WO2017201561A1 - Personal security system and device - Google Patents

Personal security system and device Download PDF

Info

Publication number
WO2017201561A1
WO2017201561A1 PCT/AU2016/000179 AU2016000179W WO2017201561A1 WO 2017201561 A1 WO2017201561 A1 WO 2017201561A1 AU 2016000179 W AU2016000179 W AU 2016000179W WO 2017201561 A1 WO2017201561 A1 WO 2017201561A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
mobile electronic
user
command point
security command
Prior art date
Application number
PCT/AU2016/000179
Other languages
French (fr)
Inventor
Elisaia LAGA'AIA
Original Assignee
Aps 000 Pty Ltd Trading As 3G Safety Watch
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aps 000 Pty Ltd Trading As 3G Safety Watch filed Critical Aps 000 Pty Ltd Trading As 3G Safety Watch
Priority to PCT/AU2016/000179 priority Critical patent/WO2017201561A1/en
Publication of WO2017201561A1 publication Critical patent/WO2017201561A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/50Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
    • H04M3/51Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing
    • H04M3/5116Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing for emergency applications
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/028Communication between parent and child units via remote transmission means, e.g. satellite network
    • G08B21/0283Communication between parent and child units via remote transmission means, e.g. satellite network via a telephone network, e.g. cellular GSM
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/04Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier
    • H04M3/42068Making use of the calling party identifier where the identifier is used to access a profile
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/33Security of mobile devices; Security of mobile applications using wearable devices, e.g. using a smartwatch or smart-glasses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42348Location-based services which utilize the location information of a target
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/65Environment-dependent, e.g. using captured environmental data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Definitions

