US20070218895A1 - Personal security system - Google Patents

Personal security system Download PDF

Info

Publication number
US20070218895A1
US20070218895A1 US11/687,818 US68781807A US2007218895A1 US 20070218895 A1 US20070218895 A1 US 20070218895A1 US 68781807 A US68781807 A US 68781807A US 2007218895 A1 US2007218895 A1 US 2007218895A1
Authority
US
United States
Prior art keywords
user
security
communication
associated
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/687,818
Inventor
Ghen Saito
Rodger Desai
Raju Rishi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rave Wireless Inc
Original Assignee
Rave Wireless Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US78427606P priority Critical
Application filed by Rave Wireless Inc filed Critical Rave Wireless Inc
Priority to US11/687,818 priority patent/US20070218895A1/en
Publication of US20070218895A1 publication Critical patent/US20070218895A1/en
Priority claimed from US12/105,828 external-priority patent/US8126424B2/en
Priority claimed from US12/105,790 external-priority patent/US8165562B2/en
Assigned to RAVE WIRELESS, INC. reassignment RAVE WIRELESS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DESAI, RODGER, RISHI, RAJU, SAITO, GHEN
Assigned to PNC BANK, NATIONAL ASSOCIATION reassignment PNC BANK, NATIONAL ASSOCIATION SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RAVE INTERMEDIATE HOLDINGS, INC., RAVE WIRELESS, INC.
Assigned to RAVE WIRELESS, INC., SWIFTREACH NETWORKS, LLC reassignment RAVE WIRELESS, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: PNC BANK, NATIONAL ASSOCIATION
Application status is Abandoned legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/009Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
    • H04M1/725Cordless telephones
    • H04M1/72519Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
    • H04M1/725Cordless telephones
    • H04M1/72519Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
    • H04M1/7258Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status by using keys with multiple functionality defined by the current phone mode or status
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/10Mobility data transfer between location register and external networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/005Context aware security
    • H04W12/00502Time aware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/005Context aware security
    • H04W12/00503Location or proximity aware, e.g. using proximity to other devices

