GB2460535A - Automatic transmission of camera phone images to a secure server - Google Patents

Automatic transmission of camera phone images to a secure server Download PDF

Info

Publication number
GB2460535A
GB2460535A GB0909545A GB0909545A GB2460535A GB 2460535 A GB2460535 A GB 2460535A GB 0909545 A GB0909545 A GB 0909545A GB 0909545 A GB0909545 A GB 0909545A GB 2460535 A GB2460535 A GB 2460535A
Authority
GB
United Kingdom
Prior art keywords
mobile device
image
user
secure
facesnap
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0909545A
Other versions
GB0909545D0 (en
Inventor
Daniel John Robinson
Giovanni Maria Laporta
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of GB0909545D0 publication Critical patent/GB0909545D0/en
Publication of GB2460535A publication Critical patent/GB2460535A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • H04N1/00281Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a telecommunication apparatus, e.g. a switched network of teleprinters for the distribution of text-based information, a selective call terminal
    • H04N1/00307Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a telecommunication apparatus, e.g. a switched network of teleprinters for the distribution of text-based information, a selective call terminal with a mobile telephone apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • H04M1/72421User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
    • H04M1/72538
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/04Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • H04N1/00323Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a measuring, monitoring or signaling apparatus, e.g. for transmitting measured information to a central location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/0035User-machine interface; Control console
    • H04N1/00352Input means
    • H04N1/00384Key input means, e.g. buttons or keypads
    • H04N1/00389Programmable function keys, e.g. for one-touch operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/0035User-machine interface; Control console
    • H04N1/00352Input means
    • H04N1/00403Voice input means, e.g. voice commands
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32037Automation of particular transmitter jobs, e.g. multi-address calling, auto-dialing
    • H04N1/32048Auto-dialling or Auto-calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • H04N7/185Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source from a mobile camera, e.g. for remote control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/0077Types of the still picture apparatus
    • H04N2201/0084Digital still camera
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3204Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3212Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image
    • H04N2201/3214Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image of a date
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3212Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image
    • H04N2201/3215Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image of a time or duration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3253Position information, e.g. geographical position at time of capture, GPS data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3274Storage or retrieval of prestored additional information
    • H04N2201/3276Storage or retrieval of prestored additional information of a customised additional information profile, e.g. a profile specific to a user ID
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3278Transmission

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Automation & Control Theory (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A method for protecting the safety of a user 1 of a mobile device 2, such as a mobile phone, in an encounter with a new person 3, by making a secure record 4 of the encounter is disclosed. An image 4 of the person and of the user who is using the mobile device is taken with the mobile device. Image data is generated and then automatically transmitted from the mobile device to a secure server 5 without the user having to enter a destination. The process can be initiated with a single user interaction, such as pressing a single button. The image data is then automatically stored as a secure record at the secure server. Suitable for use when first meeting a stranger, for internet dating, taxi drivers, mini cab drivers, estate agents or utility reader.