  • the present invention relates to a personal security device and system for providing safety and security measures to users of the system .
  • the present invention has particular but not exclusive application in safety and security services for civilian individuals, and safety and security services for personnel of private organisations. BACKGROUND OF THE INVENTION
  • wearable electronic devices such as watches have been developed to, for example, monitor a wearer's vital statistics (e.g . fitness trackers), facilitate carers/parents to monitor their charges/children, and to allow elderly people and/or people who are not able to live fully independently to live more independently.
  • vital statistics e.g . fitness trackers
  • Such wearable electronic devices have generally assumed the wearer is in a safe environment, and are ill suited for use in less benign, or outright hostile, environments.
  • a security system for dispatching assistance to a user comprises a mobile electronic device worn by the user, the mobile electronic device connected to a network and configured to establish a voice channel and data channel over the network with a preconfigured recipient; a security command point, being the preconfigured recipient, connected to the network and configured to complete the voice channel and data channel with the mobile electronic device, the security command point further connected to a plurality of responders via a telecommunications and/or data link; and a profile server storing therein a profile of the user, the profile containing personal information relevant to the user.
  • the mobile electronic device upon establishment of the voice channel and data channel with the security command point, mutes a sound reproducing means of the mobile electronic device and transmits to the security command point sound/noise from within a vicinity of the mobile electronic device and a user identifier unique to the mobile electronic device.
  • the security command point upon establishment of the voice channel and data channel with the mobile electronic device, retrieves the profile of the user from the server using the user identifier, and from the profile and the sound/noise transmitted thereto, assesses a situation of the user and dispatches one or more appropriate responders to a location of the user.
  • the mobile electronic device comprises a location receiver for wirelessly receiving location information from a location information service.
  • the wireless transceiver further transmits the location information to the security command point, and the security command point assesses the situation further based on the location information.
  • the security command point comprises a plurality of geographically dispersed command points
  • the mobile electronic device establishes the voice channel and data channel with a selected one of the plurality of geographically dispersed command points based on the location information.
  • the location information service comprises at least one of: a global positioning system (GPS) service; cellular network information service; and a Wi-Fi location service.
  • GPS global positioning system
  • the mobile electronic device upon muting the sound reproducing means, transmits an audio output status indicator signal to the security command point to indicate to the security command point that the sound reproducing means is muted.
  • the user input means is operable to unmute the sound reproducing means of the mobile electronic device, and upon unmuting the sound reproducing means, to transmit an audio output status indicator signal to the security command point to indicate to the security command point that the sound reproducing means is unmuted.
  • the mobile electronic device further comprises one or more vitality sensors configured to sense vital information of the user wearing the mobile electronic device, and transmits the vital information to the command security point.
  • the security command point assesses the situation further based on the vital information.
  • the at least one selected responder comprises an emergency services provider.
  • the mobile electronic device is operable to set a timer duration for countdown, and upon lapsing of the delay the mobile electronic device establishes the voice channel and data channel with the security command point.
  • the mobile electronic device transmits to the security command point the duration of the timer, and the security command point commences an independent countdown of the timer.
  • the mobile electronic device further transmits with the duration of the timer one or more of the location information, vital information, user identifier, and additional information input to the mobile electronic device during setting of the timer duration.
  • the security command point upon lapsing of the independent countdown, dispatches one or more appropriate responders to the location of the user.
  • the mobile electronic device further comprises an accelerometer circuitry configured to sense whether the user has experienced a fall event and the wireless transceiver is activated to transmit the communication signal in response to a fall event being sensed.
  • the mobile electronic device is a watch.
  • the mobile electronic device further transmits voice and/or data respectively along the voice channel and data channel to an application resident on a recipient electronic device.
  • the user input means comprises a physical/mechanical button that is operated by the user to establish the voice channel and data channel with the security command point.
  • Fig. 1 is a schematic view of a mobile electronic device according to an embodiment of the invention.
  • Fig. 2 is a schematic view of a system according to an embodiment of the invention.
  • Fig. 3 is a further schematic view of a system according to an embodiment of the invention.
  • Fig. 4 is a flow diagram of an exemplary operation of the system according to an embodiment of the invention.
  • Fig. 5 is a flow diagram of another exemplary operation of the system according to an embodiment of the invention.
  • Fig. 6 is a flow diagram of another exemplary operation of the system according to an embodiment of the invention.
  • Fig. 7 is a flow diagram of another exemplary operation of the system according to an embodiment of the invention. DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • a wearable mobile electronic device 10 and a security system 1 1 of which the wearable mobile electronic device 10 is part.
  • the mobile electronic device 10 is a "smart" watch (hereinafter referred to simply as a watch), however, it is to be understood that the mobile electronic device 10 is not limited to a watch, and may be another form of preferably wearable electronic device.
  • the mobile electronic device 10 comprises a sound recording means 12, a location finder 16, user input means 18, an interfacing display 20, accelerometer circuitry 23, electronic circuitry 21 including a processor, memory, and bus, a wireless transceiver 24, a sound reproducing means 26, and a band 28.
  • the sound recording 12 is a microphone operable to record noise and sound from within the vicinity of the mobile electronic device 10. The recorded noise and sound is stored in the mobile electronic device 10 and/or transmitted from the watch by the wireless transceiver 24 to external recipients.
  • the location finder 16 is a GPS receiver, but may alternatively or additionally be a GLONASS receiver, cellular signal receiver, and/or Wi-Fi receiver.
  • the user input means 18 comprises one or more physical/mechanical buttons electronically coupled to the electronic circuitry 21 .
  • the interfacing display 20 is a touch screen display operable to both display information and receive touch input from a user. Icons 22 are displayed on the interfacing display 20 to facilitate operation of and interaction with the mobile electronic device 10.
  • the accelerometer circuitry 23 is an electro-mechanical circuit comprising one or more accelerometers, each preferably arranged in a different orientation.
  • the accelerometer circuitry 23 comprises two accelerometers arranged approximately orthogonal to each other, and a gyroscope.
  • the accelerometer circuitry 23 is associated with and monitored by a fall detection algorithm configured to detect a fall event based on outputs of the accelerometer circuitry 23.
  • the fall detection algorithm in the preferred embodiment, is in part configured using test outputs from the accelerometer circuitry 23 while conducting a large plurality of test falls.
  • the accelerometer circuitry 23 and fall detection algorithm are together operable to detect a fall-event, which is an occurrence of a user of the mobile electronic device 10 falling to the ground.
  • the wireless transceiver 24 includes a Wi-Fi transceiver compliant with
  • the mobile electronic device 10 includes a SIM (not shown) to enable communication using the appropriate cellular standards.
  • the sound reproducing means 26 includes a speaker operable to generate and output noise/sound, and may further include an interface adapted to couple with appropriate sound output means via a 3.5mm headphone jack, BluetoothTM, and the like.
  • the band 28 may be provided, where necessary, to facilitate wearing of the mobile electronic device 10.
  • the band 28 comprises sensors (not shown), such as vitality sensors (e.g. heart rate sensor), embedded therein to sense vital information of the user. Alternatively (or additionally), sensors may be located at the back of the interfacing display 20.
  • the band 28 includes a detector for detecting unauthorized removal or unclasping of the band .
  • the detector in the preferred embodiment is a sensor on the clasp of the watch to detect when the band is unclasped without first toggling a setting on the user input means 18 or interfacing display 20.
  • the mobile electronic device 10 is configured to initiate a distress call to the security command point 32.
  • the security system 1 1 comprises the mobile electronic device 10, one or more networks 30, 31 to which the mobile electronic device 10 is configured to connect via telecommunication links 34, a security command point 32 connected to the one or more networks 30, 31 via telecommunication links 36 and configured to receive communication requests initiated by the mobile electronic device 10 over the networks 30, 31 , a profile server 37 connected to the security command point 32, and responders 33 connected via a telecommunications or data link 35 with the security command point 32.
