WO2021210012A1 - System and method for initiation of distress actions - Google Patents

System and method for initiation of distress actions Download PDF

Info

Publication number
WO2021210012A1
WO2021210012A1 PCT/IN2021/050357 IN2021050357W WO2021210012A1 WO 2021210012 A1 WO2021210012 A1 WO 2021210012A1 IN 2021050357 W IN2021050357 W IN 2021050357W WO 2021210012 A1 WO2021210012 A1 WO 2021210012A1
Authority
WO
WIPO (PCT)
Prior art keywords
external trigger
distress
initiating
security system
external
Prior art date
Application number
PCT/IN2021/050357
Other languages
French (fr)
Inventor
Sanjiv BHAKAT
Silvio ABRAMOVICI
Original Assignee
Bhakat Sanjiv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bhakat Sanjiv filed Critical Bhakat Sanjiv
Publication of WO2021210012A1 publication Critical patent/WO2021210012A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/185Signal analysis techniques for reducing or preventing false alarms or for enhancing the reliability of the system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/16Security signalling or alarm systems, e.g. redundant systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/183Single detectors using dual technologies

Definitions

  • the present invention relates to a system and method for initiation of distress actions. More specifically, the present invention relates to a system and method of initiating distress actions in response to verification of multiple external triggers as per a predefined sequence.
  • the present invention provides a system and method for initiation of distress actions.
  • the system is configured to provide automated initiation of a 'distress action' based upon successful validation of at least two of a first distress trigger and second distress trigger optionally, a third external trigger, wherein the said triggers could be a unique data string which could be any / all audio / visual / biometric data or information.
  • the system includes an application server that includes a security system, a device A, and at least one device B, any of which exchange data through the network.
  • the present invention provides a process ('method') of initiating a distress action vis a security system.
  • the process comprises of receiving a first external trigger via a device A, wherein the first external trigger includes one of an audio signal or a biometric input; validating , by a processor, the first external trigger with a threshold value pre-stored in a security system; activating, by the processor, an application installed on the device A on successful validation of the first external trigger with the pre-stored threshold value; receiving a second external trigger via the device A, wherein the second external trigger includes at least one word; validating, by the security system, characteristics of the second external trigger with pre-defined values; and initiating a distress action to one or more devices B in proximity to the device A upon successful validation.
  • the above system functions in two stages i.e. an activation stage and a transmission stage.
  • Such a system and associated dual staged process ensures authentic initiation of one or more distress actions.
  • the system of the present invention provides a very high rate of identification of actual threatening situations and reduces the rate of false alarms.
  • FIG. 1 illustrates a network of connected devices in accordance with an embodiment of the present invention.
  • FIG. la illustrates an alternate network of connected devices in accordance with an embodiment of the present invention.
  • FIG. 2 depicts the modules possessed by the security system 50 in accordance with an embodiment of the present invention.
  • FIG. 3 illustrates a flowchart for initiation of one or more distress actions based upon successful validation of the first and the second external triggers in accordance with an embodiment of the present invention.
  • FIG. 3a illustrates alternate flowchart for initiation of one or more distress actions based upon successful validation of at least two of the first, the second and/or the third external triggers in accordance with an embodiment of the present invention.
  • FIG. 3b defines an alternate embodiment for initiation of one or more distress actions based upon successful validation of at least two of the first, the second and/or the third external triggers in accordance with an embodiment of the present invention.
  • each block/module of the block diagrams and/or data flow illustrations, respectively, may be implemented in part by computer program instructions, e.g., as logical steps or operations executing on a processor in a computing system or any computing device, such as but not limited to smart phones, hand held computing devices; portable computing devices etc.
  • These computer program instructions may be loaded onto a computer, such as a special purpose computer or other programmable data processing apparatus to produce a specifically-configured machine, such that the instructions which execute on the computer or other programmable data processing apparatus implement the functions specified in the data flow illustrations or blocks/modules.
  • These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including computer-readable instructions for implementing the functionality specified in the flowchart block or blocks.
  • the computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions that execute on the computer or other programmable apparatus provide operations for implementing the functions specified in the data flow illustrations or blocks.
  • modules of the block diagrams and data flow illustrations support various combinations for performing the specified functions, combinations of operations for performing the specified functions and program instructions for performing the specified functions. It should also be understood that each module of the block diagrams and flowchart illustrations, and combinations of modules in the block diagrams and flowchart illustrations, can be implemented by special purpose hardware-based computer systems that perform the specified functions or operations, or combinations of special purpose hardware and computer instructions or standard off the shelf products with on board processing / computing capability that may meet requirements. [0023] Further, applications, software programs or computer readable instructions may be referred to as components or modules.
  • Applications may be hardwired or hardcoded in hardware or take the form of software executing on a general purpose computer such that when the software is loaded into and/or executed by the computer or a computing device such as smart phone etc., the computer becomes an apparatus for practicing the invention, or they are available via a web service.
  • the computer may be capable of being uploaded with new programs / updated / amended programs from remote at will through a command system.
  • the present invention relates to a system and a method for automated initiation of a 'distress action' based upon successful validation of at least two of a first distress trigger, a second distress trigger and optionally, a third external trigger, wherein the said triggers could be a unique data string which could be any / all audio / visual / biometric data or information.
  • the term 'imperilled individual' in the following present invention corresponds to an individual who is in danger or foresees immediate danger.
  • an 'imperilled individual' relates to individuals / persons who feel threatened / oppressed due to threats and/or crime varying from minor wrongdoing, such as stalking, verbal assault, threatening behaviour, to locational situation such as disturbances, accident, fire, health crisis, etc., or violent assault such as rape or murder.
  • the term 'helper' corresponds to one or more of acquaintances such as family, friends, relatives, etc. of the imperilled individual as well as individuals other than the acquaintances such as police, hospital, security, etc.
  • the word 'distress' has been used to signify a conduct or situation under which an imperilled individual seeks assistance and would / could include call for assistance for safety; health; forecasted safety hazard; forecasted health hazard etc.
  • the 'first distress trigger' corresponds to one of a sound with or without word having a sound pressure and/or an input received from one or more biometric sensors (such as blood pressure sensor, heart rate sensor, sweat level sensor, body temperature sensor, etc.).
  • a word is textual data corresponding to a sound input.
  • the textual data of the sound input is defined as a combination of one or more alphanumeric characters or special characters say, HELP, RED and @#Tag etc.
  • Each of the 'second distress trigger' and the 'third external trigger' relate to a word(s) being prompted by the imperiled individual.
  • the second and the third external trigger are prompted sequentially.
  • 'Validation' in the following description pertains to determining whether an audio input or a biometric input associated with the first distress trigger is above a threshold value and/or whether an audio input associated with the second distress trigger and optionally, the third distress trigger overlaps with respective pre-defined sequence of words and pre-defined waveform.
  • FIG. 1 is a distress action trigger system 100 (or system 100) configured as a client/server architecture used in an embodiment of the present invention.
  • a client is a process (i.e. roughly a program or task) that requests a service which is provided by another process, known as a server program.
  • the client process uses the requested service without having to know any working details about the server program or the server itself.
  • a client process usually runs on a computer that accesses shared network resources provided by another computer running a corresponding server process.
  • a "server” is a computer program, or a device, that provides functionality for other computer programs or devices ("clients"), usually accessible over a communication medium such as the Internet.
  • the "client” process may be active on a second computer system, and communicate with the server process over a communication medium that allows multiple clients to take advantage of the information-gathering capabilities of the server.
  • the server essentially acts as an information provider for a computer network.
  • the system 100 for practicing the teachings of the present disclosure includes an application server 10 equipped with a security system 50, a device A 20, and at least one device B 30, any of which exchange data through the network 40.
  • the above system 100 functions in a synchronized manner for initiating one or more distress actions in response to successful validation of at least two external triggers i.e. a first external trigger and a second external trigger.
  • the successful validation of three sequential external triggers i.e. the first external trigger, the second external trigger and third external trigger leads to initiation of one or more external triggers.
  • a software application installed on the device A 20 corresponding to the security system 50 is activated.
  • the successful validation of the second external trigger and/or the third external trigger initiates transmission of one or more distress actions to device B 30.
  • the above system 100 functions in two stages i.e. an activation stage and a transmission stage.
  • Such a system 100 and associated dual staged process ensures authentic initiation of one or more distress actions.