Description

METHOD, DEVICE, AND SYSTEM FOR PROTECTING THE SAFETY OF A
USER
BACKGROUND OF THE INVENTION
1. Field of the Invention
The field of the invention is methods, devices, and systems for protecting the safety of a user in an encounter with a person or persons. to
2. Technical Background
Personal Protection: The need to rely on ourselves for safety and protection remains apparent as reports of crime, violence and terrorism continues, with 24 hour media 13 coverage, reinforcing and heightening our perception that there is a need to take control of our own safety. As authorities and traditional support structures repeatedly fail to avert danger, people would like to take their personal safety into their own hands. They would like to take steps to keep themselves out of harm's way and to monitor the whereabouts of their loved ones and possessions.
Online -Social Society: People are increasingly developing large numbers of virtual relationships with new people through the use of technology and social network sites.
There is a clear need to distinguish who from our virtual contacts or friends are trustworthy, who should not be trusted and even who could be devious predators.
23 People are increasingly taking steps to develop their virtual friendships, and meet the people they meet "online" to establish, real long-term friendships and relationships.
People naturally choose to trust in situations, as they have a desire to have a good time, develop friendships, and relationships or are being forced to interact with a "stranger," a new person, due to life or work situations. Once they have placed themselves into a position where they meet someone for the first time, they put themselves at greatest risk from opportunists and predators. "A survey for Company magazine found that 60 per cent of female respondents reported binge drinking. Half of these women admitted to waking up with no idea how they had got home, and one in 10 said they had to be escorted home by a stranger" www.dnnkaware.co.uk (10-Nov-08) 3. Discussion of Related Art Camera phones (i.e. mobile phones which include cameras) are becoming increasingly common. Many camera phones permit transmitting multimedia content such as S photographs, in order that the multimedia content can be transmitted to other mobile phones, to a computer or to a remote server. Multimedia content may be sent as a MMS (Multimedia Messaging Service) message, or by connecting to the internet to send multimedia content, for example via email or General Packet Radio Service (GPRS).
In order to send a photograph from a camera phone, the user must first take a photograph using the camera phone. Then to send the photograph to another mobile phone or to a remote server, the user must select how they would like to send the image and where to send the image. It therefore takes several steps, and involves pressing a sequence of several buttons in order for the user to capture and send the image.
IS
SUMMARY OF THE INVENTION
The invention is a method for protecting the safety of a user of a personal, mobile device in an encounter with a person by making a secure record of the encounter, comprising 3 the steps of: (i) taking, with the mobile device, an image of the person; (ii) automatically transmitting the image data from the mobile device to a secure server; and (iii automatically making a secure record of the transmitted image data at the secure server.
This provides a fast, secure way of creating a record of an encounter; it acts as a deterrent against violent or unlawful actions against the user and hence protects the safety of the user.
In an implementation, the step of the user taking the image leads automatically and without any subsequent further user interaction, such as the user setting or selecting the destination, to the automatic transmission of the image data to the secure server. Because the user does not have to first take a photograph and then select a send' function and then select a destination, as would be necessary in most camera phone applications, for example, this process is far faster and more reliable. The image data may be automatically removed from the mobile device once it has been transmitted to the secure server. The secure record is not accessible to the user, unlike conventional photo-sharing web sites.
The secure record is accessible solely to police and law enforcement agencies in a strictly 23 controlled manner.
Other implementation features include the following: * The secure record includes a date and time stamp associated with the data and time of transmission and/or reception, according to the secure server.
* User identification data is automatically transmitted with the image data to the secure server.
* The image of the person and an image of the user can be taken automatically at the same time, or within a pre-defined time period.
* The mobile device establishes its own location when the image is taken; the associated location data is then sent together with the image data.
* The image data and location data are automatically processed and transmitted in real time, i.e. within a very short space of time, by the mobile device.
3 a bi-directional camera or multiple bi-directional cameras are used to capture an image of the user and the person.
* the mobile device has a single hard wired button, or a soft key such as a touch screen key, that causes or initiates the automatic capture and transmission of the image data with a single key press.
* the mobile device responds to a single voice command to cause or initiate the automatic capture and transmission of the image data.
* the mobile device is a camera phone.
* the secure record includes an image of the person encountered; 13 an image of the user; a time & date stamp; and a location stamp (such as obtained by Cell ID & GPS).
* for security, no image data is stored on the mobile device, other than transient storage prior to transmission.
* the secure record cannot be changed, or modified in any way.
* the secure record includes a time and date stamp that are not taken from the mobile device but instead provided by the secure server.
* the time and date applied to an image cannot be viewed, modified or changed in any way from the mobile device.
23 * the location data applied to an image, such as GPS & Cell ID location data, is secure and cannot be modified, accessed or updated in any way from the mobile device.
* the secure record can only be generated in real time, i.e. very shortly after taking the image, by using secure software running on the mobile device.
* the secure record includes two photos: one photo of the person, which is transiently displayed on a display of the mobile device and the second of the user, which is not displayed on the display.
* 24/7 live tracking is provided by the mobile device.
* live tracking can be started remotely in tlie case of an emergency from tlie server without the mobile device having to have a data connection, other than a data messaging connection.
* the image is taken by the mobile device under the control of a secure application 3 that cannot be disabled by anyone other than the user.
* the image data is sent immediately, and location data can be sent at the same time, or sent at separate times.
* the method is used by at least one of a police force, a user when meeting a new person, an online or standard dating agency, a social network site, a utility company, a mini cab company, a university, a local night time business, a night club, a bar, a restaurant, or an estate agent.
* the user can send an MMS of an image to a digital safe through a short-code or long code number.
* a unique UID is generated for each member authorised to send image data to the 13 secure server, and in which the UID, with revision, is used to link users to members.
Another aspect is a computer program product for protecting the safety of a user of a mobile device in an encounter with a person by making a secure record of the encounter, where the computer program product is installable on the mobile device, and, in use, controls i) the taking of an image of the person and of the user who is using the mobile device, and ii the automatic generation of image data; and ciii) the automatic transmission of the image data from the mobile device to a secure server.
23 A third aspect is a device for protecting the safety of a user of the mobile device in an encounter with a person by making a secure record of the encounter, where the mobile device is operable to (i take an image of the person and of the user who is using the mobile device, and (ii) automatically generate image data; and (iii automatically transmit the image data from the mobile device to a secure server.
A fourth aspect is a system for protecting the safety of a user of a mobile device in an encounter with a person by making a secure record of the encounter, the system including the mobile device and a secure server, in which the mobile device is operable to (i take an image of the person and of the user who is using the mobile device, and (ii) automatically generate image data; and (HO automatically transmit the image data from the mobile device to a secure server; and the server is operable to securely store the image data.
S
A final aspect is a method for protecting the safety of a user of a mobile device in an encounter with a person by making a secure record of the encounter, comprising the steps of: (i taking, with the mobile device, an image of the person, and generating image data; (ii) transmitting the image data from the mobile device to a secure server; and (HO automatically making a secure record of the transmitted image data at the secure server, in which the secure record is not generally accessible to the user.
In this aspect, the user may manually define the destination, i.e. the secure server. This IS could be by the user taking the image and then entering the required destination as a MMS message with a short code. But the server keeps the secure record inaccessible to the user, so it is very different from a conventional photo-sharing web site. The secure record is only available to, for example, police or other law enforcement agencies in a strictly controlled environment. The other features detailed above may also apply to this aspect. Hence, the mobile device operates in essence as a gateway into the secure server, providing no local storage of the image data at all.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 shows a schematic description of the invention.
S DETAILED DESCRIPTION