  • the network 30, in the preferred embodiment, is the Internet (more specifically a Virtual Private Network established over the Internet) and is accessible by the mobile electronic device 10 via Wi-Fi, cellular/mobile connection, BluetoothTM, and the like.
  • the network 30 may be a closed/private network.
  • the network 31 in the preferred embodiment is a cellular mobile network, for example a 3G, 4G, LTE, EDGE, HSPA, CDMA, GSM, or similar network and accessible by the mobile electronic device 10 through the aforementioned SIM card/chip.
  • the network 30 may further include a satellite telecommunications network (e.g. IridiumTM).
  • the security command point 32 is a manned centre for receiving a distress call from the mobile electronic device 10, and from the distress call assessing the situation that a user 5 of the mobile electronic device 10 is in and determining an appropriate response for rendering assistance to the user 5.
  • the security command point 32 has a direct line to the responders 33.
  • the server 37 includes therein a database storing one or more user profiles. Each user profile contains personal details of a user of the security system 1 1 and is uniquely identified by a user identifier.
  • the server 37 is connected to the security command point 32, whereby upon receipt of a user identifier the security command point 32 is operable to retrieve a user profile corresponding to the user identifier from the server 37.
  • the responders 33 are conventional emergency services such as the police, ambulance/paramedic service, fire station, state emergency service (SES), and the like. As will be described in greater detail below, the responders 33 may further include specialized teams specific to a need of the user, for example a quick response force (QRF) in the case where the user 5 is a member of the police force and the security command point 32 is a police-specific command point (as will be described in greater detail below).
  • QRF quick response force
  • the mobile electronic device 10, as part of the system 1 1 is pre-configured to only establish a communication request to a predetermined recipient, that is, the security command point 32 or delegated command point.
  • the contact details e.g. phone number, IP address, etc.
  • the interfacing display 20 is not configured to provide means for the user 5 to input alternative contact details for the security command point 32. The modification of such information and details, in the preferred embodiment, is possible only by a delegated authority of the security command point 32.
  • a security system 1 1A which is a variation of the security system 1 1 of Fig. 2 is described.
  • the security system 1 1A is in all respects identical to the security system 1 1 , but further includes a monitoring device 48 operated by a monitor 7.
  • the monitoring device 48 is connected to the network 30 and, upon appropriate configuration of the mobile electronic device 10, receives the same information as would otherwise be received by the security command point 32 were a distress call to be made (and/or when a distress call is made) to the security command point 32.
  • the monitoring device 48 may further receive map addresses and longitude/latitude coordinates, MAC addresses, and the like.
  • the monitoring device 48 is further connected to a cellular network such as the network 31 , and thereby to the security command point 32. It is to be understood that one or more monitoring devices 48 may be connected to the network 30 to monitor the same, or a plurality of different mobile electronic devices 10.
  • the mobile electronic device 10 is designed for use by users who may have reason to at times have concern for their safety.
  • Such users include, for example, late night shift workers, law enforcement officers, paramedics, humanitarian/aid workers, adult industry workers, security personnel, and the like.
  • FIG. 4 an exemplary general operation 100 of the mobile electronic device 10 and security system 11 ,1 1 A to effect and respond to a distress call is described.
  • the general operation 100 is initiated when the user 5 considers themselves to be in, or entering into, a potentially dangerous situation.
  • the user 5 is a shift worker, and the potentially dangerous situation is one where the user 5 is feeling threatened by an aggressor.
  • the general operation 100 commences at 101 where the user 5 operates one or more of the user interface means 18 and/or interface display 20 in a manner that has been predesignated as for initiating a distress call.
  • one of the physical/mechanical buttons of the user interface means 18 is designated as a distress button, and operation thereof in a "one-touch/hold" manner for a predetermined duration (e.g. 3 seconds) initiates the distress call.
  • Operation of the one or more user interface means 18 and/or interface display 20 in the above manner causes the wireless transceiver 24 to generate a communication signal over the networks 30, 31 to initiate the distress call with the security command point 32.
  • the security command point 32 receives the communication signal and accepts the distress call, whereupon a communication channel between the security command point 32 and the mobile electronic device 10 is established across telecommunication links 34, 36.
  • the communication channel includes a voice channel and a data channel.
  • the mobile electronic device 10 communicates to the security command point 32 the user identifier that is unique to the mobile electronic device 10, an audio stream of sound/noise from within a vicinity of the user 5, and preferably also vital statistics of the user. Additionally, the mobile electronic device 10 mutes the sound reproducing means 26 to ensure that sound is not emitted thereby.
  • the status of the sound reproducing means 26 (e.g. whether it is muted or unmuted) is preferably indicated to the security command point 32 by an audio output status indicator signal which is sent from the mobile electronic device 10 to the security command point 32 also via the communication channel.
  • the status of the sound reproducing means 26 may be toggled by the user 5 through operation of one or more of the user input means 18 and/or the interface display 20.
  • the security command point 32 accesses the server 37 and, using the received user identifier, retrieves a user profile corresponding to the user 5.
  • the security command point 32 analyses the vital statistics of the user, the audio stream, and information about the user 5 contained in the user profile to determine the situation that the user 5 is currently in, and thereby assess what type of response and from which of the responders 33 a response is most appropriate.
  • the audio stream received by the security command point will likely contain dialogue between the aggressor and the user 5 where the aggressor is making one or more demands of the user 5. Based on this dialogue and the other aforementioned information, the security command point 32 is able to assess that the user is in a dangerous situation involving, in this example, what appears to be a theft.
  • the security command point 32 establishes a communication channel 35 with an appropriate responder 33, which in this case would be the police and possibly also the ambulance service, to convey thereto details of the user's situation.
  • an appropriate responder 33 which in this case would be the police and possibly also the ambulance service, to convey thereto details of the user's situation.
  • the appropriate responder(s) e.g. police and ambulance service
  • the security command point 32 is dispatched by the security command point 32 to the user's location as an appropriate response to the user's situation.
  • the user 5 may toggle the user input means 18 and/or interfacing display 20 to unmute the sound reproducing means 26.
  • the mobile electronic device 10 preferably sends a new audio output status indicator signal to the security command point 32 to indicate to the security command point 32 that the sound reproducing means 26 has been enabled.
  • Unmuting of the sound reproducing means 26 allows two-way voice communication between the user 5 and the security command point 32, such that more detailed information can be communicated to and from the security command point 32. Two-way communication may be more appropriate, for example, when the user 5 has suffered an injury, and/or when there is otherwise no longer a need to conceal the fact that the user 5 is seeking assistance.
  • the exemplary timer based operation 200 has particular use and application in situations where the user 5 knows beforehand that they will be entering into a potentially dangerous situation. For purposes of this description, the timer based operation 200 will be described in relation to a user 5 who is an adult industry worker, and who has an appointment with a client that has a pre-agreed duration of 1 hour.
  • the timer based operation 200 commences at 201 , where the user 5 operates the user input means 18 and/or interfacing display 20 to set a predetermined timer duration. For purposes of this example, the user 5 sets a timer duration of 1 hour 30 minutes.
  • the mobile electronic device 10 may further prompt the user 5 for further information such as a description of the situation the user 5 is about to enter, a room number, other more detailed location information, likely risks the user 5 may face, and the like.
  • the user 5 commences the timer and begins their appointment with their client.
  • the mobile electronic device 10 in the preferred embodiment preferably establishes a data communications channel with the security command point 32 using telecommunication links 34, 36 and communicates thereby a signal to the security command point 32 indicating that a timer has been set, and the duration of the timer.
  • any further information obtained from the user 5 at step 201 as well as GPS coordinates of the mobile electronic device 10, and the user identifier are also preferably communicated to the security command point 32.
