WO2021059296A1 - Système de sécurité et procédé de transmission de signal de détresse - Google Patents

Système de sécurité et procédé de transmission de signal de détresse Download PDF

Info

Publication number
WO2021059296A1
WO2021059296A1 PCT/IN2020/050818 IN2020050818W WO2021059296A1 WO 2021059296 A1 WO2021059296 A1 WO 2021059296A1 IN 2020050818 W IN2020050818 W IN 2020050818W WO 2021059296 A1 WO2021059296 A1 WO 2021059296A1
Authority
WO
WIPO (PCT)
Prior art keywords
security system
victim
distress signal
transmitting
devices
Prior art date
Application number
PCT/IN2020/050818
Other languages
English (en)
Inventor
Sanjiv BHAKAT
Original Assignee
Herdum Systems Private Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Herdum Systems Private Limited filed Critical Herdum Systems Private Limited
Publication of WO2021059296A1 publication Critical patent/WO2021059296A1/fr

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B27/00Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
    • G08B27/005Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations with transmission via computer network
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link

Definitions

  • the present invention relates to a security system and a method thereof. More specifically, the present invention relates to a method of transmission of distress signals at the time of emergency situations.
  • the conventional systems do not provide any provision to ensure the physical presence of the helpers for helping the victim. Further, the conventional systems are incapable of authenticating the intentions of the helpers. Hence, the identity of the helpers as well as their intention to help remains questionable.
  • the present invention discloses a security system and a method of transmitting a distress signal using the same.
  • the said method entails various steps such as receiving a distress signal triggered by a device A (20) at an application server (10) by a security system (50) along with location of the device A (20).
  • the method involves identifying at least one device B (30) present within a predefined distance from the device A (20) by the security system (50).
  • a notification is then transmitted to the at least one device B (30).
  • the notification includes type of distress and distance of the device A (20) from the at least one device B (30).
  • an acknowledgement is received from the at least one device B (30) at the application server (10) by the security system (50).
  • the location of the device A (20) is transmitted to the at least one device B (30).
  • FIG. 1A illustrates a network of connected devices in accordance with an embodiment of the present invention.
  • FIG. IB illustrates an alternate embodiment of a network of connected devices in accordance with an embodiment of the present invention.
  • FIG. 1C illustrates a yet another embodiment of a network of connected devices in accordance with an embodiment of the present invention.
  • FIG. 2 illustrates various modules possessed by the security system of the present invention.
  • FIG. 3 indicates a flowchart including all steps involved in performing safety measures by an individual in accordance with an embodiment of the present invention.
  • 'victim' in the following present invention corresponds to an individual who is in danger or foresees immediate danger. More specifically, 'victim' relates to individuals / persons who feel threatened / oppressed due to threats and / or crime varying from minor wrongdoing, such as stalking, verbal assault, threatening behaviour, locational situation such as disturbances, accident etc. , violent assault such as rape or murder.
  • the term 'subscriber' corresponds to an individual who volunteers for helping the victim at the time of distress.
  • the subscribers in the present invention are classified into different categories including, but not limited to security guards, organised neighbourhood watch organisations, policemen, doctors, family, friends, good Samaritans, public etc.
  • each block/module of the block diagrams and/or data flow illustrations, respectively, may be implemented in part by computer program instructions, e.g., as logical steps or operations executing on a processor in a computing system.
  • These computer program instructions may be loaded onto a computer, such as a special purpose computer or other programmable data processing apparatus to produce a specifically-configured machine, such that the instructions which execute on the computer or other programmable data processing apparatus implement the functions specified in the data flow illustrations or blocks/modules.
  • These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including computer-readable instructions for implementing the functionality specified in the flowchart block or blocks.
  • the computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions that execute on the computer or other programmable apparatus provide operations for implementing the functions specified in the data flow illustrations or blocks.
  • modules of the block diagrams and data flow illustrations support various combinations for performing the specified functions, combinations of operations for performing the specified functions and program instructions for performing the specified functions. It should also be understood that each module of the block diagrams and flowchart illustrations, and combinations of modules in the block diagrams and flowchart illustrations, can be implemented by special purpose hardware-based computer systems that perform the specified functions or operations, or combinations of special purpose hardware and computer instructions or standard off the shelf products with on board processing / computing capability that may meet requirements.
