US20210327253A1 - Wearbale personal security devices and systems - Google Patents
Wearbale personal security devices and systems Download PDFInfo
- Publication number
- US20210327253A1 US20210327253A1 US17/359,107 US202117359107A US2021327253A1 US 20210327253 A1 US20210327253 A1 US 20210327253A1 US 202117359107 A US202117359107 A US 202117359107A US 2021327253 A1 US2021327253 A1 US 2021327253A1
- Authority
- US
- United States
- Prior art keywords
- data
- captured
- security device
- digital camera
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000005540 biological transmission Effects 0.000 claims abstract description 56
- 238000004891 communication Methods 0.000 claims abstract description 42
- 230000004044 response Effects 0.000 claims abstract description 12
- 230000001681 protective effect Effects 0.000 description 38
- 230000000694 effects Effects 0.000 description 10
- 230000033001 locomotion Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 6
- 230000004048 modification Effects 0.000 description 6
- 239000004744 fabric Substances 0.000 description 5
- 238000000034 method Methods 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 4
- 230000001413 cellular effect Effects 0.000 description 3
- 230000007423 decrease Effects 0.000 description 3
- 239000002861 polymer material Substances 0.000 description 3
- 239000012780 transparent material Substances 0.000 description 3
- 230000001960 triggered effect Effects 0.000 description 3
- 241000251468 Actinopterygii Species 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 2
- 239000000853 adhesive Substances 0.000 description 2
- 230000001070 adhesive effect Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000010835 comparative analysis Methods 0.000 description 2
- 239000011521 glass Substances 0.000 description 2
- 238000005286 illumination Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 239000007769 metal material Substances 0.000 description 2
- 229920000515 polycarbonate Polymers 0.000 description 2
- 239000004417 polycarbonate Substances 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000000386 athletic effect Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000009429 distress Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 239000012811 non-conductive material Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 239000013598 vector Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/765—Interface circuits between an apparatus for recording and another apparatus
- H04N5/77—Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television camera
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/016—Personal emergency signalling and security systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19613—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
- G08B13/19656—Network used to communicate with a camera, e.g. WAN, LAN, Internet
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
- G08B13/1966—Wireless systems, other than telephone systems, used to communicate with a camera
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/08—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/45—Cameras or camera modules comprising electronic image sensors; Control thereof for generating image signals from two or more image sensors being of different type or operating in different modes, e.g. with a CMOS sensor for moving images in combination with a charge-coupled device [CCD] for still images
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/50—Constructional details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/50—Constructional details
- H04N23/51—Housings
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/56—Cameras or camera modules comprising electronic image sensors; Control thereof provided with illuminating means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/60—Control of cameras or camera modules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/60—Control of cameras or camera modules
- H04N23/61—Control of cameras or camera modules based on recognised objects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/60—Control of cameras or camera modules
- H04N23/66—Remote control of cameras or camera parts, e.g. by remote control devices
- H04N23/661—Transmitting camera control signals through networks, e.g. control via the Internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/60—Control of cameras or camera modules
- H04N23/667—Camera operation mode switching, e.g. between still and video, sport and normal or high- and low-resolution modes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/60—Control of cameras or camera modules
- H04N23/698—Control of cameras or camera modules for achieving an enlarged field of view, e.g. panoramic image capture
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/90—Arrangement of cameras or camera modules, e.g. multiple cameras in TV studios or sports stadiums
-
- H04N5/2251—
-
- H04N5/2252—
-
- H04N5/2256—
-
- H04N5/2258—
-
- H04N5/232—
-
- H04N5/23206—
-
- H04N5/23218—
-
- H04N5/23238—
-
- H04N5/23245—
-
- H04N5/247—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/183—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
- H04N7/185—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source from a mobile camera, e.g. for remote control
Definitions
- the present disclosure relates generally to security systems, and more particularly, to wearable personal security devices and systems.
- Prior wearable digital recording devices suffer from one or more disadvantages.
- such devices generally suffer from a limited field of view focused in front of the wearer such that side and/or backward-looking images are not captured and/or data generated by such devices is physically stored on such devices such that any images actually captured can be eliminated by a perpetrator by disposing of and/or destroying/damaging the device.
- a device and system that provides a wide field of view and retrieval of the captured images and/or video and/or audio from an off-site or remote location.
- a security device includes a housing, a digital camera, an electronic storage medium, and a communication module.
- the digital camera is coupled to the housing and is configured to capture data.
- the electronic storage medium is coupled to the digital camera such that the electronic storage medium is configured to store the captured data therein.
- the communication module is configured to transmit the captured data according to an ordered sequence of data transmissions in response to the occurrence of a triggering event, the ordered sequence including (i) a first transmission of captured data including data captured prior to the triggering event, and (ii) a second transmission of captured data including data captured subsequent to the triggering event.
- a wearable personal security device includes a protective housing, a plurality of digital cameras, a microphone, an electronic storage medium, and a communication module.
- the plurality of digital cameras is coupled to the protective housing, and each of the plurality of digital cameras is configured to capture data, including still images, video images, or both.
- the microphone is coupled to the protective housing and is configured to capture sounds.
- the electronic storage medium is coupled to the microphone and each of the plurality of digital cameras such that the electronic storage medium stores the captured data and the captured sounds therein.
- the communication module is coupled to the electronic storage medium and is configured to transmit at least a portion of the stored, captured data and at least a portion of the stored, captured sounds in response to the occurrence of a triggering event.
- a wearable personal security device includes a protective outer housing, an inner housing, a plurality of digital cameras, a microphone, and a communication module.
- the protective outer housing includes an upper half having a trigger and a lower half being coupled to a clip.
- the inner housing includes a lower portion, a middle portion, and an upper portion, the inner housing being disposed within the protective outer housing.
- a first one of the plurality of digital cameras is coupled to the middle portion of the inner housing and a second one of the plurality of digital cameras is coupled to the upper portion of the inner housing.
- Each of the plurality of digital cameras is configured to capture data, including still images, video images, or both.
- the microphone is coupled to the upper half of the protective housing and is configured to capture sounds.
- the electronic storage medium is coupled to the microphone and each of the plurality of digital cameras such that the electronic storage medium stores the captured data and the captured sounds therein.
- the communication module is coupled to the electronic storage medium and is configured to transmit at least a portion of the stored, captured data and at least a portion of the stored, captured sounds in response to the occurrence of a triggering event.
- a personal security system includes a wearable personal security device and an application.
- the wearable personal security device includes a protective housing, a plurality of digital cameras, a microphone, an electronic store medium, and a communication module.
- the plurality of digital cameras is coupled to the protective housing, and each of the plurality of digital cameras is configured to capture data, including still images, video images, or both.
- the microphone is coupled to the protective housing and is configured to capture sounds.
- the electronic storage medium is coupled to the microphone and each of the plurality of digital cameras such that the electronic storage medium stores the captured data and the captured sounds therein.
- the communication module is coupled to the electronic storage medium and is configured to transmit at least a portion of the stored, captured data and at least a portion of the stored, captured sounds in response to the occurrence of a triggering event.
- the application executes on a mobile device that is wirelessly coupled to the wearable personal security device.
- the executing application is configured to: receive, from the communications module of the wearable personal security device, at least a portion of the transmitted data and sounds; process, via a processor of the mobile device, the received data and sounds; store the processed data and sounds in a memory of the mobile device; and wirelessly transmit at least a portion of the processed data and sounds, via a communication module of the mobile device, to a remote server.
- FIG. 1 is a schematic illustration of a wearable personal security device according to some implementations of the present disclosure
- FIG. 2 is a perspective view of a wearable personal security device according to some implementations of the present disclosure
- FIG. 3A is a exploded perspective view of the wearable personal security device of FIG. 2 ;
- FIG. 3B is another exploded perspective view of the wearable personal security device of FIG. 2 ;
- FIG. 4A is an enlarged partial perspective view of a clip of the wearable personal security device of FIG. 2 in a closed position;
- FIG. 4B is an enlarged partial detailed perspective view of the clip of FIG. 4A in an open position
- FIG. 5A is a plan view of the wearable personal security device of FIG. 2 ;
- FIG. 5B is another perspective view of the wearable personal security device of FIG. 2 illustrating respective fields of view of a plurality of cameras;
- FIG. 6A is a side elevation view of the wearable personal security device of FIG. 2 affixed to a right arm of a user;
- FIG. 6B is a front elevation view of the user of FIG. 6A ;
- FIG. 7A is a side elevation view of the wearable personal security device of FIG. 2 affixed to a right shoulder of a user;
- FIG. 7B is a front elevation view of the user of FIG. 7A ;
- FIG. 8A is a side elevation view of the wearable personal security device of FIG. 2 affixed to a chest of a user;
- FIG. 8B is a front elevation view of the user of FIG. 8A ;
- FIG. 9 is a perspective schematic illustration of the wearable personal security device of FIG. 2 affixed to a user and being communicatively coupled to an external network via a mobile device;
- FIG. 10 is a schematic illustration of an access control system/scheme used in the operation of a security system according to implementations of the present disclosure.
- a security device 100 includes a protective housing 101 , a plurality of digital cameras 102 , a microphone 104 , a speaker 106 , a plurality of light-emitting diodes (“LEDS”) 108 , an electronic storage medium 110 , a communication module 112 , a processor 114 , and a battery/power supply 116 .
- the security device 100 is used to record images and sounds of the surrounding environment then store and/or disseminate such recordings (e.g., to a third party monitoring service, police, etc.). As such, the security device 100 can be used to decrease the likelihood of a crime being committed against a user of the device or against property and/or third parties generally in the vicinity of the device.
- Each of the plurality of digital cameras 102 is coupled to the protective housing 101 and captures data from the surrounding environment, including still images, video images, or both. Further, each of the plurality of digital cameras 102 is communicatively coupled to the electronic storage medium 110 and transmits the captured data to the electronic storage medium 110 for storage therein. While the plurality of digital cameras 102 is shown as including four digital cameras, any number of digital cameras is possible, such as, for example, only one camera, only two cameras, six cameras, ten cameras, twenty cameras, etc.
- the plurality of digital cameras 102 can consist of the same or different types of digital cameras, such as, for example, digital cameras that only record still images, digital cameras that only record video images, digital cameras that record still images and video images, high definition cameras, low resolution cameras (e.g., cameras that produce “security quality” images), cameras with a fish eye lens (e.g., a 180 degree fish eye lens), cameras with or without zooming ability (optical and/or digital zoom), or the like, or any combination thereof. Further, each of the plurality of digital cameras 102 can be selected such that the captured still images or video images have a desired resolution and/or file size (i.e., 0.1 Mb, 1 Mb, 10 Mb, 50 Mb, etc.)
- the microphone 104 is coupled to the protective housing 101 and captures sounds from the surrounding environment.
- the microphone 104 is communicatively coupled to the electronic storage medium 110 such that the captured sounds are transmitted to the electronic storage medium 110 for storage.
- the microphone 104 can be selected such that it has a desired gain for recording sound from the surrounding environment.
- the security device 100 is shown as having one microphone, the device can include any number of microphones to increase the likelihood of capturing all sounds from the surrounding environment (e.g., two microphones, five microphones, etc.).
- the electronic storage medium 110 is communicatively coupled to the plurality of digital cameras 102 and the microphone 104 and stores captured data and/or captured sounds.
- the electronic storage medium 110 can be any mass storage device, such as, for example, a hard disk drive, a solid state drive, a secure digital (“SD”) card, or the like, or any combination thereof.
- the storage capacity of the electronic storage medium 110 can be selected such that it can store a desired amount of data and sounds before requiring deletion and/or overwriting of previously stored data/sounds in order to store newly captured data and/or sounds.
- the communication module 112 is communicatively coupled to the electronic storage medium 110 and transmits at least a portion of the captured data and/or captured sounds stored in the electronic storage medium 110 to a remote device (e.g., a server, a computer, a tablet a smartphone, etc.). Alternatively or additionally, the communication module 112 can be directly coupled to the plurality of digital cameras 102 to permit transmission of real-time data captured by the plurality of digital cameras 102 .
- a remote device e.g., a server, a computer, a tablet a smartphone, etc.
- the communication module 112 is communicatively coupled to the remote device via, for example, a cellular network, a Wi-Fi network, near-field communication, an RFID connection, a Bluetooth connection, or the like, or any combination thereof Alternatively, the communication module 112 can be communicatively coupled to the remote device via a hard-wired connection (e.g., via a micro USB cable).
- the remote device receives the transmitted portion of the stored images and/or stored sounds and in some implementations permits a user of the remote device to view, analyze, and/or manipulate the captured data and/or sound. In some other implementations, the user is prevented from accessing, viewing, analyzing, manipulating, etc. the captured data and/or sound.
- the user in an effort to prevent tampering with the data and/or audio by unwanted individuals (e.g., a robber, etc.), the user is only permitted to access, view, analyzing, manipulating, etc. the captured data and/or sound when certain predetermined events occur (e.g., when the user is at home, at work, when the security device 100 is hard wired to a computer, etc. or any combination thereof).
- certain predetermined events e.g., when the user is at home, at work, when the security device 100 is hard wired to a computer, etc. or any combination thereof.
- the processor 114 is communicatively coupled to the plurality of digital cameras 102 , the microphone 104 , the speaker 106 , the plurality of LEDs 108 , the electronic storage medium 110 , the communication module 112 , the power supply 116 , and/or any of the other components of the security device 100 .
- the processor 114 executes instructions stored in the electronic storage medium 110 and controls the operation of the other components of the security device 100 to which it is communicatively coupled.
- the power supply 116 is electrically connected to the various components of the security device 100 and provides power to the components.
- the power supply 116 can be a disposable battery, a rechargeable battery, an external A/C power supply, an external D/C power supply, or the like, or any combination thereof.
- the security device 100 also optionally includes a light sensor 118 .
- the light sensor 118 measures the ambient light surrounding the security device 100 .
- the plurality of LEDs 108 illuminate to aid a user's vision and/or enhance the clarity of the captured data from the plurality of digital cameras 102 .
- the predefined value of ambient light that triggers illumination of the plurality of LEDs 108 can be less than fifty lux, less than twenty lux, less than ten lux, less than five lux, etc.
- the plurality of LEDs 108 can also be used to notify third parties (e.g., a potential perpetrator of a crime) of the presence of the security device 100 in a dimly light environment by operating as strobe lights, and thus act as a deterrent.
- third parties e.g., a potential perpetrator of a crime
- the security device 100 also optionally includes a plurality of spring-loaded pin contactors 120 and a plurality of tactile switches 122 .
- the security device 100 is designed to be affixed to a user's body, clothing, or accessories (e.g., a backpack, a purse, or the like).
- the optional plurality of spring-loaded pin contactors 120 , the plurality of tactile switches 122 , and a plurality of metallic traces 124 can be used to determine if the security device 100 has been removed from the user's clothing or accessory.
- a first one of the plurality of spring-loaded pin contactors 120 and a second one of the plurality of spring-loaded contactors 120 are coupled to the protective housing 101 such that they are in direct contact with one of the plurality of metallic traces 124 when the device is not affixed to clothing or an accessory.
- the first and second ones of the plurality of spring-loaded pin contactors 120 are in direct contact with the metallic trace 124 , they create a completed electrical circuit.
- the first and second ones of the plurality of spring-loaded contactors 120 are separated from the metallic trace 124 by, for example, a piece of fabric (i.e., a non-conductive material) from the user's clothing being positioned therebetween, the electrical circuit is interrupted and/or terminated.
- the electrical circuit between the first and second ones of the plurality of spring-loaded pin contactors 120 and the metallic trace 124 is completed and serves an indicator that the device has been removed.
- the plurality of tactile switches 122 detect whether the device is affixed to the user in the same or similar manner by creating an electrical circuit that can serve as an indicator that the device has been removed from clothing or an accessory.
- the security device 100 optionally includes an accelerometer 126 , a gyroscope 128 , and a GPS unit 130 .
- the accelerometer 126 measures the acceleration of the security device 100 and the gyroscope 128 measures the angle or level of the security device 100 .
- the GPS unit 130 determines a location of the wearable personal service device 100 .
- the accelerometer 126 , the gyroscope 128 , and/or the GPS unit 130 can be communicatively coupled to one or more of the electronic storage medium 110 for storing captured data, the communication module 112 for transmitting captured data, and/or the processor 114 for processing captured data.