  • the system 100 of the present invention provides a very high rate of identification of actual threatening situations and reduces the rate of false alarms.
  • the 'activation stage' corresponds to the stage in which a first external trigger is received by the device A 20 and if found to be above a threshold value, the processor is configured to activate the software application of the device A 20.
  • the threshold value(s) may be stored locally or at the application server 10.
  • the threshold value(s) may also be referred as pre-stored threshold value (s).
  • the 'transmission stage' relates to the stage wherein the second external trigger and/or the third external trigger are validated by the security system 50 and if found to include a pre defined word and a pre-defined waveform, transmission of one or more distress actions to the device B 30 is initiated.
  • a waveform is a spectral analysis of the imperilled individual's input ('one or more words') and without limitation, key values, markers, special factors thereof .
  • the pre defined word and/or the pre-defined waveform corresponding to the second and the third external triggers may be stored locally or at the application server 10.
  • the pre -defined word and/or the pre-defined waveform may also be referred as pre-defined values.
  • the first external trigger may include a sound input having a sound pressure (audio signals).
  • the first external trigger may be a biometric signal (above a threshold value) recorded by a biometric sensor associated with the imperilled individual.
  • the biometric sensor includes a heart rate sensor, a blood pressure monitor, a sweat level sensor, etc.
  • each of the second external trigger and the third external trigger include a word uttered by the imperilled individual having a pre-defined waveform.
  • the imperilled individual may utter a sequence of words, say, a first word followed by a second word at one go or may utter a second word after passage of a pre-defined time from the first word.
  • the pre-defined time may include a time interval sufficient for the security system 50 to differentiate two words, say 2 ms.
  • the device A 20 of the present invention corresponds to a wearable device of the imperilled individual.
  • the device A 20 may be in physical proximity or in contact with the imperilled individual.
  • the electronic device may be any conventionally known device such as, without limitation, a wearable device like a smart watch, a NFC device, a piece of jewellery with signal interception capability, etc.
  • the device A 20 may include location detection capability for example, a GPS receiver, assisted GPS, Wi-Fi networks, etc.
  • the device A 20 may be equipped to receive the first, the second and the third external triggers.
  • the device A 20 may include a means say, a transducer for converting sound into an electrical signal.
  • the transducer is in the form of a microphone which receives the first external trigger, the second external trigger and the third external trigger.
  • the device A 20 may include a biometric sensor for recording a biometric signal corresponding to the first external trigger.
  • the biometric sensor may include any sensor including, without limitation, a blood pressure sensor, a heart rate sensor, a sweat level sensor, a body temperature sensor, etc.
  • the device A 20 may also include a sound pressure level meter for acoustic measurements of the first, the second and the third external triggers.
  • the sound pressure level meter is configured to detect the pressures of the first, the second and the third external triggers.
  • the device A 20 may include a processor configured to compare the first external trigger the second external trigger and/or the third external trigger with the threshold values and/or the pre-defined word and pre-defined waveform respectively. For instance, the processor is capable of locally ascertaining whether the sound pressure of the first external trigger is above a threshold sound pressure. Additionally and optionally, the processor may compare the biometric signal received from the biometric sensor with the respective threshold value.
  • the threshold sound pressure or other values may be stored in the device A 20 either by the imperilled individual beforehand or provided by the application server 10.
  • the pre defined sequence of words and pre-defined waveform may be stored in the device A 20 either by the imperilled individual beforehand or provided by the application server 10.
  • the processor is configured to convert the voice of imperilled individual in the second external trigger and/or the third external trigger into a waveform.
  • the device A 20 is also capable of transmitting the said waveform associated with the second external trigger and/or the third external trigger to the application server 10.
  • the device A 20 may transmit such details via the network 40 or combination of networks 40 such as cellular network or other packet switched network such as Wi-Fi, Internet, Bluetooth etc. to the application server 10.
  • networks 40 such as cellular network or other packet switched network such as Wi-Fi, Internet, Bluetooth etc.
  • the application corresponding to the security system 50 may be installed on the device A 20.
  • the application may be downloaded from the Internet, Android marketplace, hard wired systems, Bluetooth, Wi-Fi, IR, laser etc.
  • the application may be accessed through a user interface provided with the device(s) A 20.
  • the application may include various functions which when executed by the processor of device A 20 are capable of making requisite decisions and transmit the required information to the application server 10.
  • the application processes the first external trigger to determine whether the input (sound or biometric) exceeds the threshold value.
  • the application processes the second external trigger and/or the third external trigger to determine whether the input (voice and speech) matches the pre defined waveform and sequence of words.
  • the one or more device(s) B 30 corresponds to one or more electronic devices of the one or more helpers of the present invention.
  • the electronic devices may be any conventional known devices such as without limitation, a laptop, a handheld device as a smartphone, a personal digital assistant (PDA), a tablet, etc., or a wearable device like a smart watch, a NFC device, etc.
  • the device(s) B 30 may include location detection capability for example, a GPS receiver, assisted GPS, Wi-Fi networks, etc.
  • the device(s) B 30 may communicate with the application server 10 via network 40 bi-directionally.
  • the application server 10 may host a security system 50 which may obtain inputs from one or more of, the device A 20, and/or the device B 30 and further process the obtained inputs.
  • the application server 10 may be a cloud based server.
  • the application server 10 may be a remote computer system having processing capability required for the security system 50.
  • the security system 50 is capable of performing and mediating all functionalities, operations and methods of the present disclosure.
  • the security system 50 includes various modules as provided in FIG. 2.
  • the said modules of the security system 50 help to validate the external triggers in order to initiate the distress actions.
  • the network 40 may include, without limitation, internet, a local area network, a wide area network and/or a wireless network.
  • the network 40 may include copper transmission cables, optical transmission fibres, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers.
  • a network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network 40 and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
  • FIG. la depicts an alternate embodiment to FIG. 1 as an exemplary depiction.
  • the system 100 includes a device C 20a in addition to other devices illustrated in FIG. 1.
  • This embodiment relates to a scenario where the device C 20a possesses more processing as well as transmission capabilities than the device A 20 of the present invention.
  • the device A may be a piece of jewellery with only sound reception and limited transmission capability.
  • the application of the security system 50 would be installed in device C 20a for further processing and action.
  • the one or more device(s) C 20a corresponds to one or more electronic devices of the imperilled individual.
  • the device C 20a may be any conventional known devices such as without limitation, a laptop, a handheld device as a smartphone, a personal digital assistant (PDA), a tablet, etc.
  • PDA personal digital assistant
  • the device(s) C 20a may include one or more processors, memories, input/output devices, and a network interface, such as a conventional modem.
  • the device(s) C 20a may include location detection capability for example, a GPS receiver, assisted GPS, Wi-Fi networks, etc.
  • the device(s) C 20a may communicate with the application server 10 via network 40 bi-directionally.
  • the device(s) C 20a may correspond with devices A 20 or device B 30 via the network elaborated above.
  • FIG.2 illustrates the plurality of modules of the security system 50.
  • the said modules of the security system 50 may include a geo-location module 210, a distance determination module 220, a notification module 230, a first trigger verification module 240, a second trigger verification module 250 and a database module 260.
  • the security system 50 may include various other modules depending upon the type of the external triggers and the functions performed by the security system 50.
  • the said geo-location module 210 may receive location co-ordinates from the device A 20, device C 20a and/or the device(s) B 30.
  • the geo-location module 210 may receive the location co-ordinates in real-time or as per configured durations, e.g. 2 minutes or at a configured instance, say, when the imperilled individual triggers the one or more distress actions.
  • the distance determination module 220 may work using location obtained via the geo location module 210 to calculate the distance between the location co-ordinates of the device A 20/device C 20a and the device(s) B 30.
  • the notification module 230 is configured to trigger one or more notifications to the device B 30.
  • the notifications may be in the form of a short messaging service (SMS), a push notification (alert or update), a phone call via server and/or other forms of electronic communications with or without a unique ringtone or alert on the device B 30.
  • SMS short messaging service
  • a push notification alert or update
  • phone call via server and/or other forms of electronic communications with or without a unique ringtone or alert on the device B 30.
  • the first and the second trigger verification modules 240, 250 may be configured to receive and compare the characteristics (like waveform, words and sequence thereof, etc.) of the second and the third external triggers.
  • the first trigger verification module 240 is a voice recognition module.
  • the voice recognition module is configured to receive the waveform associated with the second external trigger and/or the third external trigger from the device A 20/device C 20a.
  • the voice recognition module may receive the waveform in real-time when the imperilled individual prompts the second external trigger and/or the third external trigger.
  • the voice recognition module is also configured to compare the waveform of the second external trigger and/or the third external trigger with the pre-defined waveforms of the voice associated with the imperilled individual.