  • applications, software programs or computer readable instructions may be referred to as components or modules.
  • Applications may be hardwired or hardcoded in hardware or take the form of software executing on a general purpose computer such that when the software is loaded into and/or executed by the computer, the computer becomes an apparatus for practicing the invention, or they are available via a web service.
  • Applications may also be downloaded in whole or in part through the use of a software development kit or a toolkit that enables the creation and implementation of the present invention.
  • these implementations, or any other form that the invention may take may be referred to as techniques. In general, the order of the steps of disclosed processes may be altered within the scope of the invention.
  • FIG. 1A is a system 100 configured as a client/server architecture used in an embodiment of the present invention.
  • a "client” is a subscriber of a class or group that uses the services of another class or group to which it is not related.
  • a client is a process (i.e. roughly a program or task) that requests a service which is provided by another process, known as a server program.
  • the client process uses the requested service without having to know any working details about the server program or the server itself.
  • a client process usually runs on a computer that accesses shared network resources provided by another computer running a corresponding server process.
  • a "server” is typically a remote computer system that is accessible over a communication medium such as the Internet.
  • the client process may be active on a second computer system, and communicate with the server process over a communication medium that allows multiple clients to take advantage of the information-gathering capabilities of the server.
  • the server essentially acts as an information provider for a computer network.
  • the system 100 for practicing the teachings of the present disclosure includes an application server 10 equipped with a security system 50, a device A 20 and at least one device B 30, any of which exchange data through network 40.
  • the application server 10 may host a security system 50 which obtains inputs from the device A 20 and/or device B 30 and further processes the obtained inputs.
  • the application server 10 may be a cloud based server.
  • the application server 10 may be a remote computer system having processing capability required for the security system 50.
  • the security system 50 is capable of performing and mediating all functionalities, operations and methods of the present disclosure.
  • the security system 50 includes various modules as provided in FIG. 2.
  • the said modules of the security system 50 mediate transmission of one or more distress signals triggered by the device A 20 (victim) to at least one device B 30 (subscriber).
  • the application server 10 may additionally serve to activate one or more alert devices 60 when the device A 20 triggers one or more distress signals.
  • the device A 20 of the present invention corresponds to an electronic device which may be held by the victim or in vicinity of the victim.
  • the electronic devices may be any conventional known devices such as without limitation, a laptop, a handheld device as a smartphone, a personal digital assistant (PDA), a tablet, etc., a wearable device like a smart watch, a NFC device, etc.
  • the device A 20 may communicate with the application server 10 when the victim foresees danger or at the time of emergency such as physical assault, rape, theft, health issue, etc.
  • the victim may trigger one or more distress signals directly via the device A 20.
  • the device A 20 includes a specialized button or icon for activating the distress signal.
  • the device A 20 may be in communication with another device such as a wearable gadget 20a as shown in FIG. IB.
  • the victim triggers the distress signal(s) indirectly via voice activation or by pressing a push button provided with the said wearable gadget 20a.
  • the device A 20 transmits details such as location co-ordinates, secure ID, date, time, etc. to the application server 10 on activation of distress signals.
  • the location may be transmitted once or in real-time at regular intervals, say, 30 seconds.
  • the device A 20 is capable of transmitting a message to the application server 10 once the victim is out of danger.
  • the said message is only transmitted through a password or a pass key to ensure deliberate stand down after due authentication and to ensure that only the victim relays the message and not any passerby.
  • the device A 20 may include one of, a GPS receiver, a Wi-Fi positioning data device, or other equivalent means which are capable of determining the location of the device A 20.
  • the device A 20 may receive global positioning system (GPS) data from one or combination of global navigation satellite system (GNSS), GLONASS, Galileo or Beidou, etc. and process the received data to produce location coordinates.
  • GPS global positioning system
  • the device A 20 may transmit such details via the network 40 or combination of networks 40 such as cellular network or other packet switched network such as Wi-Fi, Internet, Bluetooth etc. to the application server 10.
  • networks 40 such as cellular network or other packet switched network such as Wi-Fi, Internet, Bluetooth etc.