- the security device 100 optionally includes a radar (not shown) and a microwave (not shown).
- the radar and/or microwave can be used in order to digitally map a space (e.g., a room, a house, etc.) and/or detect motion around the security device 100 .
- the components of the security device 100 described above can be configured to operate as described herein in response to the occurrence of one or more triggering events.
- Two examples of triggering events are (i) a manually activated security alert, and (ii) an automatically activated security alert.
- a manually activated security alert is activated by a user of the security device 100 , when, for example, the user feels that a security risk is imminent.
- the user can create a manually activated security alert by various mechanisms, such as a trigger button 132 disposed on the protective housing 101 .
- an automatically activated security alert is triggered without a user needing to take any affirmative action.
- an automatically activated security alert causes various components of the security device 100 to operate, even if the user is unaware of a security threat or is otherwise incapacitated.
- Examples of automatically activated security alerts include: (i) an acceleration of the security device 100 (measured by the accelerometer) above a predefined value (which may indicate that the user/wearer was put into a moving vehicle against his/her will), (ii) removal of the security device 100 from a user's clothing or accessory (as indicated by one or more of the plurality of spring-loaded pin contactors 120 , the plurality of tactile switches 122 , or metallic traces 124 ), (iii) the security device 100 being separated from a user's mobile device by a predefined distance (as determined by the GPS unit 130 and the processor 114 ), and (iv) an angle of the device (measured by the gyroscope 128 ) exceeds a predefined angle (e.g., the security device 100 is turned 90 degrees relative an original orientation, which may indicate that the user has fallen) .
- a predefined value which may indicate that the user/wearer was put into a moving vehicle against his/her will
- the processor 114 performs a comparative analysis of the recorded data and/or recorded sound, and responsive to a predefined level of change, the processor 114 triggers an automatic security alert.
- the processor 114 can perform a comparison of the recorded sound from the microphone 104 and a predefined volume (e.g., a volume which may indicate shouting or distress) or predefined sounds (e.g., a gunshot, predefined words or phrases, etc.) stored in the electronic storage medium 110 . If the processor 114 determines that the recorded sound exceeds the predefined volume, of if the processor 114 identifies one of the predefined sounds, the processor 114 triggers an automatic security alert (described above).
- a predefined volume e.g., a volume which may indicate shouting or distress
- predefined sounds e.g., a gunshot, predefined words or phrases, etc.
- the processor 114 can perform a comparison of the recorded data from the plurality of digital cameras 102 and previously recorded data stored in the electronic storage medium 110 (i.e., data recorded at a predefined interval prior to the currently recorded data) or a library of security-related images stored in the electronic storage medium 110 (e.g., images of weapons, images of known criminals, or any other image that may be indicative of a security threat, or the like).
- previously recorded data stored in the electronic storage medium 110 i.e., data recorded at a predefined interval prior to the currently recorded data
- a library of security-related images stored in the electronic storage medium 110 e.g., images of weapons, images of known criminals, or any other image that may be indicative of a security threat, or the like.
- the processor 114 can compare a brightness of the recorded data (i.e., still images, video images, or both) and previously recorded data, in which case a lower brightness in the recorded data compared to the previously recorded data may indicate that a third party (e.g., a perpetrator) has entered the field of view of one of the plurality of digital cameras 102 , or that the security device 100 has been moved.
- the processor 114 can trigger an automatic security alert based on the comparison of recorded data and previously recorded data, or if the processor 114 identifies one of the security-related images.
- the one or more triggering events cause the same result whether the triggering event is a manually activated security alert or an automatically activated security alert.
- the plurality of digital cameras 102 and the microphone 104 only record data and/or sound respectively in response to a triggering event. For example, a user can press a trigger button 132 on the protective housing 101 to trigger a manually activated security alert which then causes the plurality of digital cameras 102 and the microphone 104 to begin capturing and/or storing data and/or sounds.
- a triggering event causes: (i) all of the data and sound currently stored in the electronic storage medium 110 to be disseminated (e.g., wirelessly transmitted) to a remote device (e.g., a smartphone, a server, a computer, etc.) via the communication module 112 , (ii) the plurality of LEDs 108 to operate as strobe lights at the highest illumination level, (iii) the GPS location (as determined by the GPS unit 130 ) to be disseminated (e.g., wirelessly transmitted) to a remote device via the communication module 112 , (iv) the speaker 106 to emit a siren-like or other alarm sound, (v) or any combination thereof.
- a remote device e.g., a smartphone, a server, a computer, etc.
- the plurality of LEDs 108 to operate as strobe lights at the highest illumination level
- the GPS location as determined by the GPS unit 130
- the speaker 106 to emit a siren-like or other
- the stored, captured data and the stored, captured sounds transmitted by the communication module 112 responsive to the occurrence of a triggering event includes data and sounds captured (i) at the time of the triggering event, (ii) during a predefined period prior to the triggering event (e.g., ten seconds, thirty seconds, one minute, two minutes, etc.), and (iii) during a predefined period subsequent to the triggering event (e.g., ten second, thirty seconds, one minute, two minutes, etc.).
- the communication module 112 can transmit stored, captured data taken ten minutes before the triggering event, five minutes before the triggering event, one minute before triggering event, at the time of the triggering event, one minute subsequent to the triggering event, five minutes subsequent to the triggering event, and ten minutes subsequent to the triggering event, etc.
- the communication module 112 is configured to transmit the stored, captured data and/or the stored, captured sounds in an ordered sequence. If the perpetrator of an attack or crime in the vicinity of the security device 100 is aware of the device's presence and its capabilities, there is a strong likelihood that the perpetrator will attempt to delete the incriminating data and/or sounds stored therein or otherwise prevent their transmission (e.g., by destroying the security device 100 ). To that end, a perpetrator may be able to destroy the device and prevent transmission of the relevant data/sounds (despite the protection offered by the protective housing 101 ).
- communication module 112 is configured to transmit data and sounds according to the ordered sequence of data transmissions in response to the occurrence of a triggering event in order to prioritize transmission of the most relevant captured data and sounds before the device can be destroyed, thereby increasing the likelihood of identifying perpetrator and increasing the overall deterrent effect of the security device 100 .
- the ordered sequence generally includes one or more separate transmissions (e.g., two transmissions, four transmissions, twenty transmissions, one hundred transmissions, etc.).
- the ordered sequence can include (i) a first transmission of captured data including data captured prior to the triggering event, and (ii) a second transmission of captured data including data captured subsequent to the triggering event.
- the second transmission of captured data can include data captured contemporaneous with the triggering event.
- the ordered sequence can further include (iii) a third transmission of captured data including additional data captured prior to the captured data of the first transmission; and (iv) a fourth transmission of captured data including additional data captured subsequent to the captured data of the second transmission.
- the captured data of the various transmissions can be data captured at predefined interval (e.g., 0.5 seconds, three seconds, ten seconds, one minute, five minutes, etc.) prior to and/or subsequent to the triggering event.
- the second transmission of captured data and the fourth transmission of captured data is each a transmission of real-time data (e.g., streaming data in a real-time fashion with and/or without the real-time data being stored locally).
- the first transmission includes data captured, for example, one second before the triggering event
- the second transmission includes real-time data
- the third transmission includes data captured, for example, five seconds before the triggering event
- the fourth transmission includes real-time data.
- the ordered sequence prioritizes data and/or sounds captured immediately prior to the triggering event (i.e., data most likely to show the approach of the perpetrator) and immediately subsequent to the triggering event (i.e., data most likely to show the perpetrator committing a crime or fleeing).
- the communication module 112 continues to transmit captured data and/or sounds in accordance with the ordered sequence for a predefined amount of time (e.g., five minutes, thirty minutes, one hour, etc.) or until the device is destroyed.
- the transmitted data of the transmissions of the ordered sequence described above includes one or more compressed, encrypted still images.
- Compressed still images are advantageous because of their relatively small file size (e.g., between about 0.3 Mb and 1 Mb).
- the transmission of the captured data and/or sounds by the communication module 112 to a remote device e.g., a mobile device or remote server
- the transmitted data can include video images of a predefined duration (i.e., one second, three seconds, ten seconds, etc.), or a combination of still images and video images.
- the security device 100 transmits data and/or sounds according to an order sequence.
- the ordered sequence includes a first transmission that occurs first in time that includes data captured prior to the triggering event.
- the first transmission includes, for example, one or more still pictures (e.g., one, two, three, four, etc.) and/or one or more video clips (e.g., a one second video clip, a two second video clip, etc.) captured prior to the triggering event occurring.
- the order sequence includes a second transmission that occurs second in time (i.e., after the first transmission is completed) that includes data captured subsequent to the triggering event.
- the second transmission includes, for example, one or more still pictures (e.g., one, two, three, four, etc.) and/or one or more video clips (e.g., a one second video clip, a two second video clip, etc.) captured subsequent to the triggering event occurring.
- second transmission includes for real-time data that is streaming, which may or may not be stored in the security device 100 prior to transmission or ever.
- the ordered sequence can include any number of additional transmissions.
- additional transmissions can include a third transmission that occurs third in time (i.e., after the second transmission is completed) that includes data captured prior to the triggering event and prior to the data included in the first transmission.
- the ordered can include a fourth transmission that occurs fourth in time (i.e., after the third transmission is completed) that includes data captured subsequent to the triggering event and subsequent to the data included in the second transmission.
- the plurality of digital cameras 102 only captures still images and the processor 114 is configured to create a detailed storyboard of an event using the captured still images taken at predefined intervals.
- the storyboard can provide a portrayal of the event using imagery and/or sound from the location of the event.
- the storyboard requires reduced storage capacity of the electronic storage medium 110 , minimizes the volume of captured, recorded data that the communication module 112 transmits, decreases power consumption from the power supply 116 , and frees up the processor 114 for other tasks.
- the captured, stored data and captured, stored data in the electronic storage medium 110 may include highly personal or sensitive information, such as the user's whereabouts and recent activities, and in general anything seen or heard by the user when the plurality of digital cameras 102 and microphone 104 are recording.
- the captured, stored data and the captured, stored sounds can be encrypted while stored in the electronic storage medium 110 .
- the stored data and the stored sounds are not accessible by the user. Instead, for example, the stored data and sounds are only accessible subsequent to being transmitted by the communication module 112 to an authorized remote server.
- the encryption protects the captured data and sound stored on the security device 100 from being accessed by an unauthorized individual should, for example, the security device 100 become lost or stolen.
- an alternative wearable personal security device includes the protective housing 101 , the plurality of digital cameras 102 , the microphone 104 , the speaker 106 , the plurality of LEDs 108 , the electronic storage medium 110 , the communication module 112 , the processor 114 , and the power supply 116 .
- various wearable personal security devices can be formed using any portion of the basic components described herein.
- a wearable personal security device 200 that is the same as, or similar to, the security device 100 , includes an inner housing 210 , a protective outer housing 250 , and a clip 290 .
- the wearable personal security device 200 differs from the security device 100 in that the wearable personal security device 200 includes the inner housing 210 and the protective outer housing 250 , rather than the single protective housing 101 .
- the wearable personal security device 200 is used in the same or similar manner as the security device 100 , and can include more or fewer components than security device 100 .
- the wearable personal security device 200 also includes a plurality of digital cameras that is the same as, or similar to, the plurality of digital cameras 102 of the security device 100 described above. As shown, the plurality of digital cameras includes four digital cameras: a first digital camera 212 a, a second digital camera 212 b, a third digital camera 212 c, and a fourth digital camera 212 d.
- the inner housing 210 includes a top portion 220 , a middle portion 230 , and a bottom portion 240 .
- the top portion 220 , the middle portion 230 , and the bottom portion 240 are stacked together to form the inner housing 210 .
- the inner housing 210 can be a single monolithic component (i.e., the top portion 220 , the middle portion 230 , and the bottom portion 240 are unitary).
- the top portion 220 includes a top surface 222 a ( FIG. 3A ), a bottom surface 222 b ( FIG. 3B ), a first plurality of apertures 224 , and a second plurality of apertures 226 .
- Each of the first plurality of apertures 224 and each of the second plurality of apertures 226 extend between the top surface 222 a ( FIG. 3A ) and the bottom surface 222 b ( FIG. 3B ).
- the first digital camera 212 a, the second digital camera 212 b, and the third digital camera 212 d are coupled to the top portion 220 .
- the first digital camera 212 a and the second digital camera 212 b are coupled to the top portion 220 such that they extend from the bottom surface 222 b and are orientated generally perpendicular to the top and bottom surfaces 222 a, 222 b (e.g., parallel with a vertical axis of the top portion 220 ).
- the third digital camera 212 c is coupled to the top portion 220 such that it is orientated at an angle ⁇ 1 relative to a vertical axis of the top portion 220 .
- the angle ⁇ 1 is approximately 45 degrees, however, other values for angle ⁇ 1 are possible, such as, for example, 5 degrees, 15 degrees, 30 degrees, 60 degrees, 75 degrees, etc.
- the top portion 220 When the inner housing 210 is assembled, the top portion 220 is stacked on top of the middle portion 230 , and more particularly, the support arm 234 and fourth digital camera 212 d ( FIG. 3A ).
- the top portion 220 is made from a transparent or semi-transparent material, such as, for example, a glass material, a polymer material (e.g., polycarbonate), or the like, or any combination thereof
- the inner housing 210 can be assembled such that the top surface 222 a of the top portion 220 is positioned underneath the support arm 234 and the fourth digital camera 212 d.
- the top portion 220 can be made from a transparent, semi-transparent, or opaque material (e.g., a metal material, a polymer material, or the like).
- the middle portion 230 includes an inner surface 232 a, an outer surface 232 b, a plurality of notches 233 , a support arm 234 ( FIG. 3A ), an LED 235 ( FIG. 3A ), a pair of camera windows 236 , and an angled recess 238 .
- the support arm 234 extends from the inner surface 232 a towards the angled recess 238 and is coupled to and supports the fourth digital camera 212 d and the LED 235 . As best shown in FIG.
- the fourth digital camera 212 d is oriented such that it is generally perpendicular to the inner surface 232 a and the outer surface 232 b (i.e., generally perpendicular to the orientation of the first, second, and third digital cameras 212 a, 212 b, 212 c ).
- Each of the plurality of notches 233 of the middle portion 230 have a generally rectangular configuration, and while shown as having four notches, any number of notches is possible (e.g., 2 notches, 6 notches, 10 notches, etc.).
- the angled recess 238 is sized and shaped such that it receives the third digital camera 212 c when the top portion 220 is stacked on top of the middle portion 230 when the inner housing 210 is assembled.
- the angled recess 238 has an angle that is approximately the same as the angle ⁇ 1 of the third digital camera 212 d (described above).
- Each of the pair of camera windows 236 is made from a transparent or semi-transparent material (e.g., glass, polycarbonate, or the like, or any combination thereof).
- a transparent or semi-transparent material e.g., glass, polycarbonate, or the like, or any combination thereof.
- the bottom portion 240 includes a top surface 242 a, a bottom surface 242 b, a sidewall 243 , a plurality of locking columns 244 , a plurality of notches 246 , and a pair of generally “U”-shaped slots 248 .
- the plurality of locking columns 244 extend from the top surface 242 a and have a generally cylindrical configuration.
- each of the plurality of locking columns 244 has a generally central aperture 245 .
- the plurality of notches 246 is similar to the plurality of notches 233 of the middle portion 230 in that each of the plurality of notches 246 has a generally rectangular configuration.
- the plurality of notches 246 of the bottom portion 240 and the plurality of notches 233 of the middle portion 230 are orientated relative to one another such that corresponding ones of the plurality of notches 246 and the plurality of notches 233 form a respective opening in the inner housing 210 when assembled (i.e., the top portion 220 is stacked on top of the middle portion 230 ).
- Each of the pair of generally “U”-shaped slots 248 is sized and shaped to receive the pair of camera windows 236 of the middle portion 230 when the inner housing 210 is assembled.
- the protective outer housing 250 includes an upper half 252 and a lower half 280 .
- the protective outer housing 250 encases the inner housing 210 to aid in securing the top portion 220 , the middle portion 230 , and the bottom portion 240 to one another and protects the electronic components disposed within the inner housing 210 .