Abstract

A personal security system takes advantage of location determination capabilities of a mobile communication services to provide personal security features to one or more communities of users. One method includes a user initiating a security period from a mobile device and specifying an end condition for that security period. If the user does not terminate the security period, at the end of the security period a notification is sent with information characterizing the user and a location associated with the user.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit of U.S. Provisional Application No. 60/784,276 filed Mar. 20, 2006, which is incorporated herein by reference.
  • BACKGROUND
  • This invention relates to a system for personal security.
  • Cellular telephone systems today typically provide some sort of location tracking of users, for example, to determine the location of a user that dials an emergency number (e.g., using E911). In some communities of users, such as students on a university campus, use of cellular telephones has become ubiquitous, with users using text messaging and other applications to stay “connected.”
  • SUMMARY
  • In one aspect, in general, a personal security system takes advantage of location determination capabilities of a mobile communication services to provide personal security features to one or more communities of users.
  • In another aspect, in general, a method includes a user initiating a security period from a mobile device and specifying an end condition for that security period. If the user does not terminate the security period, at the end of the security period a notification is sent with information characterizing the user and a location associated with the user.
  • In another aspect, in general, a method includes receiving communication indicative of initiation of a security period associated with a user of a mobile device. If the user does not terminate the security period, at the end of the security period sending a notification with information characterizing the user and a location associated with the user.
  • In another aspect, in general, a system includes a communication server that includes a communication link to a location based server for obtaining location information associated with mobile devices for users in a community. The communication server is configured to receive communication indicative of initiation by a user of the mobile devices of a security period, and if the user does not terminate the security period, at the end of the security period send a notification with information characterizing the user and a location associated with the user.
  • Aspects can include one or more of the following features.
  • Receiving the communication includes receiving a specification of an end condition for the security period. The end condition may include an end time for the security period. The method may include timing the security period to determine the end of the security period.
  • The user is prompted at the end of the security period to terminate the security period.
  • Sending the notification includes sending the notification to a security service associated with the user.
  • Information characterizing a location associated with the user is obtained from a mobile communication system servicing the mobile device. For example, the mobile device is a cellular telephone and the mobile communication system is a cellular telephone system.
  • The user was previously enrolled, for example, by receiving personal information associated with the user.
  • Sending the notification includes sending personal information associated with the user.
  • The security period can have a user-specified duration, and the end condition for the period corresponds to expiration of a timer for the period.
  • The user initiates the security period using a mobile device, and optionally terminates the security period using the mobile device. The mobile device can be a mobile telephone.
  • The location associated with the user can include a GPS-based location, for example, determined by a communication system to which the mobile device is coupled
  • In another aspect, in general, mobile devices are provided to users in a set of communities of users. Communication is monitored at a server from the users indicative of initiation and termination of security periods associated with the users. Based on the monitored communication, notifications are sent with information characterizing users and locations associated with said users. The recipients of the notifications are determined based on the corresponding communities to which the users belong. The notifications may be indicative of possible security conditions associated with the users. Sending of the notifications may be based on expiration of security periods prior to receipt of corresponding communication indicative of termination of the security periods.
  • Aspects can have advantages that include one or more of the following:
  • Faster and more effective intervention is possible. Campus safety can be immediately notified on an incident, the location and critical information such as the student's description and any medical issues. Students are also provided with a one button “panic call” option prompting an immediate response.
  • The system can eliminate “consensual” arguments in acquaintance assault because activation of the system is a clear sign that the student was uncomfortable in a situation.
  • Crimes in progress may be interrupted when the system timer expires campus safety immediately calls the student's phone, interrupting any assault
  • Clery Act Timely Warnings are made possible so that universities are able to instantly broadcast warnings via TXT messages.
  • Areas of concern on campus may be highlighted. Historical reporting on areas where the system was initiated provides universities with a clear picture of areas where students feel uncomfortable and at what times of day, enabling proactive measures such as increased patrols or enhanced lighting.
  • Other features and advantages of the invention are apparent from the following description, and from the claims.
  • DESCRIPTION OF DRAWINGS
  • FIG. 1 is a block diagram of a personal security system
  • FIG. 2 is a graphical display for security personnel.
  • DESCRIPTION
  • Referring to FIG. 1, a personal security system makes use of personal mobile handsets 128 coupled to a mobile communication system 120. Each handset 128 is associated with a corresponding user of the system. In some examples, the handsets are cellular telephones that are coupled by a mobile telephone system, such as a GSM, CDMA or and iDen based system.
  • Very generally, the system makes use of a communication server 110, one function of which is to determine when a security situation may exist for one of the users, and to then alert an appropriate security service 134. The security service then determines if there is truly a security situation, for example, by communicating with the user over the handset or investigating in person.
  • In order to aid the security service, examples of the system make use of various types of location based services. For example, the mobile communication system includes or has associated with it a location based server (LBS) 124, which is able to determine the location of a particular handset 128. The communication server 110 can query the LBS 124 (e.g., as a software based request over the Internet) to determine the location of a particular handset. Different examples of the security system make use of one or more types of location determination approaches. One type of location determination approach uses Global Positioning System (GPS) functionality that is built into the handset, optionally assisted by fixed elements of the mobile communication system 120 in an Assisted GPS (AGPS) approach. Other location determination approaches use signal strength and/or direction information in triangulation approaches based on transmitted or received radio signals from the mobile communication system. Yet other approaches are based on cell identification in a cellular telephone network.
  • Some examples of the system provide services to multiple different communities 130 of users. Communities can be various associations of users, which may each be served by their own security service 134. An example of a community is a university, with the security service being the campus police service for that university. In such an example, different universities typically have separate campus police services.
  • Note that in some examples, the communities may not be geographically separated. For example, urban universities may have student communities that are very close to one another (e.g., students of New York University and Columbia University), and the users is such communities may operate in overlapping geographic regions. The system supports configurations in which the users are serviced by the security service for their community, regardless of their actual geographic location.
  • In some examples, the personal security system supports a personal security button on the handset. Various approaches to configuring the handset to provide such a button are possible, including through provisioning by the operator of the mobile communication system and by downloading software to a configurable device. For example, the “home” or “dashboard” screen of a mobile telephone can provide direct “one touch” access to security services.
  • When a user activates the personal security button, the handset 128 sends a message to the communication server 110. Various approaches to sending the message are used in different examples of the system. Some examples use a Short Message Service (SMS) provided through the mobile communication system. When the communication server 110 receives the message, it queries the LBS 124 to determine the location of the sending handset. In some examples the LBS already has access to location information for the handset that is maintained by the communication system, while in other examples, it in turn queries the communication system which determines the handset's location. The LBS returns the handset's location to the communication server 110, which then contacts the appropriate security service 134 for the user's community.
  • Different examples of the system use various approaches to enrollment of users. In some approaches, a web-based approach is used in which a user provides enrollment information to the communication server. Such information includes an identification of the user's community 130, and optionally personal information that might be useful to the security service in an emergency. In other examples, the users enroll through a system operated by the community, and personal information is maintained privately within the community. The community provides the communication server with identifications of the handsets within its community. Example of personal information that may be useful to a security service is a photograph of the user and physical data (e.g., gender, height, weight, hair color, etc.)
  • Some mobile communication systems 120 require that a user authorize particular parties so that they can access their location information, for example, through the LBS 124. In such systems, as part of the enrollment process the users provide the necessary authorization, which is communicated to the LBS and/or the mobile communication system.