  • an application corresponding to the security system 50 may be installed on the device A 20 which aids the victim to provide one or more inputs.
  • the application may be downloaded from the internet, android marketplace, etc.
  • the one or more inputs include selection of preferred category of subscriber(s) out of the plurality of subscriber categories.
  • the victim may select the said preferred subscriber category (ies) at the time of the emergency situation or may pre-select the preferred subscriber category(ies).
  • the one or more device(s) B 30 may correspond to one or more electronic devices of the one or more subscribers of the present invention.
  • the electronic devices may be any conventional known devices such as without limitation, a laptop, a handheld device as a smartphone, a personal digital assistant (PDA), a tablet, etc., a wearable device like a smart watch, a NFC device, etc.
  • An application corresponding to the security system 50 may be installed on the device B 30 which may be similar or different to the one installed on the device A 20.
  • the application may be accessed through a user interface provided with device A 20 and/or device(s) B 30.
  • the device(s) B 30 may include one or more processors, memories, input/output devices, and a network interface, such as a conventional modem. Further, like the device A 20, the device(s) B 30 may include location detection capability for example, a GPS receiver, assisted GPS, Wi-Fi networks, etc.
  • the device(s) B 30 may communicate with the application server 10 via network 40 bi-directionally.
  • the network 40 may include, without limitation, internet, a local area network, a wide area network and/or a wireless network.
  • the network 40 may include copper transmission cables, optical transmission fibres, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers.
  • a network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
  • the one or more alert devices 60 as shown in FIG. 1C may include any conventionally known audio and/or visual indicator. It should be noted that other type of conventionally known alert devices are also within the scope of the present invention.
  • each of the alert devices 60 is an audio-visual indicator which includes a coloured light emitting diode (or other such devices) and capable to produce a predefined sound at a predefined decibel. The coloured light and the predefined sound may be produced simultaneously or consecutively.
  • the alert device(s) 60 may be a conventional stand-alone device that is self-powered and re-chargeable.
  • the alert device (60) is so powered that it is capable of sustaining its functionality for longer period of time.
  • the alert device (60) may be hermetically sealed and have a water proof enclosure.
  • the alert device (60) is capable of enduring ambient temperature exceeding 55 deg C and not lower than minus 15 deg C (depending on the ambient conditions in the user area).
  • the alert devices 60 may be installed in various buildings such as schools, hospitals, office spaces and/or public vehicles such as cabs, buses, etc.
  • the alert devices 60 may be activated by the security system 50 i.e. emit light and produce sound, only when the device A 20 triggers one or more distress signals. In an embodiment, only those alert devices 60 which lie in close proximity of the device A 20 are activated. It must be noted that the term 'close proximity' in the aforesaid statement refers to 5 to 500 m or a distance that may be defined by the server / user / administrator. The said range may vary depending upon whether the device is mounted on a static body or on a moving body such as a vehicle.
  • alert device 60 enhances the chances of immediate help by making all individuals present in the vicinity of the device A 20, aware of the emergency situation of the victim.
  • FIG.2 illustrates the plurality of modules of the security system 50.
  • the said modules of the security system 50 may include a geo-location module 210, a distance determination module 220, a notification module 230, an acknowledgement module 240 and a database module 250. Though the description mentions the explicit presence of the aforesaid modules, it must be noted that the security system 50 may include various other modules depending upon the functions performed by the security system 50.
  • the said geo-location module 210 may receive location co-ordinates from the device A 20 and/or the device(s) B 30.
  • the geo-location module 210 may receive the location co ordinates in real-time or as per configured durations, e.g. 2 minutes or at a configured instance, say, when the victim triggers the one or more distress signals.
  • the distance determination module 220 may work using location obtained via the geo location module 210 to calculate the distance between the location co-ordinates of the device A 20 and the device(s) B 30. Post calculation, the distance determination module 220 compares the calculated distance between the device A 20 and the device(s) B 30 with a threshold value. In an embodiment, the distance determination module 220 segregates the device(s) B 30 for which the calculated distance is less than or equal to the threshold valve. As an exemplary embodiment, the threshold value is 5 kms.
  • the notification module 230 is configured to trigger one or more notifications to the device A 20 and/or device B 30.
  • the notifications may be in the form of a short messaging service (SMS), a push notification (alert or update), a phone call via server and/or other forms of electronic communications with or without a unique ringtone or alert on the subscriber's device.
  • SMS short messaging service