- the upper half 252 includes a top surface 254 a, a bottom surface 254 b, a sidewall 256 , a plurality of locking columns 258 , an light recess 260 , a camera recess 262 , a button aperture 264 , a trigger aperture 266 , a camera screen 268 , a microphone aperture 270 , a plurality of speaker slots 271 , a push button 272 , and a trigger button 274 .
- the sidewall 256 extends from the bottom surface 254 b and along an outer edge of the upper half 252 .
- the plurality of locking columns 258 ( FIG.
- the plurality of locking columns 258 are similar to plurality of locking columns 244 of the bottom portion 240 of the inner housing 210 described above in that they each have a generally cylindrical configuration and a generally central aperture 258 c. However, the plurality of locking columns 258 differs from the plurality of locking columns 244 in that each of the plurality of locking columns 258 includes an upper portion 258 a and a lower portion 258 b. As shown, the upper portion 258 a of each of the plurality of locking columns 258 has a diameter that is greater than a diameter of the lower portion 258 b. The diameter of the lower portion 258 b of each of the plurality of locking columns 258 is sized such that it can be disposed with a corresponding one of the first plurality of apertures 224 of the top portion 220 of the inner housing 210 .
- the light recess 260 ( FIG. 3B ) is sized and shaped to receive the LED 235 ( FIG. 3A ) of the middle portion 230 of the inner housing 210 when the device is assembled and permits light emitted from the LED to be visible through the top surface 254 a of the upper half 252 .
- the camera recess 262 is sized and shaped to receive first digital camera 212 a when the device is assembled.
- the button aperture 264 has a generally rectangular configuration and receives the push button 272 therein, which also has a generally rectangular configuration.
- the trigger aperture 266 has a generally semi-circular configuration and receives the trigger button 274 therein, which also has a generally semi-circular configuration. Both the push button 272 and the trigger button 274 partially extend from the top surface 254 a past the bottom surface 254 b of the upper half 252 .
- the lower half 280 of the protective outer housing 250 includes a top surface 282 a, a bottom surface 282 b, a first arm 284 , a pair of side arms 286 , and a pair of end arms 288 .
- the first arm 284 generally extends up from the top surface 282 a (i.e., away from the bottom surface 282 b ) and includes a pin 284 a extending therefrom.
- Each of the pair of side arms 286 also extends up from the top surface 282 a (i.e., away from the bottom surface 282 b ) and includes a pair of pins 286 a.
- the pair of end arms 288 is separated from one another by a slot 287 and also generally extends up from the top surface 282 a.
- the pair of end arms 288 also includes a pair of pins 288 a.
- the top portion 220 , the middle portion 230 , and the bottom portion 240 of the inner housing 210 are stacked together as described above.
- the upper half 252 of the protective outer housing 250 is positioned on top of the top portion 220 such that the bottom portion 258 b of each of the plurality of locking columns 258 engages a corresponding one of the first plurality of apertures 224 of the top portion 220 . Because the diameter of the upper portion 258 a of each of the plurality of locking columns 258 is greater than the diameter of the lower portion 258 b and the plurality of apertures 224 , each upper portion 258 a contacts the top surface 222 a of the top portion 220 .
- the various electronic components described above can be disposed with this gap (i.e., coupled to the top surface 222 a.
- a speaker (not shown) and a microphone (not shown) can be disposed in this gap such that the speaker is directly adjacent to the plurality of speaker slots 271 and the microphone is directly adjacent to the microphone aperture 270 .
- the second plurality of apertures 226 permit these components to be connected to other electronic components disposing within the inner housing 210 (e.g., a processor, an electronic storage medium, a power supply, etc.).
- the second plurality of apertures 226 permits the push button 272 and the trigger button 274 to be communicatively coupled to various electronic components disposed in the inner housing 210 (i.e., such that the push button 272 and/or trigger button 274 can be used to create a manually activated security alert).
- the plurality of notches 233 and the plurality of notches 246 form corresponding openings in the inner housing 210 .
- the pair of pins 286 a of each of the pair of side arms 286 engages a corresponding one of the openings formed in the inner housing 210 , thereby aiding in securing the lower half 280 to the inner housing 210 .
- the pin 284 a of the first arm 284 and the pair of pins 288 a of the pair of end arms 288 engage the inner housing 210 to aid in securing the lower half 280 to the inner housing 210 .
- the clip 290 includes a base portion 292 , a first arm portion 294 , a flexible second arm portion 295 , and a contactor 296 .
- the base portion 292 has a generally circular configuration and is coupled to the bottom surface 282 b ( FIG. 3B ) of the lower half 280 of the protective outer housing 250 . While shown as having a generally circular configuration, other configurations for the base portion 292 are possible, such as, for example, a rectangular configuration, a triangular configuration, a polygonal configuration, or the like, or any combination thereof.
- the base portion 292 can be coupled to the bottom surface 282 b by various mechanisms, such as, for example, an adhesive connection, a welded connection, a threaded connection, a pin and aperture system, a magnetic connection, a hook and loop fastener, or the like, or any combination thereof.
- the first arm portion 294 is coupled to the base portion 292 and has a generally “L” shaped configuration.
- the second flexible arm portion 295 is coupled to the first arm portion 294 and includes a contactor 296 . While the base portion 292 , the first arm portion 294 , and the second flexible arm portion 295 are unitary and/or monolithic, although various mechanisms for coupling these components are possible (e.g., a welded connection, an adhesive connection, or the like). Further, the clip 290 can be made from a polymer material, a metal material, or the like, or any combination thereof.
- the clip 290 is generally used to secure the wearable personal security device 200 to a user's clothing and/or accessories (e.g., a backpack, a purse, a briefcase, or the like).
- a user's clothing and/or accessories e.g., a backpack, a purse, a briefcase, or the like.
- the second flexible arm portion 295 urges the contactor 296 in the opposite direction of arrow A towards the bottom surface 282 b of the lower half 280 .
- the second flexible arm portion 295 maintains direct contact between the lower surface 282 b and the contactor 296 .
- the contactor 296 moves away from the bottom surface 282 b and a gap is formed therebetween.
- a piece of fabric 300 (i.e., from a user's clothing or accessory) can be placed between the bottom surface 282 b and the contactor 296 .
- the second flexible arm portion 295 urges the contactor 296 in the opposite direction of arrow A, thereby securing the fabric 300 between the contactor 296 and the bottom surface 282 b, and thus the wearable personal security device 200 to the user's clothing/accessory.
- the wearable personal security device 200 is described above as being affixed to a user's clothing and/or accessories via the clip 290 , other mechanisms for affixing the wearable personal security device 200 to the user's clothing/accessories without use of the clip 290 are possible.
- the wearable personal security device 200 can be affixed to a sleeve or wrap (not shown) which is worn over an appendage of the user (e.g., an arm of the user), or disposed within a pocket or opening formed in the wrap/sleeve.
- the wrap/sleeve aids in keeping the wearable personal security device 200 affixed to the while the user moves the appendage (i.e., arm) during normal activities (e.g., running, walking, etc.).
- the positioning of the wearable personal security device 200 on the arm of the user aids the wearable personal security device 200 in collecting a wide range of images and/or video compared to a relatively more stationary positioning (e.g., the chest of the user) due to the movement of the cameras in the wearable personal security device 200 .
- the inner housing 210 can be directly affixed to user's clothing by, for example, hoop and loop fasteners, a second clip that can be coupled to the bottom surface 242 b of the bottom portion 240 of the inner housing 210 , or the like, or any combination thereof.
- the wearable personal security device 200 further includes a first circuit element 310 ( FIG. 3A ), a second circuit element 312 , and a third circuit element 314 ( FIG. 3B ) for determining whether the device 200 is attached to a user's clothing and/or accessories.
- the first circuit element 310 ( FIG. 3A ) is coupled to the contactor 296 of the clip 290 .
- the second circuit element 312 ( FIGS. 3A and 3B ) is coupled to the bottom surface 282 b of the lower half 280 of the protective outer housing 250 .
- the third circuit element 314 ( FIG. 3B ) is coupled to the bottom surface 242 b of the bottom portion 240 of the inner housing 210 .
- the first circuit element 310 FIG. 3A
- the second circuit element 312 , and the third circuit element 314 are electrical contacts that form a completed electrical circuit when the contactor 296 is in contact with the bottom surface 282 b of the lower half 280 of the protective outer housing 250 , as shown in FIG. 4B .
- the wearable personal security device 200 is affixed to a user's clothing or accessory such that the clothing or accessory is positioned between the clip 290 and the protective outer housing 250 (i.e., fabric 300 shown in FIG. 4B )
- the electrical circuit between the first, second, and third circuit elements 310 , 312 , 314 is interrupted or terminated.
- the first, second, and third circuit elements 310 , 312 , 314 are communicatively coupled to a processor (not shown) and can trigger an automatically activated security alert when the device 200 is removed from the user's clothing.
- the each of the first, second, and third circuit elements 310 , 312 , 314 can be at least one of a spring-loaded pin contactor, a tactile switch, and/or a metallic trace that is the same as or similar to the plurality of spring-loaded pin contactor 120 , the plurality of tactile switches 122 , or the plurality of metallic traces 124 described above with respect to the security device 100 .
- the wearable personal security device can optionally include a pair of spring-loaded pin contactors 320 ( FIG. 3B ) and a fourth circuit element 322 (e.g., a metallic trace) ( FIG. 3A ).
- the pair of spring-loaded pin contactors 320 is coupled to the bottom portion 240 of the inner housing 210 and extend through the bottom surface 242 b thereof.
- the fourth circuit element 322 is coupled to the top surface 282 a of the lower half 280 of the protective outer housing 250 .
- the protective outer housing 250 When the protective outer housing 250 is removed from the inner housing 210 , the completed electric circuit between the pair of spring-loaded pin contactors 320 and the fourth circuit element 322 is interrupted or terminated, and can prompt a processor (not shown) to trigger an automatically activated security alert. In this manner, the pair of spring-loaded pin contactors 320 and the fourth circuit element 322 can be used to determine whether the protective outer housing 250 is removed from the inner housing 210 and trigger an automatic security alert.
- the wearable personal security device 200 can include a tactile switch (not shown) having a down or compressed position and a released position.
- a tactile switch (not shown) having a down or compressed position and a released position.
- the tactile switch and fourth circuit element 322 are in direct contact with one another, resulting in the tactile switch being in the down or compressed position.
- the tactile switch will be released completing an electric circuit.
- the wearable personal security device 200 does not include the protective outer housing 250 such that the inner housing 210 is directly affixed to a user's clothing or accessories (such as through the use of hook and loop or touch fasteners), the tactile switch (or pair of spring-loaded pin contactors 320 ) would be incorporated into the fasteners or clothing on the user, which would then complete an electronic circuit that would be broken if the inner housing 210 was removed from the wearer. Any interruption of the circuit will trigger a security alert automatically; this will have the same effects as if a security alert was manually triggered.
- the first digital camera 212 a, the second digital camera 212 b, and the third digital camera 212 c each have a respective field of view (shown in detail in FIGS. 6A-8B ). Each respective field of view is the area surrounding the wearable personal security device 200 from which the digital camera can capture still or video images.
- the respective field of view of the first digital camera 212 a has a central axis 500 a
- the respective field of view of the second digital camera 212 b has a central axis 500 b
- the respective field of view of the third digital camera 212 c has a central axis 500 c.
- the central axis 500 b of the second digital camera 212 b is orientated an at an angle ⁇ b relative to a z-axis of the wearable personal security device 200 and the central axis 500 c is orientated at an angle ⁇ c relative to the negative z-axis.
- the angle ⁇ b can have a value ranging between about 0 degrees and about 75 degrees relative to the (positive) z-axis
- the angle ⁇ c can each have a value ranging between about 0 degrees and about 75 degrees relative to the negative z-axis.
- angles ⁇ b and ⁇ c are approximately 25 degrees relative to the positive and negative z-axes respectively.
- the angles ⁇ b and ⁇ c can have a value ranging between about 0 degrees and about 45 degrees relative to a y-axis, rather than the z-axis as shown.
- the fourth digital camera 212 d also has a respective field of view with a central axis 500 d.
- the central axis 500 d is orientated parallel to the y-axis (i.e., at an angle of 0 degrees relative to the y-axis) of the wearable personal security device 200 , and thus is thus orientated approximately 90 degrees relative to the second and third digital cameras 212 b, 212 c (i.e., relative to the x-axis and the z-axis).
- the central axis 500 d can have an angle ⁇ d (not shown) having a value that ranges between about 0 degrees and about 75 degrees relative to the y-axis.
- the central axis 500 a of the first digital camera 212 a is orientated at an angle ⁇ a relative to an x-axis of the wearable personal security device 200 .
- the angle ⁇ a can range between about ⁇ 75 degrees to about 75 degrees relative to the x-axis. Desirably, and as shown, the angle ⁇ a is approximately 45 degrees relative to the x-axis.
- digital cameras 212 a, 212 b, and 212 d are orientated such that the central axes 500 a, 500 b, 500 c of the respective fields of view are orientated at approximately 120 degrees relative to one another about the y-axis of the wearable personal security device 200 .
- an aggregate field of view that includes each respective field of view described above allows the digital cameras 212 a, 212 b, and 212 c to capture data from substantially 360 degrees around the wearable personal security device 200 when affixed to a user's clothing or accessory.
- central axis 500 d of the respective field of view of the fourth digital camera 212 d is orientated at approximately 90 degrees relative to central axes 500 b and 500 c and about 45 degrees relative to central axis 500 a, further increasing the aggregate field of view.
- FIGS. 6A-8B generally illustrate three likely options for how an individual may wear the wearable personal security device 200 described above. Regardless of how an individual elects to wear the device 200 , FIGS. 6A-8B illustrate that the orientation of digital cameras 212 a, 212 b, 212 c, and 212 d relative to one another provides a broad aggregate field of view in multiple different vectors from the individual to capture images of, for example, a perpetrator approaching the individual from different directions. Accordingly, as the individual, or the applicable portion of the human body to which the device is attached or affixed, physically moves, the scope of coverage of the plurality of digital cameras also shifts.
- each of the respective fields of field moves relative to its original position, thus aiding in expanding the aggregate field of view.
- the individual can deliberately move in order to specifically modify one or more of the respective fields of view to aid in providing a desired field of view for capturing data (e.g., still images and/or video clip(s)).
- the wearable personal security device 200 is affixed to an upper arm 602 of an individual 600 .
- the wearable personal security device 200 captures data (i.e., still images, video images, or both) from an aggregate field of view that includes the respective field of view 600 a of the first digital camera 212 a, the respective field of view 600 b of the second digital camera 212 b, the respective field of view 600 c of the third digital camera 212 c, and the respective field of view 600 d of the fourth digital camera 212 d.
- data i.e., still images, video images, or both
- respective fields of view 612 b and 612 c capture data from in front of and behind the individual 600 .
- FIG. 6A respective fields of view 612 b and 612 c capture data from in front of and behind the individual 600 .
- respective fields of view 612 a and 612 d capture data from the side of the individual 600 . Because the angle ⁇ a of central axis 500 a ( FIG. 4B ) of the first digital camera 212 a has a value of approximately 45 degrees relative to the x-axis, the respective field of view 612 a of the first digital camera 212 a captures data without being substantially obstructed or limited by a portion of the individual when the device is affixed to the upper arm 602 .
- the individual's arm could substantially (or even completely) obscure or limit of the respective field of view of the first digital camera 212 a when affixed to the upper arm 602 , thereby restricting the aggregate field of view of the plurality of digital cameras.
- movement of the individual 600 can modify one or more of the respective fields of view (i.e., the aggregate field of view) of the plurality of digital cameras.
- the respective fields of view 612 a, 612 b, 612 c, and 612 d are directed in front of the individual, behind the individual, and to the individual's right side, providing approximately 270 degrees of coverage around the individual.
- the individual can, for example, turn his or her chest/torso to his or her left, which will position the respective field of view 612 c in the general direction of the individual's left side.
- the individual can turn his or her chest/torso to his or her right, which will position the respective field of view 612 d in the general direction of the individual's left side. In this manner, the individual's natural or deliberate movement can aid in providing a wider aggregate field of view.
- the wearable personal security device 200 only includes the second digital camera 212 b (not shown in FIGS. 6A and 6B ) and the third digital camera 212 c (not shown in FIGS. 6A and 6B ).