  • the second trigger verification module 250 may be a speech recognition module.
  • the speech recognition module is configured to receive the plurality of words uttered as the second external trigger and/or the third external trigger, transmitted via the device A 20 and/or the device C 20a.
  • the speech recognition module is also configured to compare the pre-defined sequence of words with the plurality of words as received from the device A 20/device C 20a.
  • the database module 260 is equipped to store all details of the imperilled individuals.
  • the details of the imperilled individual may include name, address, selected helpers, location, voice and permitted words (pre-defined waveforms and sequence of words), and threshold values to initiate one or more distress actions, etc.
  • the database module 260 may further store various inputs received from the device A 20 or device C 20a.
  • the database module 260 also includes one or more look up tables for the characteristics of the second external trigger and/or the third external trigger.
  • the characteristics of the second external trigger and/or the third external trigger includes the imperilled individual's pre-defined one or more words and corresponding waveforms.
  • the security system 50 may include a sound pressure module.
  • the sound pressure module is configured to receive the sound pressure associated with the first external trigger from the device A 20.
  • the sound pressure module may receive the sound pressure in real-time or as per configured durations, e.g. 2 minutes or at a configured instance, say, when the imperilled individual prompts the first, the second and the third external triggers.
  • the sound pressure module is also configured to determine whether the sound pressure level of the first external trigger is above the threshold sound pressure.
  • the security system 50 may include a biometric module for accessing the inputs of biometric sensors.
  • the security system 50 includes the aforesaid modules only in cases wherein the device A 20 is not capable of processing the sound pressure and/or biometric inputs locally.
  • FIG.3 a flowchart entailing the steps involved in initiation of the distress actions via security system 50 is disclosed. It should be noted that though the present invention may be used for various applications as provided above, the following steps disclose the use of security system 50 at the time of say, physical assault.
  • the device A 20 receives a first external trigger in the form of a loud sound.
  • the sound having a particular sound pressure is received by the device A 20 as audio signals.
  • the security system 50 receives the first external trigger as a prompt from the biometric sensor based upon a biometric input.
  • a heart rate sensor monitors the heart beats of the imperilled individual and in case, the heart is found to beat at an exaggerated rate i.e. beyond a threshold rate, the sensor registers the first external trigger as an increased heartbeat.
  • the presence of other sensors and use of the same for prompting the first external trigger is also within the scope of the present invention.
  • the device A 20 ascertains if the values associated with the first external trigger are above(or equal to) the threshold values.
  • the threshold values are digitized parameters corresponding to the first external trigger and may include sound pressure, slope of fundamental frequency, a temporal features (speech rate and pausing), maximum value of vocal energy, a mean of a bandwidth and a mean of the fundamental frequency etc.
  • the application on the device A 20 is activated at step 305.
  • the device A 20 ascertains whether the sound pressure associated with the first external trigger is above the threshold sound pressure. In case, the sound pressure of the first external trigger is found to be above the threshold sound pressure, then the application is activated at step 305. Else, the application installed on the device A 20 stays dormant.
  • the device A 20 ascertains whether the first external trigger corresponding to the biometric sensor exceeds the threshold value. In case it does, then the application is activated at step 305.
  • the security system 50 receives the second external trigger from the imperilled individual.
  • the second external trigger may be in the form of one or more words.
  • the device A 20 converts the voice associated with the second external trigger into a waveform.
  • the word and the waveform associated with the second external trigger is transmitted to the application server 10 via the application installed on the device A 20.
  • the security system 50 on the application server 10 is configured to ascertain whether the word and the waveform associated with the second external trigger corresponds with the pre-defined word and the pre-defined waveform.
  • the pre-defined word and the pre defined waveform may be stored in the database module 260.
  • the security system 50 is configured to refer to the database module 260 to retrieve the pre-defined word and the pre defined waveform corresponding to the second external trigger.
  • the security system 50 is configured to ascertain by comparing the word and its associated waveform received from the imperilled individual as second external trigger with the pre-defined word and the pre-defined waveform stored in database module 260 as a second external trigger in real time.
  • the security system 50 is operatively coupled to the voice recognition module and the speech recognition module in order to retrieve the word and its associated waveform.
  • the waveform associated with the second external trigger is first compared with the pre-defined waveform followed by comparison of the word associated with the second external trigger with the pre-defined word (speech).
  • the security system 50 identifies a match or an overlap between the second external trigger (waveform and word) received in real time and the pre-defined waveform as well as the pre-defined word then the security system 50 is configured to transmit a notification to each of the pre-selected devices B 30 via the notification module 230 at step 313.
  • the application installed on the device A 20 may locally validate the first and the second external triggers post which the device A 20 may request the security system 50 at the server to initiate distress actions.
  • FIG. 3a illustrates a flowchart entailing the steps involved in initiation of the distress actions post successful validation of at least two of the first external trigger, the second external trigger and the third external trigger.
  • steps relating to the first external trigger i.e. steps 301a-305a are same as the steps 301-305 of FIG. 3 and are not explained in detail for the sake of brevity.
  • the imperilled individual utters a sequence of two words i.e. a first word and a second word.
  • the first word corresponds to the second external trigger while the second word corresponds to the third external trigger.
  • the said second and third external triggers are received by the device A 20 as depicted at step 307a.
  • the device A 20 is configured to convert the voice associated with the second and the third external trigger into a waveform.
  • the words and the waveforms associated with the second and the third external triggers are transmitted to the application server 10 via the application installed on the device A 20.
  • the security system 50 on the application server 10 is configured to ascertain whether the words and the waveforms associated with the second and the third external trigger corresponds with the respective pre-defined words and the pre-defined waveforms.
  • the pre defined word and the pre-defined waveform associated with each of the second and the third external triggers may be stored in the database module 260.
  • the security system 50 refers the database module 260 to retrieve the pre-defined words and the pre-defined waveforms.
  • the security system 50 is configured to compare whether the waveform and the words received in real time as the second and the third external trigger overlap with the pre defined waveforms and the pre-defined words stored in database module 260.
  • the security system 50 is operatively coupled to the voice recognition module and the speech recognition module in order to retrieve the word and waveform associated with the second and the third external triggers.
  • the waveform associated with each of the second external trigger and the third external trigger is first compared with predefined waveform associated with each of the second external trigger and the third external trigger respectively followed by comparison of the word associated with each of the second external trigger and the third external trigger with predefined word associated with each of the second external trigger and the third external trigger respectively.
  • the security system 50 identifies a match or an overlap between waveform and word associated with each of the second and the third external triggers received in real time and the respective pre-defined waveforms as well as the pre-defined words then, the security system 50 is configured to transmit a notification to each of the pre-selected devices B 30 via the notification module 230 at step 313a.
  • the application installed on the device A 20 may locally ascertains validate the first, the second and the third external triggers.
  • FIG. 3b illustrates a process wherein the first external is received and validated using the above method (steps 301b-305b same as the steps 301-305 of FIG. 3) however, the second and third external triggers are received in a different way.
  • the imperiled individual may first utter one word corresponding to the second external trigger.
  • the second external trigger may then be validated using the above elaborated steps (steps 305b- 311b similar to steps 305-311). Subsequently, after a pre-defined time, say, 30 seconds, the imperiled individual may utter a second word which corresponds to the third external trigger.
  • the third external trigger may be validated (steps 313b-317b similar to steps 305b-311b)and post validation of at least two of the first, the second and the third external triggers, one or more distress actions are initiated at step 319b as shown in FIG. 3b.
  • a communication between the device A 20 and the device C 20a is established.
  • the communication may be established via a communication protocol including, but not limited to Bluetooth such as Bluetooth low energy (BLE), RFID, NFC, WiFi etc.
  • BLE Bluetooth low energy
  • RFID RFID
  • NFC NFC
  • WiFi WiFi
  • a BLE connection is established between the device A 20 and the device C 20a.
  • the device A 20 On receiving the second external trigger and/or the third external trigger, the device A 20 transmits the plurality of words and the waveform of the second external trigger to the device C 20a via the communication established earlier.
  • the device C 20a may further transmit such data to the security system 50.
  • the security system 50 may then validate the second external trigger and on successful validation may notify the devices B 30.
  • the imperilled individual may transmit via the device A 20, a message to the application server 10 confirming that the imperilled individual is out of distress.
  • the said message is only transmitted through a password or a pass key to ensure deliberate stand down after due authentication and to ensure that only the imperilled individual relays the message and not any other passer-by.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)