The present invention is implemented in a system called FaceSnapTM; it is a Personal Safety Solution' FaceSnap is a fun, consumer application that runs on mobile devices. It provides a way to protect your safety, when meeting people for the first time, by creating a secure, real time record of interaction, which can undeniably link 2 people to have shared an encounter at a given time and place.
Objectives of FaceSnap To give people the tools to take control of their own personal safety, using preventative psychology, preventing & reducing crime, by targeting situations where opportunists and IS devious predators prey, in situations where people meet new people (strangers) for the first time.
To provide solutions that cannot be mis-used or are not open to fraudulent use.
Benefits to Consumers of FaceSnap * Take control of your own personal safety, using your existing mobile phone.
* Provides a way for online social virtual communities, to take the next steps and develop long lasting friendships, in the teal world without the need for fear.
* Provides a way to remove fear culture. If you have nothing to hide, people don't mind. Enjoy yourself and live life without fear.
* Fun to use. Can drive out the minority of criminals \vith bad intentions by being open and showing that the user can be trusted by supporting FaceSnap.
Preventative psychology benefits of FaceSnap Certain criminals and opportunists prey on people's goodwill and trust, but they do not want to risk getting caught.
The 10 Rules of Crime prevention show that by increasing a potential criminal's perception that the risk of being caught is increased, opportunists and predators would S think twice and not act upon the opportunity.
Opportunity can cause normally decent people under the effects of alcohol to act out of character. Increasing the risk of being caught removes the perception of an opportunity.
What exactly is FaceSnap? We use the term FaceSnap' to refer to a number of related items: * The FaceSnap software apphcation for a mobile device ("FaceSnap Express") * The FaceSnap image (and additional data) taken by the camera(s) C'FaceSnap ID") * The FaceSnap secure record stored at the remote server * The FaceSnap service IS * The entire FaceSnap system -i.e. the combination of all the above Generally, the context will make clear which aspect we are referring to.
Technical -How it can create an un-deniable link The FaceSnap service is an end-to-end service that uses mobile devices (such as mobile telephones, smartphones, personal and portable electronic devices, or indeed any other type of hardware or software) that can provide positional information, Wireless OTA transfer method and, preferably but not necessarily, secure time, secure date, and a bi-directional camera.
The mobile device may use a bi-directional camera or multiple bi-directional cameras to capture an image of 2 people's faces at a given point in time and location. This data is then securely combined and transmitted to a secure server over a wireless Over The Air (OTA) connection.
Ideally the mobile device (hardware) would have a single hard wired button, or a soft key such as a touch screen key, that would cause or initiate the automatic capture of image data and send that data automatically with a single or a minimum number of key presses to a secure server without the user having to select or define a specific destination.
For example, in one implementation called the "FaceSnap Key", the mobile device has a 3 dedicated button labelled FaceSnap'. When selected by the user, this auto launches, then captures FaceSnap image data, switches on GPS, requests Location GPS / Cell ID, then adds Time, Date, GPS, Cell ID as Geo Tags and sends the data to a server OTA, automatically. Hence, the user need only press or select the FaceSnap' key and all the necessary processes, including transmission to the remote server, are initiated. Another approach is for there to be a voice recognition function so that whenever the user speaks a pre-defined word or phrase (for example: "FaceSnap!"), then the mobile device automatically performs the above steps, without the need for any further user interaction steps. A flashing light or audible countdown before the image of the person being met may be provided by the mobile device. The mobile device could also be set to regularly 13 take an image every 5 seconds, or could be set to continuous video, with that regular sequence or video stream being automatically transmitted to the secure server.
It is also possible for the user to have to select a Send' button or key once he has reviewed the image of the person and is satisfied that it is adequate: the image is then automatically sent, again without the user having to select or define a specific destination.
The mobile device is used to capture data in real time and then sends this in real time (i.e. immediately) OTA, via a wireless link to a secure online server. The secure online server stores the data, in the user's digital safe deposit box, i.e. a secure data storage. This data cannot be accessed even by the FaceSnap service member'. A member' is a valid user; we use the term member' because FaceSnap service is a fee-paying (e.g. subscription) based service. The secure records stored in the digital safety deposit box could be either tamper resistant (i.e. extremely difficult to maliciously alter) or tamper evident (hard to maliciously alter, but any alterations can readily be detected).
The FaceSnap secure record may include the following data * FaceSnap Image, e.g. close up photo of individual's face, who was in the FaceSnap * FaceSnap Also includes image, e.g. close of facial photo of user who activated the FaceSnap image capture.
* FaceSnap Time & Date * FaceSnap Location (including Cell ID & GPS or any other location identifiers) * The data can be sent in individual packets or all at the same time.
For security, no data needs to be stored on the mobile device (other than the transient storage prior to transmission); the image data is instead stored solely on the remote secure server and as such is secure. The FaceSnap data cannot be viewed, changed, modified in any way and is not backed up or stored on the mobile device.
The time and date of the FaceSnap image, as recorded in the FaceSnap secure record, are not taken from the handset's global settings, e.g.. user or network defined time: the time and date is instead held securely within the FaceSnap application and is provided by secure transmissions from the FaceSnap Server. The time and date cannot be viewed, modified or changed in any way from the mobile device.
The location data, including GPS & Cell ID, is secure and cannot be modified, accessed or updated in any way from the mobile device. Any form of location data, derived in any manner, can be used. For example, Wi-Fi hotspots and other beacons can be mapped and their locations published in a beacon location database; location can be readily derived from such a database.
A FaceSnap image can only be taken in real time using the secure FaceSnap software application running on the mobile device. Older images cannot be sent as a FaceSnap image; only images captured through or using the FaceSnap software can be sent to the secure server; furthermore, the FaceSnap application will only send to the secure software images immediately after they have been taken -i.e. only real-time operation is possible. All FaceSnap images are automatically deposited and exist in the member's safe deposit box, even if they choose to take another one based on the preview.
The FaceSnap image includes 2 images, such as close up facial photos: I photo is of the person being met or encountered by the mobile device user. This photo is displayed on the screen of the mobile device so that the user can check that the image quality is good enough; if it is not, then another FaceSnap image can be taken. But where the mobile device includes a bi-directional camera, then the mobile device also invisibly captures' (i.e. captures but without displaying on the device screen) the face of the person that 3 activated the FaceSnap application. This securely records an image of the person using the phone and hence allows subsequent verification that he or she is a member. Where a bi-directional camera is not available, then the FaceSnap application can take two separate photographs a fixed time, say 5 seconds apart: then the user can take the first FaceSnap image of the person(s) being met and then turn the device round to face the user and take the FaceSnap image of the user.
Figure 1 schematically illustrates an implementation of the invention. In Figure 1, the user I of a mobile telephone 2 meets a man 3 for a date. She informs him that they will take a FaceSnap image and she activates the FaceSnap functionality of the mobile telephone 2 by pressing the 1-Touch FaceSnap key. This activates the camera function of 13 the mobile telephone 2, which then displays a video of the man's face on a display screen of the mobile telephone, with a short 5 second countdown. The user I centres the image on the display to get a good close up of the man's face and a 2 second video is taken at the end of the S second countdown. Because the mobile telephone 2 has two camera lenses and two image sensors, at the same time as it is taking the video of the man 3, it is also taking a still photograph of the user I. The image data of both photographs is then processed by the mobile telephone 2 and packaged up, together with the ID of the user I and location data from the telephone's GPS sensors. It is then sent over a secure encrypted link 4 to server 3, where the data is stored as a secure record, together with the date and time of receipt according to a secure clock which is part of the server.
23 24/7 Live Tracking' can also be provided by the mobile device. This feature can be enabled by the server, but Live Tracking' can also be started remotely in the case of an emergency from the server without the phone having to have a data connection. In Live Tracking', the location of a mobile device is tracked regularly (e.g. every IS seconds).
The FaceSnap service member also provides full personal details including digital passport authentication via billing data, and credit card to ensure members can be identified.
FaceSnap service members also can send their own FaceSnap image in to add to their personal details kept in their secure digital safe-deposit box.
In the event of an emergency or a crime, for which this data needs to be released, this data can be released to specific approved police force members within specific control rooms very quickly through direct access to the details requested foliowing a phone call S to the standard Police Call control centres -999 etc. 24/7 Live Tracking can also be started remotely from the server in a specific emergency.