  • In some examples, the personal security system supports a mode that can be used when a user expects to be at some risk for an upcoming interval of time. For example, a university student may need to cross a campus late at night and feel at risk walking along isolated paths.
  • Some examples of such a mode use a timer-based approach. Generally, when the user is about to initiate an interval of time during which they may feel at risk, they initiate the timing of an interval by the security system. If the user “checks in” before the expiry of the interval, or alternatively in response to a prompt by the system at the end of the interval, the user is deemed to be safe. On the other hand, if the user does not check in or does not respond to a prompt, or optionally if the handset is not accessible from the communication system 120 during the interval, the security service for that user's community is notified along with the last known location of the handset.
  • Referring to FIG. 1, a sequence of steps for a previously registered user of the system are described in such an example:
  • Step 1: The user notifies the communication server 110 that they are about to start an at-risk interval. In different examples, this step is carried out in a variety of ways. For example, the handset may have a browser (e.g., a Wireless Application Protocol, WAP, browser) that accesses an application at the communication server that provides a graphical interface for display on the handset. The graphical interface permits the user to enter the duration of the interval (or alternatively the end time of the interval). In some examples, the user has provided a Personal Identification Number (PIN) to be used to check in—in other examples the user provides a check-in PIN at the start of the interval. In some examples, a software application has already been loaded on the handset, and the application sends data messages to the communication server 110 to initiate the interval. In other examples, communication techniques such as SMS, or voice based (e.g., using speech recognition) or touch-tone (DTMF) based interfaces are user by the user to inform the communication server that the interval is about to start. In some examples, the communication between the handset and the communication server is direct, while in other examples, the communication is mediated by a system operated by the user's community. When the communication server determines that the user has started an interval, it begins a count-down timer that will expire at the end of the interval.
  • Step 2 a: Prior to the end of the interval, the user can communicate with the communication server to check in and terminate the interval. With PIN-based approaches, the user enters their secret PIN, which was recorded as part of a registration procedure, or was provided at the start of the interval. In some examples, the user has the option of entering a special PIN that indicates that they are in danger. For example, suppose an attacker forces a user to terminate the interval, the user can enter a special PIN, such a pre-arranged PIN or the normal PIN with a special suffix (e.g., adding a 1 at the end of the PIN). This can signal the communication server that the user is in danger without alerting the attacker.
  • Step 2 b: If at the end of the interval the user has not yet check in, the communication server can act on the possibility that the user is in danger. In some examples, the server first communicates automatically with the user. For example, the server may interact with an application executing on the handset, send a SMS-based message that needs to be responded to, or may a telephone call requiring voice or text entry of the PIN.
  • Step 3: If the user has not checked in prior to the expiry of the planned interval, or has not responded to the prompt from the system at the end of the interval in examples that are configured to provide such a prompt, the communication server 110 requests location information for the user's handset.
  • Step 4: The LBS 124 determines the last known location of the user, optionally with the time the location determination was made. The LBS then send this location information to the communication server 110. The location information may take various forms, such as latitude and longitude.
  • Step 5: The communication server 110 notifies the security service 134 for the user. In examples in which the communication server 110 serves many communities, the server has been configured with at least information identifying the particular security service to notify (or alternatively, multiple security services may be notified and only the one responsible for that handset acts on the notification). In examples in which the communication server has additional personal information related to the user (e.g., name, photo, etc.) it sends this information along with the notification. In examples in which the security service has access to personal information for that user, it accesses that information in response to the notification.
  • In some examples, security personnel, for example at a command station or at a mobile device for personnel on patrol, are provided with a display associated with the user and the current risk. For example, referring to FIG. 2, a graphical display with a map showing the user's location (or last known location), a photograph of the user, as well as text-based personal information are displayed to the security personnel.
  • Step 6: The security personnel attempt to interact with the user, for example, by calling their handset to establish person-to-person communication, and/or by dispatching personnel to the user's location to provide assistance. When appropriate, the security service may notify other security organizations, such as a local police department, to help handle the incident.
  • In some examples, when a user initiates an at-risk interval, the communication server may initially inform the security service and provide location information obtained from the LBS on an ongoing basis. The security service can maintain a display, for example showing their locations on a map, of users as they travel. In some examples, users may have the option of permitting or denying such tracking, for example, for privacy reasons. A concentration of users in a particular area may be addressed by dispatching preventive patrols into the area. Also, historical information may be logged, for example, to identify areas and time in which users feel at risk or in which incidents actually occur. Such historical information may used, for example, to improve users' sense of security in those areas, for example though physical improvements (e.g., lighting) or increased patrols.
  • In some examples, the security period may be defined using other and/or additional criteria than time duration or end time. For example, a user may identify a route (e.g., using a destination building number) and the security period is defined as the time until the user reaches the destination. In such an example, the end of the security period may be defined by the server as a reasonable time needed to reach the destination. In some examples, the communication server may determine that there may be a possible security condition if the user deviates significantly from a path to the declared destination.
  • In some examples, security periods may be initiated or defined by entities other than the user. For example, a parent may require that a child check in at a particular time (e.g., at midnight) or at a set of prespecified times (e.g., every two hours). In addition or instead of notifying a security service, the parent may be notified if the child fails to check in. That is, the parent may serve the role of the security service. Similarly, an elderly parent may need to check in periodically or else their adult child or other caregiver is notified with information about their location. In some examples, a child may initiate the security period with the parent being notified if they fail to terminate the period or check in when prompted.
  • In some examples, a security period may be initiated by a passive activity of the user. For example, a system may detect that a user has entered a predefined geographic area (e.g., going off campus, leaving a nursing home) and may have to check in within a certain period of time (e.g., within one hour).
  • In some examples, the user's community security service is notified regardless of the user's geographic location. For example, a user from a university in California may be visiting New York City yet their security-related notifications are sent back to California. This approach can permit their university security service to provide additional information to local New York police. In other examples, the security service that is notified may depend on the user's geographic location. For example, universities may cooperate and a student visiting another university's campus may result in a notification to the security service of the visited university in addition or instead of the user's home university.
  • In some examples, one communication server 110 may interact with multiple mobile communication systems. For example, users in a single community 130 or in different communities 130 may be served by different mobile telephone carriers.
  • In some version of the system, additional community services 136 may take advantage of the capabilities of the communication server. For example in a university situation, a community service may include an academic group that provides class-related notifications (e.g., class cancellation, in-class surveys, etc.). Another community service may include access to transportation information, such a campus bus routes, schedules, and expected arrival time information. Other examples include broadcasting of campus-wide alerts, which may be security related.
  • In the description above, in some examples of the system a university student community is provided as an example of users served by the system. Other examples of communities may be served by examples of the system. For example, personnel on a military base, a special interest group, a church group, residents of a housing development, inhabitants of cities, towns, hotel guests, etc. can each form a community served by an example of a personal security system.
  • In some examples, capabilities described are implemented in software, which may be stored on computer readable media or embodied on signals propagating through communication media (e.g., over wired or wireless networks). The software may include instructions, such as machine instructions, programming language or interpreter statements, instructions for virtual machines (e.g., Java), or other forms of instructions. The software may be distributed, for example, with some components execution on the handsets and other components executing at fixed servers.
  • It is to be understood that the foregoing description is intended to illustrate and not to limit the scope of the invention, which is defined by the scope of the appended claims. Other embodiments are within the scope of the following claims.