- the wearable personal security device 200 when worn on the upper arm 602 as shown in FIGS. 6A and 6B , captures data from an aggregate field of view including the respective field of view 612 b of the second digital camera 212 b and the respective field of view 612 c of the third digital camera 212 c.
- the aggregate field of view in this implementation permits the wearable personal security device 200 to capture data from in front of and behind the individual 600 , as best shown in FIG. 6A .
- the wearable personal security device 200 is affixed to a shoulder 704 of an individual 700 .
- the wearable personal security device 200 captures data (i.e., still images, video images, or both) from an aggregate field of view that includes the respective field of view 700 a of the first digital camera 212 a, the respective field of view 700 b of the second digital camera 212 b, the respective field of view 700 c of the third digital camera 212 c, and the respective field of view 700 d of the fourth digital camera 212 d.
- respective fields of view 712 b and 712 c capture data from in front of and behind the individual 700 .
- respective field of view 712 a captures data from the side of the individual 700
- the respective field of view 712 d captures data from above the individual 700 .
- the wearable personal security device 200 is affixed to a chest 806 of an individual 800 .
- the wearable personal security device 200 captures data (i.e., still images, video images, or both) from an aggregate field of view that includes the respective field of view 800 a of the first digital camera 212 a, the respective field of view 800 b of the second digital camera 212 b, the respective field of view 800 c of the third digital camera 212 c, and the respective field of view 800 d of the fourth digital camera 212 d.
- respective fields of view 812 b and 812 c capture data from the sides of the individual 800 .
- FIG. 8B respective fields of view 812 b and 812 c capture data from the sides of the individual 800 .
- respective field of view 812 a captures data from the above the individual 700
- the respective field of view 812 d captures data from in front of the individual 800 .
- the angle ⁇ a of central axis 500 a ( FIG. 4B ) of the first digital camera 212 a has a value of approximately 45 degrees relative to the x-axis (and also the y-axis)
- the respective field of view 812 a of the first digital camera 212 a captures data without being substantially (or even completely) obstructed by a portion of the individual when the device is affixed to the chest 806 .
- the respective field of view 812 a is shown as being partially limited by the individual's head, if the angle ⁇ a was about 0 degrees relative to the x-axis, the individual's head could completely obscure the respective field of view of the first digital camera 212 a.
- the respective field of view 812 a is only partially obscured or limited by the individual's head while permitting the wearable personal security device 200 to, for example, continuously monitor the individual's identity using the first digital camera 212 a (i.e., verify that an authorized individual is wearing the device).
- the orientation of the respective fields of view of the plurality of digital cameras relative to one another permit the individual to affix the wearable personal security device 200 to multiple locations on the individual's body without a portion the individual's body (e.g., arm, head, etc.) substantially obscuring or limiting one of the respective fields of view.
- the relative orientation of the central axes FIGS. 5A-5B
- FIGS. 5A-5B can be selected to achieve a desired aggregate field of view. While exemplary angles of the cameras with respect to the axes of wearable personal security device 200 and with respect to each other have been provided, other angles are also contemplated and fall with the concepts of the present disclosure.
- a wearable personal security device 900 that is the same as or similar to the wearable personal security devices 100 , 200 is communicatively coupled (as represented by reference numeral 912 ) to a mobile device 920 via a communication module (disposed within the wearable personal security device 900 , and thus not shown) that is the same as or similar to the communication module 112 described above.
- the wearable personal security device 900 and the mobile device 920 can be communicatively coupled via, for example, a Bluetooth connection, a Wi-Fi connection, a wired connection, or the like, or any combination thereof.
- connection speed between the communication module of the wearable personal security device 900 and the mobile device 920 can be, for example, between about 0.5 and 100 Mb, between about 1 and 5 Mb, about 2 Mb, etc.
- the mobile device 920 is communicatively coupled (as represented by reference numeral 922 ) to an external network 930 .
- the external network 930 can be a cellular network, a Wi-Fi network, a near-field communication network, or any other wireless network, or the like, or any combination thereof.
- connection speed between the mobile device 920 and the external network 930 can be, for example, between about 0.5 Mb and about 100 Mb, between about 1 Mb and about 5 Mb, between about 3 Mb and about 4 Mb, etc.
- the mobile device 920 generally includes a memory and a processor, with an associated software application stored in the memory.
- the associated application can establish a communication session with the communication module of the wearable personal security device 900 (as shown by 912 ) and can also and process the transmitted security data using the processor of the mobile device 900 , store transmitted security data in the memory of the mobile device; 900 , terminate the communication session, and/or upload the transmitted security data to the external network 930 . Further, a user of the mobile device can activate a manually activated security alert (described above) via the associated application.
- stored, captured data and/or stored, captured sounds (collectively, “security data”) from the wearable personal security device 900 is transmitted to the mobile device 920 .
- the mobile device 920 transmits the security data via the external network 930 to one or more third parties 940 .
- the one or more third parties 940 can receive the security data on their mobile device that includes the same associated application described above, or alternatively, the one or more third parties 940 can receive a text message or e-mail notification.
- the one or more third parties can be, for example, friends or family members of the user of the wearable personal security device 900 , the user's employer, or law enforcement personnel.
- the one or more third parties can be a monitoring company that review the transmitted security data and provides access to an applicable portion thereof to an authorized person (e.g., the user's friends and family, law enforcement, etc.) as determined by services selected the user.
- the monitoring company can utilize other software or applications on the user's mobile device 920 or a GPS unit included in the wearable personal security device 900 (that is the same or similar to the GPS described above) to contact a different user located nearby the wearer or disseminate the location of a triggered security alert to other users of similar security devices or systems that have a mobile device containing software or applications capable of receiving such notification.
- the associated application includes a navigational map.
- the associated application receives a GPS location of the user of the wearable personal security device 900 from a communication module (that is the same as or similar to communication module 112 ), and the associated application displays the user's GPS location on the navigational map (which the user can view and interact with via a display of the mobile device 920 ).
- the associated application also displays one or more points of interests on the navigational map that are within a predefined range of the user's GPS location (e.g., within a block, a half-mile, two miles, etc.).
- the one or more points of interests can be stored in the memory of the mobile device 920 and/or received from the external network 930 (i.e., a remote server).
- the one or more points of interest can be fixed points of interest, such as areas with historically high crime rate, areas with historically low crime rates, police stations, other areas of safety, or the like.
- the user of the wearable personal security device 900 and associated application can create temporary points of interest on the navigational map and submit them to the remote server such that they can be received on other users' associated application and displayed on their navigational maps.
- the user and/or third parties can submit real-time, temporary points of interest such as a location with suspicious activity, a location of a known perpetrator/criminal, a location of a recently committed or attempted crime, or the like.
- the wearable personal security device 900 and associated application can also automatically submit a temporary point of interest (i.e., the GPS location of the user) responsive to a manually or automatically activated security alert.
- a temporary point of interest i.e., the GPS location of the user
- users who submit a point of interest may be rewarded with a free third party monitoring service for a limited period of time.
- the user of the wearable personal security device 900 and associated application can further decrease the likelihood of being the victim of a crime by (i) avoiding locations or routes that currently have, or are likely to have, a security threat and/or (ii) favoring locations or routes that are near areas of safety.
- the navigational map can highlight and/or provide directions to one or more points of interest which the user can travel towards to reduce the response time for law enforcement (i.e., the location of the nearest police station).
- the wearable personal security device 900 can be directly communicatively coupled to the external network 930 .
- specific communication instructions and a unique device registration identifier may be added to the device 900 .
- the wearable personal security device 900 can transmit captured data and/or sounds without depending on the mobile device 920 , which could, for example, run out of battery, be lost or stolen, etc.
- the wearable personal security device 900 could be used by individuals who do not own a mobile device (e.g., small children, the elderly, etc.).
- a device of the present disclosure utilizes an access control system, such as, for example, when communicating thru a cellular network, a wide area network, or any other type of network.
- an access control system could be open to all users, or the access control system could be controlled by an employer, association, or other controlling body.
- a device of the present disclosure setup to monitor a certain location e.g., a home, an office, etc.
- the access control system e.g., a cloud based information depository
- An authorized list of users could be created and/or stored, or a real time notification of someone requesting access could be sent to the owner and/or operator (e.g., administrator) of the device.
- Authorized users could either enter a code in their personal mobile device or provide some other method of identification and disarming credentials, or the owner and/or operator of the device could remotely disarm the device for individuals requesting access.
- the access control system could either require an individual granted access to rearm the device, the owner could remotely arm the device, or the access control system could rearm the device based upon predetermined parameters.
- a device of the present disclosure can be configured through its executing application to permit direct access to the captured, stored data and/or sounds or real-time data and/or sounds by a third party.
- a third party e.g., an employer can directly access the captured, stored data on the device worn by an employee to monitor the employee's activities (i.e., whether the employee is performed specified tasks, etc.) via a direct access feature.
- a friend or family member can monitor an at-risk user of the device (e.g., a child, an elderly person, a disabled person, etc.) in real-time using the direct access feature.
- permitting direct third party access to the captured data and/or sounds via the direct access feature avoids having the third party view the user directly as would be the case using other devices (e.g., wall-mounted cameras, nanny cameras, or the like), thereby permitting the third party to be less intrusive and protecting the privacy of the user.
- the direct access feature and/or security devices of the present disclosure can be configured such that the third party can only access the captured, stored data in response to one or more of the triggering events described above. For instance, in the case of an employer monitoring an employee wearing the device, the employer may only be able to access the captured data if the employee is injured (which could be indicated by an accelerometer, as described above).
- While the wearable personal security devices 100 , 200 have been described herein as being designed to be worn on a user's clothing and/or accessories, a user may place the security device 100 , 200 in a central location in his or her home and set the device to standby or stationary mode. After a predefined time period elapses (e.g., 30 seconds) to allow the user to exit the area without triggering an alarm, the device begins to monitor sound in the area using the microphone to detect changes in the sound levels in excess of an acceptable range. The device may also additionally utilize some or all of the plurality of digital cameras in standby/stationary mode to detect motion in the area by comparing images captured by such cameras in excess of acceptable levels of change.
- This comparative analysis could be processed on the processor of the security device 100 , 200 or through the associated application on a mobile device. These changes in sound or images would trigger a security alert, which would have the same effects as described above. Some implementations of the present disclosure may provide different effects upon this type of security alert, such as increasing ambient light level via light-emitting diodes to improve the quality of images and/or not emitting sounds or light.
- wearable personal security devices 100 , 200 , 900 have been described as personal security-related, each of these devices can be used to obtain information acquired during the use of the device.
- a wearable personal security device includes a GPS unit
- the device can be used to determine the number of steps taken by the user, the distance that the user traveled, etc.
- the wearable personal security devices 100 , 200 , 900 can continuously store captured data (e.g., still images, video clips, audio/sound clips, etc.) and by using the GPS unit, digitally map rooms and other interior spaces, or any other environment. This data can then be used to create digital representations of various environments (e.g., a specific room, a house, a street, etc.).
- the present disclosure may be used in multiple applications, including commercial applications addressing worker safety, productivity, and facility management, and any commercial applications may provide for access to the captured sounds and images, before or after an alert, to the entity employing, engaging, or otherwise contracting with the user of the security system.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Alarm Systems (AREA)
Abstract
A security device includes a housing, a digital camera, an electronic storage medium, and a communication module. The digital camera is coupled to the housing and is configured to capture data. The electronic storage medium is coupled to the digital camera such that the electronic storage medium is configured to store the captured data therein. The communication module is configured to transmit the captured data according to an ordered sequence of data transmissions in response to the occurrence of a triggering event, the ordered sequence including (i) a first transmission of captured data including data captured prior to the triggering event, and (ii) a second transmission of captured data including data captured subsequent to the triggering event.
Description
- This application claims the benefit of and priority to U.S. Provisional Application No. 62/319,008, filed on Apr. 6, 2016, 62/442,153, filed on Jan. 4, 2017, and 62/453,122, filed on Feb. 1, 2017, each of which is hereby incorporated by reference herein in its entirety.
- The present disclosure relates generally to security systems, and more particularly, to wearable personal security devices and systems.
- Individuals desire to avoid being the victim of theft, assault, battery, and other offenses. It has been acknowledged that one of the principal reasons an individual may be the subject of criminal offenses is due to the perception by the perpetrator that the individual is an “easy target.” This determination is made upon the consideration of multiple factors, including the current status of the individual and the likelihood of avoiding the attention of police agencies and punishment. The present disclosure cannot alter the current status of an individual (e.g., transformation the individual into an aware, healthy, athletic adult located in a populated open space) but the present disclosure does aid in increasing the likelihood of a negative outcome for a would be perpetrator on account of a recorded wide field of view and dissemination of such information to one or more third-parties in a separate, remote location.
- Prior wearable digital recording devices suffer from one or more disadvantages. For example, such devices generally suffer from a limited field of view focused in front of the wearer such that side and/or backward-looking images are not captured and/or data generated by such devices is physically stored on such devices such that any images actually captured can be eliminated by a perpetrator by disposing of and/or destroying/damaging the device. Hence, there remains a need for a device and system that provides a wide field of view and retrieval of the captured images and/or video and/or audio from an off-site or remote location.
- Furthermore, other prior wearable digital recording devices require the manipulation of such device by the wearer's hand in order to obtain the desired benefits or are designed to subtly blend into the appearance of the wearer so as to not be easily noticeable by the public. These features, however, limit the effectiveness of such devices by either requiring activity by the wearer that may not be performed at the necessary moments in time or fail to signal to the perpetrator that the wearer is not an “easy target.” Hence, there remains a need for an improved security device and system. The present disclosure is directed towards addressing these needs and other problems.
- According to some implementations of the present disclosure, a security device includes a housing, a digital camera, an electronic storage medium, and a communication module. The digital camera is coupled to the housing and is configured to capture data. The electronic storage medium is coupled to the digital camera such that the electronic storage medium is configured to store the captured data therein. The communication module is configured to transmit the captured data according to an ordered sequence of data transmissions in response to the occurrence of a triggering event, the ordered sequence including (i) a first transmission of captured data including data captured prior to the triggering event, and (ii) a second transmission of captured data including data captured subsequent to the triggering event.
- According to some implementations of the present disclosure, a wearable personal security device includes a protective housing, a plurality of digital cameras, a microphone, an electronic storage medium, and a communication module. The plurality of digital cameras is coupled to the protective housing, and each of the plurality of digital cameras is configured to capture data, including still images, video images, or both. The microphone is coupled to the protective housing and is configured to capture sounds. The electronic storage medium is coupled to the microphone and each of the plurality of digital cameras such that the electronic storage medium stores the captured data and the captured sounds therein. The communication module is coupled to the electronic storage medium and is configured to transmit at least a portion of the stored, captured data and at least a portion of the stored, captured sounds in response to the occurrence of a triggering event.
- According to some implementations of the present disclosure, a wearable personal security device includes a protective outer housing, an inner housing, a plurality of digital cameras, a microphone, and a communication module. The protective outer housing includes an upper half having a trigger and a lower half being coupled to a clip. The inner housing includes a lower portion, a middle portion, and an upper portion, the inner housing being disposed within the protective outer housing. A first one of the plurality of digital cameras is coupled to the middle portion of the inner housing and a second one of the plurality of digital cameras is coupled to the upper portion of the inner housing. Each of the plurality of digital cameras is configured to capture data, including still images, video images, or both. The microphone is coupled to the upper half of the protective housing and is configured to capture sounds. The electronic storage medium is coupled to the microphone and each of the plurality of digital cameras such that the electronic storage medium stores the captured data and the captured sounds therein. The communication module is coupled to the electronic storage medium and is configured to transmit at least a portion of the stored, captured data and at least a portion of the stored, captured sounds in response to the occurrence of a triggering event.
- According to some implementations of the present disclosure, a personal security system includes a wearable personal security device and an application. The wearable personal security device includes a protective housing, a plurality of digital cameras, a microphone, an electronic store medium, and a communication module. The plurality of digital cameras is coupled to the protective housing, and each of the plurality of digital cameras is configured to capture data, including still images, video images, or both. The microphone is coupled to the protective housing and is configured to capture sounds. The electronic storage medium is coupled to the microphone and each of the plurality of digital cameras such that the electronic storage medium stores the captured data and the captured sounds therein. The communication module is coupled to the electronic storage medium and is configured to transmit at least a portion of the stored, captured data and at least a portion of the stored, captured sounds in response to the occurrence of a triggering event. The application executes on a mobile device that is wirelessly coupled to the wearable personal security device. The executing application is configured to: receive, from the communications module of the wearable personal security device, at least a portion of the transmitted data and sounds; process, via a processor of the mobile device, the received data and sounds; store the processed data and sounds in a memory of the mobile device; and wirelessly transmit at least a portion of the processed data and sounds, via a communication module of the mobile device, to a remote server.