  • Alert or update a push notification
  • phone call via server and/or other forms of electronic communications with or without a unique ringtone or alert on the subscriber's device.
  • the acknowledgement module 240 is configured to seek as well as manage one or more acknowledgements from the device(s) B 30.
  • the acknowledgements are sought from the device(s) B 30 which have been segregated by the distance determination module 220.
  • the said acknowledgements are provided by the associated subscribers of the segregated device(s) B 30 who are willing to help the victim. Therefore, an 'acknowledgement' in the present invention corresponds to a confirmation sent at the time of the emergency situation by one or more subscribers present in the vicinity of the victim assuring to help the victim.
  • the database module 250 is equipped to store all details of the victims and the subscribers associated with the security system 50.
  • the details of the victim may include name, address, selected categories of subscribers, location etc.
  • the details of the subscribers include name, address, category, criminal background, location, etc.
  • the database module 250 may further store various inputs received from the device A 20 and the device(s) B 30.
  • the database module 250 also includes one or more look up tables of features that the victim may have subscribed.
  • the list of features includes without limitation type of notifications, categories of subscribers, etc.
  • the security system 50 may include an alert activation module (not shown).
  • the alert activation module may be configured to activate the one or more alert devices 60 once the distress signals are triggered by the device A 20.
  • FIG.3 a flowchart entailing the steps involved in transmission of the distress signals via security system 50 is disclosed. It should be noted that though the present invention may be used for various applications as provided above, the following steps disclose the use of security system 50 at the time of say, physical attack.
  • a distress signal is triggered by the victim via the device A 20.
  • the distress signal may be triggered by the victim using a wearable gadget 20a through a wired or wireless circuitry.
  • the trigger of the distress signal by the victim through the wearable gadget 20a first activates the device A 20 by establishing a communication via a communication protocol but not limited to Bluetooth, RFID, NFC, WiFi etc. Subsequently, the device A 20 interacts with the application server 10 via the network 40.
  • the victim may trigger the distress signal by pressing a button, say SOS button, speaking a keyword, etc.
  • the distress signal is transmitted to the security system 50 along with the location of the victim (or device A 20).
  • the location of the device A 20 may be transmitted in real time, say, in every 30 seconds up to 5 minutes.
  • the security system 50 refers the database module 250 in order to identify the details of any category of subscribers which have to be mandatorily intimated about the distress (or emergency situation) say, family category. Subsequent to the same, the application server 10 immediately transmits the details of the victim, location and the type of distress to the devices B 30 of family category irrespective of their distance from the device A 20.
  • the security system 50 Based upon the location of the victim, the security system 50 establishes a communication with the devices B 30 which are present within a range of 5m to 5 km (depending on user / victim choice) with respect to the device A 20.
  • the distance determination module 220 of the security system 50 identifies and segregates such devices B 30 which are placed in vicinity of the device A 20 (nearby devices B 30). In case, there are no devices B 30 present in the said range, the range may be increased by, for example, 10 km to identify devices B 30 which lie within such range.
  • the security system 50 activates all alert devices 60 present in a distance of 100m from the location of device A 20.
  • the said distance is calculated by the distance determination module 220.
  • the said step may be simultaneously take place with the step 305 or may be preceded/followed by step 305.
  • the security system 50 subsequently transmits a notification to each of the identified devices B 30 via the notification module 230.
  • each of the subscribers are notified about the emergency situation irrespective of their categories.
  • the security system 50 may transmit notifications to defined categories of the subscribers which may either be pre-selected by the victim or selected in real-time.
  • the notification may include the type of danger, urgency thereof, distance of the device A from the device B, etc. However, the notification may not include identity of the victim, location of the victim, etc. Such contents of the notification eliminate the risk of transmitting information of the user to non-genuine subscribers with ill intentions.
  • the acknowledgement module 240 seeks acknowledgement from the notified devices B 30 of the step 309.
  • the acknowledgment corresponds to a confirmation from the subscriber that the subscriber is willing to help the victim.
  • the subscribers may provide their acknowledgement via a user interface provided with the corresponding devices. Alternately, the acknowledgement may be provided by speaking few predefined words on the microphone say, 'Ready to help', or pressing a button, etc.
  • the acknowledgement module 240 does not receive any acknowledgement from any of the notified devices B 30, the device may resend the notification in a predefined time say every 30 seconds till an acknowledgement is received.
  • the geo-location module 210 transmits the location of the victim to the said device(s) B 30.
  • the acknowledgement module 240 receives the acknowledgement from any of the nearby devices B 30, the details of the subscriber(s) who has volunteered to help is saved in the database module 250.
  • Such a provision helps to create an audit trail of such subscribers to recognise, reward and/or seek evidence from and /or eliminate from list of subscribers based on particular subscriber's behaviour at the point of rendering assistance.
  • the device A 20 is notified about the details of the subscriber(s) of the device(s) B 30 who are willing to help and hence, the victim may be rescued from the emergency situation by genuine and authentic subscribers.
  • the above disclosed method of the present invention ensures efficient transmission of the distress signals in real-time so that the victim may be provided with immediate help at the time of emergency situation. Further, the present invention reduces any risk of further mishappenings which may arise due to transmission of distress signals to the subscribers having ill intentions or non-authentic or non-genuine subscribers.
  • Example 1 A victim senses an attack by a group of goons and triggers a distress signal via device A 20. Once the device A 20 establishes a communication with the application server 10, the distress signal is transmitted to the security system 50 along with the location of the device A 20. The security system 50 receives the distress signal as well as the location of the device A and queries the database module 250 in order to identify the details of the subscribers listed in the family category. At the time of receiving the distress signal, the database module 250 of the security system 50 includes the following information:
  • the application server 10 immediately transmits the details of the victim, location and the type of distress to the devices B 30 of family category (Bl, B2, B3) irrespective of their distance from the device A 20 as provided in the database module 250.
  • the security system 50 then identifies nearby devices B 30 which are present in a range of 5 m to 5 km with respect to the device A 20.
  • the security system 50 detects eight nearby devices B BO in total which include two nearby devices B 30 in policemen category (B4, B5), three nearby devices B 30 in doctor category (B6, B7, B8) and the remaining three nearby devices B 30 belonging to security guards (B9, B10, Bll) as provided in table above.
  • the security system 50 transmits a notification to all the eight nearby devices B 30 (irrespective of their categories) seeking an acknowledgement from at least one of the devices B 30 for helping the victim.
  • the notification includes the type of danger i.e. attack by a group of people and the distance between the device A 20 and the respective devices B 30.
  • the application server 10 then receives acknowledgements from three nearby devices B 30 (B4, B6, B9) as shown in Table 1 below. Thereafter, the security system 50 transmits the exact location of the device A 20 and the identity of the victim to the said devices B 30 that have acknowledged to help the victim.
  • Example 2 A victim is attacked by a group of goons and triggers a distress signal via device A 20. Once the device A 20 establishes a communication with the application server 10, the distress signal is transmitted to the security system 50 along with the location of device A 20.
  • the security system 50 receives the distress signal as well as the location of the device A and refers the database module 250 in order to identify the details of subscribers of family category. Subsequent to the same, the security system 50 immediately transmits the details of the victim, location and the type of distress to the devices B 30 of family category (B12, B13) irrespective of their distance from the device A 20.
  • the security system 50 then identifies nearby devices B 30 which are present in a range of 5 m to 5 km with respect to the device A 20.
  • the security system 50 detects five nearby devices B 30 in total which include two nearby devices B 30 (B14, B15) belonging to the category of policemen while three nearby devices B 30 (B16, B17, B18) are of doctors category.
  • the security system 50 transmits a notification to the three nearby devices B 30 of doctor category (B16, B17, B18), seeking an acknowledgement from at least one of the nearby devices B 30 for helping the victim.
  • the notification includes the type of danger i.e. attack by a group of people and the distance between the device A 20 and the respective devices B BO.
  • none of the three devices B 30 sends any acknowledgement as represented in Table 2 below:
  • the range is increased to 10 km and the security system 50 starts to identify the devices B 30 present within the said range.
  • the security system 50 detects the presence of three devices B 30 of doctor category (B19, B20, B21) and hence, the notifications were sent to each of the said devices B 30 (B19, B20, B21) by the security system 50.
  • the application server 10 receives an acknowledgement from one nearby devices B 30 for helping the victim. Subsequently, the security system 50 shares the details of the said nearby devices B 30 with the victim on device A 20.
  • the security system 50 transmits the details of the victim i.e. identity and exact location of the device A 20 to the device B 30 (B20) that has acknowledged to help the victim. The same is tabulated below in Table 3: TABLE 3