  • the security command point 32 records the timer duration, and any further information received, and commences an independent countdown of the timer.
  • the user 5 at 203 operates the user input means 18 and/or interfacing display 20 to deactivate the timer.
  • deactivation of the timer may require the user 5 to input a PIN or other passcode.
  • the mobile electronic device 10 in the preferred embodiment preferably establishes a data communications channel with the security command point 32 using telecommunication links 34, 36 to communicate to the security command point 32 a signal indicating that the timer has been deactivated .
  • the security command point 32 upon receipt of the signal indicating that the timer has been deactivated by the user 5 deactivates and ceases the independent countdown.
  • the timer is caused to eventually lapse.
  • the mobile electronic device 10 at 204 automatically and without further user input establishes a distress call with the security command point 32, whereupon steps 102 to 106 of the previously described generation operation 100 are then executed.
  • the security command point 32 at the lapsing of the timer may itself establish a distress call with the mobile electronic device 10 (if one has not already been established) and/or automatically and without further user input or communication from the mobile electronic device 10 dispatch an appropriate responder 33 to the GPS coordinated provided by the user 5 at step 202, or to a location deemed most appropriate by the security command point 32 based on any further information that was provided by the user 5 at step 202.
  • deactivation of the timer may require the input of a PIN or other passcode.
  • the requirement for a passcode prevents deactivation of the timer by an unauthorized entity.
  • an incorrect input of a passcode a predetermined number of times causes the mobile electronic device 10 to automatically and without further user input establish a distress call with the security command point 32, whereupon steps 102 to 106 of the previously described general operation 100 are then executed.
  • one or more alternate, predetermined passcodes may be pre-set. Input by the user 5 of a predetermined alternate passcode causes the mobile electronic device 10 to indicate on the interfacing display that the timer has been deactivated but to otherwise establish a distress call with the security command point 32, whereupon steps 102 to 106 of the previously described general operation 100 are subsequently executed and/or the security command point 32 is instructed by the mobile electronic device 10 to immediately dispatch an appropriate responder.
  • the exemplary fall-based operation 300 has particular use and application in situations where the user 5 knows beforehand that there is a high likelihood that the user 5 may suffer a fall, and that the fall will constitute a serious threat to the user 5.
  • the fall-based operation 300 has particular application when, for example, the user 5 will be in an unstable/unbalanced situation at heights, or in a situation where the user 5 is likely to be involuntarily taken to the ground by another party.
  • the fall-based operation 300 will be described in relation to a user 5 who is a police officer, and who is about to engage a group/crowd of people.
  • the fall-based operation 300 commences at 301 , where the user 5 operates the user input means 18 and/or interfacing display 20 to set the mobile electronic device 10 into a fall-based mode.
  • the mobile electronic device 10 in the preferred embodiment may further prompt the user 5 for further information, such as a description of the situation the user 5 is about to enter, and the like.
  • the user 5 enters the situation, which in the present example involves the user 5 engaging with the group/crowd of people.
  • the user 5 at 303 operates the user input means 18 and/or interfacing display 20 to switch the mobile electronic device 10 out of the fall-based mode.
  • the falling of the user 5 to the ground is detected by the accelerometer circuitry 23 and associated fall detection algorithm of the mobile electronic device 10 at 304.
  • Detection of a fall event causes the mobile electronic device 10 at 204 to establish a distress call with the security command point 32, whereupon steps 102 to 106 of the general operation 100 are then executed.
  • the distress call is established after the detection of the fall event and the further elapse of a predetermined amount of time where the mobile electronic device 10 detects no movement of the user.
  • the security command point 32 of the present invention may be implemented in a number of forms.
  • the security command point 32 is a command point set up to service any person who is a user of the mobile electronic device 10 and has a service subscription with the security system 1 1 , 1 1 A.
  • the users 5 are generally civilians, and the public.
  • the security command point 32 is a command point set up to be manned by and provide service specifically only to members of a particular organisation/agency.
  • An example of a security command point 32 set up in this manner is a command point set up to service a local law enforcement agency.
  • the security command point 32 of the second form allows customized "standard operating procedures" to be set up that better cater to the types of distress calls likely to be faced by their users.
  • Other organisations/agencies such as intelligence agencies, aid agencies, the military, and the like would similarly benefit from a security command point 32 set up according to this second form.
  • the security command point 32 may be comprised of a plurality of geographically dispersed command points.
  • the mobile electronic device 10 using its GPS derived location, determines the geographically nearest or otherwise most appropriate command point to communicate with when necessary.
  • the security command point 32 is particularly effective for ensuring that responders 33 are able to attend the user 5 as expediently as possible, and further that any possible language issues (for example, if the user 5 is travelling in a foreign country) are ameliorated.
  • the operation 700 is a broadcast operation for broadcasting certain information from one mobile electronic device 10 to a plurality of other mobile electronic devices 10 connected to the same security command point 32.
  • the broadcast operation 700 has particular use and application in alerting users 5 to a common threat, and/or sharing information pertinent to a security event.
  • common threats include but are not limited to weather warnings (e.g. typhoons, tsunamis, earthquakes, floods, bush fires), presence/approach of hostile forces (e.g. for aid organisations working in hostile environments), and the like.
  • Examples of sharing information pertinent to a security event include but are not limited to the broadcast of photos of missing persons, number plates or descriptions of stolen vehicles, and the like.
  • the broadcast operation 700 will be described in relation to a system 1 1 having a security command point 32 set up according to the aforementioned second form. Specifically, the security command point 32 has been set up to service the local law enforcement agency. Additionally, for purposes of this description, the broadcast operation 700 will be described in relation to the theft of a vehicle that has been witness by a first police officer (first user).
  • the first user upon witnessing the theft of the vehicle, operates the user input means 18 and/or the interfacing display 20 to commence a broadcast action.
  • the first user is optionally prompted for information about the theft.
  • the first user inputs "503: 938VDU - Grey - Renault".
  • the mobile electronic device 10 establishes a communication channel with the security command point 32. Upon establishment of the communication channel, the mobile electronic device communicates thereto the information inputted at 702. Additionally, the first user may, by voice, provide further information to the security command point 32.
  • the security command point 32 assigns the event witnessed by the first user with an identifier.
  • the security command point 32 then identifies one or more other police officers (second users) to broadcast information about the theft to. Identification of the second users may be, for example, by one or more of rank, current location, responsible area of operations, on/off duty status, duty/responsibility/division/team, and the like.
  • the security command point 32 broadcasts the information about the theft to all identified second users and the first user.
  • the second user(s) operates their mobile electronic device 10 to indicate that they have pertinent information.
  • Their mobile electronic device 10 then establishes a communication channel with the security command point 32, sending along a data channel thereof the identifier identifying the security event for which the second user(s) has pertinent information, and initiating (or waiting for the security command point 32 to initiate) a voice channel.
  • further information such as the GPS location of the mobile electronic device 10, and the vital statistics of the second user are also sent to the security command point 32 on the data channel.
  • the second user upon establishment of a voice channel, the second user communicates the pertinent information to the security command point 32.
  • the method could be embodied in program code.
  • the program code could be supplied in a number of ways, for example on a tangible computer readable medium, such as a disc or a memory or as a data signal or data file (for example, by transmitting it from a server), or it can be stored in the memory of the mobile electronic device 10 and or the memory of the security command point 32.
  • the system of the present invention has a number of advantages including providing a user wearing or carrying a mobile electronic device of the system with an increased level of safety and security. This can be achieved by establishing a communication channel between the mobile electronic device and a security command point of the system so that audio signals are sent to the security command point but sound is not outputted by the mobile electronic device which could, for instance, be heard and compromise the user's positon in an emergency situation. VARIATIONS

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Child & Adolescent Psychology (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Alarm Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A security system for dispatching assistance to a user includes a mobile electronic device worn by the user. The device is connected to a network and configured to establish a voice and data channel over the network with a preconfigured recipient. A security command point, being the preconfigured recipient, is connected to the network and configured to complete the voice channel and data channel with the device. The security command point is further connected to a plurality of responders. Upon establishment of the voice data channel with the security command point, the device mutes a sound reproducing means thereof and transmits to the security command point sound/noise from within a vicinity of the device and a user identifier unique to the device. The security command point, upon establishment of the voice and data channel with the device, assesses a situation of the user from the sound/noise transmitted thereto and dispatches one or more appropriate responders to a location of the user.

Description

Personal Security System and Device
FIELD OF INVENTION
The present invention relates to a personal security device and system for providing safety and security measures to users of the system . The present invention has particular but not exclusive application in safety and security services for civilian individuals, and safety and security services for personnel of private organisations. BACKGROUND OF THE INVENTION
With recent advances in the fields of mobile telecommunications and mobile electronics, mobile and wearable electronic devices have become widespread.
Various uses for wearable electronic devices, such as watches have been developed to, for example, monitor a wearer's vital statistics (e.g . fitness trackers), facilitate carers/parents to monitor their charges/children, and to allow elderly people and/or people who are not able to live fully independently to live more independently.
Such wearable electronic devices have generally assumed the wearer is in a safe environment, and are ill suited for use in less benign, or outright hostile, environments.
OBJECT OF THE INVENTION
It is one object of the present invention to provide a mobile electronic device and system that provides its user with safety and security measures, and which mobile electronic device and system are suited for use in potentially hostile environments.
This and other objects of the present invention will be made apparent from the following disclosure of the invention.
SUMMARY OF THE INVENTION
According to an aspect of the present invention, a security system for dispatching assistance to a user comprises a mobile electronic device worn by the user, the mobile electronic device connected to a network and configured to establish a voice channel and data channel over the network with a preconfigured recipient; a security command point, being the preconfigured recipient, connected to the network and configured to complete the voice channel and data channel with the mobile electronic device, the security command point further connected to a plurality of responders via a telecommunications and/or data link; and a profile server storing therein a profile of the user, the profile containing personal information relevant to the user. The mobile electronic device, upon establishment of the voice channel and data channel with the security command point, mutes a sound reproducing means of the mobile electronic device and transmits to the security command point sound/noise from within a vicinity of the mobile electronic device and a user identifier unique to the mobile electronic device. The security command point, upon establishment of the voice channel and data channel with the mobile electronic device, retrieves the profile of the user from the server using the user identifier, and from the profile and the sound/noise transmitted thereto, assesses a situation of the user and dispatches one or more appropriate responders to a location of the user.
In one form, the mobile electronic device comprises a location receiver for wirelessly receiving location information from a location information service.
In a further form, the wireless transceiver further transmits the location information to the security command point, and the security command point assesses the situation further based on the location information.
In a further form, the security command point comprises a plurality of geographically dispersed command points, and the mobile electronic device establishes the voice channel and data channel with a selected one of the plurality of geographically dispersed command points based on the location information..
In a further form, the location information service comprises at least one of: a global positioning system (GPS) service; cellular network information service; and a Wi-Fi location service.
In a further form, the mobile electronic device, upon muting the sound reproducing means, transmits an audio output status indicator signal to the security command point to indicate to the security command point that the sound reproducing means is muted.
In a further form, the user input means is operable to unmute the sound reproducing means of the mobile electronic device, and upon unmuting the sound reproducing means, to transmit an audio output status indicator signal to the security command point to indicate to the security command point that the sound reproducing means is unmuted. In a further form, the mobile electronic device further comprises one or more vitality sensors configured to sense vital information of the user wearing the mobile electronic device, and transmits the vital information to the command security point.
In a further form, the security command point assesses the situation further based on the vital information.
In a further form, the at least one selected responder comprises an emergency services provider.
In a further form, the mobile electronic device is operable to set a timer duration for countdown, and upon lapsing of the delay the mobile electronic device establishes the voice channel and data channel with the security command point.
In a further form, the mobile electronic device transmits to the security command point the duration of the timer, and the security command point commences an independent countdown of the timer.
In a further form, the mobile electronic device further transmits with the duration of the timer one or more of the location information, vital information, user identifier, and additional information input to the mobile electronic device during setting of the timer duration.
In a further form, upon lapsing of the independent countdown, the security command point dispatches one or more appropriate responders to the location of the user.
In a further form, the mobile electronic device further comprises an accelerometer circuitry configured to sense whether the user has experienced a fall event and the wireless transceiver is activated to transmit the communication signal in response to a fall event being sensed.
In a further form, the mobile electronic device is a watch.
In a further form, the mobile electronic device further transmits voice and/or data respectively along the voice channel and data channel to an application resident on a recipient electronic device.
In a further form, the user input means comprises a physical/mechanical button that is operated by the user to establish the voice channel and data channel with the security command point. BRIEF DESCRIPTION OF THE DRAWINGS
In order that the present invention can be more readily understood, reference will now be made to the accompanying drawings which illustrate preferred
embodiments of the invention and wherein:
Fig. 1 is a schematic view of a mobile electronic device according to an embodiment of the invention;
Fig. 2 is a schematic view of a system according to an embodiment of the invention;
Fig. 3 is a further schematic view of a system according to an embodiment of the invention;
Fig. 4 is a flow diagram of an exemplary operation of the system according to an embodiment of the invention;
Fig. 5 is a flow diagram of another exemplary operation of the system according to an embodiment of the invention;
Fig. 6 is a flow diagram of another exemplary operation of the system according to an embodiment of the invention; and
Fig. 7 is a flow diagram of another exemplary operation of the system according to an embodiment of the invention. DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
According to an embodiment of the present invention, and as illustrated in Figs. 1 and 2, there is provided a wearable mobile electronic device 10, and a security system 1 1 of which the wearable mobile electronic device 10 is part. In a preferred embodiment of the present invention, the mobile electronic device 10 is a "smart" watch (hereinafter referred to simply as a watch), however, it is to be understood that the mobile electronic device 10 is not limited to a watch, and may be another form of preferably wearable electronic device.
With reference to Fig. 1 , the mobile electronic device 10 is described in greater detail. As illustrated in Fig. 1 , the mobile electronic device 10 comprises a sound recording means 12, a location finder 16, user input means 18, an interfacing display 20, accelerometer circuitry 23, electronic circuitry 21 including a processor, memory, and bus, a wireless transceiver 24, a sound reproducing means 26, and a band 28. In the preferred embodiment, the sound recording 12 is a microphone operable to record noise and sound from within the vicinity of the mobile electronic device 10. The recorded noise and sound is stored in the mobile electronic device 10 and/or transmitted from the watch by the wireless transceiver 24 to external recipients.
The location finder 16 is a GPS receiver, but may alternatively or additionally be a GLONASS receiver, cellular signal receiver, and/or Wi-Fi receiver.
The user input means 18 comprises one or more physical/mechanical buttons electronically coupled to the electronic circuitry 21 .
The interfacing display 20 is a touch screen display operable to both display information and receive touch input from a user. Icons 22 are displayed on the interfacing display 20 to facilitate operation of and interaction with the mobile electronic device 10.
The accelerometer circuitry 23 is an electro-mechanical circuit comprising one or more accelerometers, each preferably arranged in a different orientation. In the preferred embodiment, the accelerometer circuitry 23 comprises two accelerometers arranged approximately orthogonal to each other, and a gyroscope. Additionally, the accelerometer circuitry 23 is associated with and monitored by a fall detection algorithm configured to detect a fall event based on outputs of the accelerometer circuitry 23. The fall detection algorithm, in the preferred embodiment, is in part configured using test outputs from the accelerometer circuitry 23 while conducting a large plurality of test falls. The accelerometer circuitry 23 and fall detection algorithm are together operable to detect a fall-event, which is an occurrence of a user of the mobile electronic device 10 falling to the ground.
The wireless transceiver 24 includes a Wi-Fi transceiver compliant with
IEEE802.1 1 or similar standards, and a cellular transceiver compliant with cellular standards such as (but not limited to) 3G, 4G, LTE, EDGE, HSPA, CDMA, GSM, and the like. The mobile electronic device 10 includes a SIM (not shown) to enable communication using the appropriate cellular standards.
The sound reproducing means 26 includes a speaker operable to generate and output noise/sound, and may further include an interface adapted to couple with appropriate sound output means via a 3.5mm headphone jack, Bluetooth™, and the like. The band 28 may be provided, where necessary, to facilitate wearing of the mobile electronic device 10. In the preferred embodiment, the band 28 comprises sensors (not shown), such as vitality sensors (e.g. heart rate sensor), embedded therein to sense vital information of the user. Alternatively (or additionally), sensors may be located at the back of the interfacing display 20. In one form, the band 28 includes a detector for detecting unauthorized removal or unclasping of the band . The detector in the preferred embodiment is a sensor on the clasp of the watch to detect when the band is unclasped without first toggling a setting on the user input means 18 or interfacing display 20. In the event of an unauthorized removal, the mobile electronic device 10 is configured to initiate a distress call to the security command point 32.