Abstract

A system and method for initiation of distress actions is disclosed. The process of initiating a distress action via a security system (50) comprises of receiving a first external trigger. The first external trigger includes one of an audio signal or a biometric input. The first external trigger is validated with a threshold value pre-stored in the security system (50). On successful validation, an application installed on the device A (20) is activated and a second external trigger is received via the device A (20). The second external trigger includes at least one word. The system (50) is configured to validate characteristics of the second external trigger with pre-defined values. Upon successful validation, initiating a distress action to one or more devices B (30) in proximity to the device A (20).

Description

SYSTEM AND METHOD FOR INITIATION OF DISTRESS ACTIONS
FIELD OF INVENTION
[001] The present invention relates to a system and method for initiation of distress actions. More specifically, the present invention relates to a system and method of initiating distress actions in response to verification of multiple external triggers as per a predefined sequence.
BACKGROUND
[002] With a global rise in crime over the recent years, one can never be assured of safety and security. As far as personal safety is concerned, it's better to be prepared for difficult situations than to be caught unaware.
[003] In order to address such issues, advancements in communication technologies have devised various methods for individuals to initiate help at the time of emergency situations.
[004] Most of such methods rely on accessing an external device such as a mobile phone, a smartwatch, a device that may be placed in a piece of jewellery, etc., which may be equipped with a panic button and once pressed by the individual in danger, a connection with one or more concerned authorities and/or pre-selected emergency contacts may be created.
[005] However, in circumstances where the individual is being attacked or feels the need for assistance due to any reason whatsoever (individual is in a vulnerable state), chances are unlikely that the individual will be able to access any external device say, a mobile phone, in order to reach out for help. Further, the attacker may seize such deterrents or disable such deterrents including the mobile device within pre-defined distances, thus leaving the individual without many options to reach out for assistance.
[006] Therefore, in accordance to the problems mentioned above, there is a need for a simple, inconspicuous, automated scheme and a method to seek help in the event of a threatening situation.
SUMMARY
[007] The present invention provides a system and method for initiation of distress actions. The system is configured to provide automated initiation of a 'distress action' based upon successful validation of at least two of a first distress trigger and second distress trigger optionally, a third external trigger, wherein the said triggers could be a unique data string which could be any / all audio / visual / biometric data or information. The system includes an application server that includes a security system, a device A, and at least one device B, any of which exchange data through the network.
[008] The present invention provides a process ('method') of initiating a distress action vis a security system. The process comprises of receiving a first external trigger via a device A, wherein the first external trigger includes one of an audio signal or a biometric input; validating , by a processor, the first external trigger with a threshold value pre-stored in a security system; activating, by the processor, an application installed on the device A on successful validation of the first external trigger with the pre-stored threshold value; receiving a second external trigger via the device A, wherein the second external trigger includes at least one word; validating, by the security system, characteristics of the second external trigger with pre-defined values; and initiating a distress action to one or more devices B in proximity to the device A upon successful validation. Hence, the above system functions in two stages i.e. an activation stage and a transmission stage. Such a system and associated dual staged process ensures authentic initiation of one or more distress actions. The system of the present invention provides a very high rate of identification of actual threatening situations and reduces the rate of false alarms.
BRIEF DESCRIPTION OF DRAWINGS
[009] The summary above, as well as the following detailed description of illustrative embodiments, is better understood when read in conjunction with the appended drawings. For the purpose of illustrating the present disclosure, exemplary constructions of the disclosure are shown in the drawings. However, the disclosure is not limited to specific methods and instrumentalities disclosed herein. Moreover, those in the art will understand that the drawings are not to scale.
[0010] FIG. 1 illustrates a network of connected devices in accordance with an embodiment of the present invention.
[0011] FIG. la illustrates an alternate network of connected devices in accordance with an embodiment of the present invention.
[0012] FIG. 2 depicts the modules possessed by the security system 50 in accordance with an embodiment of the present invention.
[0013] FIG. 3 illustrates a flowchart for initiation of one or more distress actions based upon successful validation of the first and the second external triggers in accordance with an embodiment of the present invention. [0014] FIG. 3a illustrates alternate flowchart for initiation of one or more distress actions based upon successful validation of at least two of the first, the second and/or the third external triggers in accordance with an embodiment of the present invention.
[0015] FIG. 3b defines an alternate embodiment for initiation of one or more distress actions based upon successful validation of at least two of the first, the second and/or the third external triggers in accordance with an embodiment of the present invention.
DETAILED DESCRIPTION OF DRAWINGS
[0016] Prior to describing the invention in detail, definitions of certain words or phrases used throughout this patent document will be defined: the terms "include" and "comprise", as well as derivatives, mean inclusion without limitation; the term "or" is inclusive, meaning and/or; Definitions of certain words and phrases are provided throughout this patent document, and those of ordinary skill in the art will understand that such definitions apply in many, if not most, instances to prior as well as future uses of such defined words and phrases.
[0017] Wherever possible, same reference numbers will be used throughout the drawings to refer to same or like parts. Moreover, references to various elements described herein are made collectively or individually when there may be more than one element of the same type. However, such references are merely exemplary in nature. It may be noted that any reference to elements in the singular may also be construed to relate to the plural and vice-versa without limiting the scope of the disclosure to the exact number or type of such elements unless set forth explicitly in the appended claims.
[0018] The following description is presented to enable any person skilled in the art to make and use the invention. For purpose of explanation, specific nomenclature is set forth to provide a thorough understanding of the present invention. Descriptions of specific applications are provided only as examples. Various modifications to the preferred embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
[0019] Particular embodiments of the present disclosure are described herein below with reference to the accompanying drawings, however, it is to be understood that the disclosed embodiments are merely examples of the disclosure, which may be embodied in various forms. Well-known functions or constructions are not described in detail to avoid obscuring the present disclosure in unnecessary detail. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present disclosure in virtually any appropriately detailed structure.
[0020] The embodiments are described below with reference to block diagrams and/or data flow illustrations of methods, apparatus, systems, and computer program products. It should be understood that each block/module of the block diagrams and/or data flow illustrations, respectively, may be implemented in part by computer program instructions, e.g., as logical steps or operations executing on a processor in a computing system or any computing device, such as but not limited to smart phones, hand held computing devices; portable computing devices etc. These computer program instructions may be loaded onto a computer, such as a special purpose computer or other programmable data processing apparatus to produce a specifically-configured machine, such that the instructions which execute on the computer or other programmable data processing apparatus implement the functions specified in the data flow illustrations or blocks/modules.
[0021] These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including computer-readable instructions for implementing the functionality specified in the flowchart block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions that execute on the computer or other programmable apparatus provide operations for implementing the functions specified in the data flow illustrations or blocks.
[0022] Accordingly, modules of the block diagrams and data flow illustrations support various combinations for performing the specified functions, combinations of operations for performing the specified functions and program instructions for performing the specified functions. It should also be understood that each module of the block diagrams and flowchart illustrations, and combinations of modules in the block diagrams and flowchart illustrations, can be implemented by special purpose hardware-based computer systems that perform the specified functions or operations, or combinations of special purpose hardware and computer instructions or standard off the shelf products with on board processing / computing capability that may meet requirements. [0023] Further, applications, software programs or computer readable instructions may be referred to as components or modules. Applications may be hardwired or hardcoded in hardware or take the form of software executing on a general purpose computer such that when the software is loaded into and/or executed by the computer or a computing device such as smart phone etc., the computer becomes an apparatus for practicing the invention, or they are available via a web service. The computer may be capable of being uploaded with new programs / updated / amended programs from remote at will through a command system.
[0024] Applications may also be downloaded in whole or in part through the use of a software development kit or a toolkit that enables the creation and implementation of the present invention. In this specification, these implementations, or any other form that the invention may take, may be referred to as techniques. In general, the order of the steps of disclosed processes may be altered within the scope of the invention.
[0025] The present invention relates to a system and a method for automated initiation of a 'distress action' based upon successful validation of at least two of a first distress trigger, a second distress trigger and optionally, a third external trigger, wherein the said triggers could be a unique data string which could be any / all audio / visual / biometric data or information.
[0026] In the context of the present invention, it should be noted that the term 'imperilled individual' in the following present invention corresponds to an individual who is in danger or foresees immediate danger. For example, an 'imperilled individual' relates to individuals / persons who feel threatened / oppressed due to threats and/or crime varying from minor wrongdoing, such as stalking, verbal assault, threatening behaviour, to locational situation such as disturbances, accident, fire, health crisis, etc., or violent assault such as rape or murder. The term 'helper' corresponds to one or more of acquaintances such as family, friends, relatives, etc. of the imperilled individual as well as individuals other than the acquaintances such as police, hospital, security, etc. who may be notified about the distress. [0027] The word 'distress' has been used to signify a conduct or situation under which an imperilled individual seeks assistance and would / could include call for assistance for safety; health; forecasted safety hazard; forecasted health hazard etc.
[0028] The 'first distress trigger' corresponds to one of a sound with or without word having a sound pressure and/or an input received from one or more biometric sensors (such as blood pressure sensor, heart rate sensor, sweat level sensor, body temperature sensor, etc.). A word is textual data corresponding to a sound input. The textual data of the sound input is defined as a combination of one or more alphanumeric characters or special characters say, HELP, RED and @#Tag etc.
[0029] Each of the 'second distress trigger' and the 'third external trigger' relate to a word(s) being prompted by the imperiled individual. The second and the third external trigger are prompted sequentially.
[0030] 'Validation' in the following description pertains to determining whether an audio input or a biometric input associated with the first distress trigger is above a threshold value and/or whether an audio input associated with the second distress trigger and optionally, the third distress trigger overlaps with respective pre-defined sequence of words and pre-defined waveform.
[0031] Referring now to the drawings, FIG. 1 is a distress action trigger system 100 (or system 100) configured as a client/server architecture used in an embodiment of the present invention. In the context of a computer network, such as the Internet, Bluetooth, Wi-Fi, a client is a process (i.e. roughly a program or task) that requests a service which is provided by another process, known as a server program. The client process uses the requested service without having to know any working details about the server program or the server itself. In networked systems, a client process usually runs on a computer that accesses shared network resources provided by another computer running a corresponding server process.
[0032] A "server" is a computer program, or a device, that provides functionality for other computer programs or devices ("clients"), usually accessible over a communication medium such as the Internet. The "client" process may be active on a second computer system, and communicate with the server process over a communication medium that allows multiple clients to take advantage of the information-gathering capabilities of the server. Thus, the server essentially acts as an information provider for a computer network. [0033] In FIG. 1, the system 100 for practicing the teachings of the present disclosure, as per an embodiment, includes an application server 10 equipped with a security system 50, a device A 20, and at least one device B 30, any of which exchange data through the network 40.
[0034] The above system 100 functions in a synchronized manner for initiating one or more distress actions in response to successful validation of at least two external triggers i.e. a first external trigger and a second external trigger. In few embodiments of the present invention, the successful validation of three sequential external triggers i.e. the first external trigger, the second external trigger and third external trigger leads to initiation of one or more external triggers.
[0035] In an exemplary embodiment of the present invention, upon successful validation of the first external trigger, a software application installed on the device A 20 corresponding to the security system 50 is activated. The successful validation of the second external trigger and/or the third external trigger initiates transmission of one or more distress actions to device B 30. Hence, the above system 100 functions in two stages i.e. an activation stage and a transmission stage. Such a system 100 and associated dual staged process ensures authentic initiation of one or more distress actions. The system 100 of the present invention provides a very high rate of identification of actual threatening situations and reduces the rate of false alarms.
[0036] It should be noted that the 'activation stage' corresponds to the stage in which a first external trigger is received by the device A 20 and if found to be above a threshold value, the processor is configured to activate the software application of the device A 20. The threshold value(s) may be stored locally or at the application server 10. The threshold value(s) may also be referred as pre-stored threshold value (s).
[0037] The 'transmission stage' relates to the stage wherein the second external trigger and/or the third external trigger are validated by the security system 50 and if found to include a pre defined word and a pre-defined waveform, transmission of one or more distress actions to the device B 30 is initiated. A waveform is a spectral analysis of the imperilled individual's input ('one or more words') and without limitation, key values, markers, special factors thereof .The pre defined word and/or the pre-defined waveform corresponding to the second and the third external triggers may be stored locally or at the application server 10. The pre -defined word and/or the pre-defined waveform may also be referred as pre-defined values.
[0038] As described above, the first external trigger may include a sound input having a sound pressure (audio signals).AIternately, the first external trigger may be a biometric signal (above a threshold value) recorded by a biometric sensor associated with the imperilled individual. The biometric sensor includes a heart rate sensor, a blood pressure monitor, a sweat level sensor, etc.
[0039] Likewise, each of the second external trigger and the third external trigger include a word uttered by the imperilled individual having a pre-defined waveform. The imperilled individual may utter a sequence of words, say, a first word followed by a second word at one go or may utter a second word after passage of a pre-defined time from the first word. The pre-defined time may include a time interval sufficient for the security system 50 to differentiate two words, say 2 ms.
[0040] In an embodiment, the device A 20 of the present invention corresponds to a wearable device of the imperilled individual. The device A 20 may be in physical proximity or in contact with the imperilled individual. The electronic device may be any conventionally known device such as, without limitation, a wearable device like a smart watch, a NFC device, a piece of jewellery with signal interception capability, etc.
[0041] The device A 20 may include location detection capability for example, a GPS receiver, assisted GPS, Wi-Fi networks, etc.
[0042] Further, the device A 20 may be equipped to receive the first, the second and the third external triggers. For example, the device A 20 may include a means say, a transducer for converting sound into an electrical signal. In an exemplary embodiment of the present invention, the transducer is in the form of a microphone which receives the first external trigger, the second external trigger and the third external trigger. Optionally and additionally, the device A 20 may include a biometric sensor for recording a biometric signal corresponding to the first external trigger. The biometric sensor may include any sensor including, without limitation, a blood pressure sensor, a heart rate sensor, a sweat level sensor, a body temperature sensor, etc.
[0043] Further, the device A 20 may also include a sound pressure level meter for acoustic measurements of the first, the second and the third external triggers. The sound pressure level meter is configured to detect the pressures of the first, the second and the third external triggers.
