BR102019018928A2 - FEMINICIDE FIGHTING SYSTEM - Google Patents
FEMINICIDE FIGHTING SYSTEM Download PDFInfo
- Publication number
- BR102019018928A2 BR102019018928A2 BR102019018928-2A BR102019018928A BR102019018928A2 BR 102019018928 A2 BR102019018928 A2 BR 102019018928A2 BR 102019018928 A BR102019018928 A BR 102019018928A BR 102019018928 A2 BR102019018928 A2 BR 102019018928A2
- Authority
- BR
- Brazil
- Prior art keywords
- victim
- feminicide
- fighting system
- algorithm
- aggressor
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/014—Alarm signalling to a central station with two-way communication, e.g. with signalling back
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/016—Personal emergency signalling and security systems
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Emergency Management (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Educational Administration (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
sistema de combate ao feminicídio apresenta inovação com o objetivo de inibir, diminuir e combater o feminicídio, mediante a proteção às vítimas de ameaças e/ou sob risco de vida através de um sistema único, ajudando tanto a vítima quanto as autoridades a combater o feminicídio de forma preventiva e inteligente, utilizando aparelhos já existentes como celulares e sistemas como gps (global system for mobile), iot (internet of things) e bigdata, manuseando um algoritmo de inteligência artificial capaz de indicar o grau de risco que a mulher está passando e orientar qual medida a ser realizada, além de reconhecer a distância entre o agressor e a vítima, acionando automaticamente ou através da voz da vítima as autoridades responsáveis pela proteção da mulher, visando a preservação da vida e a integridade física e psíquica da vítima.The system to combat femicide presents innovation with the objective of inhibiting, reducing and combating femicide, by protecting victims of threats and / or at risk of life through a unique system, helping both the victim and the authorities to combat femicide. in a preventive and intelligent way, using existing devices such as cell phones and systems such as gps (global system for mobile), iot (internet of things) and bigdata, handling an artificial intelligence algorithm capable of indicating the degree of risk that the woman is going through and to guide which measure to take, in addition to recognizing the distance between the aggressor and the victim, automatically triggering or through the victim's voice the authorities responsible for protecting the woman, aiming at the preservation of life and the physical and psychological integrity of the victim.
Description
[01] O presente relatório apresenta inovação com o objetivo de inibir, diminuir e combater o feminicídio, mediante a proteção às vítimas de ameaças e/ou sob risco de vida através de um sistema único, ajudando tanto a vítima quanto as autoridades a combater o feminicídio de forma preventiva e inteligente, utilizando aparelhos já existentes como celulares e sistemas como GPS (Global System for Mobile), IOT (Internet Of Things) e Bigdata, manuseando um algoritmo de inteligência artificial capaz de indicar o grau de risco que a mulher está passando e orientar qual medida a ser realizada, além de reconhecer a distância entre o agressor e a vítima, acionando automaticamente ou através da voz da vítima as autoridades responsáveis pela proteção da mulher, visando a preservação da vida e a integridade física e psíquica da vítima.[01] This report presents innovation with the aim of inhibiting, reducing and combating femicide, by protecting victims of threats and / or at risk of life through a single system, helping both the victim and the authorities to fight against feminicide in a preventive and intelligent way, using existing devices such as cell phones and systems such as GPS (Global System for Mobile), IOT (Internet Of Things) and Bigdata, handling an artificial intelligence algorithm capable of indicating the degree of risk that the woman is passing and guiding which measure to take, in addition to recognizing the distance between the aggressor and the victim, automatically triggering or through the victim's voice the authorities responsible for protecting the woman, aiming at the preservation of life and the physical and psychological integrity of the victim .
[02] A partir da preocupação relacionada ao alto índice de feminicídio no Brasil, que se eleva consideravelmente a cada ano, foi necessária a adoção de medidas para a proteção da mulher, tais como a Lei nº 11.340/2006, mais conhecida como Lei Maria da Penha que entrou em vigor em 2006, dentre elas, determina o afastamento do agressor do lar, domicílio e locais de convivência com a vítima, bem como proíbe determinadas condutas, entre as quais estão a aproximação da vítima, de seus familiares e das testemunhas, fixando o limite mínimo de distância entre estes e o agressor, cessando ainda o contato com a vítima, seus familiares e testemunhas por qualquer meio de comunicação e frequentação de determinados lugares, a fim de preservar a integridade física e psicológica da vítima, entre outros. Ocorre que, muitas vezes, não há incentivo para as vítimas procurarem tais medidas e muitas sofrem bastante até chegarem a tal escolha.[02] From the concern related to the high rate of feminicide in Brazil, which rises considerably each year, it was necessary to adopt measures for the protection of women, such as Law nº 11.340 / 2006, better known as Lei Maria da Penha that came into effect in 2006, among them, determines the aggressor's removal from the home, home and places where the victim lives, as well as prohibiting certain conducts, among which are the approximation of the victim, his relatives and the witnesses , establishing the minimum distance limit between them and the aggressor, also ceasing contact with the victim, their relatives and witnesses by any means of communication and frequenting certain places, in order to preserve the physical and psychological integrity of the victim, among others . It happens that, many times, there is no incentive for the victims to seek such measures and many suffer a lot until they reach such a choice.
[03] Mesmo com tais medidas, o problema ainda vem se agravando, o Brasil ocupa o 5º lugar no ranking mundial de Feminicídio, segundo o Alto Comissariado das Nações Unidas para os Direitos Humanos (ACNUDH). O que ocorre nas medidas já existentes é que não há uma fiscalização efetiva, e nem teria como haver, pois a vítima teria que ficar sob vigilância constante, o que a tornaria prisioneira da própria medida.[03] Even with such measures, the problem is still getting worse, Brazil occupies the 5th place in the world ranking of Femicide, according to the United Nations High Commissioner for Human Rights (OHCHR). What happens in the existing measures is that there is no effective inspection, nor could there be, as the victim would have to be under constant surveillance, which would make him a prisoner of the measure itself.
[04] Atualmente existem alguns recursos que auxiliam no combate ao feminicídio, mas todos se baseiam no “botão do pânico” que necessitaria do acionamento da vítima através do toque, o que muitas vezes pode não impedir o agressor, pois se o agressor se dispor a ir de encontro à vítima com a intenção de agredir, até que a vítima tenha ciência, certamente já não seria mais capaz de contatar as autoridades responsáveis ou solicitar ajuda a quem quer que seja, ou até mesmo buscar o “botão do pânico”, por exemplo, dentro de sua bolsa, tornando a medida protetiva ineficaz.[04] Currently, there are some resources that help in the fight against femicide, but all are based on the “panic button” that would require the victim to be touched, which can often not prevent the aggressor, because if the aggressor is willing to go to the victim with the intention of attacking, until the victim is aware, he would certainly no longer be able to contact the responsible authorities or request help from anyone, or even seek the “panic button”, for example, inside your bag, making the protective measure ineffective.
[05] Pensando nos problemas apresentados e nos recursos existentes, foi desenvolvido o sistema de combate ao feminicídio que auxilia não apenas no monitoramento da distância entre a vítima e o agressor ou no acionamento às autoridades, pois o método ajudará até mesmo antes da concessão da medida protetiva. Com a atual geração de dispositivos móveis, como os smartphones, o sistema de combate ao feminicídio se torna mais acessível a todas as vítimas, pois conforme pesquisa no IBGE, cerca de 77,1% da população possui celular próprio, o número de brasileiros que usam a internet subiu de 67% para 70% da população, o que equivale a 126,9 milhões de pessoas, desse número, 97% usam o celular como seu principal meio de conexão1 . Dessa forma, com apenas o smartphone, a vítima poderá identificar se está sofrendo agressão, pois a partir deste ponto ela já poderá instalar em seu smartphone a qualquer momento, que também servirá para orientá-la com interação ao próprio algoritmo, como também com outras vítimas através de uma rede social integrada. O método visa ajudar as vítimas de algum tipo de agressão, seja física, sexual, patrimonial, moral ou psicológica sem que seus agressores sejam capazes de interferir em seu dia a dia. Caso sua situação se agrave, o algoritmo será capaz de guardar áudios, conversas e até vídeos, onde criará um histórico que servirá como prova para abertura da denúncia que poderá ser efetuada através dele, sendo capaz de enviar seu conteúdo para assegurar possíveis proteções judiciais ou policiais, como por exemplo, a medida protetiva, pois a autoridade policial/judicial contará com informações que o auxilie na tomada de decisão da liberação da medida.[05] Thinking about the problems presented and the existing resources, the system to combat femicide was developed, which helps not only in monitoring the distance between the victim and the aggressor or in calling the authorities, as the method will help even before the granting of the protective measure. With the current generation of mobile devices, such as smartphones, the system to fight feminicide becomes more accessible to all victims, as according to research by IBGE, about 77.1% of the population has their own cell phone, the number of Brazilians who use the internet rose from 67% to 70% of the population, which is equivalent to 126.9 million people, of that number, 97% use cell phones as their main means of connection1. Thus, with only the smartphone, the victim will be able to identify if he is suffering aggression, since from this point onwards he will be able to install it on his smartphone at any time, which will also serve to guide him with interaction with the algorithm itself, as well as with other victims through an integrated social network. The method aims to help victims of some type of aggression, whether physical, sexual, patrimonial, moral or psychological without their aggressors being able to interfere in their daily lives. If your situation worsens, the algorithm will be able to save audios, conversations and even videos, where it will create a history that will serve as evidence to open the complaint that can be made through it, being able to send your content to ensure possible judicial protections or police officers, such as the protective measure, as the police / judicial authority will have information to assist them in making the decision to release the measure.
[06] Para que se tenha uma compreensão mais clara, será detalhado o fluxograma anexo, conforme descritas a seguir.[06] In order to have a clearer understanding, the attached flowchart will be detailed, as described below.
[07] A imagem 1 representa o início, onde a mulher suspeita ser vítima de violência doméstica, muitas vezes não tem ciência que está sofrendo, e quando tem o conhecimento teme buscar ajuda.[07] Image 1 represents the beginning, where the woman suspects that she is a victim of domestic violence, she is often unaware that she is suffering, and when she has the knowledge she is afraid to seek help.
[08] A imagem 2 representa o início da ajuda onde, ao instalar o algoritmo, se inicia o processo para o auxílio à vítima.[08] Image 2 represents the beginning of the aid where, when installing the algorithm, the process for assisting the victim begins.
[09] As imagens 3.1 e 3.2 representam as formas de auxílio e incentivo à vítima que irá interagir no algoritmo até que esteja disposta a tomar alguma medida.[09] Images 3.1 and 3.2 represent the forms of assistance and encouragement to the victim who will interact with the algorithm until they are ready to take action.
[10] A imagem 4 representa a Medida Protetiva oferecida pelo governo, ação necessária no auxílio à vítima, instruída pelo algoritmo para a eficaz solução do problema.[10] Image 4 represents the Protective Measure offered by the government, a necessary action in helping the victim, instructed by the algorithm for the effective solution of the problem.
[11] A imagem 5 representa o algoritmo funcionando para manter a vítima afastada do agressor no intuito de manter a integridade psíquica da vítima.[11]
[12] As imagens 6.1, 6.2 representam os recursos do algoritmo que agirá para manter a segurança da vítima assegurando sua integridade física.[12] Images 6.1, 6.2 represent the features of the algorithm that will act to maintain the victim's safety by ensuring his physical integrity.
[13] A imagem 6.3 representa o algoritmo em sigilo, caso não detecte a proximidade do agressor à vítima.[13] Image 6.3 represents the algorithm in secrecy, if it does not detect the aggressor's proximity to the victim.
[14] A vítima, que muitas vezes sequer identifica que está sofrendo algum tipo de agressão, ou quando sabe (1), por vezes fica inibida de solicitar ajuda, poderá instalar o algoritmo em seu smartphone (2), onde iniciará um questionário para que a mulher possa identificar se ela está em um relacionamento abusivo ou se está sofrendo algum tipo de agressão, mensurando o grau de risco que ela está tendo dentro do atual quadro vivenciado. Posteriormente, mediante as respostas da vítima, o algoritmo indicará quais medidas ela poderá adotar para conseguir sair da situação em que se encontra (3.1).[14] The victim, who often does not even identify that he is suffering any type of aggression, or when he knows (1), is sometimes inhibited from asking for help, may install the algorithm on his smartphone (2), where he will start a questionnaire to that the woman can identify if she is in an abusive relationship or if she is suffering some type of aggression, measuring the degree of risk she is taking within the current situation experienced. Subsequently, through the victim's responses, the algorithm will indicate what measures she can take to get out of the situation she is in (3.1).
[15] O algoritmo permitirá que a vítima conecte-se e interaja entre as vítimas, devidamente cadastradas, para que haja uma troca de experiências entre as mesmas, criando “um laço de afeto”, além de todo apoio que hoje o governo proporciona, elas saibam que é possível mudar a realidade atual, que há uma esperança e posteriormente servir de exemplo para as futuras vítimas, isso será possível através da rede social (3.2).[15] The algorithm will allow the victim to connect and interact with the victims, duly registered, so that there is an exchange of experiences between them, creating “a bond of affection”, in addition to all the support that the government currently provides, they know that it is possible to change the current reality, that there is hope and later to serve as an example for future victims, this will be possible through the social network (3.2).
[16] O algoritmo ao ser instalado, não ficará visível como os aplicativos comuns, e será ativado somente pela voz da vítima, no intuito de não ser impedida a utilizar pelo agressor, bem como não causar constrangimento a vítima perante outras pessoas, quando ativado alguma função, também irá trabalhar de forma a não ser identificado (6.3). Ademais, o algoritmo utilizará duplo fator de autenticação para garantir que somente a vítima esteja utilizando a ferramenta.[16] The algorithm when installed, will not be visible like ordinary applications, and will be activated only by the victim's voice, in order not to be prevented from using it by the aggressor, as well as not to cause embarrassment to the victim before other people, when activated some function, it will also work so as not to be identified (6.3). In addition, the algorithm will use a double factor of authentication to ensure that only the victim is using the tool.
[17] Com a adoção da Lei nº 11.340/2006 citada acima (4), o agressor deve estar, conforme estabelecido pela autoridade policial/judiciária, a uma certa distância da vítima, e para isso o algoritmo foi projetado para identificar essa distância entre o agressor e a vítima (5), o mesmo acionará a vítima através de um alerta (SMS\Ligação\alarmes), quando o agressor se aproximar da distância decidida judicialmente, os familiares cadastrados poderão receber o mesmo alerta caso a vítima não confirme o recebimento do alerta enviado (6.1), e ao violar a distância, as autoridades serão acionadas automaticamente, eles terão a localização em tempo real da vítima e agressor para atuar de forma preventiva (6.2). O algoritmo tem como objetivo ajudar, apoiar as autoridades e a vítima de forma inteligente com uma ação preventiva, inclusive o algoritmo poderá acionar as autoridades apenas com o som da voz da vítima, sem a necessidade de um “botão do pânico”.[17] With the adoption of Law No. 11,340 / 2006 mentioned above (4), the aggressor must be, as established by the police / judicial authority, at a certain distance from the victim, and for this purpose the algorithm was designed to identify this distance between the aggressor and the victim (5), the same will trigger the victim through an alert (SMS \ Call \ alarms), when the aggressor approaches the distance decided by the court, registered family members may receive the same alert if the victim does not confirm the receipt of the alert sent (6.1), and when violating the distance, the authorities will be automatically activated, they will have the real time location of the victim and aggressor to act in a preventive way (6.2). The algorithm aims to help, support the authorities and the victim intelligently with preventive action, even the algorithm can activate the authorities only with the sound of the victim's voice, without the need for a “panic button”.
[18] O algoritmo também poderá alertar a vítima como meio de prevenir que encontre, involuntariamente, o agressor, pois o algoritmo terá salvo em seu sistema os locais mais frequentados pela vítima, e a alertará caso o agressor se encontre em algum desses lugares quando a vítima se aproximar. O algoritmo também poderá monitorar o agressor para evitar a quebra da medida protetiva, através de um dispositivo eletrônico. O algoritmo só acionará a monitoração quando o agressor se aproximar da distância informada pela justiça, mantendo-se oculto (6.3). O algoritmo também alertará ao agressor caso esteja se dirigindo, inconscientemente, ao local que vítima já se encontra. O sistema não informará o local que a vítima está para o agressor.[18] The algorithm may also alert the victim as a means of preventing him from involuntarily finding the aggressor, as the algorithm will have saved the victim's most frequent locations on his system, and will alert him if the aggressor is in any of these places when the victim approaches. The algorithm will also be able to monitor the aggressor to avoid breaking the protective measure, through an electronic device. The algorithm will only trigger the monitoring when the aggressor approaches the distance informed by the court, remaining hidden (6.3). The algorithm will also alert the attacker if he is unconsciously going to the victim's location. The system will not report the victim's location to the attacker.
[19] O algoritmo possibilitará a denúncia de abusos por parte da vítima ou por parte de terceiros que identifiquem um cenário de perigo, sendo capaz de armazenar conversas, áudios e vídeos. O algoritmo será integrado com o canal 180 do governo para denúncias de terceiros. Em caso de emergência, o algoritmo poderá acionar a polícia apenas com a voz da vítima. O algoritmo enviará alertas as autoridades com a localização em tempo real do agressor e da vítima, para as medidas cabíveis sejam tomadas de forma a prevenir o incidente integrado ao sistema da polícia.[19] The algorithm will make it possible to report abuse by the victim or by third parties who identify a dangerous scenario, being able to store conversations, audios and videos. The algorithm will be integrated with the government's channel 180 for third party complaints. In an emergency, the algorithm can call the police only with the victim's voice. The algorithm will send alerts to the authorities with the real-time location of the aggressor and the victim, for the appropriate measures to be taken in order to prevent the incident integrated into the police system.
Claims (11)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BR102019018928-2A BR102019018928A2 (en) | 2019-09-12 | 2019-09-12 | FEMINICIDE FIGHTING SYSTEM |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BR102019018928-2A BR102019018928A2 (en) | 2019-09-12 | 2019-09-12 | FEMINICIDE FIGHTING SYSTEM |
Publications (1)
Publication Number | Publication Date |
---|---|
BR102019018928A2 true BR102019018928A2 (en) | 2021-03-23 |
Family
ID=75438494
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR102019018928-2A BR102019018928A2 (en) | 2019-09-12 | 2019-09-12 | FEMINICIDE FIGHTING SYSTEM |
Country Status (1)
Country | Link |
---|---|
BR (1) | BR102019018928A2 (en) |
-
2019
- 2019-09-12 BR BR102019018928-2A patent/BR102019018928A2/en not_active IP Right Cessation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Willis | Non-disclosure of violence in Australian Indigenous communities | |
JP4874266B2 (en) | Alarm system including alarm mobile terminal and alarm server | |
US8866869B2 (en) | Parolee communication and control system and method | |
US20140120977A1 (en) | Methods and systems for providing multiple coordinated safety responses | |
EP3834184B1 (en) | Public places surveillance system | |
CA2975933A1 (en) | Smart device distributed security system | |
KR20190049187A (en) | Method and apparatus for sharing dangerous status of user by using timer | |
Aziz et al. | COVID-19 and violence against women: Unprecedented impacts and suggestions for mitigation | |
TW202037195A (en) | Block chain-based smart alarm method and apparatus, and electronic device | |
Goebel et al. | Hacking 9-1-1: infrastructure vulnerabilities and attack vectors | |
US20200168063A1 (en) | System and method for suppression of physical threats | |
BR102019018928A2 (en) | FEMINICIDE FIGHTING SYSTEM | |
Campbell et al. | Stalking on campus: Ensuring security with rights and liberties | |
WO2015036926A3 (en) | Networked devices and methods for personal safety and security | |
WO2022126510A1 (en) | Digital campus safety management system | |
WO2015058271A1 (en) | Monitoring system for gsm/gps equipment with preventive safety device for emergency situations affecting persons covered by protective injunctions and/or at risk | |
KR102035589B1 (en) | Operation management system for notification of emergencies and emergency measures, and Drive method of the Same | |
Franco | Human sex trafficking: An international problem with an international solution requiring national implementation | |
Ellman | The emergency aid doctrine and 911 hang-ups: The modern general warrant | |
Minter | Victimization Or Deportation: Addressing the Unsettling Consequences of the U Visa Requirements on Domestic Violence Victims | |
CN110535883B (en) | Position information processing method and system | |
Gasmi | New CoE Convention On Preventing And Combating Violence Against Women And Domestic Violence „Istanbul Convention “–Importance Of Setting European Legal Standards | |
KR101399185B1 (en) | crime prevention system having refuge device and crime prevention service using the same | |
TW200813904A (en) | Interactive multi-functional security monitoring center system | |
US11688270B2 (en) | Mobile monitoring system, mobile monitoring unit, and mobile monitoring method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B03A | Publication of a patent application or of a certificate of addition of invention [chapter 3.1 patent gazette] | ||
B08F | Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette] |
Free format text: REFERENTE A 4A ANUIDADE. |
|
B08K | Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette] |
Free format text: EM VIRTUDE DO ARQUIVAMENTO PUBLICADO NA RPI 2739 DE 04-07-2023 E CONSIDERANDO AUSENCIA DE MANIFESTACAO DENTRO DOS PRAZOS LEGAIS, INFORMO QUE CABE SER MANTIDO O ARQUIVAMENTO DO PEDIDO DE PATENTE, CONFORME O DISPOSTO NO ARTIGO 12, DA RESOLUCAO 113/2013. |