With reference next to Fig. 2, the security system 1 1 is described in greater detail. As illustrated in Fig. 2, the security system 1 1 comprises the mobile electronic device 10, one or more networks 30, 31 to which the mobile electronic device 10 is configured to connect via telecommunication links 34, a security command point 32 connected to the one or more networks 30, 31 via telecommunication links 36 and configured to receive communication requests initiated by the mobile electronic device 10 over the networks 30, 31 , a profile server 37 connected to the security command point 32, and responders 33 connected via a telecommunications or data link 35 with the security command point 32.
The network 30, in the preferred embodiment, is the Internet (more specifically a Virtual Private Network established over the Internet) and is accessible by the mobile electronic device 10 via Wi-Fi, cellular/mobile connection, Bluetooth™, and the like. In other embodiments, the network 30 may be a closed/private network. The network 31 in the preferred embodiment is a cellular mobile network, for example a 3G, 4G, LTE, EDGE, HSPA, CDMA, GSM, or similar network and accessible by the mobile electronic device 10 through the aforementioned SIM card/chip. The network 30 may further include a satellite telecommunications network (e.g. Iridium™).
The security command point 32 is a manned centre for receiving a distress call from the mobile electronic device 10, and from the distress call assessing the situation that a user 5 of the mobile electronic device 10 is in and determining an appropriate response for rendering assistance to the user 5. The security command point 32 has a direct line to the responders 33. The server 37 includes therein a database storing one or more user profiles. Each user profile contains personal details of a user of the security system 1 1 and is uniquely identified by a user identifier. The server 37 is connected to the security command point 32, whereby upon receipt of a user identifier the security command point 32 is operable to retrieve a user profile corresponding to the user identifier from the server 37.
The responders 33, in one form, are conventional emergency services such as the police, ambulance/paramedic service, fire station, state emergency service (SES), and the like. As will be described in greater detail below, the responders 33 may further include specialized teams specific to a need of the user, for example a quick response force (QRF) in the case where the user 5 is a member of the police force and the security command point 32 is a police-specific command point (as will be described in greater detail below).
The mobile electronic device 10, as part of the system 1 1 , is pre-configured to only establish a communication request to a predetermined recipient, that is, the security command point 32 or delegated command point. In the preferred embodiment, the contact details (e.g. phone number, IP address, etc.) of the security command point 32 are the only contact details stored in the mobile electronic device 10 and otherwise available thereto. Additionally, in the preferred embodiment, the interfacing display 20 is not configured to provide means for the user 5 to input alternative contact details for the security command point 32. The modification of such information and details, in the preferred embodiment, is possible only by a delegated authority of the security command point 32.
With reference to Fig. 3, a security system 1 1A which is a variation of the security system 1 1 of Fig. 2 is described.
The security system 1 1A is in all respects identical to the security system 1 1 , but further includes a monitoring device 48 operated by a monitor 7. The monitoring device 48 is connected to the network 30 and, upon appropriate configuration of the mobile electronic device 10, receives the same information as would otherwise be received by the security command point 32 were a distress call to be made (and/or when a distress call is made) to the security command point 32. The monitoring device 48 may further receive map addresses and longitude/latitude coordinates, MAC addresses, and the like. The monitoring device 48 is further connected to a cellular network such as the network 31 , and thereby to the security command point 32. It is to be understood that one or more monitoring devices 48 may be connected to the network 30 to monitor the same, or a plurality of different mobile electronic devices 10.
As previously mentioned, the mobile electronic device 10 is designed for use by users who may have reason to at times have concern for their safety. Such users include, for example, late night shift workers, law enforcement officers, paramedics, humanitarian/aid workers, adult industry workers, security personnel, and the like.
With reference now to Fig. 4, an exemplary general operation 100 of the mobile electronic device 10 and security system 11 ,1 1 A to effect and respond to a distress call is described.
The general operation 100 is initiated when the user 5 considers themselves to be in, or entering into, a potentially dangerous situation. For the purposes of this description, the user 5 is a shift worker, and the potentially dangerous situation is one where the user 5 is feeling threatened by an aggressor.
The general operation 100 commences at 101 where the user 5 operates one or more of the user interface means 18 and/or interface display 20 in a manner that has been predesignated as for initiating a distress call. In the preferred embodiment, one of the physical/mechanical buttons of the user interface means 18 is designated as a distress button, and operation thereof in a "one-touch/hold" manner for a predetermined duration (e.g. 3 seconds) initiates the distress call. Operation of the one or more user interface means 18 and/or interface display 20 in the above manner causes the wireless transceiver 24 to generate a communication signal over the networks 30, 31 to initiate the distress call with the security command point 32.
At 102, the security command point 32 receives the communication signal and accepts the distress call, whereupon a communication channel between the security command point 32 and the mobile electronic device 10 is established across telecommunication links 34, 36. In the preferred embodiment, the communication channel includes a voice channel and a data channel.
At 103, upon the establishment of the communication channel between the security command point 32 and the mobile electronic device 10, the mobile electronic device 10 communicates to the security command point 32 the user identifier that is unique to the mobile electronic device 10, an audio stream of sound/noise from within a vicinity of the user 5, and preferably also vital statistics of the user. Additionally, the mobile electronic device 10 mutes the sound reproducing means 26 to ensure that sound is not emitted thereby. The status of the sound reproducing means 26 (e.g. whether it is muted or unmuted) is preferably indicated to the security command point 32 by an audio output status indicator signal which is sent from the mobile electronic device 10 to the security command point 32 also via the communication channel.
The status of the sound reproducing means 26 may be toggled by the user 5 through operation of one or more of the user input means 18 and/or the interface display 20.
At 104, the security command point 32 accesses the server 37 and, using the received user identifier, retrieves a user profile corresponding to the user 5. The security command point 32 then analyses the vital statistics of the user, the audio stream, and information about the user 5 contained in the user profile to determine the situation that the user 5 is currently in, and thereby assess what type of response and from which of the responders 33 a response is most appropriate.
In the example of the general operation 100, for instance, the audio stream received by the security command point will likely contain dialogue between the aggressor and the user 5 where the aggressor is making one or more demands of the user 5. Based on this dialogue and the other aforementioned information, the security command point 32 is able to assess that the user is in a dangerous situation involving, in this example, what appears to be a theft.
Accordingly, at 105, the security command point 32 establishes a communication channel 35 with an appropriate responder 33, which in this case would be the police and possibly also the ambulance service, to convey thereto details of the user's situation.
At 106, the appropriate responder(s) (e.g. police and ambulance service) are dispatched by the security command point 32 to the user's location as an appropriate response to the user's situation.
At any time, should the user 5 assess that they are in a situation where it would be appropriate to unmute the sound reproducing means 26 so as to enable two-way voice communication with the security command point 32, the user 5 may toggle the user input means 18 and/or interfacing display 20 to unmute the sound reproducing means 26. Upon doing so, the mobile electronic device 10 preferably sends a new audio output status indicator signal to the security command point 32 to indicate to the security command point 32 that the sound reproducing means 26 has been enabled. Unmuting of the sound reproducing means 26 allows two-way voice communication between the user 5 and the security command point 32, such that more detailed information can be communicated to and from the security command point 32. Two-way communication may be more appropriate, for example, when the user 5 has suffered an injury, and/or when there is otherwise no longer a need to conceal the fact that the user 5 is seeking assistance.
With reference next to Fig. 5, an exemplary timer based operation 200 of the mobile electronic device 10 and security system 1 1 , 11A to automatically effect and respond to a distress call is described.
The exemplary timer based operation 200 has particular use and application in situations where the user 5 knows beforehand that they will be entering into a potentially dangerous situation. For purposes of this description, the timer based operation 200 will be described in relation to a user 5 who is an adult industry worker, and who has an appointment with a client that has a pre-agreed duration of 1 hour.
The timer based operation 200 commences at 201 , where the user 5 operates the user input means 18 and/or interfacing display 20 to set a predetermined timer duration. For purposes of this example, the user 5 sets a timer duration of 1 hour 30 minutes. In the preferred embodiment, the mobile electronic device 10 may further prompt the user 5 for further information such as a description of the situation the user 5 is about to enter, a room number, other more detailed location information, likely risks the user 5 may face, and the like.
Next at 202, the user 5 commences the timer and begins their appointment with their client. Upon commencement of the timer, the mobile electronic device 10 in the preferred embodiment preferably establishes a data communications channel with the security command point 32 using telecommunication links 34, 36 and communicates thereby a signal to the security command point 32 indicating that a timer has been set, and the duration of the timer. Additionally, any further information obtained from the user 5 at step 201 , as well as GPS coordinates of the mobile electronic device 10, and the user identifier are also preferably communicated to the security command point 32. The security command point 32 records the timer duration, and any further information received, and commences an independent countdown of the timer. Assuming an incident free appointment with their client, the user 5 at 203 operates the user input means 18 and/or interfacing display 20 to deactivate the timer. In the preferred embodiment, and as will be described in greater detail below, deactivation of the timer may require the user 5 to input a PIN or other passcode. Upon deactivation of the timer, the mobile electronic device 10 in the preferred embodiment preferably establishes a data communications channel with the security command point 32 using telecommunication links 34, 36 to communicate to the security command point 32 a signal indicating that the timer has been deactivated . The security command point 32, upon receipt of the signal indicating that the timer has been deactivated by the user 5 deactivates and ceases the independent countdown.