- The present disclosure is susceptible to various modifications and alternative forms, and some representative implementations have been shown by way of example in the drawings and will be described in detail herein. It should be understood, however, that the inventive aspects of the disclosure are not limited to the particular forms disclosed. Rather, the disclosure is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure as defined by the appended claims.
-
FIG. 1 is a schematic illustration of a wearable personal security device according to some implementations of the present disclosure; -
FIG. 2 is a perspective view of a wearable personal security device according to some implementations of the present disclosure; -
FIG. 3A is a exploded perspective view of the wearable personal security device ofFIG. 2 ; -
FIG. 3B is another exploded perspective view of the wearable personal security device ofFIG. 2 ; -
FIG. 4A is an enlarged partial perspective view of a clip of the wearable personal security device ofFIG. 2 in a closed position; -
FIG. 4B is an enlarged partial detailed perspective view of the clip ofFIG. 4A in an open position; -
FIG. 5A is a plan view of the wearable personal security device ofFIG. 2 ; -
FIG. 5B is another perspective view of the wearable personal security device ofFIG. 2 illustrating respective fields of view of a plurality of cameras; -
FIG. 6A is a side elevation view of the wearable personal security device ofFIG. 2 affixed to a right arm of a user; -
FIG. 6B is a front elevation view of the user ofFIG. 6A ; -
FIG. 7A is a side elevation view of the wearable personal security device ofFIG. 2 affixed to a right shoulder of a user; -
FIG. 7B is a front elevation view of the user ofFIG. 7A ; -
FIG. 8A is a side elevation view of the wearable personal security device ofFIG. 2 affixed to a chest of a user; -
FIG. 8B is a front elevation view of the user ofFIG. 8A ; -
FIG. 9 is a perspective schematic illustration of the wearable personal security device ofFIG. 2 affixed to a user and being communicatively coupled to an external network via a mobile device; and -
FIG. 10 is a schematic illustration of an access control system/scheme used in the operation of a security system according to implementations of the present disclosure. - While the present disclosure is susceptible to various modifications and alternative forms, specific embodiments and implementations are shown by way of example in the drawings and are described in detail herein. It should be understood, however, that the present disclosure is not intended to be limited to the particular forms disclosed. Rather, the present disclosure is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure.
- Referring to
FIG. 1 , asecurity device 100 includes aprotective housing 101, a plurality ofdigital cameras 102, amicrophone 104, aspeaker 106, a plurality of light-emitting diodes (“LEDS”) 108, anelectronic storage medium 110, acommunication module 112, aprocessor 114, and a battery/power supply 116. Generally, thesecurity device 100 is used to record images and sounds of the surrounding environment then store and/or disseminate such recordings (e.g., to a third party monitoring service, police, etc.). As such, thesecurity device 100 can be used to decrease the likelihood of a crime being committed against a user of the device or against property and/or third parties generally in the vicinity of the device. - Each of the plurality of
digital cameras 102 is coupled to theprotective housing 101 and captures data from the surrounding environment, including still images, video images, or both. Further, each of the plurality ofdigital cameras 102 is communicatively coupled to theelectronic storage medium 110 and transmits the captured data to theelectronic storage medium 110 for storage therein. While the plurality ofdigital cameras 102 is shown as including four digital cameras, any number of digital cameras is possible, such as, for example, only one camera, only two cameras, six cameras, ten cameras, twenty cameras, etc. The plurality ofdigital cameras 102 can consist of the same or different types of digital cameras, such as, for example, digital cameras that only record still images, digital cameras that only record video images, digital cameras that record still images and video images, high definition cameras, low resolution cameras (e.g., cameras that produce “security quality” images), cameras with a fish eye lens (e.g., a 180 degree fish eye lens), cameras with or without zooming ability (optical and/or digital zoom), or the like, or any combination thereof. Further, each of the plurality ofdigital cameras 102 can be selected such that the captured still images or video images have a desired resolution and/or file size (i.e., 0.1 Mb, 1 Mb, 10 Mb, 50 Mb, etc.) - The
microphone 104 is coupled to theprotective housing 101 and captures sounds from the surrounding environment. Themicrophone 104 is communicatively coupled to theelectronic storage medium 110 such that the captured sounds are transmitted to theelectronic storage medium 110 for storage. Themicrophone 104 can be selected such that it has a desired gain for recording sound from the surrounding environment. Further, while thesecurity device 100 is shown as having one microphone, the device can include any number of microphones to increase the likelihood of capturing all sounds from the surrounding environment (e.g., two microphones, five microphones, etc.). - As described above, the
electronic storage medium 110 is communicatively coupled to the plurality ofdigital cameras 102 and themicrophone 104 and stores captured data and/or captured sounds. Theelectronic storage medium 110 can be any mass storage device, such as, for example, a hard disk drive, a solid state drive, a secure digital (“SD”) card, or the like, or any combination thereof. Further, the storage capacity of theelectronic storage medium 110 can be selected such that it can store a desired amount of data and sounds before requiring deletion and/or overwriting of previously stored data/sounds in order to store newly captured data and/or sounds. - The
communication module 112 is communicatively coupled to theelectronic storage medium 110 and transmits at least a portion of the captured data and/or captured sounds stored in theelectronic storage medium 110 to a remote device (e.g., a server, a computer, a tablet a smartphone, etc.). Alternatively or additionally, thecommunication module 112 can be directly coupled to the plurality ofdigital cameras 102 to permit transmission of real-time data captured by the plurality ofdigital cameras 102. Thecommunication module 112 is communicatively coupled to the remote device via, for example, a cellular network, a Wi-Fi network, near-field communication, an RFID connection, a Bluetooth connection, or the like, or any combination thereof Alternatively, thecommunication module 112 can be communicatively coupled to the remote device via a hard-wired connection (e.g., via a micro USB cable). The remote device receives the transmitted portion of the stored images and/or stored sounds and in some implementations permits a user of the remote device to view, analyze, and/or manipulate the captured data and/or sound. In some other implementations, the user is prevented from accessing, viewing, analyzing, manipulating, etc. the captured data and/or sound. In some implementations, in an effort to prevent tampering with the data and/or audio by unwanted individuals (e.g., a robber, etc.), the user is only permitted to access, view, analyzing, manipulating, etc. the captured data and/or sound when certain predetermined events occur (e.g., when the user is at home, at work, when thesecurity device 100 is hard wired to a computer, etc. or any combination thereof). - The
processor 114 is communicatively coupled to the plurality ofdigital cameras 102, themicrophone 104, thespeaker 106, the plurality ofLEDs 108, theelectronic storage medium 110, thecommunication module 112, thepower supply 116, and/or any of the other components of thesecurity device 100. Theprocessor 114 executes instructions stored in theelectronic storage medium 110 and controls the operation of the other components of thesecurity device 100 to which it is communicatively coupled. Thepower supply 116 is electrically connected to the various components of thesecurity device 100 and provides power to the components. Thepower supply 116 can be a disposable battery, a rechargeable battery, an external A/C power supply, an external D/C power supply, or the like, or any combination thereof. - The
security device 100 also optionally includes a light sensor 118. The light sensor 118 measures the ambient light surrounding thesecurity device 100. In some implementations, when the light sensor 118 measures an ambient light below a predefined value, the plurality ofLEDs 108 illuminate to aid a user's vision and/or enhance the clarity of the captured data from the plurality ofdigital cameras 102. For example, the predefined value of ambient light that triggers illumination of the plurality ofLEDs 108 can be less than fifty lux, less than twenty lux, less than ten lux, less than five lux, etc. Similarly, the plurality ofLEDs 108 can also be used to notify third parties (e.g., a potential perpetrator of a crime) of the presence of thesecurity device 100 in a dimly light environment by operating as strobe lights, and thus act as a deterrent. - The
security device 100 also optionally includes a plurality of spring-loadedpin contactors 120 and a plurality oftactile switches 122. Thesecurity device 100 is designed to be affixed to a user's body, clothing, or accessories (e.g., a backpack, a purse, or the like). The optional plurality of spring-loadedpin contactors 120, the plurality oftactile switches 122, and a plurality ofmetallic traces 124 can be used to determine if thesecurity device 100 has been removed from the user's clothing or accessory. For example, a first one of the plurality of spring-loadedpin contactors 120 and a second one of the plurality of spring-loadedcontactors 120 are coupled to theprotective housing 101 such that they are in direct contact with one of the plurality ofmetallic traces 124 when the device is not affixed to clothing or an accessory. When the first and second ones of the plurality of spring-loadedpin contactors 120 are in direct contact with themetallic trace 124, they create a completed electrical circuit. Thus, when the first and second ones of the plurality of spring-loadedcontactors 120 are separated from themetallic trace 124 by, for example, a piece of fabric (i.e., a non-conductive material) from the user's clothing being positioned therebetween, the electrical circuit is interrupted and/or terminated. When the fabric is removed, the electrical circuit between the first and second ones of the plurality of spring-loadedpin contactors 120 and themetallic trace 124 is completed and serves an indicator that the device has been removed. The plurality oftactile switches 122 detect whether the device is affixed to the user in the same or similar manner by creating an electrical circuit that can serve as an indicator that the device has been removed from clothing or an accessory. - In some implementations, the
security device 100 optionally includes anaccelerometer 126, agyroscope 128, and aGPS unit 130. Theaccelerometer 126 measures the acceleration of thesecurity device 100 and thegyroscope 128 measures the angle or level of thesecurity device 100. TheGPS unit 130 determines a location of the wearablepersonal service device 100. Theaccelerometer 126, thegyroscope 128, and/or theGPS unit 130 can be communicatively coupled to one or more of theelectronic storage medium 110 for storing captured data, thecommunication module 112 for transmitting captured data, and/or theprocessor 114 for processing captured data. - In some implementations, the
security device 100 optionally includes a radar (not shown) and a microwave (not shown). The radar and/or microwave can be used in order to digitally map a space (e.g., a room, a house, etc.) and/or detect motion around thesecurity device 100. - The components of the
security device 100 described above can be configured to operate as described herein in response to the occurrence of one or more triggering events. Two examples of triggering events are (i) a manually activated security alert, and (ii) an automatically activated security alert. A manually activated security alert is activated by a user of thesecurity device 100, when, for example, the user feels that a security risk is imminent. The user can create a manually activated security alert by various mechanisms, such as atrigger button 132 disposed on theprotective housing 101. - Unlike a manually activated security alert, an automatically activated security alert is triggered without a user needing to take any affirmative action. Advantageously, an automatically activated security alert causes various components of the
security device 100 to operate, even if the user is unaware of a security threat or is otherwise incapacitated. Examples of automatically activated security alerts include: (i) an acceleration of the security device 100 (measured by the accelerometer) above a predefined value (which may indicate that the user/wearer was put into a moving vehicle against his/her will), (ii) removal of thesecurity device 100 from a user's clothing or accessory (as indicated by one or more of the plurality of spring-loadedpin contactors 120, the plurality oftactile switches 122, or metallic traces 124), (iii) thesecurity device 100 being separated from a user's mobile device by a predefined distance (as determined by theGPS unit 130 and the processor 114), and (iv) an angle of the device (measured by the gyroscope 128) exceeds a predefined angle (e.g., thesecurity device 100 is turned 90 degrees relative an original orientation, which may indicate that the user has fallen) . In some implementations, theprocessor 114 performs a comparative analysis of the recorded data and/or recorded sound, and responsive to a predefined level of change, theprocessor 114 triggers an automatic security alert. For example, theprocessor 114 can perform a comparison of the recorded sound from themicrophone 104 and a predefined volume (e.g., a volume which may indicate shouting or distress) or predefined sounds (e.g., a gunshot, predefined words or phrases, etc.) stored in theelectronic storage medium 110. If theprocessor 114 determines that the recorded sound exceeds the predefined volume, of if theprocessor 114 identifies one of the predefined sounds, theprocessor 114 triggers an automatic security alert (described above). Similarly, theprocessor 114 can perform a comparison of the recorded data from the plurality ofdigital cameras 102 and previously recorded data stored in the electronic storage medium 110 (i.e., data recorded at a predefined interval prior to the currently recorded data) or a library of security-related images stored in the electronic storage medium 110 (e.g., images of weapons, images of known criminals, or any other image that may be indicative of a security threat, or the like). More particularly, when comparing the recorded data to previously recorded data, theprocessor 114 can compare a brightness of the recorded data (i.e., still images, video images, or both) and previously recorded data, in which case a lower brightness in the recorded data compared to the previously recorded data may indicate that a third party (e.g., a perpetrator) has entered the field of view of one of the plurality ofdigital cameras 102, or that thesecurity device 100 has been moved. Theprocessor 114 can trigger an automatic security alert based on the comparison of recorded data and previously recorded data, or if theprocessor 114 identifies one of the security-related images. - The one or more triggering events cause the same result whether the triggering event is a manually activated security alert or an automatically activated security alert. In some implementations, the plurality of
digital cameras 102 and themicrophone 104 only record data and/or sound respectively in response to a triggering event. For example, a user can press atrigger button 132 on theprotective housing 101 to trigger a manually activated security alert which then causes the plurality ofdigital cameras 102 and themicrophone 104 to begin capturing and/or storing data and/or sounds. Similarly, in some implementations, a triggering event causes: (i) all of the data and sound currently stored in theelectronic storage medium 110 to be disseminated (e.g., wirelessly transmitted) to a remote device (e.g., a smartphone, a server, a computer, etc.) via thecommunication module 112, (ii) the plurality ofLEDs 108 to operate as strobe lights at the highest illumination level, (iii) the GPS location (as determined by the GPS unit 130) to be disseminated (e.g., wirelessly transmitted) to a remote device via thecommunication module 112, (iv) thespeaker 106 to emit a siren-like or other alarm sound, (v) or any combination thereof. - In some implementations, the stored, captured data and the stored, captured sounds transmitted by the
communication module 112 responsive to the occurrence of a triggering event includes data and sounds captured (i) at the time of the triggering event, (ii) during a predefined period prior to the triggering event (e.g., ten seconds, thirty seconds, one minute, two minutes, etc.), and (iii) during a predefined period subsequent to the triggering event (e.g., ten second, thirty seconds, one minute, two minutes, etc.). For example, thecommunication module 112 can transmit stored, captured data taken ten minutes before the triggering event, five minutes before the triggering event, one minute before triggering event, at the time of the triggering event, one minute subsequent to the triggering event, five minutes subsequent to the triggering event, and ten minutes subsequent to the triggering event, etc. - Similarly, in some implementations, the
communication module 112 is configured to transmit the stored, captured data and/or the stored, captured sounds in an ordered sequence. If the perpetrator of an attack or crime in the vicinity of thesecurity device 100 is aware of the device's presence and its capabilities, there is a strong likelihood that the perpetrator will attempt to delete the incriminating data and/or sounds stored therein or otherwise prevent their transmission (e.g., by destroying the security device 100). To that end, a perpetrator may be able to destroy the device and prevent transmission of the relevant data/sounds (despite the protection offered by the protective housing 101). Thus,communication module 112 is configured to transmit data and sounds according to the ordered sequence of data transmissions in response to the occurrence of a triggering event in order to prioritize transmission of the most relevant captured data and sounds before the device can be destroyed, thereby increasing the likelihood of identifying perpetrator and increasing the overall deterrent effect of thesecurity device 100. - The ordered sequence generally includes one or more separate transmissions (e.g., two transmissions, four transmissions, twenty transmissions, one hundred transmissions, etc.). For example, the ordered sequence can include (i) a first transmission of captured data including data captured prior to the triggering event, and (ii) a second transmission of captured data including data captured subsequent to the triggering event. Alternatively, the second transmission of captured data can include data captured contemporaneous with the triggering event. In addition, the ordered sequence can further include (iii) a third transmission of captured data including additional data captured prior to the captured data of the first transmission; and (iv) a fourth transmission of captured data including additional data captured subsequent to the captured data of the second transmission. More specifically, the captured data of the various transmissions (i.e., the first transmission, second transmission, etc.) can be data captured at predefined interval (e.g., 0.5 seconds, three seconds, ten seconds, one minute, five minutes, etc.) prior to and/or subsequent to the triggering event. Further, in some implementations, the second transmission of captured data and the fourth transmission of captured data is each a transmission of real-time data (e.g., streaming data in a real-time fashion with and/or without the real-time data being stored locally).