[0044] The device A 20 may include a processor configured to compare the first external trigger the second external trigger and/or the third external trigger with the threshold values and/or the pre-defined word and pre-defined waveform respectively. For instance, the processor is capable of locally ascertaining whether the sound pressure of the first external trigger is above a threshold sound pressure. Additionally and optionally, the processor may compare the biometric signal received from the biometric sensor with the respective threshold value.
[0045] The threshold sound pressure or other values may be stored in the device A 20 either by the imperilled individual beforehand or provided by the application server 10. Similarly, the pre defined sequence of words and pre-defined waveform may be stored in the device A 20 either by the imperilled individual beforehand or provided by the application server 10.
[0046] In an embodiment, the processor is configured to convert the voice of imperilled individual in the second external trigger and/or the third external trigger into a waveform. The device A 20 is also capable of transmitting the said waveform associated with the second external trigger and/or the third external trigger to the application server 10.
[0047] The device A 20 may transmit such details via the network 40 or combination of networks 40 such as cellular network or other packet switched network such as Wi-Fi, Internet, Bluetooth etc. to the application server 10.
[0048] The application corresponding to the security system 50 may be installed on the device A 20. The application may be downloaded from the Internet, Android marketplace, hard wired systems, Bluetooth, Wi-Fi, IR, laser etc. The application may be accessed through a user interface provided with the device(s) A 20. The application may include various functions which when executed by the processor of device A 20 are capable of making requisite decisions and transmit the required information to the application server 10. In an embodiment, the application processes the first external trigger to determine whether the input (sound or biometric) exceeds the threshold value. Similarly, the application processes the second external trigger and/or the third external trigger to determine whether the input (voice and speech) matches the pre defined waveform and sequence of words.
[0049] The one or more device(s) B 30 corresponds to one or more electronic devices of the one or more helpers of the present invention. The electronic devices may be any conventional known devices such as without limitation, a laptop, a handheld device as a smartphone, a personal digital assistant (PDA), a tablet, etc., or a wearable device like a smart watch, a NFC device, etc.
[0050] Further, the device(s) B 30 may include location detection capability for example, a GPS receiver, assisted GPS, Wi-Fi networks, etc. The device(s) B 30 may communicate with the application server 10 via network 40 bi-directionally. [0051] The application server 10 may host a security system 50 which may obtain inputs from one or more of, the device A 20, and/or the device B 30 and further process the obtained inputs. In an embodiment, the application server 10 may be a cloud based server. In another embodiment, the application server 10 may be a remote computer system having processing capability required for the security system 50.
[0052] The security system 50 is capable of performing and mediating all functionalities, operations and methods of the present disclosure. The security system 50 includes various modules as provided in FIG. 2. The said modules of the security system 50 help to validate the external triggers in order to initiate the distress actions. [0053] The network 40 may include, without limitation, internet, a local area network, a wide area network and/or a wireless network. The network 40 may include copper transmission cables, optical transmission fibres, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network 40 and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
[0054] FIG. la depicts an alternate embodiment to FIG. 1 as an exemplary depiction. The system 100 includes a device C 20a in addition to other devices illustrated in FIG. 1. This embodiment relates to a scenario where the device C 20a possesses more processing as well as transmission capabilities than the device A 20 of the present invention. For example, the device A may be a piece of jewellery with only sound reception and limited transmission capability. In such case, the application of the security system 50 would be installed in device C 20a for further processing and action.
[0055] The one or more device(s) C 20a corresponds to one or more electronic devices of the imperilled individual. The device C 20a may be any conventional known devices such as without limitation, a laptop, a handheld device as a smartphone, a personal digital assistant (PDA), a tablet, etc.
[0056] The device(s) C 20a may include one or more processors, memories, input/output devices, and a network interface, such as a conventional modem. [0057] The device(s) C 20a may include location detection capability for example, a GPS receiver, assisted GPS, Wi-Fi networks, etc. The device(s) C 20a may communicate with the application server 10 via network 40 bi-directionally.
[0058] The device(s) C 20a may correspond with devices A 20 or device B 30 via the network elaborated above.
[0059] FIG.2 illustrates the plurality of modules of the security system 50. The said modules of the security system 50 may include a geo-location module 210, a distance determination module 220, a notification module 230, a first trigger verification module 240, a second trigger verification module 250 and a database module 260. Though the description mentions the explicit presence of the aforesaid modules, it must be noted that the security system 50 may include various other modules depending upon the type of the external triggers and the functions performed by the security system 50.
[0060] The said geo-location module 210 may receive location co-ordinates from the device A 20, device C 20a and/or the device(s) B 30. The geo-location module 210 may receive the location co-ordinates in real-time or as per configured durations, e.g. 2 minutes or at a configured instance, say, when the imperilled individual triggers the one or more distress actions.
[0061] The distance determination module 220 may work using location obtained via the geo location module 210 to calculate the distance between the location co-ordinates of the device A 20/device C 20a and the device(s) B 30.
[0062] The notification module 230 is configured to trigger one or more notifications to the device B 30. The notifications may be in the form of a short messaging service (SMS), a push notification (alert or update), a phone call via server and/or other forms of electronic communications with or without a unique ringtone or alert on the device B 30.
[0063] The first and the second trigger verification modules 240, 250 may be configured to receive and compare the characteristics (like waveform, words and sequence thereof, etc.) of the second and the third external triggers. In an embodiment, the first trigger verification module 240 is a voice recognition module. The voice recognition module is configured to receive the waveform associated with the second external trigger and/or the third external trigger from the device A 20/device C 20a. The voice recognition module may receive the waveform in real-time when the imperilled individual prompts the second external trigger and/or the third external trigger. The voice recognition module is also configured to compare the waveform of the second external trigger and/or the third external trigger with the pre-defined waveforms of the voice associated with the imperilled individual.
[0064] The second trigger verification module 250 may be a speech recognition module. The speech recognition module is configured to receive the plurality of words uttered as the second external trigger and/or the third external trigger, transmitted via the device A 20 and/or the device C 20a. The speech recognition module is also configured to compare the pre-defined sequence of words with the plurality of words as received from the device A 20/device C 20a.
[0065] The database module 260 is equipped to store all details of the imperilled individuals. The details of the imperilled individual may include name, address, selected helpers, location, voice and permitted words (pre-defined waveforms and sequence of words), and threshold values to initiate one or more distress actions, etc. The database module 260 may further store various inputs received from the device A 20 or device C 20a. The database module 260 also includes one or more look up tables for the characteristics of the second external trigger and/or the third external trigger. The characteristics of the second external trigger and/or the third external trigger includes the imperilled individual's pre-defined one or more words and corresponding waveforms.
[0066] In an alternate embodiment, in addition to the above modules, the security system 50 may include a sound pressure module. The sound pressure module is configured to receive the sound pressure associated with the first external trigger from the device A 20. The sound pressure module may receive the sound pressure in real-time or as per configured durations, e.g. 2 minutes or at a configured instance, say, when the imperilled individual prompts the first, the second and the third external triggers. The sound pressure module is also configured to determine whether the sound pressure level of the first external trigger is above the threshold sound pressure. Likewise, the security system 50 may include a biometric module for accessing the inputs of biometric sensors.
[0067] In an embodiment, the security system 50 includes the aforesaid modules only in cases wherein the device A 20 is not capable of processing the sound pressure and/or biometric inputs locally.
[0068] Now referring to FIG.3, a flowchart entailing the steps involved in initiation of the distress actions via security system 50 is disclosed. It should be noted that though the present invention may be used for various applications as provided above, the following steps disclose the use of security system 50 at the time of say, physical assault.