Conversely, in the event of an incident, for example if the user 5 is detained by their client, the timer is caused to eventually lapse. Upon lapsing of the timer, the mobile electronic device 10 at 204 automatically and without further user input establishes a distress call with the security command point 32, whereupon steps 102 to 106 of the previously described generation operation 100 are then executed.
In the preferred embodiment where the mobile electronic device 10 at step 202 communicated to the security command point 32 the setting of the timer, the timer duration, and further information obtained at 201 , the security command point 32 at the lapsing of the timer may itself establish a distress call with the mobile electronic device 10 (if one has not already been established) and/or automatically and without further user input or communication from the mobile electronic device 10 dispatch an appropriate responder 33 to the GPS coordinated provided by the user 5 at step 202, or to a location deemed most appropriate by the security command point 32 based on any further information that was provided by the user 5 at step 202.
As mentioned above, deactivation of the timer may require the input of a PIN or other passcode. The requirement for a passcode prevents deactivation of the timer by an unauthorized entity. In the preferred embodiment, an incorrect input of a passcode a predetermined number of times causes the mobile electronic device 10 to automatically and without further user input establish a distress call with the security command point 32, whereupon steps 102 to 106 of the previously described general operation 100 are then executed.
Additionally, in accordance with the preferred embodiment, one or more alternate, predetermined passcodes may be pre-set. Input by the user 5 of a predetermined alternate passcode causes the mobile electronic device 10 to indicate on the interfacing display that the timer has been deactivated but to otherwise establish a distress call with the security command point 32, whereupon steps 102 to 106 of the previously described general operation 100 are subsequently executed and/or the security command point 32 is instructed by the mobile electronic device 10 to immediately dispatch an appropriate responder.
With reference next to Fig. 6, an exemplary fall-based operation 300 of the mobile electronic device and security system 11 , 11A to automatically effect and respond to a distress call is described.
The exemplary fall-based operation 300 has particular use and application in situations where the user 5 knows beforehand that there is a high likelihood that the user 5 may suffer a fall, and that the fall will constitute a serious threat to the user 5. The fall-based operation 300 has particular application when, for example, the user 5 will be in an unstable/unbalanced situation at heights, or in a situation where the user 5 is likely to be involuntarily taken to the ground by another party. For purposes of this description, the fall-based operation 300 will be described in relation to a user 5 who is a police officer, and who is about to engage a group/crowd of people.
The fall-based operation 300 commences at 301 , where the user 5 operates the user input means 18 and/or interfacing display 20 to set the mobile electronic device 10 into a fall-based mode. As part of the process of setting the mobile electronic device 10 into the fall-based mode, the mobile electronic device 10 in the preferred embodiment may further prompt the user 5 for further information, such as a description of the situation the user 5 is about to enter, and the like.
Next at 302, the user 5 enters the situation, which in the present example involves the user 5 engaging with the group/crowd of people.
Assuming an incident free engagement with the group/crowd of people, the user 5 at 303 operates the user input means 18 and/or interfacing display 20 to switch the mobile electronic device 10 out of the fall-based mode.
Conversely, in the event of an incident, for example if the group/crowd of people engages with the user 5 in a physically aggressive manner and causes the user 5 to be knocked to the ground, the falling of the user 5 to the ground is detected by the accelerometer circuitry 23 and associated fall detection algorithm of the mobile electronic device 10 at 304. Detection of a fall event causes the mobile electronic device 10 at 204 to establish a distress call with the security command point 32, whereupon steps 102 to 106 of the general operation 100 are then executed. In one embodiment, the distress call is established after the detection of the fall event and the further elapse of a predetermined amount of time where the mobile electronic device 10 detects no movement of the user.
The security command point 32 of the present invention may be implemented in a number of forms.
In a first form, the security command point 32 is a command point set up to service any person who is a user of the mobile electronic device 10 and has a service subscription with the security system 1 1 , 1 1 A. In this form, the users 5 are generally civilians, and the public.
In a second form, the security command point 32 is a command point set up to be manned by and provide service specifically only to members of a particular organisation/agency. An example of a security command point 32 set up in this manner is a command point set up to service a local law enforcement agency. The security command point 32 of the second form allows customized "standard operating procedures" to be set up that better cater to the types of distress calls likely to be faced by their users. Other organisations/agencies such as intelligence agencies, aid agencies, the military, and the like would similarly benefit from a security command point 32 set up according to this second form.
The security command point 32 may be comprised of a plurality of geographically dispersed command points. The mobile electronic device 10, using its GPS derived location, determines the geographically nearest or otherwise most appropriate command point to communicate with when necessary. In this arrangement, the security command point 32 is particularly effective for ensuring that responders 33 are able to attend the user 5 as expediently as possible, and further that any possible language issues (for example, if the user 5 is travelling in a foreign country) are ameliorated.
With reference to Fig. 7, a further operation 700 of the mobile electronic device 10 and security system 1 1 , 1 1A is described. The operation 700 is a broadcast operation for broadcasting certain information from one mobile electronic device 10 to a plurality of other mobile electronic devices 10 connected to the same security command point 32. The broadcast operation 700 has particular use and application in alerting users 5 to a common threat, and/or sharing information pertinent to a security event. Examples of common threats include but are not limited to weather warnings (e.g. typhoons, tsunamis, earthquakes, floods, bush fires), presence/approach of hostile forces (e.g. for aid organisations working in hostile environments), and the like. Examples of sharing information pertinent to a security event include but are not limited to the broadcast of photos of missing persons, number plates or descriptions of stolen vehicles, and the like.
For purposes of this description, the broadcast operation 700 will be described in relation to a system 1 1 having a security command point 32 set up according to the aforementioned second form. Specifically, the security command point 32 has been set up to service the local law enforcement agency. Additionally, for purposes of this description, the broadcast operation 700 will be described in relation to the theft of a vehicle that has been witness by a first police officer (first user).
At 701 , upon witnessing the theft of the vehicle, the first user operates the user input means 18 and/or the interfacing display 20 to commence a broadcast action.
At 702, the first user is optionally prompted for information about the theft. For purposes of this description, the first user inputs "503: 938VDU - Grey - Renault".
At 703, the mobile electronic device 10 establishes a communication channel with the security command point 32. Upon establishment of the communication channel, the mobile electronic device communicates thereto the information inputted at 702. Additionally, the first user may, by voice, provide further information to the security command point 32.
At 704, the security command point 32 assigns the event witnessed by the first user with an identifier. The security command point 32 then identifies one or more other police officers (second users) to broadcast information about the theft to. Identification of the second users may be, for example, by one or more of rank, current location, responsible area of operations, on/off duty status, duty/responsibility/division/team, and the like.
At 706, the security command point 32 broadcasts the information about the theft to all identified second users and the first user.
At 707, upon one or more of the second users having information pertinent to the theft, the second user(s) operates their mobile electronic device 10 to indicate that they have pertinent information. Their mobile electronic device 10 then establishes a communication channel with the security command point 32, sending along a data channel thereof the identifier identifying the security event for which the second user(s) has pertinent information, and initiating (or waiting for the security command point 32 to initiate) a voice channel. Additionally, further information such as the GPS location of the mobile electronic device 10, and the vital statistics of the second user are also sent to the security command point 32 on the data channel.
At 708, upon establishment of a voice channel, the second user communicates the pertinent information to the security command point 32.
Further aspects of the method will be apparent from the above description of the security system 1 1 , 1 1A and the mobile electronic device 10. Persons skilled in the art will also appreciate that the method could be embodied in program code. The program code could be supplied in a number of ways, for example on a tangible computer readable medium, such as a disc or a memory or as a data signal or data file (for example, by transmitting it from a server), or it can be stored in the memory of the mobile electronic device 10 and or the memory of the security command point 32.
ADVANTAGES
The system of the present invention has a number of advantages including providing a user wearing or carrying a mobile electronic device of the system with an increased level of safety and security. This can be achieved by establishing a communication channel between the mobile electronic device and a security command point of the system so that audio signals are sent to the security command point but sound is not outputted by the mobile electronic device which could, for instance, be heard and compromise the user's positon in an emergency situation. VARIATIONS
It will of course be realised that while the foregoing has been given by way of illustrative example of this invention, all such and other modifications and variations thereto as would be apparent to persons skilled in the art are deemed to fall within the broad scope and ambit of this invention as is herein set forth.
Throughout the description and claims of this specification the word
"comprise" and variations of that word such as "comprises" and "comprising", are not intended to exclude other additives, components, integers or steps. It is to be understood that, if any prior art is referred to herein, such reference does not constitute an admission that the prior art forms a part of the common general knowledge in the art in any country.