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Alarm Systems (AREA)

Abstract

La présente invention concerne un procédé pour transmettre un signal de détresse. Le procédé comprend la réception d'un signal de détresse déclenché par un dispositif A (20) au niveau d'un serveur d'application (10) par un système de sécurité (50) conjointement avec l'emplacement du dispositif A (20). Ensuite, le procédé consiste à identifier au moins un dispositif B (30) présent dans une distance prédéfinie du dispositif A (20) par le système de sécurité (50). Une notification est ensuite transmise à l'au moins un dispositif B (30). La notification comprend le type de détresse et la distance du dispositif A (20) par rapport à l'au moins un dispositif B (30). En outre, un accusé de réception est reçu en provenance de l'au moins un dispositif B (30) au niveau du serveur d'application (10) par le système de sécurité (50). Enfin, l'emplacement du dispositif A (20) est transmis à l'au moins un dispositif B (30).
PCT/IN2020/050818 2019-09-26 2020-09-25 Système de sécurité et procédé de transmission de signal de détresse WO2021059296A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN201911038903 2019-09-26
IN201911038903 2019-09-26

Publications (1)

Publication Number Publication Date
WO2021059296A1 true WO2021059296A1 (fr) 2021-04-01

Family

ID=75165150

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2020/050818 WO2021059296A1 (fr) 2019-09-26 2020-09-25 Système de sécurité et procédé de transmission de signal de détresse

Country Status (1)

Country Link
WO (1) WO2021059296A1 (fr)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140118140A1 (en) * 2012-10-25 2014-05-01 David Amis Methods and systems for requesting the aid of security volunteers using a security network
US20180176362A1 (en) * 2015-01-23 2018-06-21 Smartwatcher Technologies Ag Personal emergency triggering, notification and communication for smartwatches

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140118140A1 (en) * 2012-10-25 2014-05-01 David Amis Methods and systems for requesting the aid of security volunteers using a security network
US20180176362A1 (en) * 2015-01-23 2018-06-21 Smartwatcher Technologies Ag Personal emergency triggering, notification and communication for smartwatches

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
KRISHNA, G . SHRI ET AL.: "Advanced SOS App in Smartphone", JOURNAL OF BASIC AND APPLIED ENGINEERING RESEARCH (JBAER) PRINT, vol. 1, no. 8, 31 October 2014 (2014-10-31), XP055809504, ISSN: 2350-0077, Retrieved from the Internet <URL:https://www.krishisanskriti.org/vol_image/12Jun20150606335.pdf> *

Similar Documents

Publication Publication Date Title
US20200346751A1 (en) Unmanned aerial vehicle emergency dispatch and diagnostics data apparatus, systems and methods
US11032690B2 (en) Disaster event management
US20230036290A1 (en) Apparatus and method for emergency dispatch
US11570607B2 (en) Systems and methods for identifying and activating emergency response assets
US8768294B2 (en) Notification and tracking system for mobile devices
US9769639B2 (en) Secure emergency response technology
US11363409B2 (en) Emergency alert systems with tracked user interactions
US20160050037A1 (en) Emergency alert notification device, system, and method
US9706379B2 (en) Method and system for generation and transmission of alert notifications relating to a crowd gathering
US20140118140A1 (en) Methods and systems for requesting the aid of security volunteers using a security network
US9741234B2 (en) Method and system for broadcasting a panic alert notification
US11908553B2 (en) Apparatus and method for emergency response data acquisition and retrieval
US10446016B2 (en) Advanced mobile emergency communication system
US9779174B2 (en) Framework for anonymous reporting of social incidents
US20160134644A1 (en) Geolocation safety awareness
US20120105203A1 (en) System and method for providing personal alerts
US11749094B2 (en) Apparatus, systems and methods for providing alarm and sensor data to emergency networks
US20150098553A1 (en) System And Method For Providing Alerts
WO2015143077A1 (fr) Dispositif d&#39;alerte sans fil et application mobile pour une communication d&#39;alerte sans fil
US20220377522A1 (en) Emergency data communications for citizen engagement
US10750345B1 (en) Secure emergency response technology
US9165457B1 (en) Devices, systems, and methods for multidimensional telemetry transmission
WO2021059296A1 (fr) Système de sécurité et procédé de transmission de signal de détresse
US20210243583A1 (en) Location based emergency alert
US20210243584A1 (en) Locating method for emergency caller with assistance vectoring

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20870074

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20870074

Country of ref document: EP

Kind code of ref document: A1