Why is it better than existing solutions? Currentiy there are no direct or comparable solutions available. The solutions currently offered are ali based on educating people to change their behaviour and foliow rules. In the event of an actual attack there are solutions such as attack alarms etc. which can be carried.
An Example of Educational Advice: * Do not develop online social friendships in the first place.
* Never share any personal details online, stay anonymous.
15. Swap photos before agreeing to meet.
* Build up relationships online over long periods of time, and be aware of any suspicious behaviour or un-truths.
* When deciding to contact via phone calls, use a pay as you go phone number, when deciding to speak with online contacts for the first time.
* When going on a date, or meeting for the first time: a. Ensure other people know where you are meeting, time, date, place.
b. Always meet in public places.
c. Never go home alone, or travel with the person you are meeting.
d. Don't drink alcohol in their company.
e. Always have agreed times when your friends or family call to check you are OK.
� Use these calls as unforeseen emergency to end the date, meeting if uneasy.
S g. Never leave the agreed location and move to a different location.
h. Ask for ID cards, and check they are genuine.
i. Only catch mini cabs that you have pre-ordered from a reputable known firm.
All of these solutions have to be planned well in advance, are unrealistic to follow, breed distrust and unease when meeting, and are frequently ignored by individuals through lack of understanding or alcohol clouding their judgement.
FaceSnap -Major Advantages * Provides a secure real-time record of interaction that includes a FaceSnap Image with secure time, secure date and secure location, linked to the member's details.
* The FaceSnap service includes real time capture of both the person being met and the person taking the FaceSnap image.
* The FaceSnap application can only be operated in real time, and has been designed to remove the ability to fake, view, change, modify or prevent FaceSnap images from being sent.
* The FaceSnap application preferably cannot be disabled from the mobile device by others, and is username and password protected.
* The FaceSnap secure records are not held on a mobile device, but are stored within a secure online safe-deposit-box; no one has access to the data, other than in tightly controlled circumstances (see below).
* In the event that this secure record data needs to be released, the police will be notified through normal channels. The police can have immediate direct-access to the specific data to aid their investigations.
The FaceSnap service always knows which member is using the specific mobile device because it the unique member ID is transmitted together with the image data and because the secure record includes that member's image.
S * The FaceSnap member could log into the FaceSnap system from any mobile device to, for example, add or modify any of the personal profile, username, password and credit card billing information they have entered. The personal profile information can be anything that the user would like the police or emergency services to know about (e.g. photographs, physical description, health information, aliergies, blood type, medical conditions, next of kin, work address, close friends etc.) * The FaceSnap service can be signed-up for entirely from the mobile device, or web.
* In the event that a user loses their phone, or buys a new phone, the FaceSnap service has been designed to prevent data being sent from an old mobile device.
* In the event that a member loses their phone, and authorisation is provided from police, the FaceSnap application can be activated remotely to track the position of the lost handset (Live Track') and data can be provided to the police.
* With LiveTrack enabled, a user's current and previous locations are known at all times including secure-time, secure-data. All FaceSnap images of people they have interacted with can be seen as well.
* LiveTrack can be automated remotely in an emergency from the Server.
* FaceSnap application is aware of connections available and can send data via eg.
WiFi, UMTS, EDGE, GPRS, USB PC connection. Or it can send data using SMS, MMS, with Text to ensure that data is sent, in the unlikely event that there is no other kind of data coverage.
* For Safety, FaceSnap data is sent immediately, and location data can be sent at the same time, or sent at separate times. Examples are: a. FaceSnap Image, time, date, sent first.
b. GPS Co-ordinates, time, date, sent second.
c. Cell ID, time, date, sent finally.
Fraud Prevention is inherently designed into the solution a. FaceSnap images can only be taken in real time from a secure apphcation.
FaceSnap cannot be faked.
b. FaceSnap images include a real-time photo of both the person being FaceSnapped and the person activating the FaceSnap.
c. No copy of the FaceSnap images can be stored on the mobile device d. No copy of the FaceSnap images can be viewed, accessed or modified from the mobile device (other than the initial, transient (e.g. 2 second) display to allow the user to confirm that the image is good enough and a new FaceSnap image does not have to be taken) e. An older photo of a person could not be sent instead of a genuine FaceSnap image, so someone cannot pretend they were with someone at a new given time and place.
� A different person cannot take the FaceSnap image on your behalf without being identified.
g. In the event that someone else had used the mobile device at the time of the FaceSnap image being taken, their image is also captured in real time (but not displayed on the device display) at substantially the same time as the FaceSnap of the person being met.
h. FaceSnap secure record uses a secure time and date. This is not taken from the phone settings, and is monitored by a secure server.
i. FaceSnap application uses secure GPS positional data that cannot be modified or changed (or any other position data).
j. Users cannot access, view or modify the FaceSnap secure record time and date.
k. FaceSnap image data is sent securely using a secure, encrypted and encoded protocol.
1. Only the latest version of the user's log on details can be used.
m. The FaceSnap application is sent directly to user's device OTA, via SMS provisioning & data connection.
n. FaceSnap application has password and username security, thus maintaining secure tracking.
FaceSnap could be used by: Police Forces -(also See Government Local Authorities above) * Approved police officers can have direct access into the FaceSnap secure database, containing optimum data on members, last known GPS positions, FaceSnaps etc. (see digital data security section) * FaceSnap image based evidence can be used to aid investigations, as it provides a real time record of interaction between 2 (or more) people that proves that people have shared an encounter at a given time, date and place (GPS location, Cell ID Location). This is of course especially relevant where the encounter was a violent one and a crime committed.
* FaceSnap images could reduce the time taken on investigations.
* FaceSnap images could reduce cost and resources used during investigations.
* FaceSnap service assists high level partnerships and joint campaigns with crime prevention, crime reduction and community initiatives via partner charities.
* Forces can communicate directly to FaceSnap Members via SMS service.
FaceSnap can be used when Meeting New people * When on holiday and meeting new people for the first time.
* When meeting people in bars and restaurants, encourage to FaceSnap one another, when meeting for the first time.
FaceSnap can be promoted by Online and standard Dating Agencies * A FaceSnap logo would be added to a dating agency website, on their member's 3 profile. By agreeing to go on a date with a FaceSnap member, the person is consenting to be "FaceSnap" photographed.
* When going on a date all members are advised to have fun and FaceSnap photograph each other.
FaceSnap can be promoted by Social Network Sites * A Facebook style plug-in will be developed allowing members to show this on their social network site profile: FaceSnap ID Secure'.
* This will both promote the product, services but also be used to show they are empowered to make a change.
FaceSnap can be promoted by Utility Companies * Problem: Bogus callers and workmen are calling at people's houses actively targeting people's goodwill and trust. When inside they are able to commit serious crime and thefts without fear of being caught.
* It is envisaged that utility companies would want to support crime prevention initiatives, and thus exclude bogus house callers, and show they are transparent, honest and reputable companies.
* Membership vouchers with heavy discounts could be actively provided for the drivers and companies to run PR with people's safety in mind, while making additional money. Any member who joins from the coded voucher, will receive direct revenue from FaceSnap.
FaceSnap can be promoted by Mini Cab companies Problem: Un-registered illegal mini cabs touting for business at busy weekends are giving mini cab drivers a bad name and stealing their business Some predators are actively searching out, lone, vulnerable females after clubs have closed under the pretence of being a mini cab driver, giving mini drivers a bad name.
* By supporting FaceSnap, mini cab drivers could drive out the illegal touts and predators and also protect themselves from abuse by the members of the public.
* Remember a FaceSnap ID links 2 people to have interacted at a specific time, date, and position. If a member of the public had been encouraged to make a FaceSnap image, they would think twice before assaulting the minicab driver, and could easily be reminded that the FaceSnap ID links them.
Membership vouchers with heavy discounts could be actively provided for the drivers and companies to run PR with people's safety in mind, while making additional money. Any member who joins from the coded voucher, will receive direct revenue from the FaceSnap service.
FaceSnap can be promoted by Universities, Local Night Time Businesses, Night Clubs, Bars, Restaurants Membership vouchers with heavy discounts could be actively provided for companies to run PR with people's safety in mind, while also making additional money. Any member who joins from the coded voucher, will receive direct revenue from FaceSnap.
FaceSnap can be promoted by Estate Agencies Problem: Estate agents (in US English: Realtors) are especially vulnerable when meeting people for the first time at empty addresses to show them around properties.
Other Uses A parent could purchase the live tracking for their children, and the member could be warned when their child travelled outside of a defined location.
The Live Tracking could be purchased on behalf of an older relative, and a member be warned when the relative has travelled outside of a defined location.
Other possible solutions Sending an MMS of a photo to a digital safe (Online Service) through a short-code or long code number. The FaceSnap service can support sending of data via SMS/MMS.
Details on the FaceSnap Mobile Security and Server Communications a. A unique UID is generated for each member. With Revision', this is used to link mobile users to database members.
b. The mobile device on first request uses username and password. This then requests UID and Revision from the online server.
c. All data is sent to the Server together with the Unique UID and Revision.
d. The server will only receive and accept data with the correct UTD and Revision.
e. Members can log in/out remotely from any device with the FaceSnap application Software on, to deposit data into their online digital safe deposit box.
� When the FaceSnap software has received a new username and password, the UID revision will be updated on both server and mobile device.
g. A user can change their username and password from the web interface, and any mobile devices attempting to use their old username and password (Old UID and Revision) will be reset and data not accepted h. In the event that a handset is lost or in an emergency situation, the handset can remotely be activated to start live tracking from the server, even if member is not a LiveTrack subscriber.
i. FaceSnap Application is sent OTA directly to the member's mobile device.
FaceSnap with Livetrack a. A Web Interface shows a graphical view with the member's position plotted on a map in real time. Also includes Police, Paramedics, and other emergency service locations. Note that each member's data is stored within their own digital vault; no one has free access to this data. In the event of an emergency 999 call, the member's data can however be accessed directly by the police; the police will access the LiveTrack data through the Facesnap secure operational server application. This is not a website available over the public internet, but it does have a web interface. This is locked down S to a single terminal within the physical control room. And only the approved police officer can access the data on the selected pre agreed terminal.
b. Live Link -Members can be linked to otlier members, or emergency officials, and distance can be calculated and continuously tracked in real time, via web interface, to enable the individuals to meet in real time.
More details on the 1 touch FaceSnap Key Mobile Device The mobile device running the FaceSnap application is adapted to transmit the captured image data to a designated remote server, immediately following data capture. By using a mobile communication device that is adapted to capture an image and transmit the image to a designated server by a single key activation, this means that a user can capture and transmit images to a pre-determined, designated remote server quickly and easily, without liaving to perform several steps or perform a sequence of several button presses. Images may be sent to the designated remote server quickly and easily, and this is helpful to a user that sends images to a specific designated remote server often. A further advantage is that in the event of an emergency, a photograph can quickly be taken and sent to the designated remote server. For example, if the user of the mobile communication device \vere attacked, the user would only need to activate one key on the device in order to capture and send an image to the remote server. By sending the image to a remote server, the image can be retrieved later, even if the mobile communication device has been damaged or stolen, for example.
The image is preferably a digital photograph. Alternatively the image may comprise video image data. Preferably the mobile communication device includes an activation apparatus and/or method, wherein when the activation apparatus and/or method is activated by a single key activation, the mobile communication device captures an image and transmits the image to a designated server. Preferably the activation apparatus and/or method includes a push button. Alternatively the activation apparatus and/or method may include a touch screen button. Preferably the image is transmitted using a secure data connection. A Multimedia Messaging Service (MMS) message may also be used.
The mobile communication device may be a mobile phone / cellular phone, portable digital assistant (PDA) or some other portable device capable of capturing and transmitting images.
S Other Concepts * A mobile communication device for capturing and transmitting images, the mobile communication device comprising a transmission apparatus and/or method and a capture apparatus and/or method for capturing images, wherein the mobile communication device is adapted to capture an image and transmit the image to a designated server by a single key activation.
* A particular method for storing images captured by a mobile communication device, the mobile communication device having a transmission apparatus and/or method, a capture apparatus and/or method for capturing images, at least one activation key and control apparatus and/or method, the particular method comprising the steps of activating an activation key of the mobile communication device, whereby on activation of the activation key the control apparatus and/or method causes the mobile communication device to capture an image and transmit the captured image to a designated server.
* A system for storing images captured by a mobile communication device comprising (i) at least one mobile communication device, the mobile communication device comprising a transmission apparatus and/or method, a capture apparatus and/or method for capturing images, wherein the mobile communication device is adapted to capture an image and transmit the image and data relating to the image to a designated server, the data relating to the image comprising the date and time the image was captured, and (il) a designated server adapted to receive and store an image and data relating to the image, transmitted via the transmission apparatus and/or method of the mobile communication device, wherein the image and data relating to the image are retrievable.
Dynamic Server Control of Livetrack with battery monitoring The Facesnap Server Application has dynamic control over the connection intervals of all mobile devices. The server application monitors battery life and automaücally adjusts the connection intervals to be optimised for devices in the field. When a mobile device next connects it is given a new interval time.
3 This can be managed at a single handset level or by handset groups, across the specific handsets that show heavy battery drain.
Usercase 1 -Application Download onto the Members existing mobile phone: 1. When a user sign's up from the Facesnap Website, the process is as follows a. Provide their mobile number; b. Provide their handset make and model c. Provide operator d. Provide country 13 e. Request handset support for the Facesnap express application 2. The member is then shown which services are supported on their handset 3. The member then chooses to purchase the subscriptions they are interested in a. Facesnap i. 12 month ii. I month b. Livetrack i. I 2month 23 ii.I month c. Zonebreach i. 12 month ii. 1 month 4. The Member then enters credit card details and purchases subscription/s a. payment card used for ongoing billing b. payment used for security checking the member 5. The Member is then given or can create their username and password 6. The member is then given the opportunity to enter personal information -This includes a. Detailed description -Eye colour Hair Colour, Size, Weight, etc. 3 b. Photo of themselves c. Personal Safety Information -Favourite places, family contact names and details d. The member can log on at any time and add more information and update this directly 7. The Server application then creates a unique ID for the member -(UID) linked to their username and password 8. The Server Provisioning application then selects the best application to send to the member, based on their handset, operator, country information.
9. SMS is sent to the member containing a URL which links directly to the provisioning server via HTTP(s)data connection 10. When a member clicks on the URL, this launches the URL, and on connection to the provisioning server prompts user to download the mobile application (Facesnap Express) 11. The mobile phone Application along with the configuration settings file (including the information defining the server's URL so that the mobile phone can automatically 23 send image data to the server over a HTTPs connection), is then automatically installed by the phone software 12. Once installed the phone application (Facesnap Express) then runs for the first time; On First Boot only the application a. Asks to accept T&C's b. Asks to enter username and password 13. The phone application (Facesnap Express) then connects via HTTP(s) to the server application and requests the UID, using username and password as reference 14. Mobile Phone application (Facesnap Express) then can be used by the member as the server apphcation and phone have the requited information a. UID 3 b. Username c. Password d. The correct Mobile phone number sending data into the members digital vault.
(This is provided to the server apphcation, by the member on the website and is not known by the mobile phone application at all) 13. Once installed the application will be launched and on launching will a. BACKGOUND ACTIVITY -Check if GPS is switched on and switch on if necessary, request location co-ordinates to ensure satellite fix.
b. CONSUMER PERCEPTION -Launch immediately into the Facesnap ID 13 viewfinder mode c. CONSUMER PERCEPTION -On a single button press by consumer i. the Facesnap ID will be taken ii. the Facesnap ID will be displayed as preview for (x) sec/s -Showing all data captured Facesnap Secure tii. (Application will start background activity to send data) iv. Immediately Application will Return to Viewfinder v. SMS will be received saying Facesnap safely deposited vi. A record of time/date Facesnap sent are kept in Sent Facesnap Log List (No actual data or image is kept on mobile device).