[0069] At step 301, the device A 20 receives a first external trigger in the form of a loud sound. The sound having a particular sound pressure is received by the device A 20 as audio signals. Alternately, the security system 50 receives the first external trigger as a prompt from the biometric sensor based upon a biometric input. For example, a heart rate sensor monitors the heart beats of the imperilled individual and in case, the heart is found to beat at an exaggerated rate i.e. beyond a threshold rate, the sensor registers the first external trigger as an increased heartbeat. Likewise, the presence of other sensors and use of the same for prompting the first external trigger is also within the scope of the present invention.
[0070] At step 303, as soon as the first external trigger is received from the imperilled individual, the device A 20 ascertains if the values associated with the first external trigger are above(or equal to) the threshold values. The threshold values are digitized parameters corresponding to the first external trigger and may include sound pressure, slope of fundamental frequency, a temporal features (speech rate and pausing), maximum value of vocal energy, a mean of a bandwidth and a mean of the fundamental frequency etc. In case, the values of the first external trigger exceed the threshold values, the application on the device A 20 is activated at step 305.
[0071] As an exemplary embodiment, the device A 20 ascertains whether the sound pressure associated with the first external trigger is above the threshold sound pressure. In case, the sound pressure of the first external trigger is found to be above the threshold sound pressure, then the application is activated at step 305. Else, the application installed on the device A 20 stays dormant.
[0072] Alternately, the device A 20 ascertains whether the first external trigger corresponding to the biometric sensor exceeds the threshold value. In case it does, then the application is activated at step 305.
[0073] At step 307, the security system 50 receives the second external trigger from the imperilled individual. The second external trigger may be in the form of one or more words. The device A 20 converts the voice associated with the second external trigger into a waveform.
[0074] At step 309, the word and the waveform associated with the second external trigger is transmitted to the application server 10 via the application installed on the device A 20. [0075] At step 311, the security system 50 on the application server 10 is configured to ascertain whether the word and the waveform associated with the second external trigger corresponds with the pre-defined word and the pre-defined waveform. The pre-defined word and the pre defined waveform may be stored in the database module 260. The security system 50 is configured to refer to the database module 260 to retrieve the pre-defined word and the pre defined waveform corresponding to the second external trigger.
[0076] The security system 50 is configured to ascertain by comparing the word and its associated waveform received from the imperilled individual as second external trigger with the pre-defined word and the pre-defined waveform stored in database module 260 as a second external trigger in real time. The security system 50 is operatively coupled to the voice recognition module and the speech recognition module in order to retrieve the word and its associated waveform. In an embodiment, the waveform associated with the second external trigger is first compared with the pre-defined waveform followed by comparison of the word associated with the second external trigger with the pre-defined word (speech).
[0077] If the security system 50 identifies a match or an overlap between the second external trigger (waveform and word) received in real time and the pre-defined waveform as well as the pre-defined word then the security system 50 is configured to transmit a notification to each of the pre-selected devices B 30 via the notification module 230 at step 313.
[0078] In an alternate embodiment, the application installed on the device A 20 may locally validate the first and the second external triggers post which the device A 20 may request the security system 50 at the server to initiate distress actions.
[0079] FIG. 3a illustrates a flowchart entailing the steps involved in initiation of the distress actions post successful validation of at least two of the first external trigger, the second external trigger and the third external trigger.
[0080] The steps relating to the first external trigger i.e. steps 301a-305a are same as the steps 301-305 of FIG. 3 and are not explained in detail for the sake of brevity.
[0081] The imperilled individual utters a sequence of two words i.e. a first word and a second word. The first word corresponds to the second external trigger while the second word corresponds to the third external trigger. The said second and third external triggers are received by the device A 20 as depicted at step 307a. [0082] At step 309a, the device A 20 is configured to convert the voice associated with the second and the third external trigger into a waveform. The words and the waveforms associated with the second and the third external triggers are transmitted to the application server 10 via the application installed on the device A 20.
[0083] At step 311a, the security system 50 on the application server 10 is configured to ascertain whether the words and the waveforms associated with the second and the third external trigger corresponds with the respective pre-defined words and the pre-defined waveforms. The pre defined word and the pre-defined waveform associated with each of the second and the third external triggers may be stored in the database module 260. The security system 50 refers the database module 260 to retrieve the pre-defined words and the pre-defined waveforms.
[0084] Thereafter, the security system 50 is configured to compare whether the waveform and the words received in real time as the second and the third external trigger overlap with the pre defined waveforms and the pre-defined words stored in database module 260. The security system 50 is operatively coupled to the voice recognition module and the speech recognition module in order to retrieve the word and waveform associated with the second and the third external triggers. In an embodiment, the waveform associated with each of the second external trigger and the third external trigger is first compared with predefined waveform associated with each of the second external trigger and the third external trigger respectively followed by comparison of the word associated with each of the second external trigger and the third external trigger with predefined word associated with each of the second external trigger and the third external trigger respectively.
[0085] If the security system 50 identifies a match or an overlap between waveform and word associated with each of the second and the third external triggers received in real time and the respective pre-defined waveforms as well as the pre-defined words then, the security system 50 is configured to transmit a notification to each of the pre-selected devices B 30 via the notification module 230 at step 313a.
[0086] In an alternate embodiment, the application installed on the device A 20 may locally ascertains validate the first, the second and the third external triggers.
[0087] Alternate to the above method, FIG. 3b illustrates a process wherein the first external is received and validated using the above method (steps 301b-305b same as the steps 301-305 of FIG. 3) however, the second and third external triggers are received in a different way. The imperiled individual may first utter one word corresponding to the second external trigger. The second external trigger may then be validated using the above elaborated steps (steps 305b- 311b similar to steps 305-311). Subsequently, after a pre-defined time, say, 30 seconds, the imperiled individual may utter a second word which corresponds to the third external trigger. The third external trigger may be validated (steps 313b-317b similar to steps 305b-311b)and post validation of at least two of the first, the second and the third external triggers, one or more distress actions are initiated at step 319b as shown in FIG. 3b.
[0088] In an alternate embodiment, in the presence of the device C 20a, if on successful validation of the first external trigger, a communication between the device A 20 and the device C 20a is established. The communication may be established via a communication protocol including, but not limited to Bluetooth such as Bluetooth low energy (BLE), RFID, NFC, WiFi etc. In an embodiment, a BLE connection is established between the device A 20 and the device C 20a.
[0089] On receiving the second external trigger and/or the third external trigger, the device A 20 transmits the plurality of words and the waveform of the second external trigger to the device C 20a via the communication established earlier. The device C 20a may further transmit such data to the security system 50. The security system 50 may then validate the second external trigger and on successful validation may notify the devices B 30.
[0090] As an additional embodiment, post the distress, the imperilled individual may transmit via the device A 20, a message to the application server 10 confirming that the imperilled individual is out of distress. In an embodiment, the said message is only transmitted through a password or a pass key to ensure deliberate stand down after due authentication and to ensure that only the imperilled individual relays the message and not any other passer-by.
[0091] The scope of the invention is only limited by the appended patent claims. More generally, those skilled in the art will readily appreciate that all parameters, dimensions, materials, and configurations described herein are meant to be exemplary and that the actual parameters, dimensions, materials, and/or configurations will depend upon the specific application or applications for which the teachings of the present invention is/are used.