- Generally, data and/or sounds captured immediately before and after to the triggering event (e.g., a manually activated security alert) will be the most relevant and are thus a priority for transmission. Thus, in accordance with the principles described above, in some implementations, the first transmission includes data captured, for example, one second before the triggering event, the second transmission includes real-time data, the third transmission includes data captured, for example, five seconds before the triggering event, and the fourth transmission includes real-time data. In this manner, the ordered sequence prioritizes data and/or sounds captured immediately prior to the triggering event (i.e., data most likely to show the approach of the perpetrator) and immediately subsequent to the triggering event (i.e., data most likely to show the perpetrator committing a crime or fleeing). The
communication module 112 continues to transmit captured data and/or sounds in accordance with the ordered sequence for a predefined amount of time (e.g., five minutes, thirty minutes, one hour, etc.) or until the device is destroyed. - In some implementations, the transmitted data of the transmissions of the ordered sequence described above (i.e., the first transmission, the second transmission, etc.) includes one or more compressed, encrypted still images. Compressed still images are advantageous because of their relatively small file size (e.g., between about 0.3 Mb and 1 Mb). Generally, the transmission of the captured data and/or sounds by the
communication module 112 to a remote device (e.g., a mobile device or remote server) is limited by the connection speed. Thus, compressed, still images are advantageous because more images can be transmitted in a short amount of time, which increases the likelihood that all relevant data will be transferred before a perpetrator can destroy or otherwise disable thesecurity device 100. In other implementations, the transmitted data can include video images of a predefined duration (i.e., one second, three seconds, ten seconds, etc.), or a combination of still images and video images. - In some implementations, the
security device 100 transmits data and/or sounds according to an order sequence. The ordered sequence includes a first transmission that occurs first in time that includes data captured prior to the triggering event. The first transmission includes, for example, one or more still pictures (e.g., one, two, three, four, etc.) and/or one or more video clips (e.g., a one second video clip, a two second video clip, etc.) captured prior to the triggering event occurring. The order sequence includes a second transmission that occurs second in time (i.e., after the first transmission is completed) that includes data captured subsequent to the triggering event. The second transmission includes, for example, one or more still pictures (e.g., one, two, three, four, etc.) and/or one or more video clips (e.g., a one second video clip, a two second video clip, etc.) captured subsequent to the triggering event occurring. In some implementations, second transmission includes for real-time data that is streaming, which may or may not be stored in thesecurity device 100 prior to transmission or ever. The ordered sequence can include any number of additional transmissions. For example, additional transmissions can include a third transmission that occurs third in time (i.e., after the second transmission is completed) that includes data captured prior to the triggering event and prior to the data included in the first transmission. Similarly, the ordered can include a fourth transmission that occurs fourth in time (i.e., after the third transmission is completed) that includes data captured subsequent to the triggering event and subsequent to the data included in the second transmission. - Similarly, in other implementations, the plurality of
digital cameras 102 only captures still images and theprocessor 114 is configured to create a detailed storyboard of an event using the captured still images taken at predefined intervals. The storyboard can provide a portrayal of the event using imagery and/or sound from the location of the event. Advantageously, the storyboard requires reduced storage capacity of theelectronic storage medium 110, minimizes the volume of captured, recorded data that thecommunication module 112 transmits, decreases power consumption from thepower supply 116, and frees up theprocessor 114 for other tasks. - The captured, stored data and captured, stored data in the
electronic storage medium 110 may include highly personal or sensitive information, such as the user's whereabouts and recent activities, and in general anything seen or heard by the user when the plurality ofdigital cameras 102 andmicrophone 104 are recording. In some implementations, the captured, stored data and the captured, stored sounds can be encrypted while stored in theelectronic storage medium 110. In such implementations, the stored data and the stored sounds are not accessible by the user. Instead, for example, the stored data and sounds are only accessible subsequent to being transmitted by thecommunication module 112 to an authorized remote server. The encryption protects the captured data and sound stored on thesecurity device 100 from being accessed by an unauthorized individual should, for example, thesecurity device 100 become lost or stolen. - While the
security device 100 is shown as including all of the components described above, more or fewer components can be included in a wearable personal security device. For example, an alternative wearable personal security device (not shown) includes theprotective housing 101, the plurality ofdigital cameras 102, themicrophone 104, thespeaker 106, the plurality ofLEDs 108, theelectronic storage medium 110, thecommunication module 112, theprocessor 114, and thepower supply 116. Thus, various wearable personal security devices can be formed using any portion of the basic components described herein. - Referring to
FIG. 2 , a wearablepersonal security device 200 that is the same as, or similar to, thesecurity device 100, includes aninner housing 210, a protectiveouter housing 250, and aclip 290. The wearablepersonal security device 200 differs from thesecurity device 100 in that the wearablepersonal security device 200 includes theinner housing 210 and the protectiveouter housing 250, rather than the singleprotective housing 101. Generally, the wearablepersonal security device 200 is used in the same or similar manner as thesecurity device 100, and can include more or fewer components thansecurity device 100. The wearablepersonal security device 200 also includes a plurality of digital cameras that is the same as, or similar to, the plurality ofdigital cameras 102 of thesecurity device 100 described above. As shown, the plurality of digital cameras includes four digital cameras: a firstdigital camera 212 a, a seconddigital camera 212 b, a thirddigital camera 212 c, and a fourthdigital camera 212 d. - Referring generally to
FIGS. 3A and 3B , theinner housing 210 includes atop portion 220, amiddle portion 230, and abottom portion 240. Generally, thetop portion 220, themiddle portion 230, and thebottom portion 240 are stacked together to form theinner housing 210. While thetop portion 220, themiddle portion 230, andbottom portion 240 are shown as separate components, theinner housing 210 can be a single monolithic component (i.e., thetop portion 220, themiddle portion 230, and thebottom portion 240 are unitary). - The
top portion 220 includes atop surface 222 a (FIG. 3A ), abottom surface 222 b (FIG. 3B ), a first plurality ofapertures 224, and a second plurality ofapertures 226. Each of the first plurality ofapertures 224 and each of the second plurality ofapertures 226 extend between thetop surface 222 a (FIG. 3A ) and thebottom surface 222 b (FIG. 3B ). The firstdigital camera 212 a, the seconddigital camera 212 b, and the thirddigital camera 212 d are coupled to thetop portion 220. As shown, the firstdigital camera 212 a and the seconddigital camera 212 b are coupled to thetop portion 220 such that they extend from thebottom surface 222 b and are orientated generally perpendicular to the top andbottom surfaces FIG. 3A , the thirddigital camera 212 c is coupled to thetop portion 220 such that it is orientated at an angle θ1 relative to a vertical axis of thetop portion 220. As shown, the angle θ1 is approximately 45 degrees, however, other values for angle θ1 are possible, such as, for example, 5 degrees, 15 degrees, 30 degrees, 60 degrees, 75 degrees, etc. - When the
inner housing 210 is assembled, thetop portion 220 is stacked on top of themiddle portion 230, and more particularly, thesupport arm 234 and fourthdigital camera 212 d (FIG. 3A ). Thus, at least a portion of thetop portion 220 is made from a transparent or semi-transparent material, such as, for example, a glass material, a polymer material (e.g., polycarbonate), or the like, or any combination thereof Alternatively, theinner housing 210 can be assembled such that thetop surface 222 a of thetop portion 220 is positioned underneath thesupport arm 234 and the fourthdigital camera 212 d. In such implementations, thetop portion 220 can be made from a transparent, semi-transparent, or opaque material (e.g., a metal material, a polymer material, or the like). - The
middle portion 230 includes aninner surface 232 a, anouter surface 232 b, a plurality ofnotches 233, a support arm 234 (FIG. 3A ), an LED 235 (FIG. 3A ), a pair ofcamera windows 236, and anangled recess 238. Thesupport arm 234 extends from theinner surface 232 a towards theangled recess 238 and is coupled to and supports the fourthdigital camera 212 d and theLED 235. As best shown inFIG. 3A , the fourthdigital camera 212 d is oriented such that it is generally perpendicular to theinner surface 232 a and theouter surface 232 b (i.e., generally perpendicular to the orientation of the first, second, and thirddigital cameras - Each of the plurality of
notches 233 of themiddle portion 230 have a generally rectangular configuration, and while shown as having four notches, any number of notches is possible (e.g., 2 notches, 6 notches, 10 notches, etc.). Theangled recess 238 is sized and shaped such that it receives the thirddigital camera 212 c when thetop portion 220 is stacked on top of themiddle portion 230 when theinner housing 210 is assembled. Thus, theangled recess 238 has an angle that is approximately the same as the angle θ1 of the thirddigital camera 212 d (described above). Each of the pair ofcamera windows 236 is made from a transparent or semi-transparent material (e.g., glass, polycarbonate, or the like, or any combination thereof). When theinner housing 210 is assembled, the firstdigital camera 212 a and the seconddigital camera 212 b are covered by the plurality ofcamera windows 236, and the transparent or semi-transparent material permits the firstdigital camera 212 a and the seconddigital camera 212 b to capture images, while aiding in protecting the digital cameras from being damaged. - The
bottom portion 240 includes atop surface 242 a, abottom surface 242 b, asidewall 243, a plurality of lockingcolumns 244, a plurality ofnotches 246, and a pair of generally “U”-shapedslots 248. As best shown inFIG. 3A , the plurality of lockingcolumns 244 extend from thetop surface 242 a and have a generally cylindrical configuration. Further, each of the plurality of lockingcolumns 244 has a generallycentral aperture 245. The plurality ofnotches 246 is similar to the plurality ofnotches 233 of themiddle portion 230 in that each of the plurality ofnotches 246 has a generally rectangular configuration. As shown, the plurality ofnotches 246 of thebottom portion 240 and the plurality ofnotches 233 of themiddle portion 230 are orientated relative to one another such that corresponding ones of the plurality ofnotches 246 and the plurality ofnotches 233 form a respective opening in theinner housing 210 when assembled (i.e., thetop portion 220 is stacked on top of the middle portion 230). Each of the pair of generally “U”-shapedslots 248 is sized and shaped to receive the pair ofcamera windows 236 of themiddle portion 230 when theinner housing 210 is assembled. - Referring generally to
FIGS. 3A and 3B , the protectiveouter housing 250 includes anupper half 252 and alower half 280. Generally, the protectiveouter housing 250 encases theinner housing 210 to aid in securing thetop portion 220, themiddle portion 230, and thebottom portion 240 to one another and protects the electronic components disposed within theinner housing 210. - The
upper half 252 includes atop surface 254 a, abottom surface 254 b, asidewall 256, a plurality of lockingcolumns 258, anlight recess 260, acamera recess 262, abutton aperture 264, atrigger aperture 266, acamera screen 268, amicrophone aperture 270, a plurality ofspeaker slots 271, apush button 272, and atrigger button 274. As best shown inFIG. 3B , thesidewall 256 extends from thebottom surface 254 b and along an outer edge of theupper half 252. The plurality of locking columns 258 (FIG. 3B ) extend from the interior surface 154 b in the same direction as thesidewall 256. The plurality of lockingcolumns 258 are similar to plurality of lockingcolumns 244 of thebottom portion 240 of theinner housing 210 described above in that they each have a generally cylindrical configuration and a generallycentral aperture 258 c. However, the plurality of lockingcolumns 258 differs from the plurality of lockingcolumns 244 in that each of the plurality of lockingcolumns 258 includes anupper portion 258 a and alower portion 258 b. As shown, theupper portion 258 a of each of the plurality of lockingcolumns 258 has a diameter that is greater than a diameter of thelower portion 258 b. The diameter of thelower portion 258 b of each of the plurality of lockingcolumns 258 is sized such that it can be disposed with a corresponding one of the first plurality ofapertures 224 of thetop portion 220 of theinner housing 210. - The light recess 260 (
FIG. 3B ) is sized and shaped to receive the LED 235 (FIG. 3A ) of themiddle portion 230 of theinner housing 210 when the device is assembled and permits light emitted from the LED to be visible through thetop surface 254 a of theupper half 252. Similarly, thecamera recess 262 is sized and shaped to receive firstdigital camera 212 a when the device is assembled. - The
button aperture 264 has a generally rectangular configuration and receives thepush button 272 therein, which also has a generally rectangular configuration. Thetrigger aperture 266 has a generally semi-circular configuration and receives thetrigger button 274 therein, which also has a generally semi-circular configuration. Both thepush button 272 and thetrigger button 274 partially extend from thetop surface 254 a past thebottom surface 254 b of theupper half 252. - The
lower half 280 of the protectiveouter housing 250 includes atop surface 282 a, abottom surface 282 b, afirst arm 284, a pair ofside arms 286, and a pair ofend arms 288. As best shown inFIG. 3A , thefirst arm 284 generally extends up from thetop surface 282 a (i.e., away from thebottom surface 282 b) and includes apin 284 a extending therefrom. Each of the pair ofside arms 286 also extends up from thetop surface 282 a (i.e., away from thebottom surface 282 b) and includes a pair ofpins 286 a. The pair ofend arms 288 is separated from one another by aslot 287 and also generally extends up from thetop surface 282 a. The pair ofend arms 288 also includes a pair ofpins 288 a. - To assembly the
inner housing 210 and the protectiveouter housing 250, thetop portion 220, themiddle portion 230, and thebottom portion 240 of theinner housing 210 are stacked together as described above. Theupper half 252 of the protectiveouter housing 250 is positioned on top of thetop portion 220 such that thebottom portion 258 b of each of the plurality of lockingcolumns 258 engages a corresponding one of the first plurality ofapertures 224 of thetop portion 220. Because the diameter of theupper portion 258 a of each of the plurality of lockingcolumns 258 is greater than the diameter of thelower portion 258 b and the plurality ofapertures 224, eachupper portion 258 a contacts thetop surface 222 a of thetop portion 220. Thus, there is a gap between thetop portion 220 and theupper half 252. One or more of the various electronic components described above can be disposed with this gap (i.e., coupled to thetop surface 222 a. For example, a speaker (not shown) and a microphone (not shown) can be disposed in this gap such that the speaker is directly adjacent to the plurality ofspeaker slots 271 and the microphone is directly adjacent to themicrophone aperture 270. The second plurality ofapertures 226 permit these components to be connected to other electronic components disposing within the inner housing 210 (e.g., a processor, an electronic storage medium, a power supply, etc.). Similarly, the second plurality ofapertures 226 permits thepush button 272 and thetrigger button 274 to be communicatively coupled to various electronic components disposed in the inner housing 210 (i.e., such that thepush button 272 and/ortrigger button 274 can be used to create a manually activated security alert). - When the
inner housing 210 is assembled, the plurality ofnotches 233 and the plurality ofnotches 246 form corresponding openings in theinner housing 210. When thelower half 280 is assembled, the pair ofpins 286 a of each of the pair ofside arms 286 engages a corresponding one of the openings formed in theinner housing 210, thereby aiding in securing thelower half 280 to theinner housing 210. Further, thepin 284 a of thefirst arm 284 and the pair ofpins 288 a of the pair ofend arms 288 engage theinner housing 210 to aid in securing thelower half 280 to theinner housing 210. - The
clip 290 includes abase portion 292, afirst arm portion 294, a flexiblesecond arm portion 295, and acontactor 296. Thebase portion 292 has a generally circular configuration and is coupled to thebottom surface 282 b (FIG. 3B ) of thelower half 280 of the protectiveouter housing 250. While shown as having a generally circular configuration, other configurations for thebase portion 292 are possible, such as, for example, a rectangular configuration, a triangular configuration, a polygonal configuration, or the like, or any combination thereof. Thebase portion 292 can be coupled to thebottom surface 282 b by various mechanisms, such as, for example, an adhesive connection, a welded connection, a threaded connection, a pin and aperture system, a magnetic connection, a hook and loop fastener, or the like, or any combination thereof. - The
first arm portion 294 is coupled to thebase portion 292 and has a generally “L” shaped configuration. The secondflexible arm portion 295 is coupled to thefirst arm portion 294 and includes acontactor 296. While thebase portion 292, thefirst arm portion 294, and the secondflexible arm portion 295 are unitary and/or monolithic, although various mechanisms for coupling these components are possible (e.g., a welded connection, an adhesive connection, or the like). Further, theclip 290 can be made from a polymer material, a metal material, or the like, or any combination thereof. - The