Claims

THE CLAIMS DEFINING THE INVENTION ARE AS FOLLOWS:
1 . A security system for dispatching assistance to a user, the system comprising: a mobile electronic device worn by the user, the mobile electronic device connected to a network and configured to establish a voice channel and data channel over the network with a preconfigured recipient;
a security command point, being the preconfigured recipient, connected to the network and configured to complete the voice channel and data channel with the mobile electronic device, the security command point further connected to a plurality of responders via a telecommunications and/or data link; and
a profile server storing therein a profile of the user, the profile containing personal information relevant to the user, wherein
the mobile electronic device, upon establishment of the voice channel and data channel with the security command point, mutes a sound reproducing means of the mobile electronic device and transmits to the security command point sound/noise from within a vicinity of the mobile electronic device and a user identifier unique to the mobile electronic device, and
the security command point, upon establishment of the voice channel and data channel with the mobile electronic device, retrieves the profile of the user from the server using the user identifier, and from the profile and the sound/noise transmitted thereto, assesses a situation of the user and dispatches one or more appropriate responders to a location of the user.
2. A system as claimed in claim 1 , wherein the mobile electronic device comprises a location receiver for wirelessly receiving location information from a location information service.
3. A system as claimed in claim 2, wherein the wireless transceiver further transmits the location information to the security command point, and the security command point assesses the situation further based on the location information.
4. A system as claimed in claim 2 or 3, wherein the security command point comprises a plurality of geographically dispersed command points, and the mobile electronic device establishes the voice channel and data channel with a selected one of the plurality of geographically dispersed command points based on the location information.
5. A system as claimed in any one of claims 2 to 4, wherein the location information service comprises at least one of: a global positioning system (GPS) service; cellular network information service; and a Wi-Fi location service.
6. A system as claimed in any one of claims 1 to 5, wherein the mobile electronic device, upon muting the sound reproducing means, transmits an audio output status indicator signal to the security command point to indicate to the security command point that the sound reproducing means is muted.
7. A system as claimed in any one of claims 1 to 6, wherein the user input means is operable to unmute the sound reproducing means of the mobile electronic device, and upon unmuting the sound reproducing means, to transmit an audio output status indicator signal to the security command point to indicate to the security command point that the sound reproducing means is unmuted .
8. A system as claimed in any one of claims 1 to 7, wherein the mobile electronic device further comprises one or more vitality sensors configured to sense vital information of the user wearing the mobile electronic device, and transmits the vital information to the command security point.
9. A system as claimed in claim 8, wherein the security command point assesses the situation further based on the vital information.
10. A system as claimed in any one of claims 1 to 9, wherein the at least one selected responder comprises an emergency services provider. 1 1 . A system as claimed in any one of claims 1 to 10, wherein the mobile electronic device is operable to set a timer duration for countdown, and upon lapsing of the delay the mobile electronic device establishes the voice channel and data channel with the security command point.
12. A system as claimed in claim 1 1 , wherein the mobile electronic device transmits to the security command point the duration of the timer, and the security command point commences an independent countdown of the timer. 13. A system as claimed in claim 12, wherein the mobile electronic device further transmits with the duration of the timer one or more of the location information, vital information, user identifier, and additional information input to the mobile electronic device during setting of the timer duration. 14. A system as claimed in claim 13, wherein upon lapsing of the independent countdown, the security command point dispatches one or more appropriate responders to the location of the user.
17. A system as claimed in any one of claims 1 to 16, wherein the at least one mobile electronic device further comprises an accelerometer circuitry having one or more accelerometers configured to sense whether the user has experienced a fall event and the wireless transceiver is activated to transmit the communication signal in response to the fall event being sensed. 18. A system as claimed in any one of claims 1 to 17, wherein the mobile electronic device is a watch.
19. A system as claimed in claim 1 , wherein the mobile electronic device further transmits voice and/or data respectively along the voice channel and data channel to an application resident on a recipient electronic device.
20. A system as claimed in any one of claims 1 to 19, wherein the user input means comprises a physical/mechanical button that is operated by the user to establish the voice channel and data channel with the security command point.
PCT/AU2016/000179 2016-05-23 2016-05-23 Personal security system and device WO2017201561A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/AU2016/000179 WO2017201561A1 (en) 2016-05-23 2016-05-23 Personal security system and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/AU2016/000179 WO2017201561A1 (en) 2016-05-23 2016-05-23 Personal security system and device

Publications (1)

Publication Number Publication Date
WO2017201561A1 true WO2017201561A1 (en) 2017-11-30

Family

ID=60410918

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2016/000179 WO2017201561A1 (en) 2016-05-23 2016-05-23 Personal security system and device

Country Status (1)

Country Link
WO (1) WO2017201561A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100285771A1 (en) * 2009-05-11 2010-11-11 Peabody Steven R System containing location-based personal emergency response device
US9069333B1 (en) * 2012-08-14 2015-06-30 Natascha Romans Personal alarm watch

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100285771A1 (en) * 2009-05-11 2010-11-11 Peabody Steven R System containing location-based personal emergency response device
US9069333B1 (en) * 2012-08-14 2015-06-30 Natascha Romans Personal alarm watch

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
3G SAFETY WATCH OFFICIAL VIDEO, 16 March 2015 (2015-03-16), Retrieved from the Internet <URL:https://www.youtube.com/watch?v=JMP5SLi0yWo> [retrieved on 20160624] *

Similar Documents

Publication Publication Date Title
US11665523B2 (en) Systems and methods for emergency communications amongst groups of devices based on shared data
US20210287522A1 (en) Systems and methods for managing an emergency situation
US10130272B2 (en) Personal safety and security mobile application responsive to changes in heart rate
US8768294B2 (en) Notification and tracking system for mobile devices
US9715815B2 (en) Wirelessly tethered device tracking
US9454889B2 (en) Security and public safety application for a mobile device
US8862092B2 (en) Emergency notification system for mobile devices
US10349227B2 (en) Personal safety system
US20140118140A1 (en) Methods and systems for requesting the aid of security volunteers using a security network
US20170316676A1 (en) Personal emergency response system and method of operation
KR20150115405A (en) Individual protection service system and method
US20130109427A1 (en) Individual Security Through Mobile Device Notifications
US9706380B1 (en) Providing emergency notification and tracking data from a mobile device
US10446016B2 (en) Advanced mobile emergency communication system
US20100311387A1 (en) Panic activated locator (p.a.l.)
US11670152B2 (en) Alarm notification system
US20150213700A1 (en) Personal Emergency Response System
US10460591B2 (en) Portable wearable primary device which communicates data to secondary device that is in communication with multiple networks and related communication systems
CN106817477A (en) Radio communication device and the help-asking system based on radio communication device
US9756454B1 (en) Portable wearable primary device which communciates data to secondary device that is in communication with multiple networks and related communication systems
WO2017201561A1 (en) Personal security system and device
US10587408B2 (en) Digital assistant water mark
AU2021100213A4 (en) Women security using iot based intelligent electronic jewelry
KR102517545B1 (en) Method and apparatus for sharing dangerous status of user by using timer
US20210127243A1 (en) Portable Wearable Primary Device which Communicates Data to Secondary Device that is in Communication with Multiple Networks and Related Communication Systems

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16902611

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16902611

Country of ref document: EP

Kind code of ref document: A1