d. BACKGROUND ACTIVITY -starts when consumer takes a Facesnap i. Facesnap ID Image/s Captured il. Time and Date recorded ii. Location Co-ordinates (GPS) recorded iv. Battery Life on handset is recorded v. Secure HTTP(s) Data connection made to server application (through browser) vi. Using the UID-All Data will be provided to server application -all at the same
time, or date fields provided separately.
vii. All Data will be stored instantly into the Members Digital Vault.
viii. HTTP(s) Data connection (through Browser) automatically closed, disconnected USERCASE 2 -Consumer buys handset with Facesnap Express mobile application pre-loaded -TRIAL MODE ACT IVATION
S
1. User -Launches Application 2. Prompted are they a member a. Enter Username and Password b. If not a member they skip this step to 3. Assuming not a member -Application launches into Facesnap ID viewfinder mode 4. Using a single button press user can capture Facesnap ID a. A message is displayed to user asking if they would like a free trial -Yes/NO IS b. On answering YES i. the application connects to Server application (using browser) over HTTPs(s) ii. requests a New Temporary UID iii. requests phone number to send SMS to iv. closes connection c. Application returns to Facesnap ID Viewfinder mode and can be used for trial period.
ci. User can capture Facesnap ID as per normal use above, but with a countdown showing how many Facesnap ID's are left.
e. On use of all free Facesnap ID's the user is prompted to sign-up online and application prompts for username and password.
f. BACKGROUND ACTIVITY -(Facesnap Express) Mobile phone application i. Composes background SMS, inserts the new temporal-v UID into the text body ii. Sends background SMS to the phone number provided by the server iii. Server application receives Phone number and Message Body via SMS Gateway iv. Server application Adds the Phone number into The Temporary Users Trial Account v. Server application allows trial use for qc number of Facesnap ID's to be received
g. BACKGROUND ACTIVITY -Server application
i. On receiving any data with a mobile phone number from the SMS Gateway ii. A Trial account is created for a new member iii. A Username and Password are created iv. An SMS is sent to the phone number v. The SMS includes the Username and password vi. And prompts the user to log onto the Web site to see Demo of how their data 3 would be stored into their digital vault NOTE: The UID changes dynamically any time * a user logs into their Web site members area and changes any personal details * a user enters username and password into a Facesnap Express mobile application (on any phone) All other Facesnap Express Applications trying to use the old UID are reset and prompt for username and password. This ensures only the latest logged in phone will be allowed to connect and send data into the member's digital vault.
13 NOTE: When the server application receives any data from Trial account users they will be sent promotional SMS's to send them to the Facesnap Website thus converting them to paying customers.
Dynamic ULD Each Facesnap customer account, whether a Test Account or a Member Account, will have a unique ID (UID). The server will allocate a UID when a customer initiates a Test Account or signs up to a Member Account. A customer may initiate a new Test Account by starting the Facesnap Express application and requesting to use it in Trial Mode or by 23 sending a Facesnap image into the server via MMS. A customer will sign-up to a Member Account via the Facesnap Website. When a customer opens or logs into Facesnap Express on their phone, for example by using the Usernarne and Password from their Member Account, then the Server will issue a new UID for that Member and transmit the UID for the logged in account down to the Facesnap Express installation on the phone.
In order to dc-activate a logged in instance of Facesnap Express, Facesnap staff may "increment" the UID for a Member using a function of the Database Website's Admin Area. The server will store the UID history for each Member Account, and during each communication between Facesnap Express and the server, Facesnap Express will send the UID that is has stored and the server will respond \vith the latest UID for that Member Account. If the latest UID does not match the stored UID then Facesnap Express will log the user out of the account automatically and return the application to the virgin state.
S The UID will be a system-wide incremental number (32-bit unsigned integer), with each new account or incremented UID for an existing account simply taking the next number in the sequence. Numbers will not be re-used, and a common sequence will span Test and Member Accounts.
Facesnap Express will have the capability to operate in either of two modes: Limited mode: This will allow the user to upload a limited number of Facesnap images, with no other facilities available. Facesnap Express will upload the Facesnap images into the users Test Account on the Facesnap database.
Full Mode: This will allow the user to use all of their subscribed Facesnap Services.
Facesnap Express will upload their Facesnap images and GEO Locations into their Members Account on the Facesnap system database.
Facesnap Express will require a unique id (UID) issued by the database in order to transmit Facesnap images and GEO Locations to the \Vebsite. The UID is obtained according to whether the application is operating in Limited or Full Mode as follows: Limited mode: Facesnap Express makes a Temporary User Registration request to the database. The database creates a Test Account in real-time and passes the UID it has issued to that Test Account back to the Facesnap Express application.
The Facesnap Express application then sends an SMS message from the phone to the database (via a defined phone number at the database) containing the phone number of the user along with the UID that has been issued -thus allowing the database to tie together the UID it issued with the phone number of the user.
Full Mode: The user enters their Facesnap Member Account username and password into Facesnap Express. Facesnap Express then makes a User Registration request to the database, passing to the server the username and password. If the database can match the username and password to a Facesnap Member Account then the database passes an incremented (i.e. new) UTD for that Member Account back to the Facesnap Express application.
3 Ensuring the correct handset is always being tracked If a user changes their mobile phone then Facesnap must offer a means by which they can transfer their Facesnap Express installation to their new phone and disable Facesnap Express on their previous phone. to
Facesnap Express and the database will accommodate three scenarios as described below.
Process if the Member manually wipes their previous phone: -The Member chooses the wipe function within Facesnap Express on their previous phone; -The Facesnap Express installation will set itself back to the virgin state and so will ask a future user of that phone to enter a username/pwd if they start Facesnap Express (or they may use it in Limited Mode with a new Test Account).
Process if the Member does not manually wipe their previous phone 23 -The Member installs Facesnap Express on their new phone; -The Member starts Facesnap Express on the new phone, and, when prompted, enters their username and password; -The database increments the UID and returns the new UID in the same way as for any registration of Facesnap Express; -If Facesnap Express is used on the previous phone the database will detect that the UID sent from the phone and the current UID on the database are different and will pass a "wipe" command back to Facesnap Express on the previous phone.
Process if the Member manually changes their Username/Pwd * The Member logs onto the Members' area of the Facesnap Database 3 Website, and enters and new username and/or password; * Because the member has changed their username/pwd the database automatically increments the UID for the member; * If anyone attempts to use Facesnap Express on the previous phone, or indeed any phone registered to the old UID, then, on communication from Facesnap Express to the database, the old UID will be sent to the database; * The database will detect that Facesnap Express has sent an old UID and the database will respond with a "wipe" command back to Facesnap Express.
13 In order to use Facesnap Express on a new phone, the Member will need to download the correct version of Facesnap Express onto their new phone. In order to do this, the Member will change the phone model that they have registered with Facesnap via the Members' area of the Facesnap database website. The database website will detect the change in model, and will send a request to the Provisioning Server, which will take control of the provisioning process from that point.
Auto set-up of Test Account: The database will automatically generate a Facesnap Test Account in the following 23 circumstances: * If an MMS Facesnap is sent to the database from an unrecognised phone number; * If someone starts to use Facesnap Express in Limited Mode.
In order to determine the phone number associated with a person using Facesnap Express in Limited Mode, Facesnap Express will operate as follows: -The user starts Facesnap Express, and chooses to use Facesnap Express in Limited Mode; -Facesnap Express sends a Temporary User Registration request to the database; -The database creates a Test Account and responds to Facesnap Express with 3 the UID for the Test Account; -Facesnap Express sends an SMS message to the database from the phone, with the allocated UID contained within it; -The database uses the UID from the SMS message content to determine the relevant Test Account, and populates that Test Account with the "sent from" phone number.
It is worth noting that the Facesnap system will not allow a Test Account user to download Facesnap Express, and so the Limited Mode of Facesnap Express will only be available to users who have Facesnap Express pre-installed on their mobile phone.
On generation of a new Facesnap Test Account, the database will send an SMS message to the mobile phone number associated with the account welcoming them to Facesnap and providing a URL and password to their Test Account on the Facesnap database website. The database will assign the person's mobile phone number as the username for all Test Accounts and will generate the password as a unique password across all Test Accounts.