clip 290 is generally used to secure the wearablepersonal security device 200 to a user's clothing and/or accessories (e.g., a backpack, a purse, a briefcase, or the like). Referring toFIG. 4A , the secondflexible arm portion 295 urges thecontactor 296 in the opposite direction of arrow A towards thebottom surface 282 b of thelower half 280. Thus, the secondflexible arm portion 295 maintains direct contact between thelower surface 282 b and thecontactor 296. When the secondflexible arm portion 295 is moved in the direction of arrow A, thecontactor 296 moves away from thebottom surface 282 b and a gap is formed therebetween. Thus, as shown inFIG. 4B , a piece of fabric 300 (i.e., from a user's clothing or accessory) can be placed between thebottom surface 282 b and thecontactor 296. When the force is removed, the secondflexible arm portion 295 urges thecontactor 296 in the opposite direction of arrow A, thereby securing the fabric 300 between the contactor 296 and thebottom surface 282 b, and thus the wearablepersonal security device 200 to the user's clothing/accessory. - While the wearable
personal security device 200 is described above as being affixed to a user's clothing and/or accessories via theclip 290, other mechanisms for affixing the wearablepersonal security device 200 to the user's clothing/accessories without use of theclip 290 are possible. For example, the wearablepersonal security device 200 can be affixed to a sleeve or wrap (not shown) which is worn over an appendage of the user (e.g., an arm of the user), or disposed within a pocket or opening formed in the wrap/sleeve. In such implementations, the wrap/sleeve aids in keeping the wearablepersonal security device 200 affixed to the while the user moves the appendage (i.e., arm) during normal activities (e.g., running, walking, etc.). In some implementations, the positioning of the wearablepersonal security device 200 on the arm of the user aids the wearablepersonal security device 200 in collecting a wide range of images and/or video compared to a relatively more stationary positioning (e.g., the chest of the user) due to the movement of the cameras in the wearablepersonal security device 200. - Alternatively, in such implementations in which the wearable
personal security device 200 does not include the protectiveouter housing 250, theinner housing 210 can be directly affixed to user's clothing by, for example, hoop and loop fasteners, a second clip that can be coupled to thebottom surface 242 b of thebottom portion 240 of theinner housing 210, or the like, or any combination thereof. - In some implementations, the wearable
personal security device 200 further includes a first circuit element 310 (FIG. 3A ), asecond circuit element 312, and a third circuit element 314 (FIG. 3B ) for determining whether thedevice 200 is attached to a user's clothing and/or accessories. The first circuit element 310 (FIG. 3A ) is coupled to thecontactor 296 of theclip 290. The second circuit element 312 (FIGS. 3A and 3B ) is coupled to thebottom surface 282 b of thelower half 280 of the protectiveouter housing 250. The third circuit element 314 (FIG. 3B ) is coupled to thebottom surface 242 b of thebottom portion 240 of theinner housing 210. The first circuit element 310 (FIG. 3A ), thesecond circuit element 312, and the third circuit element 314 (FIG. 3B ) are electrical contacts that form a completed electrical circuit when thecontactor 296 is in contact with thebottom surface 282 b of thelower half 280 of the protectiveouter housing 250, as shown inFIG. 4B . When the wearablepersonal security device 200 is affixed to a user's clothing or accessory such that the clothing or accessory is positioned between theclip 290 and the protective outer housing 250 (i.e., fabric 300 shown inFIG. 4B ), the electrical circuit between the first, second, andthird circuit elements third circuit elements device 200 is removed from the user's clothing. The each of the first, second, andthird circuit elements pin contactor 120, the plurality oftactile switches 122, or the plurality ofmetallic traces 124 described above with respect to thesecurity device 100. - Similarly, the wearable personal security device can optionally include a pair of spring-loaded pin contactors 320 (
FIG. 3B ) and a fourth circuit element 322 (e.g., a metallic trace) (FIG. 3A ). The pair of spring-loadedpin contactors 320 is coupled to thebottom portion 240 of theinner housing 210 and extend through thebottom surface 242 b thereof. Thefourth circuit element 322 is coupled to thetop surface 282 a of thelower half 280 of the protectiveouter housing 250. When the protectiveouter housing 250 encases theinner housing 210, thefourth circuit element 322 and the pair of spring-loadedpin contactors 320 form a completed electric circuit. When the protectiveouter housing 250 is removed from theinner housing 210, the completed electric circuit between the pair of spring-loadedpin contactors 320 and thefourth circuit element 322 is interrupted or terminated, and can prompt a processor (not shown) to trigger an automatically activated security alert. In this manner, the pair of spring-loadedpin contactors 320 and thefourth circuit element 322 can be used to determine whether the protectiveouter housing 250 is removed from theinner housing 210 and trigger an automatic security alert. - In other implementations, instead of the pair of spring-loaded
pin contactors 320, the wearablepersonal security device 200 can include a tactile switch (not shown) having a down or compressed position and a released position. When the protectiveouter housing 250 is coupled to theinner housing 210, the tactile switch andfourth circuit element 322 are in direct contact with one another, resulting in the tactile switch being in the down or compressed position. When protectiveouter housing 250 is separated from theinner housing 210, the tactile switch will be released completing an electric circuit. In such implementations in which the wearablepersonal security device 200 does not include the protectiveouter housing 250 such that theinner housing 210 is directly affixed to a user's clothing or accessories (such as through the use of hook and loop or touch fasteners), the tactile switch (or pair of spring-loaded pin contactors 320) would be incorporated into the fasteners or clothing on the user, which would then complete an electronic circuit that would be broken if theinner housing 210 was removed from the wearer. Any interruption of the circuit will trigger a security alert automatically; this will have the same effects as if a security alert was manually triggered. - The first
digital camera 212 a, the seconddigital camera 212 b, and the thirddigital camera 212 c each have a respective field of view (shown in detail inFIGS. 6A-8B ). Each respective field of view is the area surrounding the wearablepersonal security device 200 from which the digital camera can capture still or video images. Generally referring toFIGS. 5A . and 5B, and as best shown inFIG. 5A , the respective field of view of the firstdigital camera 212 a has acentral axis 500 a, the respective field of view of the seconddigital camera 212 b has acentral axis 500 b, and the respective field of view of the thirddigital camera 212 c has acentral axis 500 c. Thecentral axis 500 b of the seconddigital camera 212 b is orientated an at an angle θb relative to a z-axis of the wearablepersonal security device 200 and thecentral axis 500 c is orientated at an angle θc relative to the negative z-axis. The angle θb can have a value ranging between about 0 degrees and about 75 degrees relative to the (positive) z-axis, and the angle θc can each have a value ranging between about 0 degrees and about 75 degrees relative to the negative z-axis. Desirably, and as shown, angles θb and θc are approximately 25 degrees relative to the positive and negative z-axes respectively. Further, in some implementations, the angles θb and θc can have a value ranging between about 0 degrees and about 45 degrees relative to a y-axis, rather than the z-axis as shown. - As best shown in
FIG. 5B , the fourthdigital camera 212 d also has a respective field of view with acentral axis 500 d. Desirably, and as shown, thecentral axis 500 d is orientated parallel to the y-axis (i.e., at an angle of 0 degrees relative to the y-axis) of the wearablepersonal security device 200, and thus is thus orientated approximately 90 degrees relative to the second and thirddigital cameras central axis 500 d can have an angle θd (not shown) having a value that ranges between about 0 degrees and about 75 degrees relative to the y-axis. - Referring to
FIG. 5B , thecentral axis 500 a of the firstdigital camera 212 a is orientated at an angle θa relative to an x-axis of the wearablepersonal security device 200. The angle θa can range between about −75 degrees to about 75 degrees relative to the x-axis. Desirably, and as shown, the angle θa is approximately 45 degrees relative to the x-axis. - As shown in
FIGS. 5A and 5B ,digital cameras central axes personal security device 200. Advantageously, in this orientation, an aggregate field of view that includes each respective field of view described above allows thedigital cameras personal security device 200 when affixed to a user's clothing or accessory. Further, thecentral axis 500 d of the respective field of view of the fourthdigital camera 212 d is orientated at approximately 90 degrees relative tocentral axes central axis 500 a, further increasing the aggregate field of view. -
FIGS. 6A-8B generally illustrate three likely options for how an individual may wear the wearablepersonal security device 200 described above. Regardless of how an individual elects to wear thedevice 200,FIGS. 6A-8B illustrate that the orientation ofdigital cameras - Referring to
FIGS. 6A and 6B , the wearablepersonal security device 200 is affixed to anupper arm 602 of an individual 600. In this configuration, the wearablepersonal security device 200 captures data (i.e., still images, video images, or both) from an aggregate field of view that includes the respective field of view 600 a of the firstdigital camera 212 a, the respective field of view 600 b of the seconddigital camera 212 b, the respective field of view 600 c of the thirddigital camera 212 c, and the respective field of view 600 d of the fourthdigital camera 212 d. As best shown inFIG. 6A , respective fields ofview FIG. 6B , respective fields ofview central axis 500 a (FIG. 4B ) of the firstdigital camera 212 a has a value of approximately 45 degrees relative to the x-axis, the respective field ofview 612 a of the firstdigital camera 212 a captures data without being substantially obstructed or limited by a portion of the individual when the device is affixed to theupper arm 602. Specifically, if the angle θa was about 0 degrees relative to the x-axis, the individual's arm could substantially (or even completely) obscure or limit of the respective field of view of the firstdigital camera 212 a when affixed to theupper arm 602, thereby restricting the aggregate field of view of the plurality of digital cameras. - As described above, movement of the individual 600 can modify one or more of the respective fields of view (i.e., the aggregate field of view) of the plurality of digital cameras. For example, as shown in
FIGS. 6A and 6B , the respective fields ofview view 612 c in the general direction of the individual's left side. Likewise, the individual can turn his or her chest/torso to his or her right, which will position the respective field ofview 612 d in the general direction of the individual's left side. In this manner, the individual's natural or deliberate movement can aid in providing a wider aggregate field of view. - In some implementations, the wearable
personal security device 200 only includes the seconddigital camera 212 b (not shown inFIGS. 6A and 6B ) and the thirddigital camera 212 c (not shown inFIGS. 6A and 6B ). In such implementations, when worn on theupper arm 602 as shown inFIGS. 6A and 6B , the wearablepersonal security device 200 captures data from an aggregate field of view including the respective field ofview 612 b of the seconddigital camera 212 b and the respective field ofview 612 c of the thirddigital camera 212 c. Thus, the aggregate field of view in this implementation permits the wearablepersonal security device 200 to capture data from in front of and behind the individual 600, as best shown inFIG. 6A . - Referring to
FIGS. 7A and 7B , the wearablepersonal security device 200 is affixed to ashoulder 704 of an individual 700. In this configuration, the wearablepersonal security device 200 captures data (i.e., still images, video images, or both) from an aggregate field of view that includes the respective field of view 700 a of the firstdigital camera 212 a, the respective field of view 700 b of the seconddigital camera 212 b, the respective field of view 700 c of the thirddigital camera 212 c, and the respective field of view 700 d of the fourthdigital camera 212 d. As best shown inFIG. 7A , respective fields ofview FIG. 7B , respective field ofview 712 a captures data from the side of the individual 700, while the respective field ofview 712 d captures data from above the individual 700. - Referring to
FIGS. 8A and 8B , the wearablepersonal security device 200 is affixed to achest 806 of an individual 800. In this configuration, the wearablepersonal security device 200 captures data (i.e., still images, video images, or both) from an aggregate field of view that includes the respective field of view 800 a of the firstdigital camera 212 a, the respective field of view 800 b of the seconddigital camera 212 b, the respective field of view 800 c of the thirddigital camera 212 c, and the respective field of view 800 d of the fourthdigital camera 212 d. As best shown inFIG. 8B , respective fields ofview FIG. 7A , respective field ofview 812 a captures data from the above the individual 700, while the respective field ofview 812 d captures data from in front of the individual 800. Because the angle θa ofcentral axis 500 a (FIG. 4B ) of the firstdigital camera 212 a has a value of approximately 45 degrees relative to the x-axis (and also the y-axis), the respective field ofview 812 a of the firstdigital camera 212 a captures data without being substantially (or even completely) obstructed by a portion of the individual when the device is affixed to thechest 806. While the respective field ofview 812 a is shown as being partially limited by the individual's head, if the angle θa was about 0 degrees relative to the x-axis, the individual's head could completely obscure the respective field of view of the firstdigital camera 212 a. Advantageously, in the orientation shown, the respective field ofview 812 a is only partially obscured or limited by the individual's head while permitting the wearablepersonal security device 200 to, for example, continuously monitor the individual's identity using the firstdigital camera 212 a (i.e., verify that an authorized individual is wearing the device). - As illustrated by
FIGS. 6A-8B , the orientation of the respective fields of view of the plurality of digital cameras relative to one another permit the individual to affix the wearablepersonal security device 200 to multiple locations on the individual's body without a portion the individual's body (e.g., arm, head, etc.) substantially obscuring or limiting one of the respective fields of view. In this manner, the relative orientation of the central axes (FIGS. 5A-5B ) can be selected to achieve a desired aggregate field of view. While exemplary angles of the cameras with respect to the axes of wearablepersonal security device 200 and with respect to each other have been provided, other angles are also contemplated and fall with the concepts of the present disclosure. - Referring to
FIG. 9 , a wearablepersonal security device 900 that is the same as or similar to the wearablepersonal security devices mobile device 920 via a communication module (disposed within the wearablepersonal security device 900, and thus not shown) that is the same as or similar to thecommunication module 112 described above. As described above, the wearablepersonal security device 900 and themobile device 920 can be communicatively coupled via, for example, a Bluetooth connection, a Wi-Fi connection, a wired connection, or the like, or any combination thereof. Generally, the connection speed between the communication module of the wearablepersonal security device 900 and themobile device 920 can be, for example, between about 0.5 and 100 Mb, between about 1 and 5 Mb, about 2 Mb, etc. In turn, themobile device 920 is communicatively coupled (as represented by reference numeral 922) to anexternal network 930. Theexternal network 930 can be a cellular network, a Wi-Fi network, a near-field communication network, or any other wireless network, or the like, or any combination thereof. Generally, the connection speed between themobile device 920 and theexternal network 930 can be, for example, between about 0.5 Mb and about 100 Mb, between about 1 Mb and about 5 Mb, between about 3 Mb and about 4 Mb, etc. - The
mobile device 920 generally includes a memory and a processor, with an associated software application stored in the memory. The associated application can establish a communication session with the communication module of the wearable personal security device 900 (as shown by 912) and can also and process the transmitted security data using the processor of themobile device 900, store transmitted security data in the memory of the mobile device; 900, terminate the communication session, and/or upload the transmitted security data to theexternal network 930. Further, a user of the mobile device can activate a manually activated security alert (described above) via the associated application. - In response to the occurrence of the one or more triggering events described above (e.g., an automatically activated security alerts, a manually activated security alert, etc.), stored, captured data and/or stored, captured sounds (collectively, “security data”) from the wearable
personal security device 900 is transmitted to themobile device 920. Themobile device 920 then transmits the security data via theexternal network 930 to one or morethird parties 940. Specifically, the one or morethird parties 940 can receive the security data on their mobile device that includes the same associated application described above, or alternatively, the one or morethird parties 940 can receive a text message or e-mail notification. The one or more third parties can be, for example, friends or family members of the user of the wearablepersonal security device 900, the user's employer, or law enforcement personnel. Alternatively, the one or more third parties can be a monitoring company that review the transmitted security data and provides access to an applicable portion thereof to an authorized person (e.g., the user's friends and family, law enforcement, etc.) as determined by services selected the user. Additionally, the monitoring company can utilize other software or applications on the user'smobile device 920 or a GPS unit included in the wearable personal security device 900 (that is the same or similar to the GPS described above) to contact a different user located nearby the wearer or disseminate the location of a triggered security alert to other users of similar security devices or systems that have a mobile device containing software or applications capable of receiving such notification. - In some implementations, the associated application includes a navigational map. Using the GPS unit of the wearable