Claims (17)

1. A method comprising:
receiving communication indicative of initiation of a security period associated with a user of a mobile device; and
if the user does not terminate the security period, at the end of the security period sending a notification with information characterizing the user and a location associated with the user.
2. The method of claim 1 wherein receiving the communication includes receiving a specification of an end condition for the security period.
3. The method of claim 2 wherein the end condition includes an end time for the security period.
4. The method of claim 2 further comprising timing the security period to determine the end of the security period.
5. The method of claim 1 further comprising prompting the user to terminate the security period at the end of the security period.
6. The method of claim 1 wherein sending the notification includes sending the notification to a security service associated with the user.
7. The method of claim 1 further comprising obtaining information characterizing a location associated with the user from a mobile communication system servicing the mobile device.
8. The method of claim 7 wherein the mobile device comprises a cellular telephone and the mobile communication system comprises a cellular telephone system.
9. The method of claim 1 further comprising:
enrolling the user, including receiving personal information associated with the user.
10. The method of claim 9 wherein sending the notification includes sending the personal information associated with the user.
11. A method comprising:
providing mobile devices to users in a plurality of communities of users;
monitoring communication at a server from the users indicative of initiation and termination of security periods associated with the users; and
based on the monitored communication, sending notifications with information characterizing users and locations associated with said users, recipients of the notifications being determined based on the corresponding communities to which the users belong.
12. The method of claim 11 wherein the notifications are indicative of possible security conditions associated with the users.
13. The method of claim 11 wherein the sending of the notifications is based on expiration of security periods prior to receipt of corresponding communication indicative of termination of the security periods.
14. A system comprising:
a communication server including a communication link to a location based server for obtaining location information associated with mobile devices for users in a community;
wherein the communication server is configured to
receive communication indicative of initiation of a security period associated with a user of the mobile devices, and
if the user does not terminate the security period, at the end of the security period send a notification with information characterizing the user and a location associated with the user.
15. The system of claim 14 further comprising the plurality of mobile devices configured for communication with communication server.
16. The system of claim 14 further wherein the communication server is further configured to receive a communication initiated by the user during the security period and in response to send a notification with information characterizing the user and a location associated with the user.
17. Software comprising instructions embodied on a machine-readable medium for causing a processing system to:
receive communication indicative of initiation of a security period associated with a user of a mobile device; and
if the user does not terminate the security period, at the end of the security period send a notification with information characterizing the user and a location associated with the user.
US11/687,818 2006-03-20 2007-03-19 Personal security system Abandoned US20070218895A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US78427606P true 2006-03-20 2006-03-20
US11/687,818 US20070218895A1 (en) 2006-03-20 2007-03-19 Personal security system

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
US11/687,818 US20070218895A1 (en) 2006-03-20 2007-03-19 Personal security system
US12/105,828 US8126424B2 (en) 2006-03-20 2008-04-18 Personalized message escrow with graphical route representation
US12/105,790 US8165562B2 (en) 2006-03-20 2008-04-18 Personalized message escrow
US13/440,319 US9071643B2 (en) 2006-03-20 2012-04-05 Personal security system
US14/748,721 US9277389B2 (en) 2006-03-20 2015-06-24 Personal security system
US15/054,544 US9503876B2 (en) 2006-03-20 2016-02-26 Personal security system
US15/332,067 US9813885B2 (en) 2006-03-20 2016-10-24 Personal security system
US15/805,636 US10182332B2 (en) 2006-03-20 2017-11-07 Personal security system
US16/248,093 US20190268746A1 (en) 2006-03-20 2019-01-15 Personal security system

Related Child Applications (3)

Application Number Title Priority Date Filing Date
US12/105,790 Continuation-In-Part US8165562B2 (en) 2006-03-20 2008-04-18 Personalized message escrow
US12/105,828 Continuation-In-Part US8126424B2 (en) 2006-03-20 2008-04-18 Personalized message escrow with graphical route representation
US13/440,319 Continuation US9071643B2 (en) 2006-03-20 2012-04-05 Personal security system

Publications (1)

Publication Number Publication Date
US20070218895A1 true US20070218895A1 (en) 2007-09-20

Family

ID=38523219

Family Applications (7)

Application Number Title Priority Date Filing Date
US11/687,818 Abandoned US20070218895A1 (en) 2006-03-20 2007-03-19 Personal security system
US13/440,319 Active US9071643B2 (en) 2006-03-20 2012-04-05 Personal security system
US14/748,721 Active US9277389B2 (en) 2006-03-20 2015-06-24 Personal security system
US15/054,544 Active US9503876B2 (en) 2006-03-20 2016-02-26 Personal security system
US15/332,067 Active US9813885B2 (en) 2006-03-20 2016-10-24 Personal security system
US15/805,636 Active US10182332B2 (en) 2006-03-20 2017-11-07 Personal security system
US16/248,093 Pending US20190268746A1 (en) 2006-03-20 2019-01-15 Personal security system

Family Applications After (6)

Application Number Title Priority Date Filing Date
US13/440,319 Active US9071643B2 (en) 2006-03-20 2012-04-05 Personal security system
US14/748,721 Active US9277389B2 (en) 2006-03-20 2015-06-24 Personal security system
US15/054,544 Active US9503876B2 (en) 2006-03-20 2016-02-26 Personal security system
US15/332,067 Active US9813885B2 (en) 2006-03-20 2016-10-24 Personal security system
US15/805,636 Active US10182332B2 (en) 2006-03-20 2017-11-07 Personal security system
US16/248,093 Pending US20190268746A1 (en) 2006-03-20 2019-01-15 Personal security system

Country Status (3)

Country Link
US (7) US20070218895A1 (en)
CA (1) CA2646607C (en)
WO (1) WO2007109599A2 (en)

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090215426A1 (en) * 2008-02-27 2009-08-27 Dimsdale Engineering, Llc Personal security system and method
US20090287411A1 (en) * 2008-05-19 2009-11-19 Embarq Holdings Company, Llc System and Method for Managing Messages in a Network Data Processing System Using a Check-In Policy
US20140113651A1 (en) * 2012-10-23 2014-04-24 Snugnote, Llc Safety reporting and notification service with enhanced privacy
US20140218537A1 (en) * 2013-02-06 2014-08-07 Michael Nepo System and method for disseminating information and implementing medical interventions to facilitate the safe emergence of users from crises
US20150002293A1 (en) * 2013-06-26 2015-01-01 Michael Nepo System and method for disseminating information and implementing medical interventions to facilitate the safe emergence of users from crises
US20150137972A1 (en) * 2013-02-06 2015-05-21 Michael Nepo System and method for disseminating information and implementing medical interventions to facilitate the safe emergence of users from predicaments
US20160050550A1 (en) * 2014-07-08 2016-02-18 4 Taps, LLC. System and Method for Call Management
US20160274759A1 (en) 2008-08-25 2016-09-22 Paul J. Dawes Security system with networked touchscreen and gateway
US9924043B2 (en) 2016-04-26 2018-03-20 Rapidsos, Inc. Systems and methods for emergency communications
US9942739B2 (en) 2014-09-19 2018-04-10 Rapidsos, Inc. Method and system for emergency call management
US9986404B2 (en) 2016-02-26 2018-05-29 Rapidsos, Inc. Systems and methods for emergency communications amongst groups of devices based on shared data
US9998507B2 (en) 2015-12-22 2018-06-12 Rapidsos, Inc. Systems and methods for robust and persistent emergency communications
US10051078B2 (en) 2007-06-12 2018-08-14 Icontrol Networks, Inc. WiFi-to-serial encapsulation in systems
US10062273B2 (en) 2010-09-28 2018-08-28 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10062245B2 (en) 2005-03-16 2018-08-28 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10078958B2 (en) 2010-12-17 2018-09-18 Icontrol Networks, Inc. Method and system for logging security event data
US10079839B1 (en) 2007-06-12 2018-09-18 Icontrol Networks, Inc. Activation of gateway device
US10091014B2 (en) 2005-03-16 2018-10-02 Icontrol Networks, Inc. Integrated security network with security alarm signaling system
US10127801B2 (en) 2005-03-16 2018-11-13 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10136294B2 (en) 2015-12-17 2018-11-20 Rapidsos, Inc. Devices and methods for efficient emergency calling
US10142394B2 (en) 2007-06-12 2018-11-27 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US10140840B2 (en) 2007-04-23 2018-11-27 Icontrol Networks, Inc. Method and system for providing alternate network access
US10142166B2 (en) 2004-03-16 2018-11-27 Icontrol Networks, Inc. Takeover of security network
US10142392B2 (en) 2007-01-24 2018-11-27 Icontrol Networks, Inc. Methods and systems for improved system performance
US10140842B2 (en) 2015-11-02 2018-11-27 Rapidsos, Inc. Method and system for situational awareness for emergency response
US10156831B2 (en) 2004-03-16 2018-12-18 Icontrol Networks, Inc. Automation system with mobile interface
US10200504B2 (en) 2007-06-12 2019-02-05 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10237237B2 (en) 2007-06-12 2019-03-19 Icontrol Networks, Inc. Communication protocols in integrated systems
US10237806B2 (en) 2009-04-30 2019-03-19 Icontrol Networks, Inc. Activation of a home automation controller
US10313303B2 (en) 2007-06-12 2019-06-04 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10339791B2 (en) 2007-06-12 2019-07-02 Icontrol Networks, Inc. Security network integrated with premise security system
US10348575B2 (en) 2013-06-27 2019-07-09 Icontrol Networks, Inc. Control system user interface
US10365810B2 (en) 2007-06-12 2019-07-30 Icontrol Networks, Inc. Control system user interface
US10375558B2 (en) 2017-04-24 2019-08-06 Rapidsos, Inc. Modular emergency communication flow management system
US10380871B2 (en) 2005-03-16 2019-08-13 Icontrol Networks, Inc. Control system user interface
US10382452B1 (en) 2007-06-12 2019-08-13 Icontrol Networks, Inc. Communication protocols in integrated systems
US10389736B2 (en) 2007-06-12 2019-08-20 Icontrol Networks, Inc. Communication protocols in integrated systems

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070218895A1 (en) * 2006-03-20 2007-09-20 Rave Wireless, Inc. Personal security system
US20120329529A1 (en) * 2011-06-21 2012-12-27 GreatCall, Inc. Gesture activate help process and system
WO2016137596A1 (en) * 2015-02-24 2016-09-01 Overview Technologies, Inc. Emergency alert system
EP3504693A1 (en) 2016-08-26 2019-07-03 Intrinsic Value, LLC Systems, devices, and methods for emergency responses and safety
US10242561B1 (en) 2017-02-13 2019-03-26 Overview Technologies, Inc. Corner security detection device

Citations (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4643462A (en) * 1986-01-24 1987-02-17 Bechtel International Corporation Double-looped rotatable coupler with tension stabilizer
US5710803A (en) * 1995-06-13 1998-01-20 Kowal; Robert Emergency phone messaging system
US5787429A (en) * 1996-07-03 1998-07-28 Nikolin, Jr.; Michael A. Potential hazard and risk-assessment data communication network
US5805670A (en) * 1996-03-19 1998-09-08 Life Safety Solutions, Inc. Private notification system for communicating 9-1-1 information
US5808590A (en) * 1992-07-14 1998-09-15 Futaba Denshi Kogyo K.K. Fluorescent display device and method for driving same
US20010026221A1 (en) * 2000-04-04 2001-10-04 Kabushiki Kaisha Alpha Tsushin Emergency notification and rescue request system
US6353398B1 (en) * 1999-10-22 2002-03-05 Himanshu S. Amin System for dynamically pushing information to a user utilizing global positioning system
US20020102996A1 (en) * 2000-12-06 2002-08-01 Jenkins Michael D. System and method of accessing and recording messages at coordinate way points
US20020107927A1 (en) * 1999-06-17 2002-08-08 Gallant Stephen I. Apparatus and method for increasing safety using the internet
US20020142813A1 (en) * 1997-06-09 2002-10-03 Brian Cassidy Telephone
US6560456B1 (en) * 1999-05-24 2003-05-06 Openwave Systems, Inc. System and method for providing subscriber-initiated information over the short message service (SMS) or a microbrowser
US6600812B1 (en) * 2000-03-07 2003-07-29 Smart911, Inc. Method and apparatus for providing emergency response information
US6643355B1 (en) * 1999-07-15 2003-11-04 William J. Tsumpes Automated parallel and redundant subscriber contact and event notification system
US6661340B1 (en) * 2001-04-24 2003-12-09 Microstrategy Incorporated System and method for connecting security systems to a wireless device
US6696956B1 (en) * 1999-05-10 2004-02-24 Junji Uchida Emergency dispatching system
US20040190720A1 (en) * 2003-03-27 2004-09-30 John Harvey Method and apparatus for providing a personal security system
US20040198315A1 (en) * 2003-04-03 2004-10-07 Vellotti Jean Paul Travel plan emergency alerting system
US20040225681A1 (en) * 2003-05-09 2004-11-11 Chaney Donald Lewis Information system
US20050003797A1 (en) * 2003-07-02 2005-01-06 Baldwin Johnny E. Localized cellular awareness and tracking of emergencies
US20050009536A1 (en) * 2002-02-18 2005-01-13 Fujitsu Limited Method for providing security
US20050170810A1 (en) * 2002-02-27 2005-08-04 Yong-Hak Choi Method of membership protection using mobile communication device
US6973166B1 (en) * 1999-07-15 2005-12-06 Tsumpes William J Automated parallel and redundant subscriber contact and event notification system
US7026928B1 (en) * 2003-03-21 2006-04-11 Realty Times Portable personal security system
US7038590B2 (en) * 1997-01-21 2006-05-02 Hoffman Recruiters Llc Personal security and tracking system
US7046140B2 (en) * 2003-05-14 2006-05-16 Bellsouth Intellectual Property Corporation Method and system for alerting a person to a situation
US7068189B2 (en) * 2001-07-03 2006-06-27 Nortel Networks Limited Location and event triggered notification services
US7130389B1 (en) * 2005-04-28 2006-10-31 Tech Radium, Inc. Digital notification and response system
US20060263022A1 (en) * 2001-06-08 2006-11-23 Postech Foundation Plastic photonic crystal fiber for terahertz wave transmission and method for manufacturing thereof
US7149533B2 (en) * 2003-10-01 2006-12-12 Laird Mark D Wireless virtual campus escort system
US20070072583A1 (en) * 2005-09-23 2007-03-29 University Of South Florida Emergency Reporting System
US20070093234A1 (en) * 2004-08-20 2007-04-26 Willis John A Identify theft protection and notification system
US7212111B2 (en) * 2003-12-30 2007-05-01 Motorola, Inc. Method and system for use in emergency notification and determining location
US20070149214A1 (en) * 2005-12-13 2007-06-28 Squareloop, Inc. System, apparatus, and methods for location managed message processing
US20070190512A1 (en) * 2006-02-03 2007-08-16 Meimer Erwin K Multiuser learning system
US20070288758A1 (en) * 2006-02-21 2007-12-13 Weiss Kenneth P Universal secure registry
US7312712B1 (en) * 2007-04-11 2007-12-25 Douglas Bevan Worrall Traveler safety notification system
US7362852B1 (en) * 2005-04-28 2008-04-22 Techradium, Inc. School-wide notification and response system with enhanced administrator function
US20080188198A1 (en) * 2006-01-17 2008-08-07 Medical Envelope L.L.C. System and method for providing medical and contact information during an emergency call
US7770229B2 (en) * 2005-05-11 2010-08-03 Yahoo! Inc. System and method for the propagation of DRM protected content

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5808564A (en) * 1992-02-06 1998-09-15 Simms Security Corp. Personal security system with remote activation
GB9828827D0 (en) * 1998-12-30 1999-02-17 Nokia Telecommunications Oy Telecommunication system and method
US20030041107A1 (en) * 1999-07-22 2003-02-27 Douglas O. Blattner Method and apparatus for community network communication
US20050070247A1 (en) * 2003-09-30 2005-03-31 Larson Keith N. Emergency notification system using presence, triangulation, and wireless telephony
US20050176402A1 (en) * 2004-02-11 2005-08-11 Anthony Verloop Method of making an emergency telephone call and an automatic calling apparatus for making such call
US7751798B2 (en) * 2005-09-28 2010-07-06 Nextel Communications Inc. Method and computer-readable medium having a program for managing billing for a telecommunications campus by assigning different billing rates inside the campus
US20070218895A1 (en) * 2006-03-20 2007-09-20 Rave Wireless, Inc. Personal security system

Patent Citations (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4643462A (en) * 1986-01-24 1987-02-17 Bechtel International Corporation Double-looped rotatable coupler with tension stabilizer
US5808590A (en) * 1992-07-14 1998-09-15 Futaba Denshi Kogyo K.K. Fluorescent display device and method for driving same
US5710803A (en) * 1995-06-13 1998-01-20 Kowal; Robert Emergency phone messaging system
US5805670A (en) * 1996-03-19 1998-09-08 Life Safety Solutions, Inc. Private notification system for communicating 9-1-1 information
US5787429A (en) * 1996-07-03 1998-07-28 Nikolin, Jr.; Michael A. Potential hazard and risk-assessment data communication network
US7038590B2 (en) * 1997-01-21 2006-05-02 Hoffman Recruiters Llc Personal security and tracking system
US20020142813A1 (en) * 1997-06-09 2002-10-03 Brian Cassidy Telephone
US6480725B2 (en) * 1997-06-09 2002-11-12 Nokia Mobile Phones, Ltd. Telephone
US6696956B1 (en) * 1999-05-10 2004-02-24 Junji Uchida Emergency dispatching system
US6560456B1 (en) * 1999-05-24 2003-05-06 Openwave Systems, Inc. System and method for providing subscriber-initiated information over the short message service (SMS) or a microbrowser
US20020107927A1 (en) * 1999-06-17 2002-08-08 Gallant Stephen I. Apparatus and method for increasing safety using the internet
US6643355B1 (en) * 1999-07-15 2003-11-04 William J. Tsumpes Automated parallel and redundant subscriber contact and event notification system
US6973166B1 (en) * 1999-07-15 2005-12-06 Tsumpes William J Automated parallel and redundant subscriber contact and event notification system
US6353398B1 (en) * 1999-10-22 2002-03-05 Himanshu S. Amin System for dynamically pushing information to a user utilizing global positioning system
US6600812B1 (en) * 2000-03-07 2003-07-29 Smart911, Inc. Method and apparatus for providing emergency response information
US20010026221A1 (en) * 2000-04-04 2001-10-04 Kabushiki Kaisha Alpha Tsushin Emergency notification and rescue request system
US20020102996A1 (en) * 2000-12-06 2002-08-01 Jenkins Michael D. System and method of accessing and recording messages at coordinate way points
US6661340B1 (en) * 2001-04-24 2003-12-09 Microstrategy Incorporated System and method for connecting security systems to a wireless device
US20060263022A1 (en) * 2001-06-08 2006-11-23 Postech Foundation Plastic photonic crystal fiber for terahertz wave transmission and method for manufacturing thereof
US7068189B2 (en) * 2001-07-03 2006-06-27 Nortel Networks Limited Location and event triggered notification services
US20050009536A1 (en) * 2002-02-18 2005-01-13 Fujitsu Limited Method for providing security
US20050170810A1 (en) * 2002-02-27 2005-08-04 Yong-Hak Choi Method of membership protection using mobile communication device
US7026928B1 (en) * 2003-03-21 2006-04-11 Realty Times Portable personal security system
US20040190720A1 (en) * 2003-03-27 2004-09-30 John Harvey Method and apparatus for providing a personal security system
US20040198315A1 (en) * 2003-04-03 2004-10-07 Vellotti Jean Paul Travel plan emergency alerting system
US20040225681A1 (en) * 2003-05-09 2004-11-11 Chaney Donald Lewis Information system
US7046140B2 (en) * 2003-05-14 2006-05-16 Bellsouth Intellectual Property Corporation Method and system for alerting a person to a situation
US20050003797A1 (en) * 2003-07-02 2005-01-06 Baldwin Johnny E. Localized cellular awareness and tracking of emergencies
US7149533B2 (en) * 2003-10-01 2006-12-12 Laird Mark D Wireless virtual campus escort system
US7212111B2 (en) * 2003-12-30 2007-05-01 Motorola, Inc. Method and system for use in emergency notification and determining location
US20070093234A1 (en) * 2004-08-20 2007-04-26 Willis John A Identify theft protection and notification system
US7130389B1 (en) * 2005-04-28 2006-10-31 Tech Radium, Inc. Digital notification and response system
US7362852B1 (en) * 2005-04-28 2008-04-22 Techradium, Inc. School-wide notification and response system with enhanced administrator function
US7174005B1 (en) * 2005-04-28 2007-02-06 Techradium, Inc. School-wide notification and response system
US7770229B2 (en) * 2005-05-11 2010-08-03 Yahoo! Inc. System and method for the propagation of DRM protected content
US20070072583A1 (en) * 2005-09-23 2007-03-29 University Of South Florida Emergency Reporting System
US20070149214A1 (en) * 2005-12-13 2007-06-28 Squareloop, Inc. System, apparatus, and methods for location managed message processing
US20080188198A1 (en) * 2006-01-17 2008-08-07 Medical Envelope L.L.C. System and method for providing medical and contact information during an emergency call
US20070190512A1 (en) * 2006-02-03 2007-08-16 Meimer Erwin K Multiuser learning system
US20070288758A1 (en) * 2006-02-21 2007-12-13 Weiss Kenneth P Universal secure registry
US7312712B1 (en) * 2007-04-11 2007-12-25 Douglas Bevan Worrall Traveler safety notification system

Cited By (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10142166B2 (en) 2004-03-16 2018-11-27 Icontrol Networks, Inc. Takeover of security network
US10156831B2 (en) 2004-03-16 2018-12-18 Icontrol Networks, Inc. Automation system with mobile interface
US10062245B2 (en) 2005-03-16 2018-08-28 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10091014B2 (en) 2005-03-16 2018-10-02 Icontrol Networks, Inc. Integrated security network with security alarm signaling system
US10127801B2 (en) 2005-03-16 2018-11-13 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10380871B2 (en) 2005-03-16 2019-08-13 Icontrol Networks, Inc. Control system user interface
US10142392B2 (en) 2007-01-24 2018-11-27 Icontrol Networks, Inc. Methods and systems for improved system performance
US10225314B2 (en) 2007-01-24 2019-03-05 Icontrol Networks, Inc. Methods and systems for improved system performance
US10140840B2 (en) 2007-04-23 2018-11-27 Icontrol Networks, Inc. Method and system for providing alternate network access
US10079839B1 (en) 2007-06-12 2018-09-18 Icontrol Networks, Inc. Activation of gateway device
US10313303B2 (en) 2007-06-12 2019-06-04 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10142394B2 (en) 2007-06-12 2018-11-27 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US10389736B2 (en) 2007-06-12 2019-08-20 Icontrol Networks, Inc. Communication protocols in integrated systems
US10365810B2 (en) 2007-06-12 2019-07-30 Icontrol Networks, Inc. Control system user interface
US10339791B2 (en) 2007-06-12 2019-07-02 Icontrol Networks, Inc. Security network integrated with premise security system
US10051078B2 (en) 2007-06-12 2018-08-14 Icontrol Networks, Inc. WiFi-to-serial encapsulation in systems
US10200504B2 (en) 2007-06-12 2019-02-05 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10382452B1 (en) 2007-06-12 2019-08-13 Icontrol Networks, Inc. Communication protocols in integrated systems
US10237237B2 (en) 2007-06-12 2019-03-19 Icontrol Networks, Inc. Communication protocols in integrated systems
US20090215426A1 (en) * 2008-02-27 2009-08-27 Dimsdale Engineering, Llc Personal security system and method
US20090287411A1 (en) * 2008-05-19 2009-11-19 Embarq Holdings Company, Llc System and Method for Managing Messages in a Network Data Processing System Using a Check-In Policy
US20160274759A1 (en) 2008-08-25 2016-09-22 Paul J. Dawes Security system with networked touchscreen and gateway
US10375253B2 (en) 2008-08-25 2019-08-06 Icontrol Networks, Inc. Security system with networked touchscreen and gateway
US10275999B2 (en) 2009-04-30 2019-04-30 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US10332363B2 (en) 2009-04-30 2019-06-25 Icontrol Networks, Inc. Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events
US10237806B2 (en) 2009-04-30 2019-03-19 Icontrol Networks, Inc. Activation of a home automation controller
US10062273B2 (en) 2010-09-28 2018-08-28 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10223903B2 (en) 2010-09-28 2019-03-05 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10127802B2 (en) 2010-09-28 2018-11-13 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10078958B2 (en) 2010-12-17 2018-09-18 Icontrol Networks, Inc. Method and system for logging security event data
US20140113651A1 (en) * 2012-10-23 2014-04-24 Snugnote, Llc Safety reporting and notification service with enhanced privacy
US20140218537A1 (en) * 2013-02-06 2014-08-07 Michael Nepo System and method for disseminating information and implementing medical interventions to facilitate the safe emergence of users from crises
US9443415B2 (en) * 2013-02-06 2016-09-13 Michael Nepo Disseminating information to facilitate user safety
US10424188B2 (en) 2013-02-06 2019-09-24 Life Protector, Llc Disseminating information to facilitate user safety
US20150137972A1 (en) * 2013-02-06 2015-05-21 Michael Nepo System and method for disseminating information and implementing medical interventions to facilitate the safe emergence of users from predicaments
US10373478B2 (en) 2013-02-06 2019-08-06 Life Protector, Llc Disseminating information to facilitate user safety
US20150002293A1 (en) * 2013-06-26 2015-01-01 Michael Nepo System and method for disseminating information and implementing medical interventions to facilitate the safe emergence of users from crises
US10348575B2 (en) 2013-06-27 2019-07-09 Icontrol Networks, Inc. Control system user interface
US20160050550A1 (en) * 2014-07-08 2016-02-18 4 Taps, LLC. System and Method for Call Management
US10425799B2 (en) 2014-07-08 2019-09-24 Rapidsos, Inc. System and method for call management
US9838858B2 (en) * 2014-07-08 2017-12-05 Rapidsos, Inc. System and method for call management
US9992655B2 (en) 2014-07-08 2018-06-05 Rapidsos, Inc System and method for call management
US9942739B2 (en) 2014-09-19 2018-04-10 Rapidsos, Inc. Method and system for emergency call management
US10165431B2 (en) 2014-09-19 2018-12-25 Rapidsos, Inc. Method and system for emergency call management
US10140842B2 (en) 2015-11-02 2018-11-27 Rapidsos, Inc. Method and system for situational awareness for emergency response
US10136294B2 (en) 2015-12-17 2018-11-20 Rapidsos, Inc. Devices and methods for efficient emergency calling
US9998507B2 (en) 2015-12-22 2018-06-12 Rapidsos, Inc. Systems and methods for robust and persistent emergency communications
US9986404B2 (en) 2016-02-26 2018-05-29 Rapidsos, Inc. Systems and methods for emergency communications amongst groups of devices based on shared data
US10419915B2 (en) 2016-02-26 2019-09-17 Rapidsos, Inc. Systems and methods for emergency communications amongst groups of devices based on shared data
US9924043B2 (en) 2016-04-26 2018-03-20 Rapidsos, Inc. Systems and methods for emergency communications
US10375558B2 (en) 2017-04-24 2019-08-06 Rapidsos, Inc. Modular emergency communication flow management system

Also Published As

Publication number Publication date
US20160183073A1 (en) 2016-06-23
US9071643B2 (en) 2015-06-30
US9813885B2 (en) 2017-11-07
US10182332B2 (en) 2019-01-15
US20190268746A1 (en) 2019-08-29
US20120252399A1 (en) 2012-10-04
WO2007109599A2 (en) 2007-09-27
US20150296360A1 (en) 2015-10-15
US9277389B2 (en) 2016-03-01
US9503876B2 (en) 2016-11-22
CA2646607C (en) 2016-09-06
US20180199177A1 (en) 2018-07-12
US20170142568A1 (en) 2017-05-18
WO2007109599A3 (en) 2007-12-21
CA2646607A1 (en) 2007-09-27

Similar Documents

Publication Publication Date Title
US9615199B1 (en) Methods for identifying location of individuals who are in proximity to a user of a network tracking system
US7133685B2 (en) Monitoring boundary crossings in a wireless network
US7512405B2 (en) Location privacy manager for a wireless communication device and method therefor
US7254388B2 (en) System for MS-assisted location trigger, and service methods thereof
JP5084882B2 (en) Method and apparatus for mobile telephone network
US7136747B2 (en) Method for GPS carpool rendezvous tracking and personal safety verification
EP1102501B1 (en) Method and apparatus for a wireless telecommunications system that provides location-based information delivery to a wireless mobile unit
US10382936B2 (en) Interactive emergency information and identification systems and authentication methods
US8116723B2 (en) Network server emergency information accessing method
EP1279306B1 (en) On demand location function for mobile terminal
KR100432268B1 (en) System and method of accessing and recording messages at coordinate way points
US8145183B2 (en) On-demand emergency notification system using GPS-equipped devices
US7853268B2 (en) GPS enabled cell phone location tracking for security purposes
CA2552830C (en) System and method for establishing and monitoring the relative location of group members
US8442482B2 (en) Method and system for an emergency location information service (E-LIS)
US20030013463A1 (en) Smart all-purpose expert management system
US20020042277A1 (en) Subscriber information service center (SISC)
US9094816B2 (en) Method and system for an emergency location information service (E-LIS) from unmanned aerial vehicles (UAV)
US7321773B2 (en) Area watcher for wireless network
US7184776B2 (en) Technique for notification of mobile terminals by geographical co-ordinates
US20080214142A1 (en) Emergency Alerting System
US20050221876A1 (en) Methods for sending messages based on the location of mobile users in a communication network
JP4981931B2 (en) Location-based emergency call
JP5661644B2 (en) Predictive notification system for emergency services
US8918075B2 (en) Method and system for an emergency location information service (E-LIS) from wearable devices

Legal Events

Date Code Title Description
AS Assignment

Owner name: RAVE WIRELESS, INC., NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SAITO, GHEN;DESAI, RODGER;RISHI, RAJU;REEL/FRAME:021084/0722

Effective date: 20070315

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: PNC BANK, NATIONAL ASSOCIATION, PENNSYLVANIA

Free format text: SECURITY INTEREST;ASSIGNORS:RAVE INTERMEDIATE HOLDINGS, INC.;RAVE WIRELESS, INC.;REEL/FRAME:046219/0580

Effective date: 20180627

AS Assignment

Owner name: SWIFTREACH NETWORKS, LLC, NEW JERSEY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:048975/0921

Effective date: 20190423

Owner name: RAVE WIRELESS, INC., MASSACHUSETTS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:048975/0921

Effective date: 20190423