Claims (34)

  1. CLAIMS1. Method for protecting the safety of a user of a personal, mobile device in an encounter with a person by making a secure record of the encounter, comprising the 3 steps of: (i) taking, with the mobile device, an image of the person, and generating image data; (ii) automatically transmitting the image data from the mobile device to a secure server; and (iii automatically making a secure record of the transmitted image data at the secure server.
  2. 2. The method of Claim I in which the personal, mobile device is capable of permanently storing the image data, but the image data is instead automatically removed from the mobile device once it has been transmitted to the secure server.
  3. 3. The method of Claim I or 2 in which the secure record is not accessible to the user.
  4. 4. The method of any preceding Claim, including the step of the user taking the image, leading automatically and without any subsequent further user interaction, such as the user setting or selecting the destination, to the automatic transmission of the image data to the secure server.
  5. 5. The method of any preceding Claim 1, in which the secure record includes a date 23 and time stamp associated with the data and time of transmission and/or reception, according to the secure server.
  6. 6. The method of any preceding claim in which user identification data is automatically transmitted with the image data to the secure server.
  7. 7. The method of Claim 6 in which the user identification data includes an image of the user who is using the mobile device.
  8. 8. The method of Claim 7 in which the image of the person and the image of the user are taken automatically at the same time, or within a pre-defined time period.
  9. 9. The method of any preceding claim in which the mobile device establishes its 3 own location when the image is taken; the associated location data is then sent together with the image data.
  10. 10. The method of Claim 9 in which the image data and location data are automatically processed and transmitted in real time, i.e. within a very short space of time, by the mobile device.
  11. 11. The method of any previous Claim, in which a bi-directional camera or multiple bi-directional cameras are used to capture an image of the user and the person.
    13
  12. 12. The method of any previous Claim, in which the mobile device has a single hard wired button, or a soft key such as a touch screen key, that causes or initiates the automatic capture and transmission of the image data with a single key press.
  13. 13. The method of any previous Claim in which the mobile device responds to a single voice command to cause or initiate the automatic capture and transmission of the image data.
  14. 14. The method of any previous Claim, in which the mobile device is a camera phone.
    23
  15. 15. The method of any previous Claim, in which the secure record includes: an image of the person encountered; an image of the user; a time & date stamp; and a location stamp (such as obtained by Cell ID & GPS).
  16. 16. The method of any previous Claim, in which for security, no image data is stored on the mobile device, other than transient storage prior to transmission.
  17. 17. The method of any previous Claim, in which the secure record cannot be changed, or modified in any way.
  18. 18. The method of any previous Claim, in which the secure record includes a time 3 and date stamp that are not taken from the mobile device but instead provided by the secure server.
  19. 19. The method of any previous Claim, in which the time and date applied to an image cannot be viewed, modified or changed in any way from the mobile device.
  20. 20. The method of any previous Claim, in which the location data applied to an image, such as GPS & Cell ID location data, is secure and cannot be modified, accessed or updated in any way from the mobile device.
    13
  21. 21. The method of any previous Claim, in which the secure record can only be generated in real time, i.e. very shortly after taking the image, by using secure software running on the mobile device.
  22. 22. The method of any previous Claim, in which the secure record includes two photos: one photo of the person, which is transiently displayed on a display of the mobile device and the second of the user, which is not displayed on the display.
  23. 23. The method of any previous Claim, in which 24/7 live tracking is provided by the mobile device.
  24. 24. The method of Claim 23, in which live tracking can be started remotely in the case of an emergency from the server without the mobile device having to have a data connection, other than a data messaging connection.
  25. 25. The method of any previous Claim, in which the image is taken by the mobile device under the control of a secure application that cannot be disabled by anyone other than the user.
  26. 26. The method of any previous Claim in which the image data is sent immediately, and location data can be sent at the same time, or sent at separate times.
    3
  27. 27. The method of any previous claim, in which the method is used by at least one of a police force, a user when meeting a new person, an online or standard dating agency, a social network site, a utility company, a mini cab company, a university, a local night time business, a night club, a bar, a restaurant, or an estate agent.
  28. 28. The method of any previous claim, in which the user can send an MMS of an image to a digital safe through a short-code or long code number.
  29. 29. The method of any previous Claim in which a unique UTD is generated for each member authorised to send image data to the secure server, and in which the UID, with 13 revision, is used to link users to members.
  30. 30. The method of Claim 29, in which the server generates the unique ID for each member; sends tliat unique ID to tlie mobile device of eacli member; clianges a unique ID whenever a user first opens an application on the mobile device responsible for automaticaliy transmitting the image data by for example entering in a username and password; sends that changed unique ID to that mobile device for that mobile device to store; receives a unique ID from a mobile device whenever that device transmits image data to the server and determines if that unique ID matches the unique ID the server has listed for that mobile device, only generating a secure record if there is a match.
  31. 31. Computer program product for protecting the safety of a user of a mobile device in an encounter with a person by making a secure record of the encounter, where the computer program product is instaliable on the mobile device, and, in use, controls (i) the taking of an image of the person; (ti) the automatic generation of image data; and (iii) the automatic transmission of the image data from the mobile device to a secure server.
  32. 32. Mobile device for protecting the safety of a user of the mobile device in an encounter with a person by making a secure record of the encounter, where the mobile device is operable to (i take an image of the person; (ii automatically generate image data; and (iii) automatically transmit the image data from the mobile device to a secure server.
    3
  33. 33. System for protecting the safety of a user of a mobile device in an encounter with a person by making a secure record of the encounter, the system including the mobile device and a secure server, in which the mobile device is operable to (i) take an image of the person; (ii) automatically generate image data; and (iii) automatically transmit the image data from the mobile device to a secure server; and the server is operable to securely store the image data.
  34. 34. Method for protecting the safety of a user of a mobile device in an encounter with a person by making a secure record of the encounter, comprising the steps of: I 3 (i) taking, with the mobile device, an image of the person, and generating image data; (ii) transmitting the image data from the mobile device to a secure server; and (iii) automatically making a secure record of the transmitted image data at the secure server, in which the secure record is not generally accessible to the user.
GB0909545A 2008-06-04 2009-06-04 Automatic transmission of camera phone images to a secure server Withdrawn GB2460535A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB0810177.6A GB0810177D0 (en) 2008-06-04 2008-06-04 Portable communication device

Publications (2)

Publication Number Publication Date
GB0909545D0 GB0909545D0 (en) 2009-07-15
GB2460535A true GB2460535A (en) 2009-12-09

Family

ID=39638136

Family Applications (2)

Application Number Title Priority Date Filing Date
GBGB0810177.6A Ceased GB0810177D0 (en) 2008-06-04 2008-06-04 Portable communication device
GB0909545A Withdrawn GB2460535A (en) 2008-06-04 2009-06-04 Automatic transmission of camera phone images to a secure server

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GBGB0810177.6A Ceased GB0810177D0 (en) 2008-06-04 2008-06-04 Portable communication device

Country Status (2)

Country Link
GB (2) GB0810177D0 (en)
WO (1) WO2009147444A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100283609A1 (en) * 2009-05-07 2010-11-11 Perpcast, Inc. Personal safety system, method, and apparatus

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003134258A (en) * 2001-10-25 2003-05-09 Matsushita Electric Ind Co Ltd Digital camera mount type mobile phone, image information service system, and emergency notice system
GB2401752A (en) * 2003-05-13 2004-11-17 Guy Frank Howard Walker Mobile personal security eyewitness device
GB2419783A (en) * 2005-11-11 2006-05-03 Fraser William Tart Security apparatus
WO2006075521A1 (en) * 2004-12-27 2006-07-20 Jupiter Net Incorporated Mobile wireless transmitter having emergency notifying function, emergency notifying device, and emergency notifying system
US20060199609A1 (en) * 2005-02-28 2006-09-07 Gay Barrett J Threat phone: camera-phone automation for personal safety
US20070040895A1 (en) * 2005-08-19 2007-02-22 University Of South Florida Wireless Emergency-Reporting System
WO2009049170A2 (en) * 2007-10-12 2009-04-16 Secure Mobile Records, Llc System and method for securely storing wirelessly transmitted text, images, and video
GB2456532A (en) * 2008-01-16 2009-07-22 Elan Trading Ltd Personal security system and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7248170B2 (en) * 2003-01-22 2007-07-24 Deome Dennis E Interactive personal security system
JP2004252918A (en) * 2003-02-18 2004-09-09 Kosuke Okimatsu Security system
KR20030059027A (en) * 2003-06-13 2003-07-07 유병섭 Mobile phone for personal security
CA2532958A1 (en) * 2005-01-12 2006-07-12 George Raad Apparatus for providing information regarding a missing person to a monitoring station

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003134258A (en) * 2001-10-25 2003-05-09 Matsushita Electric Ind Co Ltd Digital camera mount type mobile phone, image information service system, and emergency notice system
GB2401752A (en) * 2003-05-13 2004-11-17 Guy Frank Howard Walker Mobile personal security eyewitness device
WO2006075521A1 (en) * 2004-12-27 2006-07-20 Jupiter Net Incorporated Mobile wireless transmitter having emergency notifying function, emergency notifying device, and emergency notifying system
US20080132199A1 (en) * 2004-12-27 2008-06-05 Jupiter Net Incorporated Portable Radio Device Having Emergency Notifying Function, Emergency Notification Apparatus, and Emergency Notification System
US20060199609A1 (en) * 2005-02-28 2006-09-07 Gay Barrett J Threat phone: camera-phone automation for personal safety
US20070040895A1 (en) * 2005-08-19 2007-02-22 University Of South Florida Wireless Emergency-Reporting System
GB2419783A (en) * 2005-11-11 2006-05-03 Fraser William Tart Security apparatus
WO2009049170A2 (en) * 2007-10-12 2009-04-16 Secure Mobile Records, Llc System and method for securely storing wirelessly transmitted text, images, and video
GB2456532A (en) * 2008-01-16 2009-07-22 Elan Trading Ltd Personal security system and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100283609A1 (en) * 2009-05-07 2010-11-11 Perpcast, Inc. Personal safety system, method, and apparatus
US9177455B2 (en) * 2009-05-07 2015-11-03 Perpcast, Inc. Personal safety system, method, and apparatus
US9589447B2 (en) * 2009-05-07 2017-03-07 Perpcast, Inc. Personal safety system, method, and apparatus

Also Published As

Publication number Publication date
GB0909545D0 (en) 2009-07-15
WO2009147444A1 (en) 2009-12-10
GB0810177D0 (en) 2008-07-09

Similar Documents

Publication Publication Date Title
US20200372599A1 (en) System and method for controlling, monitoring and recording of wireless telecommunications services in penal institutions
US9686660B2 (en) Secure mobile information management system and method
US8280359B2 (en) Methods of authorizing actions
US8225380B2 (en) Methods to authenticate access and alarm as to proximity to location
US8965416B2 (en) Distribution of lottery tickets through mobile devices
US8260274B2 (en) Extraction of information from e-mails and delivery to mobile phones, system and method
US20180124240A1 (en) Dissemination of real estate information through text messaging
US20090106052A1 (en) Computerized acquisition and compilation of vehicle accident information
US20130109341A1 (en) Home security system
US20230130298A1 (en) Personal security monitoring
CA2528615A1 (en) Remote control method and device controlled from communicating terminals
GB2460535A (en) Automatic transmission of camera phone images to a secure server
JP2005173678A (en) Visitor pre-specification system
KR20140019260A (en) How to prevent and respond to individual targets of crime using mobile networks and how to share information with law enforcement authorities
WO2003094118A1 (en) Parking system
US20230027652A1 (en) Personal Security System and Method
KR101433353B1 (en) Auto phone-connecting system for no revealing private information
AU2015202721B2 (en) Secure mobile information management system and method
KR20140144124A (en) Smartphone with app possible.
AU2012216853B2 (en) Secure mobile information management system and method
FR2868650A1 (en) Visitor and resident communication method for e.g. apartment, involves communicating between electronic porter controlling access to building and terminal of selected resident for direct communication of visitor and resident terminals
KR20060114811A (en) System and method for inquiring into a person's back-ground using by multimedia mobile phone
JP2002207839A (en) Certificate picture management system and its use method

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)