personal security device 900, the associated application receives a GPS location of the user of the wearablepersonal security device 900 from a communication module (that is the same as or similar to communication module 112), and the associated application displays the user's GPS location on the navigational map (which the user can view and interact with via a display of the mobile device 920). The associated application also displays one or more points of interests on the navigational map that are within a predefined range of the user's GPS location (e.g., within a block, a half-mile, two miles, etc.). The one or more points of interests can be stored in the memory of themobile device 920 and/or received from the external network 930 (i.e., a remote server). For example, the one or more points of interest can be fixed points of interest, such as areas with historically high crime rate, areas with historically low crime rates, police stations, other areas of safety, or the like. In addition, the user of the wearablepersonal security device 900 and associated application can create temporary points of interest on the navigational map and submit them to the remote server such that they can be received on other users' associated application and displayed on their navigational maps. In this manner, the user and/or third parties can submit real-time, temporary points of interest such as a location with suspicious activity, a location of a known perpetrator/criminal, a location of a recently committed or attempted crime, or the like. The wearablepersonal security device 900 and associated application can also automatically submit a temporary point of interest (i.e., the GPS location of the user) responsive to a manually or automatically activated security alert. To encourage users to submit points of interest and ensure that the navigational map has as much relevant data as possible, users who submit a point of interest may be rewarded with a free third party monitoring service for a limited period of time. In this manner, by viewing the one or more points of interest on the navigational map, the user of the wearablepersonal security device 900 and associated application can further decrease the likelihood of being the victim of a crime by (i) avoiding locations or routes that currently have, or are likely to have, a security threat and/or (ii) favoring locations or routes that are near areas of safety. Similarly, responsive to a manually or automatically activated security alert, the navigational map can highlight and/or provide directions to one or more points of interest which the user can travel towards to reduce the response time for law enforcement (i.e., the location of the nearest police station). - Alternatively, rather than being communicatively coupled to the
external network 930 by using themobile device 920 as an intermediary, the wearablepersonal security device 900 can be directly communicatively coupled to theexternal network 930. In such implementations, specific communication instructions and a unique device registration identifier may be added to thedevice 900. Advantageously, in this configuration, the wearablepersonal security device 900 can transmit captured data and/or sounds without depending on themobile device 920, which could, for example, run out of battery, be lost or stolen, etc. Further, the wearablepersonal security device 900 could be used by individuals who do not own a mobile device (e.g., small children, the elderly, etc.). - Referring generally to
FIG. 10 , according to some implementations of the present disclosure, in certain circumstances a device of the present disclosure (e.g.,security device 100 or wearable personal security device 200) utilizes an access control system, such as, for example, when communicating thru a cellular network, a wide area network, or any other type of network. Such an access control system could be open to all users, or the access control system could be controlled by an employer, association, or other controlling body. For example, a device of the present disclosure setup to monitor a certain location (e.g., a home, an office, etc.) could look to the access control system (e.g., a cloud based information depository) using network connectivity to identify authorized individuals. An authorized list of users could be created and/or stored, or a real time notification of someone requesting access could be sent to the owner and/or operator (e.g., administrator) of the device. Authorized users could either enter a code in their personal mobile device or provide some other method of identification and disarming credentials, or the owner and/or operator of the device could remotely disarm the device for individuals requesting access. The access control system could either require an individual granted access to rearm the device, the owner could remotely arm the device, or the access control system could rearm the device based upon predetermined parameters. - Further, in some implementations, a device of the present disclosure (e.g.,
security device 100 or wearable personal security device 200) can be configured through its executing application to permit direct access to the captured, stored data and/or sounds or real-time data and/or sounds by a third party. For example, an employer can directly access the captured, stored data on the device worn by an employee to monitor the employee's activities (i.e., whether the employee is performed specified tasks, etc.) via a direct access feature. Similarly, a friend or family member can monitor an at-risk user of the device (e.g., a child, an elderly person, a disabled person, etc.) in real-time using the direct access feature. This would allow the friend or family member to see what the user is seeing and permit the friend or family member to determine whether there is a problem (e.g., if the captured images have not moved in a long period of time, this may indicate that the user of the device is not moving and may have fallen). Advantageously, permitting direct third party access to the captured data and/or sounds via the direct access feature avoids having the third party view the user directly as would be the case using other devices (e.g., wall-mounted cameras, nanny cameras, or the like), thereby permitting the third party to be less intrusive and protecting the privacy of the user. - To maintain privacy, the direct access feature and/or security devices of the present disclosure (e.g.,
security device 100 or wearable personal security device 200) can be configured such that the third party can only access the captured, stored data in response to one or more of the triggering events described above. For instance, in the case of an employer monitoring an employee wearing the device, the employer may only be able to access the captured data if the employee is injured (which could be indicated by an accelerometer, as described above). - While the wearable
personal security devices security device security device - Further, while the wearable
personal security devices personal security devices - While the disclosure is susceptible to various modifications and alternative forms, specific embodiments and methods thereof have been shown by way of example in the drawings and are described in detail herein. It should be understood, however, that it is not intended to limit the disclosure to the particular forms or methods disclosed, but, to the contrary, the intention is to cover all modifications, equivalents and alternatives falling within the spirit and scope of the disclosure. For example, while the above discussion is focused on the use of the present disclosure by an individual during common activities conducted outside of the individual's residence, including, without limitation, commuting to work, running errands and exercising, the present disclosure may be used in multiple applications, including commercial applications addressing worker safety, productivity, and facility management, and any commercial applications may provide for access to the captured sounds and images, before or after an alert, to the entity employing, engaging, or otherwise contracting with the user of the security system.
Claims (2)
1. A security device comprising:
a housing;
a digital camera coupled to the housing and being configured to capture data;
an electronic storage medium coupled to the digital camera such that the electronic storage medium is configured to store the captured data therein; and
a communication module configured to transmit the captured data according to an ordered sequence of data transmissions in response to the occurrence of a triggering event, the ordered sequence including (i) a first transmission of captured data including data captured prior to the triggering event, and (ii) a second transmission of captured data including data captured subsequent to the triggering event.
2-40. (canceled)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/359,107 US20210327253A1 (en) | 2016-04-06 | 2021-06-25 | Wearbale personal security devices and systems |
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662319008P | 2016-04-06 | 2016-04-06 | |
US201762442153P | 2017-01-04 | 2017-01-04 | |
US201762453122P | 2017-02-01 | 2017-02-01 | |
PCT/US2017/026455 WO2017177067A1 (en) | 2016-04-06 | 2017-04-06 | Wearable personal security devices and systems |
US201816091059A | 2018-10-03 | 2018-10-03 | |
US17/079,246 US11074804B2 (en) | 2016-04-06 | 2020-10-23 | Wearable personal security devices and systems |
US17/359,107 US20210327253A1 (en) | 2016-04-06 | 2021-06-25 | Wearbale personal security devices and systems |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/079,246 Continuation US11074804B2 (en) | 2016-04-06 | 2020-10-23 | Wearable personal security devices and systems |
Publications (1)
Publication Number | Publication Date |
---|---|
US20210327253A1 true US20210327253A1 (en) | 2021-10-21 |
Family
ID=60000685
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/091,059 Active US10839672B2 (en) | 2016-04-06 | 2017-04-06 | Wearable personal security devices and systems |
US17/079,246 Active US11074804B2 (en) | 2016-04-06 | 2020-10-23 | Wearable personal security devices and systems |
US17/359,107 Abandoned US20210327253A1 (en) | 2016-04-06 | 2021-06-25 | Wearbale personal security devices and systems |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/091,059 Active US10839672B2 (en) | 2016-04-06 | 2017-04-06 | Wearable personal security devices and systems |
US17/079,246 Active US11074804B2 (en) | 2016-04-06 | 2020-10-23 | Wearable personal security devices and systems |
Country Status (4)
Country | Link |
---|---|
US (3) | US10839672B2 (en) |
EP (1) | EP3440631A4 (en) |
CA (1) | CA3018877A1 (en) |
WO (1) | WO2017177067A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA3018877A1 (en) * | 2016-04-06 | 2017-10-12 | Marc Allan Harris | Wearable personal security devices and systems |
CN110050298A (en) * | 2016-12-15 | 2019-07-23 | 霍劳尔有限公司 | Wearable multifunctional personal safety equipment |
KR102503440B1 (en) * | 2018-04-12 | 2023-02-27 | 삼성전자주식회사 | An electronic device obtaining an security image using security processing module |
EP3815063A4 (en) * | 2018-06-01 | 2021-12-08 | Harris, Marc, Allan | Wearable personal security devices and systems |
US10902538B2 (en) | 2018-08-21 | 2021-01-26 | GM Global Technology Operations LLC | Efficient ride request |
US10831824B1 (en) * | 2019-07-01 | 2020-11-10 | Koye Corp. | Audio segment based and/or compilation based social networking platform |
US20230307105A1 (en) * | 2022-03-28 | 2023-09-28 | Doug Klassen | Portable Non-Volatile Storage Device for Use in Providing Patient Medical Records Regardless of Patient's Level of Consciousness |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6169789B1 (en) | 1996-12-16 | 2001-01-02 | Sanjay K. Rao | Intelligent keyboard system |
CA2357697A1 (en) * | 2001-06-26 | 2002-12-26 | Steve Mann | Method and apparatus for enhancing personal safety with conspicuously concealed, incidentalist, concomitant, or deniable remote monitoring possibilities of a witnessential network, or the like |
US6784833B1 (en) | 2003-02-21 | 2004-08-31 | Lockheed Martin Corporation | Personal surveillance system with locating capabilities |
JP2005352024A (en) * | 2004-06-09 | 2005-12-22 | Murata Mfg Co Ltd | Glasses type interface device and security system |
US8457314B2 (en) * | 2004-09-23 | 2013-06-04 | Smartvue Corporation | Wireless video surveillance system and method for self-configuring network |
US7957532B2 (en) | 2006-06-23 | 2011-06-07 | Microsoft Corporation | Data protection for a mobile device |
US20080180537A1 (en) * | 2006-11-14 | 2008-07-31 | Uri Weinberg | Camera system and methods |
US20100020229A1 (en) | 2007-04-30 | 2010-01-28 | General Electric Company | Wearable personal video/audio device method and system |
US20100205628A1 (en) | 2009-02-12 | 2010-08-12 | Davis Bruce L | Media processing methods and arrangements |
US9049595B2 (en) | 2008-12-11 | 2015-06-02 | Microsoft Technology Licensing, Llc | Providing ubiquitous wireless connectivity and a marketplace for exchanging wireless connectivity using a connectivity exchange |
US9177455B2 (en) | 2009-05-07 | 2015-11-03 | Perpcast, Inc. | Personal safety system, method, and apparatus |
US8547435B2 (en) * | 2009-09-20 | 2013-10-01 | Selka Elektronik ve Internet Urunleri San.ve Tic.A.S | Mobile security audio-video recorder with local storage and continuous recording loop |
US20120242698A1 (en) | 2010-02-28 | 2012-09-27 | Osterhout Group, Inc. | See-through near-eye display glasses with a multi-segment processor-controlled optical layer |
US20120050532A1 (en) | 2010-08-30 | 2012-03-01 | Paragon Gps, Inc. | Electronic Latch and Locking Device for a Personal Locating and Tracking Device |
JP5828039B2 (en) * | 2012-06-11 | 2015-12-02 | 株式会社ソニー・コンピュータエンタテインメント | Image generating apparatus and image generating method |
US20160034764A1 (en) * | 2014-08-01 | 2016-02-04 | Robert A. Connor | Wearable Imaging Member and Spectroscopic Optical Sensor for Food Identification and Nutrition Modification |
US9247779B1 (en) * | 2012-11-08 | 2016-02-02 | Peter Aloumanis | Enhanced global positioning system (GPS) based functionality for helmets |
US20140152777A1 (en) * | 2012-12-01 | 2014-06-05 | Csr Techology Inc. | Camera having additional functionality based on connectivity with a host device |
US20150065082A1 (en) | 2013-08-27 | 2015-03-05 | Akhil SEHGAL | Personal safety device, system and a method |
US9083860B2 (en) * | 2013-10-09 | 2015-07-14 | Motorola Solutions, Inc. | Method of and apparatus for automatically controlling operation of a user-mounted recording device based on user motion and event context |
US20150248772A1 (en) * | 2014-02-28 | 2015-09-03 | Semiconductor Components Industries, Llc | Imaging systems and methods for monitoring user surroundings |
WO2015164224A1 (en) * | 2014-04-21 | 2015-10-29 | Desoyza Erangi | Wristband and application to allow one person to monitor another |
US10341544B2 (en) * | 2014-07-23 | 2019-07-02 | Orcam Technologies Ltd. | Determining a matching score between users of wearable camera systems |
US20160042767A1 (en) | 2014-08-08 | 2016-02-11 | Utility Associates, Inc. | Integrating data from multiple devices |
CA2913568C (en) * | 2015-01-29 | 2024-01-02 | Panasonic Intellectual Property Management Co., Ltd. | Wearable camera system, and video recording control method for wearable camera system |
US10555021B2 (en) * | 2015-08-31 | 2020-02-04 | Orcam Technologies Ltd. | Systems and methods for selecting content based on a user's behavior |
US9460596B1 (en) * | 2016-03-18 | 2016-10-04 | Thomas Lawrence Moses | Portable wireless remote monitoring and control systems |
CA3018877A1 (en) * | 2016-04-06 | 2017-10-12 | Marc Allan Harris | Wearable personal security devices and systems |
-
2017
- 2017-04-06 CA CA3018877A patent/CA3018877A1/en not_active Abandoned
- 2017-04-06 US US16/091,059 patent/US10839672B2/en active Active
- 2017-04-06 EP EP17779868.3A patent/EP3440631A4/en not_active Ceased
- 2017-04-06 WO PCT/US2017/026455 patent/WO2017177067A1/en active Application Filing
-
2020
- 2020-10-23 US US17/079,246 patent/US11074804B2/en active Active
-
2021
- 2021-06-25 US US17/359,107 patent/US20210327253A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
EP3440631A4 (en) | 2019-11-20 |
WO2017177067A1 (en) | 2017-10-12 |
US20210056833A1 (en) | 2021-02-25 |
CA3018877A1 (en) | 2017-10-12 |
US20190122531A1 (en) | 2019-04-25 |
US10839672B2 (en) | 2020-11-17 |
EP3440631A1 (en) | 2019-02-13 |
US11074804B2 (en) | 2021-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11074804B2 (en) | Wearable personal security devices and systems | |
US8630820B2 (en) | Methods and systems for threat assessment, safety management, and monitoring of individuals and groups | |
EP3118826B1 (en) | Home, office security, surveillance system using micro mobile drones and ip cameras | |
CA2864890C (en) | Systems and methods for providing emergency resources | |
JP6608911B2 (en) | Door and home security system and method | |
US20140118140A1 (en) | Methods and systems for requesting the aid of security volunteers using a security network | |
JP4617269B2 (en) | Monitoring system | |
JP4702598B2 (en) | Monitoring system, monitoring apparatus and method, recording medium, and program | |
TW201737143A (en) | Smart wearable devices | |
US10176693B2 (en) | Security and tracking systems and related methods | |
US20210217293A1 (en) | Wearable personal security devices and systems | |
US10431065B2 (en) | Security and tracking systems and associated methods | |
US11450098B2 (en) | Firearm detection system and method | |
US20200401814A1 (en) | Firearm detection system and method | |
ES2686086B1 (en) | Autonomous private security system, capable of providing passive and active services and in the fight against gender violence. | |
JP2017167800A (en) | Monitoring system, information processor, monitoring method, and monitoring program | |
US20210281886A1 (en) | Wearable camera system for crime deterrence | |
US20170347025A1 (en) | User-wearable type photographing device | |
TWI773141B (en) | Hazard Prediction and Response Device and System | |
EP3984009B1 (en) | Kit for monitoring and assistance to security guards and porters | |
KR20210068368A (en) | System of safety control service using wearable communication device | |
Bora et al. | V-Safe-Anywhere: Empowering Women's Safety With Wearable AI and IoT Technology | |
KR20200127383A (en) | Personal safety system using personal black box |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |