alert server system can provide different alerts to mobile devices located within different portions of a facility.
- the alert can indicate the alert condition, exit location information, and/or any other information as described herein.
- the emergency alert server system can query a CC transaction database for a recent transaction by a credit card associated with the mobile device(s) whose location is not known.
- a recent transaction was found, such as a user in a mall using their credit card to make a purchase in a particular store, the location of the device processing the transaction involving the credit card can be used as the location of the mobile device and the process can proceed to step 724 .
- the emergency alert server system can query a keycard access database for recent use of a keycard associated with the mobile device(s) whose geolocation is not known at step 716 .
- the emergency alert server system can query a biometric recognition database at step 720 .
- the emergency alert server system can query the biometric recognition database for a recent identification of biometric information, such as facial recognition, with the mobile device(s) whose geolocation is not known.
- the emergency alert server system obtains a recent identification of a biometric indicator, such as the user being identified by facial recognition software being run against surveillance system footage, the location of where the user was identified can be used as the location of the mobile device and the process can proceed to step 724 .
- a biometric indicator such as the user being identified by facial recognition software being run against surveillance system footage
- the emergency alert server system can determine one or more exits that are proximate to the mobile device based on the proxy location identified in steps 712 - 722 .
- the emergency alert server system can also generate one or more routes through the facility from the location of the mobile device to the one or more exits.
- the routes can include any of a variety of hallways, rooms, and/or any other building features as identified in a routing database for the facility as appropriate.
- the emergency alert server system can obtain images of the determined exits.
- the emergency alert server system can generate an alert indicating the exit routes and the images of the exit locations as described herein.
- the emergency alert server system can provide the alerts to the mobile device.
- the mobile device can be sent a generalized alert indicating the alert condition.
- FIG. 8 depicts a flow chart for routing alerts according to one or more aspects of the disclosure. Some or all of the steps of process 800 may be performed using any of the computing devices and/or combination thereof described herein. In a variety of embodiments, some or all of the steps described below may be combined and/or divided into sub-steps as appropriate.
- an emergency alert server system can use a variety of communication modules (e.g. safety alert modules, property specific modules, and/or non-property communication modules) to provide alerts to mobile devices in the community. Those modules can transmit alerts to the appropriate users' mobile device based on the location of the mobile device and/or monitor for a response to those alerts that require a response. For example, if a fire is detected by sensors in a school, one or more alert messages can be generated and provided to various communities of users in the school's community. The alert message can indicate that the user is to select an exit to which the user is going to proceed in response to the alert.
- the emergency alert server system can obtain an indication of the exit selected by the user.
- the emergency alert server system can query a route database for the evacuation route from the user's current location, via the user's selected exit. In many embodiments, the emergency alert server system adjusts the route to avoid any detected threats to safety such as a fire. At step 816 , the emergency alert server system can provide the generated route to the user's mobile device so the user can safely navigate from their current location to the selected exit.
- One or more aspects discussed herein may be embodied in computer-usable or readable data and/or computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices as described herein.
- program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device.
- the modules may be written in a source code programming language that is subsequently compiled for execution, or may be written in a scripting language such as (but not limited to) HTML or XML.
- the computer executable instructions may be stored on a computer readable medium such as a hard disk, optical disk, removable storage media, solid-state memory, RAM, and the like.
- the functionality of the program modules may be combined or distributed as desired in various embodiments.
- the functionality may be embodied, in whole or in part, in firmware or hardware equivalents such as integrated circuits, field programmable gate arrays (FPGA), and the like.
- Particular data structures may be used to more effectively implement one or more aspects discussed herein, and such data structures are contemplated within the scope of computer executable instructions and computer-usable data described herein.
- Various aspects discussed herein may be embodied as a method, a computing device, a system, and/or a computer program product.
Abstract
Description
- The instant application claims priority to U.S. Provisional Patent Application No. 62/901,390, titled “Emergency Alert Systems” and filed Sep. 17, 2019, the disclosure of which is hereby incorporated by reference in its entirety.
- Aspects of the disclosure relate generally to communication systems and more specifically to important and emergency alert systems.
- People use many different systems to send and receive messages with others, including individual emails, group emails, texts to mobile devices, etc. during emergency and time-sensitive events. Existing emergency alert systems like the Federal Emergency Alert System rely on people listening to a radio, television, or similar device to receive their alerts. These devices may interfere with sleep and therefore are usually turned off while people are sleeping or otherwise busy. The precision in which emergency alert systems use for transmitting alerts is further limited to existing telecommunication architecture. For example, if there were a fire in a portion of Orange County, Calif., the existing emergency alerts systems would notify the entire Los Angeles metropolitan area and portions of the surrounding counties. Alert systems utilizing mobile phones are similarly limited as they do not allow for emergency alerts to be audibly provided while the mobile phone is in a silent or do not disturb mode.
- Aspects described herein may address these and other problems, and generally improve the quality, efficiency, and speed of emergency alerts by improving the ability of a system to quickly and easily identify groups of people such that these people may be quickly contacted in the event of an emergency.
- The following presents a simplified summary of various aspects described herein. This summary is not an extensive overview, and is not intended to identify key or critical elements or to delineate the scope of the claims. The following summary merely presents some concepts in a simplified form as an introductory prelude to the more detailed description provided below. Corresponding apparatus, systems, and computer-readable media are also within the scope of the disclosure.
- Aspects discussed herein relate to communicating with a community of people determined by a geofencing system to be physically in or near a location such as a building or property, wherein the system overrides any alert-inhibiting state in the people's mobile devices (or any other device) to deliver audio or visual alerts in emergencies. In addition to providing emergency alerts, the present system may be used by building managers to communicate with people living or working in a building, by university administration to communicate with students or instructors on a university campus, by airport management to communicate with travelers passing through the airport, by a stadium operator to communicate with fans at a sporting game, and a variety of other uses. As may be appreciated, the present communication and emergency alert system may be used by many different groups of administrators to communicate with many different communities of people. Moreover, certain individuals may be members of more than one community at the same time, and the communities themselves may change over time based both on the user's preferences and on their physical locations. The location of an individual may be determined based on location data provided by their mobile device and refined using known landmarks, such as beacons and/or access points, located in the location.
- In one embodiment, a computer-implemented method includes obtaining an indication of an alert condition in a facility, determining that the alert condition includes an emergency condition in a first portion of the facility, determining a location for a plurality of mobile devices, each mobile device being located in the facility, determining, for each mobile device in the plurality of mobile devices, an exit location for the mobile device, generating, based on the emergency condition and the alert condition, an evacuation route for each mobile device in the plurality of mobile device, wherein the evacuation route includes a route from the location of the mobile device in the facility to the exit location for the mobile device, generating, for each mobile device based on the emergency condition and the evacuation route, an emergency alert for each mobile device, and transmitting each emergency alert to the corresponding mobile device, wherein the emergency alert causes the mobile device to display a notification irrespective of an alert-enabled setting of the mobile device.
- In yet another embodiment of the invention, the evacuation route includes at least one hallway located in the facility as indicated in a route database for the facility.
- In still another embodiment of the invention, the notification for the emergency alert is selected from the group consisting of an audible notification, a visual notification, and a haptic notification.
- In yet still another embodiment of the invention, the computer-implemented method further includes determining that a second mobile device is located in the facility and automatically adding the second mobile device to a community for the facility, wherein the community includes the plurality of mobile devices.
- In yet another additional embodiment of the invention, the computer-implemented method further includes identifying a mobile device in the plurality of mobile devices for which a location has not been determined, determining a proxy location for the mobile device, and using the proxy location for the mobile device as the location of the mobile device.
- In still another additional embodiment of the invention, the mobile device is associated with a user, an access card is associated with the user, and the proxy location includes an access device at which the access card associated with the user was used.
- In yet still another additional embodiment of the invention, the proxy location includes a location of a wireless access point to which the mobile device is connected.
- Yet another embodiment of the invention includes a computing device including a processor and a memory in communication with the processor and storing instructions that, when read by the processor, cause the computing device to obtain an indication of an alert condition in a facility, determine that the alert condition includes an emergency condition in a first portion of the facility, determine a location for a plurality of mobile devices, each mobile device being located in the facility, determine, for each mobile device in the plurality of mobile devices, an exit location for the mobile device, generate, based on the emergency condition and the alert condition, an evacuation route for each mobile device in the plurality of mobile device, wherein the evacuation route includes a route from the location of the mobile device in the facility to the exit location for the mobile device, generate, for each mobile device based on the emergency condition and the evacuation route, an emergency alert for each mobile device, and transmit each emergency alert to the corresponding mobile device, wherein the emergency alert causes the mobile device to display a notification irrespective of an alert-enabled setting of the mobile device.
- In yet another embodiment of the invention, the evacuation route includes at least one hallway located in the facility as indicated in a route database for the facility.
- In still another embodiment of the invention, the notification for the emergency alert is selected from the group consisting of an audible notification, a visual notification, and a haptic notification.
- In yet still another embodiment of the invention, the instructions, when read by the processor, further cause the computing device to determine that a second mobile device is located in the facility and automatically add the second mobile device to a community for the facility, wherein the community includes the plurality of mobile devices.
- In yet another additional embodiment of the invention, the instructions, when read by the processor, further cause the computing device to identify a mobile device in the plurality of mobile devices for which a location has not been determined, determine a proxy location for the mobile device, and use the proxy location for the mobile device as the location of the mobile device.
- In still another additional embodiment of the invention, the mobile device is associated with a user, an access card is associated with the user, and the proxy location includes an access device at which the access card associated with the user was used.
- In yet still another additional embodiment of the invention, the proxy location includes a location of a wireless access point to which the mobile device is connected.
- Still another embodiment of the invention includes a non-transitory machine-readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform steps including obtaining an indication of an alert condition in a facility, determining that the alert condition includes an emergency condition in a first portion of the facility, determining a location for a plurality of mobile devices, each mobile device being located in the facility, determining, for each mobile device in the plurality of mobile devices, an exit location for the mobile device, generating, based on the emergency condition and the alert condition, an evacuation route for each mobile device in the plurality of mobile device, wherein the evacuation route includes a route from the location of the mobile device in the facility to the exit location for the mobile device, generating, for each mobile device based on the emergency condition and the evacuation route, an emergency alert for each mobile device, and transmitting each emergency alert to the corresponding mobile device, wherein the emergency alert causes the mobile device to display a notification irrespective of an alert-enabled setting of the mobile device.
- In yet another embodiment of the invention, the evacuation route includes at least one hallway located in the facility as indicated in a route database for the facility.
- In still another embodiment of the invention, the notification for the emergency alert is selected from the group consisting of an audible notification, a visual notification, and a haptic notification.
- In yet still another additional embodiment of the invention, the instructions, when executed by one or more processors, further cause the one or more processors to perform steps including determining that a second mobile device is located in the facility and automatically adding the second mobile device to a community for the facility, wherein the community includes the plurality of mobile devices.
- In yet another additional embodiment of the invention, the instructions, when executed by one or more processors, further cause the one or more processors to perform steps including identifying a mobile device in the plurality of mobile devices for which a location has not been determined, determining a user associated with the identified mobile device, identifying an access card associated with the user, determining a proxy location for the mobile device based on the access card and an access device within the facility at which the access card was used, and using the proxy location for the mobile device as the location of the mobile device.
- In still another additional embodiment of the invention, the instructions, when executed by one or more processors, further cause the one or more processors to perform steps including identifying a mobile device in the plurality of mobile devices for which a location has not been determined, determining an access point to which the identified mobile device is connected, identifying a location of the access point in the facility, and using the location of the access point as the location for the mobile device.
- These features, along with many others, are discussed in greater detail below.
- The present disclosure is illustrated by way of example and not limited in the accompanying figures in which like reference numerals indicate similar elements and in which:
-
FIG. 1 illustrates an example of an emergency alert system in which one or more aspects described herein may be implemented; -
FIG. 2 illustrates an example computing device in accordance with one or more aspects described herein; -
FIG. 3 illustrates a process for providing an emergency alert in accordance with one or more aspects described herein; -
FIG. 4 depicts a flow chart for providing alerts via intermediate devices according to one or more aspects of the disclosure; -
FIG. 5 depicts a flow chart for providing alerts according to one or more aspects of the disclosure; -
FIG. 6 depicts a facility database according to one or more aspects of the disclosure; -
FIG. 7 depicts a flow chart for generating alerts according to one or more aspects of the disclosure; and -
FIG. 8 depicts a flow chart for routing alerts according to one or more aspects of the disclosure. - In the following description of the various embodiments, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration various embodiments in which aspects of the disclosure may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made without departing from the scope of the present disclosure. Aspects of the disclosure are capable of other embodiments and of being practiced or being carried out in various ways. In addition, it is to be understood that the phraseology and terminology used herein are for the purpose of description and should not be regarded as limiting. Rather, the phrases and terms used herein are to be given their broadest interpretation and meaning.
- Emergency alert systems may override any alert-inhibiting state in a person's mobile device to deliver an audio, visual, and/or haptic alert in an emergency. An alert-inhibiting state prevents a mobile device from playing a sound and/or visual indication of a notification received by the mobile device. Emergency alert systems provide a method of communicating with members of a community by using geofencing to determine the location of users such that they may optionally be automatically added to a community. Members may be auto-subscribed into the community based on their physical locations. These subscriptions may change from time to time as the mobile device moves. Users may also be added to a community based on their own user preferences. People may be members of more than one community and the communities may change over time. A variety of systems and methods for establishing the location of a mobile device and providing alerts to the mobile device in accordance with embodiments of the invention are described in U.S. Pat. No. 10,251,023, titled “Notification and Communication System using Geofencing to Identify Members of a Community” and issued Apr. 2, 2019, the disclosure of which is hereby incorporated by reference in its entirety.
- For example, emergency alert systems in accordance with embodiments of the invention can communicate with members of a community by using geofencing to determine the location of users such that they can optionally be automatically added to a community. As such, members may be auto-subscribed into the community based on their physical locations (which may change from time to time). Members or users can also be added to the community based on their own user preferences. People can be members of more than one community and the communities can change over time. Geofencing systems can be used to determine whether a particular mobile device is physically present in a geographic region or area or range (for example, in a building or on a property) based upon the physical location of the smartphone. If the user's phone is determined to be on the property, the user's phone can be automatically added to the property community. In cases where the mobile device is determined not to be physically present on the property (e.g. not detected by proximity sensors in the location), the user can be provided with the option of voluntarily subscribing to join the community. In this way, interested users (e.g. building tenants who are away at work and/or persons working at different jobsites) can be kept informed of developments and alerts with regard to a particular property community even when they are physically away from that property.
- Emergency alert systems can determine the “alert state” of each of the individuals' smart devices. This can be accomplished by sending a signal to the user's mobile device to determine if the “silent” or “do not disturb” setting is on. If the mobile device setting is alert-enabled (e.g. the “do not disturb” or “silent” function is not turned on), then the mobile device is ready to receive alert messages at step 210. However, in those cases where the mobile device is not alert-enabled (e.g. the “do not disturb” or “silent” function is turned on), then one of two options is possible. First, the user can be sent a message asking if the alert setting can be switched to alert-enabled. Should the user agree and grant permission, then the alert enabled setting is enabled (e.g. the “do not disturb” or “silent” function is overridden). Alternatively, the present system may instead automatically override the “do not disturb” or “silent” function, thereby enabling the mobile device to receive alerts and communications from the emergency alert system irrespective of the “do not disturb” or “silent” function. As such, an important advantage of the present system is that it can be prioritized over typical email, text, and notification traffic, even when the user's phone is set on silent, and warn building or property occupants in the event of an emergency situation such as a fire, crime, or medical emergency. In this way, the alert can be provided to the user irrespective of the alert-enabled setting of the device, including the playback of any audio, visual, and/or haptic notifications indicated in the alert as appropriate.
- In addition to sending safety alerts, emergency alert systems can send property-specific (and/or interest group-specific) messages and non-property-specific messages (e.g. messages appealing to more than one property or interest group-specific group). The property-specific messages and the non-property-specific messages may be sent with the smartphone's “do not disturb” or “silent” function overridden and turned off. However, the more likely desired setting may be to have the property-specific messages and non-property-specific messages are subject to the smartphone's “do not disturb” or “silent” settings. Emergency alert systems can be configured such that only safety alert messages will override the smartphone's “do not disturb” or “silent” settings while other messages (e.g. building advertisements/messages) will not override the smartphone's “do not disturb” or “silent” settings. The settings used can optionally be set by members of the community themselves, by the manager or administrator of the community, or both. This is desirable such that users/community members receive safety alerts such as “fire” or “active shooter in the building” without such messages being silenced, but are able to block, silence, or turn off messages like “lunch specials in the building's cafe.” In preferred aspects, such advertising may be targeted and, for example, by being tailored to businesses within a 2 to 3 block radius around building. Moreover, when the user/community member first registers with the present system, they can be asked a series of questions to better target the advertising to their desires in addition to their location.
-
FIG. 1 illustrates anemergency alert system 100 in accordance with an embodiment of the invention. Theemergency alert system 100 includes at least oneclient device 110 and/or at least one emergencyalert server system 120 in communication via anetwork 130. It will be appreciated that the network connections shown are illustrative and any means of establishing a communications link between the computers may be used. The existence of any of various network protocols such as TCP/IP, Ethernet, FTP, HTTP and the like, and of various wireless communication technologies such as GSM, CDMA, WiFi, and LTE, is presumed, and the various computing devices described herein may be configured to communicate using any of these network protocols or technologies. Any of the devices and systems described herein may be implemented, in whole or in part, using one or more computing devices described with respect toFIG. 2 . -
Client devices 110 may provide data to and/or obtain data from the at least one emergencyalert server system 120 as described herein. The client devices may determine their geographic location using a variety of location-determination techniques, including receiving positioning signals frompositioning system satellites 140, cellular tower triangulation, WiFi positioning systems, geocoding systems, and the like. Emergencyalert server systems 120 may store and process a variety of data as described herein. Thenetwork 130 may include a local area network (LAN), a wide area network (WAN), a wireless telecommunications network, and/or any other communication network or combination thereof. - The emergency alert system may also include a variety of
virtual border transmitters 150. Virtual border transmitters may broadcast a signal that is capable of determining when an object, such as a person, mobile device, vehicle, and the like, enters or crosses a particular geographic location. The virtual border transmitter may be able to determine its own location via a variety of technologies, such as via GPS, and/or be pre-programmed to know its location. In this way, the virtual border transmitter may be used to create a virtual fence around a particular geographic area. In several embodiments, a number of virtual border transmitter are installed in a specific geographic region to create a virtual border around a particular geographic region. In many embodiments, a virtual border transmitter is installed in a vehicle (or other moving object) that may detect movement in an area surrounding the vehicle. In this way, specific geofenced areas may be created, either in fixed locations or in moving locations. - Some or all of the data described herein may be stored using any of a variety of data storage mechanisms, such as databases. These databases may include, but are not limited to relational databases, hierarchical databases, distributed databases, in-memory databases, flat file databases, XML databases, NoSQL databases, graph databases, and/or a combination thereof. The data transferred to and from various computing devices in the
emergency alert system 100 may include secure and sensitive data, such as confidential documents, customer personally identifiable information, and account data. It may be desirable to protect transmissions of such data using secure network protocols and encryption and/or to protect the integrity of the data when stored on the various computing devices. For example, a file-based integration scheme or a service-based integration scheme may be utilized for transmitting data between the various computing devices. Data may be transmitted using various network communication protocols. Secure data transmission protocols and/or encryption may be used in file transfers to protect the integrity of the data, for example, File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP), and/or Pretty Good Privacy (PGP) encryption. In many embodiments, one or more web services may be implemented within the various computing devices. Web services may be accessed by authorized external devices and users to support input, extraction, and manipulation of data between the various computing devices in theemergency alert system 100. Web services built to support a personalized display system may be cross-domain and/or cross-platform, and may be built for enterprise use. Data may be transmitted using the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocol to provide secure connections between the computing devices. Web services may be implemented using the WS-Security standard, providing for secure SOAP messages using XML encryption. Specialized hardware may be used to provide secure web services. For example, secure network appliances may include built-in features such as hardware-accelerated SSL and HTTPS, WS-Security, and/or firewalls. Such specialized hardware may be installed and configured in theemergency alert system 100 in front of one or more computing devices such that any external devices may communicate directly with the specialized hardware. - Turning now to
FIG. 2 , acomputing device 200 in accordance with an embodiment of the invention is shown. Thecomputing device 200 may include aprocessor 203 for controlling overall operation of thecomputing device 200 and its associated components, includingRAM 205,ROM 207, input/output device 209,communication interface 211, and/ormemory 215. A data bus may interconnect processor(s) 203,RAM 205,ROM 207,memory 215, I/O device 209, and/orcommunication interface 211. In some embodiments,computing device 200 may represent, be incorporated in, and/or include various devices such as a desktop computer, a computer server, a mobile device, such as a laptop computer, a tablet computer, a smart phone, any other types of mobile computing devices, and the like, and/or any other type of data processing device. - Input/output (I/O)
device 209 may include a microphone, keypad, touch screen, and/or stylus through which a user of thecomputing device 200 may provide input, and may also include one or more of a speaker for providing audio output and a video display device for providing textual, audiovisual, and/or graphical output.Communication interface 211 may include one or more transceivers, digital signal processors, and/or additional circuitry and software for communicating via any network, wired or wireless, using any protocol as described herein. Software may be stored withinmemory 215 to provide instructions toprocessor 203 allowingcomputing device 200 to perform various actions. For example,memory 215 may store software used by thecomputing device 200, such as anoperating system 217,application programs 219, and/or an associatedinternal database 221. The various hardware memory units inmemory 215 may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data.Memory 215 may include one or more physical persistent memory devices and/or one or more non-persistent memory devices.Memory 215 may include, but is not limited to, random access memory (RAM) 205, read only memory (ROM) 207, electronically erasable programmable read only memory (EEPROM), flash memory or other memory technology, optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that may be used to store the desired information and that may be accessed byprocessor 203. -
Processor 203 may include a single central processing unit (CPU), which may be a single-core or multi-core processor, or may include multiple CPUs. Processor(s) 203 and associated components may allow thecomputing device 200 to execute a series of computer-readable instructions to perform some or all of the processes described herein. Although not shown inFIG. 2 , various elements withinmemory 215 or other components incomputing device 200, may include one or more caches, for example, CPU caches used by theprocessor 203, page caches used by theoperating system 217, disk caches of a hard drive, and/or database caches used to cache content fromdatabase 221. For embodiments including a CPU cache, the CPU cache may be used by one ormore processors 203 to reduce memory latency and access time. Aprocessor 203 may retrieve data from or write data to the CPU cache rather than reading/writing tomemory 215, which may improve the speed of these operations. In some examples, a database cache may be created in which certain data from adatabase 221 is cached in a separate smaller database in a memory separate from the database, such as inRAM 205 or on a separate computing device. For instance, in a multi-tiered application, a database cache on an application server may reduce data retrieval and data manipulation time by not needing to communicate over a network with a back-end database server. These types of caches and others may be included in various embodiments, and may provide potential advantages in certain implementations of devices, systems, and methods described herein, such as faster response times and less dependence on network conditions when transmitting and receiving data. - Although various components of
computing device 200 are described separately, functionality of the various components may be combined and/or performed by a single component and/or multiple computing devices in communication without departing from the invention. - Emergency alert system can override any alert-inhibiting state in a person's mobile device to deliver an audio or visual alert in an emergency situation. Members of a community can be determined by using geofencing to determine the location of users such that they can optionally be automatically added to a community. As such, members may be auto-subscribed into the community based on their physical locations, which may change from time to time. Members or users can also be added to the community based on their own user preferences. People can be members of more than one community and the communities can change over time.
-
FIG. 3 illustrates a process for providing an emergency alerts to members of a community in accordance with one or more aspects described herein. Some or all of the steps ofprocess 300 may be performed using any of the computing devices and/or combination thereof described herein. In a variety of embodiments, some or all of the steps described below may be combined and/or divided into sub-steps as appropriate. - At
step 310, it can be determined if a mobile device is located within a particular region. For example, an emergency alert server system, using a geofencing and/or GPS systems, can determine whether a mobile device associated with a particular user is physically present in a geographic region or area or range (e.g. In a building or on a property) based upon the physical location of the mobile device. In several embodiments, the physical location of the mobile device can be determined based on a GPS location augmented using one or more beacons located in the geographic region. Atstep 312, if the user's mobile device is determined to be on the property, the user's mobile device can be automatically added to a community database. In several embodiments, the mobile device can be added to the community database by the emergency alert server system. Atstep 314, in cases where the user's mobile device is determined not to be physically present on the property (e.g. not detected by proximity sensors), the user can be provided with the option of voluntarily subscribing to join the community (e.g. enter the user's mobile device into the community database) by providing a subscription request on the mobile device. In this way, interested users (e.g. building tenants who are away at work, persons working at different job sites, and the like) can be kept informed of developments and alerts with regard to a particular property community even when they are physically away from that property. If the mobile device does not subscribe to the community, the process can end atstep 324. - At
step 316, the alert state of each of the subscribed user's mobile devices can be determined. This can be accomplished by sending a signal to the mobile device to determine if the mobile device's “silent” or “do not disturb” setting is on. If the mobile device setting is alert-enabled (e.g. the “do not disturb” or “silent” function is not turned on), then the mobile device is ready to receive alert messages. However, in those cases where the mobile device is not alert-enabled (e.g. the “do not disturb” or “silent” function is turned on), then one of two options is possible. First, atstep 320, a message can be sent to the user asking if the alert setting can be switched to alert-enabled. Should the user agree and grant permission, then the alert enabled setting is enabled (e.g. the “do not disturb” or “silent” function is overridden). If the user does not agree to set the mobile device to an alert-enabled state, the process can end atstep 324. Second, atstep 322, the system may instead proceed directly to automatically override the “do not disturb” or “silent” function, thereby enabling the mobile device to receive alerts and communications from system. - At
step 318, a variety of messages can be sent using the emergency alert server system. In addition to sending safety alerts through the safety alert module, the emergency alert server system also can send property-specific (or interest group-specific) messages using the property specific module and non-property-specific messages (e.g. Messages appealing to more than one property or interest group-specific group) using the non-property communication module. In different optional embodiments of the system, the property-specific messages sent by the property specific module and the non-property-specific messages sent by the non-property communication module may be sent with the “do not disturb” or “silent” function of the mobile device overridden and turned off. However, the more likely desired setting may be to have the property-specific messages sent by the property specific module and non-property-specific messages sent by the non-property communication module are subject to the “do not disturb” or “silent” settings of the mobile device. In such a case, the emergency alert system can be configured such that only safety alert messages will override the “do not disturb” or “silent” settings of the mobile device, while other messages (e.g. Building advertisements and/or messages) will not override the “do not disturb” or “silent” settings. The settings used can optionally be set by members of the community themselves, by the manager or administrator of the community, or both. This is desirable such that users/community members receive safety alerts such as “fire” or “active shooter in the building” without such messages being silenced, but can block, silence, or turn off messages like “lunch specials in the building's café.” These various alerts can be provided via the mobile device instep 326. The alerts may be provided using any audible, visual, and/or haptic notifications indicated in the alert. - The emergency alert server system can obtain, depending upon the alert condition, a user response to the delivered alert. The user response can include an indication that the user viewed the alert. In many embodiments, the user having viewed the alert can be indicated by the user having interacted with their mobile device after the alert was delivered to and/or displayed by an emergency alert application executing on the mobile device, where the emergency alert application can display one or more notifications indicated in the alert by overriding any alert-inhibiting state of the mobile device as described herein. The user response can include any responses to prompts and/or questions provided in the alert, such as a request for additional information about an alert condition, the user's response to the alert condition, and the like.
-
FIG. 4 depicts a flow chart for delivering alerts according to one or more aspects of the disclosure. Some or all of the steps ofprocess 400 may be performed using any of the computing devices and/or combination thereof described herein. In a variety of embodiments, some or all of the steps described below may be combined and/or divided into sub-steps as appropriate. - At
step 410, an alerting module of an emergency alert server system can determine that a mobile device is scheduled to receive an alert but the current location of the mobile device cannot be determined. Atstep 412, the emergency alert system can determine if the mobile device is connected to an intermediate device, such as a WiFi router, cell tower, Bluetooth beacon, point of sale device, NFC card reader, and/or another computing device that may have a WiFi, Bluetooth or NFC connection with the mobile device. If the mobile device is not connected to another device, the process may provide the alert to the mobile device via a cellular communication channel instep 424. - At
step 414, if the mobile device is connected to an intermediate device, the emergency alert server system can query a known device database to determine the properties of the intermediate device, including its geolocation and the device ability to deliver the alerts to the mobile device via its own communication channel, such as Bluetooth, WiFi, etc. If the intermediate device is not in the known device database, the emergency alert server system may provide the alert via cellular signal by an appropriate delivery module, such as a safety module, the property specific module, and a non-property communication module as described herein atstep 424. - At
step 416, if the connected device is in the known device database, the emergency alert server system can query an alert database to determine if the geolocation of the connected device is consistent with the alert criteria. Atstep 418, if the connected device's geolocation is associated with the alert, but not its own alert delivery method, the alert can be delivered via cellular signal by the emergency alert server system atstep 424. If the connected device does not have its own alert delivery communication path, the alert is delivered via cellular signal by the emergency alert server system atstep 424. If the connected device does have an alert delivery communication path, such as WiFi, it is delivered by that path instead of, or in addition to the cellular path, atstep 420. Regardless of alert delivery path, the alert can be transmitted by the emergency alert server system via the appropriate communication channel (e.g. via an intermediate device and/or cellular communication channel) atstep 422. - An emergency alert system may manage the directing of alerts to different subsets of the community based upon alert criteria input into the alert database by a system administrator and delivers these alerts to the appropriate mobile devices. A facility database may contain a history of devices present in the facility and/or scans by access sensors in the facility. In this way, the facility database can track each time an individual's credentials (usually in the form of an NFC card) are used at an access point, such as a door. However, it should be noted that any access sensors, such as biometrics, fingerprint, facial recognition, retinal scan, etc. can be used as appropriate. Similarly, facial recognition of security camera footage can also be used. The emergency alert server system can compare mobile devices present at the facility with the access devices (e.g. Keycards, biometrics, and the like) associated with the mobile devices. The last location an access device was scanned in the facility can be used as a proxy for mobile device location. A Routing Module of the emergency alert server system may identify the nearest (e.g. most accessible) exit to the mobile device and delivers the most efficient evacuation route from the routing database through the selected exit.
-
FIG. 5 depicts a flow chart for providing alerts according to one or more aspects of the disclosure. Some or all of the steps ofprocess 500 may be performed using any of the computing devices and/or combination thereof described herein. In a variety of embodiments, some or all of the steps described below may be combined and/or divided into sub-steps as appropriate. - At
step 510, an emergency alert server system can obtain sensor data. For example, sensor data can include a signal from a smoke detector that smoke is present in a facility. It should be noted that any signal from any device, such as a water detector, earthquake detector, and the like, can be obtained as appropriate. - At
step 512, the emergency alert server system can determine if an alert condition is present based upon the sensor data. If alarm conditions are present in the sensor data, the system moves to step 520. Atstep 514, if the sensor data does not indicate an alert condition the network of authorized mobile devices are polled for user input of an alert condition. Atstep 516, the emergency alert server system can obtain an alert notification from a mobile device. The emergency alert server system can store the user-defined alert to an alert database atstep 518. The user-defined alert can include any of a variety of data such as, but not limited to, text data, audible notifications, visual notifications, haptic notifications, and the like. - At
step 520, an evacuation alert may be generated based on the alert condition. The evacuation alert can be generated by the emergency alert server system. The evacuation alert can include any of a variety of data such as, but not limited to, text data, audible notifications, visual notifications, haptic notifications, and the like. In a variety of embodiments, the evacuation alert includes a description of the alert condition and an evacuation plan. The evacuation plan can be customized to each mobile device present in the facility. For example, the evacuation plan targeted toward a mobile device can include an evacuation route from the last known location of the mobile device to the closest exit point to the mobile device. If the alert condition does not indicate an evacuation condition, an emergency alert can be generated indicating the alert condition. For example, a chemical spill in one portion of a facility may not require the evacuation of a section portion of the facility, but users in the section portion of the facility can be advised to avoid the first portion of the facility. Atstep 522, the location of all mobile devices in the facility can be determined. If there are any mobile devices with an unknown location in the facility, a location module can be used by the emergency alert server system to identify the location of those mobile devices atstep 524. Atstep 526, the generated alerts can be provided to the mobile devices. - A routing database may store the layout of a facility, images of all exits and relevant landmarks, as well as evacuation routes from each room in the facility. A third-party server may be a plurality of servers from which historical data events involving a credential associated with the user may be found. A CC transaction database may be a proxy for a credit card provider's transaction records for which a credit card that is associated with the user would include the time and location of any point of sale devices that engaged in transactions using the credit card(s) associated with users. A keycard access database may be a proxy for a building or organization access system historical records. This database may store the time and location of each time a near field communication chip associated with a user was used to attempt access at a card reader. A biometric recognition database may be a proxy for a building or organization biometric-based identification system. This database may store the time and location of a biometric recognition event, such as a facial recognition software being run against surveillance camera footage, or a fingerprint being used at an access point. The emergency alert server system may use any of these databases to determine the location of a mobile device and/or determine an exit route for the user associated with a mobile device as described herein.
-
FIG. 6 depicts a facility database according to one or more aspects of the disclosure. Thedatabase 600 contains the history of scans by access sensors in the facility. For example, the database tracks each time an individual's credentials (such as an NFC card) are used at an access point, such as a door. The time, keycard identifier, and access point can be indicated in the alert code database. In the illustrated example, the database includes a table with a key column identifying the keycard id along with columns indicating each access point in a facility. Each row of the database indicates the most recent time at which the keycard id was present at a particular access point. As shown indatabase 600, keycard ‘12345’ was seen ataccess point 1 at 9:47 am, while keycard ‘12347’ was seen ataccess point 2 at 8:25 am andaccess point 3 at 9:26 am. An emergency alert system can use this information to determine where a mobile device is for providing alerts to the mobile device as described herein. -
FIG. 7 depicts a flow chart for generating alerts according to one or more aspects of the disclosure. Some or all of the steps ofprocess 700 may be performed using any of the computing devices and/or combination thereof described herein. In a variety of embodiments, some or all of the steps described below may be combined and/or divided into sub-steps as appropriate. - At
step 710, an emergency alert server system can obtain an indication of an evacuation alert and at least one mobile device whose location is not known. The emergency alert server system can provide targeted alerts to the mobile devices based on the specific location of the mobile device. For example, the emergency alert server system can provide different alerts to mobile devices located within different portions of a facility. The alert can indicate the alert condition, exit location information, and/or any other information as described herein. - At
step 712, the emergency alert server system can query a CC transaction database for a recent transaction by a credit card associated with the mobile device(s) whose location is not known. Atstep 714, if a recent transaction was found, such as a user in a mall using their credit card to make a purchase in a particular store, the location of the device processing the transaction involving the credit card can be used as the location of the mobile device and the process can proceed to step 724. If no recent transaction involving a credit was identified query atstep 714, the emergency alert server system can query a keycard access database for recent use of a keycard associated with the mobile device(s) whose geolocation is not known atstep 716. Atstep 718, if a recent access was performed with the keycard, such as the user utilizing their keycard to access a secure section of a facility, the location of that access point can be used as the location of the mobile device and the process can proceed to step 724. If no recent access was identified atstep 718, the emergency alert server system can query a biometric recognition database atstep 720. The emergency alert server system can query the biometric recognition database for a recent identification of biometric information, such as facial recognition, with the mobile device(s) whose geolocation is not known. Atstep 722, if the emergency alert server system obtains a recent identification of a biometric indicator, such as the user being identified by facial recognition software being run against surveillance system footage, the location of where the user was identified can be used as the location of the mobile device and the process can proceed to step 724. - At
step 724, the emergency alert server system can determine one or more exits that are proximate to the mobile device based on the proxy location identified in steps 712-722. The emergency alert server system can also generate one or more routes through the facility from the location of the mobile device to the one or more exits. The routes can include any of a variety of hallways, rooms, and/or any other building features as identified in a routing database for the facility as appropriate. Atstep 726, the emergency alert server system can obtain images of the determined exits. Atstep 728, the emergency alert server system can generate an alert indicating the exit routes and the images of the exit locations as described herein. The emergency alert server system can provide the alerts to the mobile device. Atstep 730, if no proxy location indicating the relative location of the mobile device has been found, the mobile device can be sent a generalized alert indicating the alert condition. -
FIG. 8 depicts a flow chart for routing alerts according to one or more aspects of the disclosure. Some or all of the steps ofprocess 800 may be performed using any of the computing devices and/or combination thereof described herein. In a variety of embodiments, some or all of the steps described below may be combined and/or divided into sub-steps as appropriate. - At
step 810, an emergency alert server system can use a variety of communication modules (e.g. safety alert modules, property specific modules, and/or non-property communication modules) to provide alerts to mobile devices in the community. Those modules can transmit alerts to the appropriate users' mobile device based on the location of the mobile device and/or monitor for a response to those alerts that require a response. For example, if a fire is detected by sensors in a school, one or more alert messages can be generated and provided to various communities of users in the school's community. The alert message can indicate that the user is to select an exit to which the user is going to proceed in response to the alert. Atstep 812, the emergency alert server system can obtain an indication of the exit selected by the user. Atstep 814, the emergency alert server system can query a route database for the evacuation route from the user's current location, via the user's selected exit. In many embodiments, the emergency alert server system adjusts the route to avoid any detected threats to safety such as a fire. Atstep 816, the emergency alert server system can provide the generated route to the user's mobile device so the user can safely navigate from their current location to the selected exit. - One or more aspects discussed herein may be embodied in computer-usable or readable data and/or computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices as described herein. Generally, program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device. The modules may be written in a source code programming language that is subsequently compiled for execution, or may be written in a scripting language such as (but not limited to) HTML or XML. The computer executable instructions may be stored on a computer readable medium such as a hard disk, optical disk, removable storage media, solid-state memory, RAM, and the like. As will be appreciated by one of skill in the art, the functionality of the program modules may be combined or distributed as desired in various embodiments. In addition, the functionality may be embodied, in whole or in part, in firmware or hardware equivalents such as integrated circuits, field programmable gate arrays (FPGA), and the like. Particular data structures may be used to more effectively implement one or more aspects discussed herein, and such data structures are contemplated within the scope of computer executable instructions and computer-usable data described herein. Various aspects discussed herein may be embodied as a method, a computing device, a system, and/or a computer program product.
- Although the present invention has been described in certain specific aspects, many additional modifications and variations would be apparent to those skilled in the art. In particular, any of the various processes described above may be performed in alternative sequences and/or in parallel (on different computing devices) in order to achieve similar results in a manner that is more appropriate to the requirements of a specific application. It is therefore to be understood that the present invention may be practiced otherwise than specifically described without departing from the scope and spirit of the present invention. Thus, embodiments of the present invention should be considered in all respects as illustrative and not restrictive. Accordingly, the scope of the invention should be determined not by the embodiments illustrated, but by the appended claims and their equivalents.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/023,761 US20210084445A1 (en) | 2019-09-17 | 2020-09-17 | Emergency alert systems with augmented location data |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201962901390P | 2019-09-17 | 2019-09-17 | |
US17/023,761 US20210084445A1 (en) | 2019-09-17 | 2020-09-17 | Emergency alert systems with augmented location data |
Publications (1)
Publication Number | Publication Date |
---|---|
US20210084445A1 true US20210084445A1 (en) | 2021-03-18 |
Family
ID=74868766
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/023,761 Abandoned US20210084445A1 (en) | 2019-09-17 | 2020-09-17 | Emergency alert systems with augmented location data |
US17/023,832 Active US11363409B2 (en) | 2019-09-17 | 2020-09-17 | Emergency alert systems with tracked user interactions |
US17/023,793 Active US11228861B2 (en) | 2019-09-17 | 2020-09-17 | Emergency alert systems with customized alerts |
US17/023,903 Active 2041-04-28 US11516304B2 (en) | 2019-09-17 | 2020-09-17 | Third-party integration of emergency alert systems |
US17/023,964 Active 2040-09-22 US11381931B2 (en) | 2019-09-17 | 2020-09-17 | Emergency alert systems with secondary alerts |
Family Applications After (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/023,832 Active US11363409B2 (en) | 2019-09-17 | 2020-09-17 | Emergency alert systems with tracked user interactions |
US17/023,793 Active US11228861B2 (en) | 2019-09-17 | 2020-09-17 | Emergency alert systems with customized alerts |
US17/023,903 Active 2041-04-28 US11516304B2 (en) | 2019-09-17 | 2020-09-17 | Third-party integration of emergency alert systems |
US17/023,964 Active 2040-09-22 US11381931B2 (en) | 2019-09-17 | 2020-09-17 | Emergency alert systems with secondary alerts |
Country Status (1)
Country | Link |
---|---|
US (5) | US20210084445A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11659374B1 (en) * | 2020-06-01 | 2023-05-23 | United Services Automobile Association (Usaa) | Fire warning network and emergency guidance system |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11830380B2 (en) * | 2019-01-10 | 2023-11-28 | International Business Machines Corporation | System and method for social learning utilizing user devices |
US11109187B2 (en) * | 2019-09-24 | 2021-08-31 | T-Mobile Usa, Inc. | Device to device communication and wayfinding |
US11704988B2 (en) * | 2019-11-19 | 2023-07-18 | The Catholic University Of Korea Industry—Academic Cooperation Foundation | Group leader selection method, and user safety monitoring system and method |
US11557194B2 (en) * | 2020-02-24 | 2023-01-17 | Intrado Corporation | Integrated emergency response and data network |
US11341830B2 (en) | 2020-08-06 | 2022-05-24 | Saudi Arabian Oil Company | Infrastructure construction digital integrated twin (ICDIT) |
WO2022087029A1 (en) * | 2020-10-19 | 2022-04-28 | Strongarm Technologies, Inc. | Methods and apparatus for determining and preventing risk of human injury |
US11758467B2 (en) * | 2020-10-21 | 2023-09-12 | Glolink Technologies Inc. | Mobile application for prioritized communication |
US20220417744A1 (en) * | 2021-06-23 | 2022-12-29 | Capital One Services, Llc | User authentication |
US20240031047A1 (en) * | 2022-07-25 | 2024-01-25 | Sony Group Corporation | Delivery of extended emergency notifications through sensory feedback |
Family Cites Families (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0011747D0 (en) | 2000-05-17 | 2000-07-05 | Butterworth Martyn | Improvements related to telecoms |
WO2002027522A1 (en) | 2000-09-25 | 2002-04-04 | Scott Mager | Managing building infrastructure and environment method/system |
US8738024B1 (en) | 2008-03-29 | 2014-05-27 | Nexrf, Corp. | Delivering content within a boundary with beacons |
US6842628B1 (en) | 2001-08-31 | 2005-01-11 | Palmone, Inc. | Method and system for event notification for wireless PDA devices |
US7248159B2 (en) * | 2003-03-01 | 2007-07-24 | User-Centric Ip, Lp | User-centric event reporting |
US7221928B2 (en) | 2003-10-01 | 2007-05-22 | Laird Mark D | Mobile emergency notification system |
US20050096040A1 (en) | 2003-10-31 | 2005-05-05 | Haberman William E. | Presenting broadcast received by mobile device based on proximity |
US7180415B2 (en) | 2004-04-30 | 2007-02-20 | Speed 3 Endeavors, Llc | Safety/security alert system |
US7277018B2 (en) | 2004-09-17 | 2007-10-02 | Incident Alert Systems, Llc | Computer-enabled, networked, facility emergency notification, management and alarm system |
US20060067300A1 (en) * | 2004-09-30 | 2006-03-30 | Behrouz Poustchi | System and method for bridge call appearance in distributed peer-to-peer network |
US20060121887A1 (en) | 2004-12-08 | 2006-06-08 | Chilukoor Muralidharan S | Message priority mechanism |
US8836580B2 (en) | 2005-05-09 | 2014-09-16 | Ehud Mendelson | RF proximity tags providing indoor and outdoor navigation and method of use |
CA2549223A1 (en) | 2005-06-27 | 2006-12-27 | Renaissance Learning, Inc. | Wireless classroom response system |
US20080189162A1 (en) | 2006-10-20 | 2008-08-07 | Ray Ganong | System to establish and maintain intuitive command and control of an event |
US8013734B2 (en) | 2007-05-14 | 2011-09-06 | Autocart Llc | Personal safety mobile notification system |
US8331268B2 (en) * | 2007-08-31 | 2012-12-11 | At&T Intellectual Property I, L.P. | Methods, systems, and computer-readable media for providing an event alert |
US8624727B2 (en) | 2008-01-28 | 2014-01-07 | Saigh And Son, Llc | Personal safety mobile notification system |
US8536999B2 (en) | 2008-07-16 | 2013-09-17 | Qualcomm Incorporated | Method for dynamic creation of a GeoFence in a wireless system |
US8362899B2 (en) * | 2009-03-11 | 2013-01-29 | International Business Machines Corporation | Initiating emergency communication in response to detecting bio-feedback satisfying an alert condition |
WO2011002313A1 (en) * | 2009-06-30 | 2011-01-06 | Spider Tracks Limited | Improved tracking system device and method |
US8577590B2 (en) | 2009-11-09 | 2013-11-05 | Qualcomm Incorporated | Scalable geofences |
US8531293B2 (en) | 2009-12-23 | 2013-09-10 | Lockheed Martin Corporation | Predictive geofence crossing |
US20120084372A1 (en) | 2010-10-02 | 2012-04-05 | Adam Isaac Michael Cohen | System and method for providing information in a network |
US8396485B2 (en) | 2010-11-09 | 2013-03-12 | Apple Inc. | Beacon-based geofencing |
US8857716B1 (en) * | 2011-02-21 | 2014-10-14 | Proxense, Llc | Implementation of a proximity-based system for object tracking and automatic application initialization |
IT1404531B1 (en) | 2011-02-24 | 2013-11-22 | Sisvel Technology Srl | PROCEDURE AND INDOOR LOCALIZATION SYSTEM FOR MOBILE TERMINALS IN A MOBILE MOBILE TELECOMMUNICATION NETWORK AND RELATIVE MOBILE TERMINAL. |
JP2012234934A (en) | 2011-04-28 | 2012-11-29 | Toshiba Corp | Television device and electronic apparatus |
US20120327837A1 (en) | 2011-06-24 | 2012-12-27 | Velleros, Inc. | Method, apparatus and system for providing emergency alerts to mobile devices |
US8941489B2 (en) | 2011-10-20 | 2015-01-27 | Qualcomm Incorporated | Method and/or apparatus for geofence management |
US8863172B2 (en) | 2012-03-17 | 2014-10-14 | Time Warner Cable Enterprises Llc | Emergency alert system methods and apparatus |
CA3107007A1 (en) * | 2012-03-23 | 2013-09-26 | Digital Retail Apps., Inc. | System and method for facilitating secure self payment transactions of retail goods |
US8792906B2 (en) | 2012-04-24 | 2014-07-29 | Cellco Partnership | Providing derived location information for customer relationship in response to receipt of short range wireless beacon |
US9113298B2 (en) | 2012-06-12 | 2015-08-18 | Telecommunication Systems, Inc. | Geofence with kalman filter |
US9769604B2 (en) | 2012-08-22 | 2017-09-19 | Ebay Inc. | Passive dynamic geofencing for mobile devices |
US8965406B2 (en) | 2012-09-06 | 2015-02-24 | Square, Inc. | Generating geofences |
US11210648B2 (en) * | 2012-10-17 | 2021-12-28 | Royal Bank Of Canada | Systems, methods, and devices for secure generation and processing of data sets representing pre-funded payments |
US20140129457A1 (en) * | 2012-11-02 | 2014-05-08 | Stroz Friedberg, LLC | An interactive organizational decision-making and compliance facilitation portal |
WO2014072510A2 (en) | 2012-11-09 | 2014-05-15 | Doro AB | Improved geofencing |
US10380636B2 (en) | 2012-12-06 | 2019-08-13 | Ebay Inc. | Systems and methods for statistical dynamic geofencing |
US8971930B2 (en) | 2012-12-11 | 2015-03-03 | Blackberry Limited | Geofencing system and method |
US9589435B2 (en) | 2012-12-14 | 2017-03-07 | Qualcomm Incorporated | Providing alerts, vouchers, or coupons once a plurality of geo-fences have been breached a number of times |
US10080136B2 (en) * | 2012-12-25 | 2018-09-18 | At&T Mobility Ip, Llc | Credibility token system for over the air multi-programming of a wireless device and method of operation |
KR20150098635A (en) | 2013-02-04 | 2015-08-28 | 샵킥, 인크. | Presence detection using bluetooth and hybrid-mode transmitters |
US20140280526A1 (en) | 2013-03-12 | 2014-09-18 | Sergio Filho | Method of Social Networking Using a Defined Geo-Fence and Check-In Feature |
US9680948B2 (en) * | 2013-03-14 | 2017-06-13 | Arista Networks, Inc. | System and method for device failure notification |
US20140279421A1 (en) * | 2013-03-15 | 2014-09-18 | Elwha Llc | Methods and systems for agnostic payment systems |
US20160379183A1 (en) * | 2013-03-15 | 2016-12-29 | Elwha Llc | Methods and systems for agnostic payment systems |
US10318993B2 (en) | 2013-05-31 | 2019-06-11 | Accenture Global Services Limited | Cross-channel personalized promotion platform |
GB2515522A (en) | 2013-06-26 | 2014-12-31 | Ibm | Mobile network based geofencing |
US8755824B1 (en) | 2013-06-28 | 2014-06-17 | Google Inc. | Clustering geofence-based alerts for mobile devices |
WO2014209374A1 (en) | 2013-06-28 | 2014-12-31 | Intel Corporation | Geofencing |
US9351114B2 (en) | 2013-07-25 | 2016-05-24 | Square, Inc. | Generating geofences |
US20150065081A1 (en) | 2013-09-03 | 2015-03-05 | Guard911 LLC | Systems and Methods for Notifying Law Enforcement Officers of Armed Intruder Situations |
US9363638B1 (en) | 2015-06-02 | 2016-06-07 | GeoFrenzy, Inc. | Registrar mapping toolkit for geofences |
US9906902B2 (en) | 2015-06-02 | 2018-02-27 | GeoFrenzy, Inc. | Geofence information delivery systems and methods |
US9572002B2 (en) | 2013-10-22 | 2017-02-14 | Patrocinium Systems LLC | Interactive emergency information and identification systems and methods |
US9419733B2 (en) * | 2013-11-21 | 2016-08-16 | At&T Intellectual Property I, L.P. | Effective broadcasting of emergency messages |
US9936346B2 (en) | 2013-11-28 | 2018-04-03 | Microsoft Technology Licensing, Llc | Geofences from context and crowd-sourcing |
US20150237470A1 (en) | 2014-02-14 | 2015-08-20 | Apple Inc. | Personal Geofence |
US9369840B2 (en) | 2014-02-20 | 2016-06-14 | Apple Inc. | Content geofencing |
US9788153B1 (en) | 2014-03-28 | 2017-10-10 | Symantec Corporation | Techniques for mobile geofencing |
US9288620B2 (en) | 2014-04-01 | 2016-03-15 | Qualcomm Incorporated | Reducing overlapping geofences |
US9521519B2 (en) | 2014-07-02 | 2016-12-13 | Mediatek Inc. | Mobile communication devices and context-based geofence control methods thereof |
US9875251B2 (en) | 2015-06-02 | 2018-01-23 | GeoFrenzy, Inc. | Geofence information delivery systems and methods |
US9683856B2 (en) * | 2014-08-18 | 2017-06-20 | Trimble Inc. | Evacuation navigation device |
US9466199B2 (en) | 2014-08-18 | 2016-10-11 | Trimble Navigation Limited | Responder-ready reporting network |
US9900174B2 (en) | 2015-03-06 | 2018-02-20 | Honeywell International Inc. | Multi-user geofencing for building automation |
US10720001B1 (en) * | 2015-04-02 | 2020-07-21 | Mark Y. Grosberg | System and method for verified admission through access controlled locations |
US10360363B1 (en) * | 2015-04-02 | 2019-07-23 | Mark Y. Grosberg | System and method for verified admission through access controlled locations using a mobile device |
US9640002B1 (en) * | 2015-04-02 | 2017-05-02 | Mark Y. Grosberg | System and method for verified admission through access controlled locations using a mobile device |
US9549287B2 (en) | 2015-04-22 | 2017-01-17 | At&T Mobility Ii Llc | Geofence profile management |
US9826358B2 (en) | 2015-07-09 | 2017-11-21 | GeoVisible, Inc. | Method and system for geolocation and coordinated communication with emergency responders |
US11500058B2 (en) | 2015-07-17 | 2022-11-15 | Origin Wireless, Inc. | Method, apparatus, and system for wireless proximity sensing |
US10120948B2 (en) | 2015-10-13 | 2018-11-06 | Google Llc | Providing notifications based on geofencing search results |
US20170111247A1 (en) * | 2015-10-14 | 2017-04-20 | Ricoh Company, Ltd. | Device management apparatus, device management system, device management method, and computer-readable recording medium |