Claims

I CLAIM:
1. A process of initiating a distress action vis a security system (50), the process comprising: a. receiving a first external trigger via a device A (20), wherein the first external trigger includes one of an audio signal or a biometric input; b. validating, by a processor (20a), the first external trigger with a threshold value pre stored in a security system (50); c. activating, by the processor (20a), an application installed on the device A(20) on successful validation at step b; d. receiving a second external trigger via the device A (20), wherein the second external trigger includes at least one word; e. validating, by the security system (50), characteristics of the second external trigger with pre-defined values; and f. initiating a distress action to one or more devices B (30) in proximity to the device A (20) upon successful validation.
2. The process of initiating the distress action as claimed in claim 1 wherein the characteristics include a waveform, a word and sequence thereof.
3. The process of initiating the distress action as claimed in claim 1 wherein prior to initiating the distress action, receiving a third external trigger via the device A (20), wherein the third external trigger includes at least one word. 4. The process of initiating the distress action as claimed in claim 3 wherein upon receipt of the third external trigger, validating, by the security system (50), characteristics of the third external trigger with pre-defined values.
5. The process of initiating the distress action as claimed in claim 4 wherein upon successful validation of the characteristics of the third external trigger with the pre-defined values, initiating the distress action to the one or more devices B (30) in proximity to the device A
(20).
6. The process of initiating the distress action as claimed in claim 1 wherein the device A (20) includes a wearable device. The process of initiating the distress action as claimed in claim 1 wherein the threshold value includes one or more of sound pressure, slope of fundamental frequency, a temporal features (speech rate and pausing), maximum value of vocal energy, a mean of a bandwidth and a mean of the fundamental frequency.
PCT/IN2021/050357 2020-04-13 2021-04-10 System and method for initiation of distress actions WO2021210012A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202011015965 2020-04-13
IN202011015965 2020-04-13

Publications (1)

Publication Number Publication Date
WO2021210012A1 true WO2021210012A1 (en) 2021-10-21

Family

ID=78083606

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2021/050357 WO2021210012A1 (en) 2020-04-13 2021-04-10 System and method for initiation of distress actions

Country Status (1)

Country Link
WO (1) WO2021210012A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080172232A1 (en) * 2007-01-12 2008-07-17 Gurley Scott A Voice triggered emergency alert
US20160155454A1 (en) * 2012-06-13 2016-06-02 Wearsafe Labs Llc Systems and methods for managing an emergency situation
US20190108742A1 (en) * 2017-10-11 2019-04-11 Lenovo (Singapore) Pte. Ltd. Determining user risk

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080172232A1 (en) * 2007-01-12 2008-07-17 Gurley Scott A Voice triggered emergency alert
US20160155454A1 (en) * 2012-06-13 2016-06-02 Wearsafe Labs Llc Systems and methods for managing an emergency situation
US20190108742A1 (en) * 2017-10-11 2019-04-11 Lenovo (Singapore) Pte. Ltd. Determining user risk

Similar Documents

Publication Publication Date Title
US20210056981A1 (en) Systems and methods for managing an emergency situation
US20210287522A1 (en) Systems and methods for managing an emergency situation
US11974207B2 (en) Modular emergency communication flow management system
JP6919978B2 (en) Systems and methods for emergency communications
US11399095B2 (en) Apparatus and method for emergency dispatch
US20170188216A1 (en) Personal emergency saver system and method
CN105306204B (en) Security verification method, device and system
US20160071399A1 (en) Personal security system
WO2015180447A1 (en) Alarming method, terminal, and storage medium
US20180007210A1 (en) Voice-controlled audio communication system
CA2855484C (en) Method to detect an alarm situation and to send silent alerts to external systems using voice input to mobile devices
US10446016B2 (en) Advanced mobile emergency communication system
US9706380B1 (en) Providing emergency notification and tracking data from a mobile device
CN105160806A (en) Wearing device having alarming function and alarming method thereof
WO2017201874A1 (en) Method and apparatus for prompting loss of terminal
CN107371144B (en) Method and device for intelligently sending information
WO2019237008A1 (en) Remote recording and data reporting systems and methods
WO2021105085A1 (en) A personal help button and administrator system for a personal emergency response system (pers)
JP3864267B1 (en) Authentication mobile terminal device and authentication mobile terminal program
KR101564347B1 (en) Terminal and method for requesting emergency relief
WO2021210012A1 (en) System and method for initiation of distress actions
KR101289255B1 (en) Smartphone for school emergency notification
Save et al. Applying human computer interaction to individual security using mobile application
US20240184876A1 (en) Multi-dimensional voice-based digital authentication
JPWO2019106811A1 (en) Query response system and query response method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21788058

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21788058

Country of ref document: EP

Kind code of ref document: A1