US9888371B1 (en) | 2015-11-13 | 2018-02-06 | State Farm Mutual Automobile Insurance Company | Portable home and hotel security system |
US10089855B2 (en) | 2015-11-23 | 2018-10-02 | Warnable, LLC | System and method for processing emergency alerts and responses |
US10454876B2 (en) * | 2016-03-25 | 2019-10-22 | American Express Travel Related Services Company, Inc. | Systems and methods for asynchronous communication |
US9788156B1 (en) | 2016-03-30 | 2017-10-10 | International Business Machines Corporation | Geofence determination |
US20170295159A1 (en) * | 2016-04-06 | 2017-10-12 | Bank Of America Corporation | Authenticating Clients Using Tokens |
US9794755B1 (en) | 2016-04-25 | 2017-10-17 | Patrocinium Systems LLC | Interactive emergency visualization methods |
US10251023B2 (en) | 2016-04-29 | 2019-04-02 | In-Telligent Properties Inc. | Notification and communication system using geofencing to identify members of a community |
US10901373B2 (en) | 2017-06-15 | 2021-01-26 | Johnson Controls Technology Company | Building management system with artificial intelligence for unified agent based control of building subsystems |
US10192427B2 (en) | 2016-05-27 | 2019-01-29 | Titan Health & Security Technologies, Inc. | Community emergency notification system with inter-organizational compatibility |
US20180107795A1 (en) * | 2016-10-13 | 2018-04-19 | Liquid Payments, Inc. | Tracking and Controlling Inter-System Processing Events Using Event Tokens |
US20180357689A1 (en) * | 2017-06-13 | 2018-12-13 | Zeroplus Technology Co., Ltd. | System to provide requirements within a region and a method thereof |
US10445997B2 (en) * | 2017-06-20 | 2019-10-15 | International Business Machines Corporation | Facilitating a search of individuals in a building during an emergency event |
US20190007548A1 (en) * | 2017-06-28 | 2019-01-03 | The Travelers Indemnity Company | Systems and methods for discrete location-based functionality |
SG11202001067WA (en) * | 2017-08-11 | 2020-03-30 | Tellus Title Company | Distributed ledger based system and method for the settlement and transfer of title to real estate |
CA3025386A1 (en) | 2017-11-27 | 2019-05-27 | Pelmorex Corp. | Systems and methods for location-based alert generation |
US10990976B1 (en) * | 2017-12-20 | 2021-04-27 | United Services Automobile Association (Usaa) | Systems and methods for account ownership verification |
WO2019161230A1 (en) * | 2018-02-15 | 2019-08-22 | Federal Signal Corporation | Localized distribution of emergency mass notification alerts |
US10599713B2 (en) * | 2018-03-07 | 2020-03-24 | Rovi Guides, Inc. | Systems and methods for determining whether to output a reply to a message relating to a previous conversation when a device is on a do-not-disturb mode |
KR102612508B1 (en) | 2018-09-12 | 2023-12-12 | 삼성전자주식회사 | Server, user terminal apparatus, erectronic apparatus, and contrl method thereof |
US10820029B2 (en) | 2018-10-24 | 2020-10-27 | Motorola Solutions, Inc. | Alerting groups of user devices to similar video content of interest based on role |
US11605274B2 (en) * | 2018-11-01 | 2023-03-14 | Apple Inc. | Fall detection—audio looping |
US10553085B1 (en) | 2019-01-25 | 2020-02-04 | Lghorizon, Llc | Home emergency guidance and advisement system |
US11146680B2 (en) | 2019-03-29 | 2021-10-12 | Rapidsos, Inc. | Systems and methods for emergency data integration |
US11388775B2 (en) | 2019-09-11 | 2022-07-12 | Honeywell International Inc. | Systems and methods for identifying blockages of emergency exists in a building |
-
2020
- 2020-09-17 US US17/023,761 patent/US20210084445A1/en not_active Abandoned
- 2020-09-17 US US17/023,832 patent/US11363409B2/en active Active
- 2020-09-17 US US17/023,793 patent/US11228861B2/en active Active
- 2020-09-17 US US17/023,903 patent/US11516304B2/en active Active
- 2020-09-17 US US17/023,964 patent/US11381931B2/en active Active
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11659374B1 (en) * | 2020-06-01 | 2023-05-23 | United Services Automobile Association (Usaa) | Fire warning network and emergency guidance system |
Also Published As
Publication number | Publication date |
---|---|
US11363409B2 (en) | 2022-06-14 |
US11381931B2 (en) | 2022-07-05 |
US20210084436A1 (en) | 2021-03-18 |
US20210084710A1 (en) | 2021-03-18 |
US11228861B2 (en) | 2022-01-18 |
US20210084476A1 (en) | 2021-03-18 |
US20220007164A1 (en) | 2022-01-06 |
US11516304B2 (en) | 2022-11-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210084445A1 (en) | Emergency alert systems with augmented location data | |
US20230161908A1 (en) | Systems and Methods for Context-Based Permissioning of Personally Identifiable Information | |
US10783275B1 (en) | Electronic alerts for confidential content disclosures | |
US9977911B2 (en) | Methods and systems for managing permissions to access mobile device resources | |
US8898288B2 (en) | Status update propagation based on crowd or POI similarity | |
US8560608B2 (en) | Crowd formation based on physical boundaries and other rules | |
US9594775B2 (en) | Retrieving images | |
US20080182586A1 (en) | Methods and devices for attracting groups based upon mobile communications device location | |
EP3164793B1 (en) | Dual channel identity authentication | |
US20080291022A1 (en) | Automatic locating system | |
US20150358822A1 (en) | Utilizations and Applications of Near Field Communications in Mobile Device Management and Security | |
US10251023B2 (en) | Notification and communication system using geofencing to identify members of a community | |
CA3043598A1 (en) | Content access control in social network | |
US20150289093A1 (en) | Social Network For Users Sharing Geolocation-Based Information | |
US20140280532A1 (en) | Systems and methods for digitally augmented networking | |
US20210127226A1 (en) | Emergency alert systems with perimeter monitoring | |
US20200042742A1 (en) | Specific methods that improve the functionality of a personal data sharing service system by protecting user privacy | |
US20090313325A1 (en) | Distributed Technique for Cascaded Data Aggregation in Parallel Fashion | |
EP3040899B1 (en) | Methods and systems for managing permissions to access mobile device resources | |
US11748715B1 (en) | Location-based note generation using wireless devices | |
WO2019099254A1 (en) | Systems and methods for virtual line services | |
AU2019201376A1 (en) | Incident monitoring method and system | |
US20190109946A1 (en) | System, method and computer program product for reducing unnecessary 911 emergency call center volume |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: IN-TELLIGENT PROPERTIES LLC, ILLINOIS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SUTHERLAND, ALLAN C.;REEL/FRAME:053806/0214 Effective date: 20200916 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION COUNTED, NOT YET MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |