WO2024100369A1 - Comprehensive personal safety and therapeutic mobile application - Google Patents
Comprehensive personal safety and therapeutic mobile application Download PDFInfo
- Publication number
- WO2024100369A1 WO2024100369A1 PCT/GB2023/000053 GB2023000053W WO2024100369A1 WO 2024100369 A1 WO2024100369 A1 WO 2024100369A1 GB 2023000053 W GB2023000053 W GB 2023000053W WO 2024100369 A1 WO2024100369 A1 WO 2024100369A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- users
- feature
- access
- application
- Prior art date
Links
- 230000001225 therapeutic effect Effects 0.000 title claims abstract description 14
- 238000004891 communication Methods 0.000 claims abstract description 20
- 230000002996 emotional effect Effects 0.000 claims abstract description 13
- 238000012545 processing Methods 0.000 claims abstract description 8
- 230000036642 wellbeing Effects 0.000 claims abstract description 7
- 238000013459 approach Methods 0.000 claims abstract description 6
- 238000000034 method Methods 0.000 claims description 19
- 230000007613 environmental effect Effects 0.000 claims description 18
- 230000003993 interaction Effects 0.000 claims description 14
- 230000008569 process Effects 0.000 claims description 12
- 230000009471 action Effects 0.000 claims description 11
- 238000001514 detection method Methods 0.000 claims description 11
- 230000010354 integration Effects 0.000 claims description 11
- 238000007726 management method Methods 0.000 claims description 11
- 230000007246 mechanism Effects 0.000 claims description 11
- 238000012544 monitoring process Methods 0.000 claims description 9
- 230000004044 response Effects 0.000 claims description 9
- 230000002708 enhancing effect Effects 0.000 claims description 7
- 230000000704 physical effect Effects 0.000 claims description 6
- 230000033001 locomotion Effects 0.000 claims description 5
- 230000001960 triggered effect Effects 0.000 claims description 5
- 230000000694 effects Effects 0.000 claims description 4
- 238000012795 verification Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 3
- 230000003203 everyday effect Effects 0.000 claims description 2
- 230000006870 function Effects 0.000 claims description 2
- 230000007257 malfunction Effects 0.000 claims description 2
- 230000002265 prevention Effects 0.000 claims description 2
- 230000035945 sensitivity Effects 0.000 claims description 2
- 238000004458 analytical method Methods 0.000 claims 1
- 238000013473 artificial intelligence Methods 0.000 claims 1
- 238000013474 audit trail Methods 0.000 claims 1
- 239000000383 hazardous chemical Substances 0.000 claims 1
- 230000002452 interceptive effect Effects 0.000 claims 1
- 230000000750 progressive effect Effects 0.000 claims 1
- 230000004630 mental health Effects 0.000 description 9
- 239000008186 active pharmaceutical agent Substances 0.000 description 7
- 238000002560 therapeutic procedure Methods 0.000 description 5
- 238000006243 chemical reaction Methods 0.000 description 4
- 230000001953 sensory effect Effects 0.000 description 3
- 208000022120 Jeavons syndrome Diseases 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 231100001261 hazardous Toxicity 0.000 description 2
- 208000021825 aldosterone-producing adrenal cortex adenoma Diseases 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 239000003054 catalyst Substances 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 230000002354 daily effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000008451 emotion Effects 0.000 description 1
- 230000006397 emotional response Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000008921 facial expression Effects 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 230000007935 neutral effect Effects 0.000 description 1
- 230000002250 progressing effect Effects 0.000 description 1
- 238000012502 risk assessment Methods 0.000 description 1
- 230000009295 sperm incapacitation Effects 0.000 description 1
- 208000024891 symptom Diseases 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 239000011800 void material Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
Definitions
- This invention pertains to the field of mobile applications, particularly those emphasizing the integration of various functionalities for personal safety, privacy, emotional wellbeing, and therapeutic communication. It is uniquely designed to cater to individuals seeking digital solutions for safety and privacy in everyday life and those in more critical scenarios such as abusive relationships or mental health challenges.
- the application leverages a cloud-based platform to enhance security and scalability, integrates with social media identity providers for ease of access, and utilizes dedicated storage for message security.
- This invention “Comprehensive Personal Safety and Therapeutic Mobile Application,” is a response to these complex challenges, inspired in part by personal observations and experiences that have highlighted the intricacies and often hidden nature of such situations. It aims to provide a private and secure platform for individuals to manage their mental health and communicate safely, especially for those who are not yet ready to seek professional help.
- SUBSTITUTE SHEET (RULE 26) intensified these issues, with depression rates significantly higher than pre-pandemic levels. In the workplace, the impact is profound, with over half of the employees experiencing symptoms of depression, yet only a small percentage seeking mental health support.
- this application caters to a diverse user base, ranging from victims of subtle forms of abuse to those grappling with mental health challenges like depression. It represents a comprehensive tool for personal safety, emotional processing, and self-help, thereby filling a critical void in the current digital landscape for personal wellbeing.
- the application's foundation is laid on a dedicated and secure cloud infrastructure, ensuring that user privacy and data integrity are paramount.
- Utilizing services such as Azure API Management allows for advanced security and routing functions, ensuring that all user interactions, from profile management to message encryption, are secure and reliable.
- This technological backbone is essential in creating a trustworthy environment, particularly for users navigating the complexities of personal risk and mental health challenges.
- the invention presents a multi-featured mobile application that leverages a secure cloud infrastructure to provide users with tools for safety, privacy, and emotional wellbeing.
- the application integrates with popular social media identity providers for Single Sign-On (SSO), offering ease of access while maintaining stringent security standards.
- SSO Single Sign-On
- a dedicated storage solution ensures the confidentiality of messages, underpinned by rigorous access controls and data sovereignty considerations, with initial implementation in EMEA and expansion plans to other regions.
- Core APIs facilitate a seamless and secure user experience across the application's various features, from secure communication to environmental risk detection, all supported by the robust Microsoft Azure cloud platform.
- the invention provides a multi-faceted mobile application, hosted on a dedicated Microsoft Azure cloud platform tenant, enhancing user experience through advanced Azure API Management for routing and security.
- This robust platform integrates seamlessly with popular social media identity providers for Single Sign-On (SSO), offering users streamlined access while upholding stringent security protocols.
- SSO Single Sign-On
- Azure API Management gateway At the core of the application's architecture is the Azure API Management gateway, which empowers the platform with sophisticated API routing capabilities, bolstered by advanced security options. This gateway ensures that all user interactions, from profile management to message encryption, are conducted in a secure and reliable manner.
- SUBSTITUTE SHEET (RULE 26) User Service Functionality: The Toll user service is a comprehensive feature that addresses all aspects of user engagement with the platform. It manages profile information, preferences, and contact lists, and monitors user activities, providing a tailored experience for each individual.
- the message service and metadata datastore are integral components that provide basic message handling capabilities. They are responsible for tracking messages, their recipients, and managing the release dates, ensuring a seamless communication flow within the application.
- Analytics and API Services Enhancing the application's functionality are the analytics and various API services.
- the analytics service offers insightful message and user analytics, crucial for personalizing the user experience.
- the sensor API service leverages the smartphone's hardware to enhance user interaction, while the location API service processes geolocation events, contributing to the platform's safety features.
- a dedicated S3 storage solution ensures the secure storage of messages, with initial implementation in the EMEA region. Access to these storage accounts is tightly controlled, reflecting the application's commitment to data integrity and sovereignty, with plans to expand to the Americas and APAC regions.
- the application embodies a secure, user-centric environment supported by a reliable cloud infrastructure. Its comprehensive set of features are designed to cater to the modern user's need for privacy, safety, and emotional well-being.
- the Secure Communication Feature of the application is designed to provide users with a private and secure platform for sending and storing personal notes and messages. This feature is particularly tailored to meet the needs of individuals who require confidential communication with loved ones or entities like charities, legal advisors, and law enforcement agencies.
- the app's secure messaging system is underpinned by a dedicated S3 storage location, ensuring encrypted and safe storage of messages.
- the API management system routes messages securely, protecting the integrity of user data.
- the app allows users to specify recipients for these messages, which can include family members, friends, or other trusted individuals.
- SUBSTITUTE SHEET (RULE 26) Messages can be scheduled to be sent at a future date or triggered by specific events, offering users the flexibility to communicate their thoughts and feelings at appropriate times.
- the app includes a 'vault' feature where users can securely store sensitive information, documents, or messages.
- This vault is protected by advanced encryption and can only be accessed by the user or designated individuals under predefined conditions.
- the stored data in the vault remains inaccessible to others, including the app developers, ensuring complete privacy.
- the application includes a time-marking feature, allowing users to mark specific points in time using a dedicated button within the app interface. This functionality is particularly useful for organising messages or notes chronologically, highlighting significant moments, or setting up reminders for future reference.
- Time-marking feature Users can activate the time-marking feature by pressing a button when composing or viewing messages and notes. This action timestamps the message or note with the current date and time, making it easy to locate or reference in the future.
- the time-marking feature serves multiple purposes, including helping users organise their data more effectively, flagging important messages for easy retrieval, and aiding in setting conditions for data release in the vault feature.
- users can use this feature to mark important life events or moments of significance, which can then be used as triggers for releasing messages from the vault or as reminders for future actions.
- This feature is seamlessly integrated into the application, ensuring that it complements the existing secure communication and data viewing functionalities.
- the time-marking functionality adheres to strict privacy and security protocols, ensuring that all timestamps and associated data remain confidential and secure.
- a unique aspect of this feature is the ability to establish two-way communication channels with charities, legal advisors, and police.
- This functionality is vital for users in sensitive situations, such as those dealing with domestic abuse, legal disputes, or needing immediate assistance from law enforcement.
- the user interface is designed to be intuitive and user-friendly, allowing easy navigation and operation of the communication features.
- Accessibility options are available to cater to users with different abilities, ensuring that the app is inclusive and usable by a broad audience.
- Users can access the platform through a web application or native mobile application, both designed for a full range of functionalities and supported by a dedicated Microsoft Azure cloud platform tenant.
- the application adheres to strict privacy policies and data protection protocols. User data is handled with the utmost confidentiality and in compliance with relevant privacy laws.
- the Secure Communication Feature of the application is a comprehensive solution for private and secure communication tailored to the needs of individuals seeking a reliable platform for sensitive conversations and data storage.
- This feature integrates advanced security measures with user-friendly functionalities, making it an indispensable tool for personal safety and privacy.
- This section of the patent describes the application’s functionality related to the viewing and release of stored data, including personal notes, messages in the vault, and messages designated for loved ones.
- the focus is on balancing ease of access for authorised users while maintaining stringent security measures to protect sensitive information.
- the application is designed to provide straightforward access to previously stored data for authorised users. This includes personal notes, messages, and any other stored documents.
- Access to this data is protected by multi-factor authentication methods, ensuring that only the user or individuals with granted permissions can view it.
- certain sensitive data may require more rigorous authentication processes, which may include biometric verification or security questions.
- the application also includes a user-friendly search and filter system, allowing users to quickly and easily locate specific messages or notes based on various parameters such as date, recipient, or keywords.
- the application’s vault feature allows users to set specific conditions under which the stored data will be released or made accessible to designated individuals.
- Conditions for release can include specific dates, events (e.g., the user's incapacitation or death), or trigger-based scenarios (e.g., failure to respond within a set period).
- users can schedule the release for significant future dates (e.g., a child's 18th birthday, anniversaries) or contingent upon specific life events.
- the application ensures that these conditions are securely encrypted and cannot be altered once set, except by the original user, under authenticated conditions.
- the application can facilitate expedited data release to law enforcement or legal representatives, provided the requisite legal processes and verifications are followed.
- the application incorporates advanced encryption and security protocols to safeguard the data during storage and upon release.
- SUBSTITUTE SHEET (RULE 26) Privacy is a paramount concern; as such, the application is designed to minimise data exposure and ensure that only intended recipients gain access to released data.
- the Data Viewing and Release feature of the application strikes a balance between user accessibility and stringent security. It provides a secure and user-friendly platform for storing and managing sensitive data, with customisable release conditions to cater to the diverse needs and preferences of the users.
- the application's robust security measures ensure that personal data, whether stored in the vault or intended for loved ones, remains protected and private until the specified conditions for release are met.
- the Therapy Feature of the application is a unique and innovative aspect that enables users to gain a detached perspective on their personal issues. This is achieved through a process of story reframing, where users interact with a cyber friend - an Al-generated character - who narrates the user's experiences back to them. This method is designed to offer users new insights and understanding of their situations.
- the recording process itself is therapeutic, as it encourages users to articulate and externalise their thoughts and emotions.
- the Al in the app then generates this cyber friend, complete with a unique voice and visual representation, ensuring that the character feels like a separate entity.
- users can interact with their cyber friend, who recounts the user's own experiences as if they were their own.
- the therapy feature is designed with utmost privacy in mind. All interactions are encrypted, and the generated cyber friend exists only within the user's account.
- the app provides users with access to additional support resources. This may include links to counseling services, legal advice, or emergency support, depending on the nature of the user's experiences.
- the Therapy Feature of the application represents a novel approach to personal therapy, leveraging technology to provide users with a unique tool for selfreflection and emotional processing. This feature empowers users to gain new perspectives on their personal challenges in a safe, private, and controlled environment, potentially guiding them towards meaningful personal development and external support.
- the Location Safety Feature of the application is a sophisticated functionality designed to enhance user privacy and security by leveraging location-based access controls. This feature allows users to set designated 'safe locations' where they can access their private data, ensuring that sensitive information is only available in secure environments.
- Users can define specific geographical locations as 'safe' within the app. These locations are places where the user feels secure and unobserved, such as a personal residence, a trusted friend's house, or a public space deemed safe.
- the app utilises GPS and other location services to accurately identify these designated areas.
- Access to certain sensitive features of the app is restricted to when the user is within one of their predefined safe locations.
- the app When the user attempts to access these features outside of a safe location, the app will either deny access or provide limited functionality based on the user's settings.
- This feature is integrated with advanced encryption and security protocols to ensure that the user's location data and the conditions of access are protected.
- the app does not store location history, ensuring user privacy and adhering to data protection standards.
- the app also allows for temporary adjustments to safe locations, accommodating situations like travel or temporary stays at different places.
- the app In case of emergencies or unforeseen circumstances where the user needs to access their data outside of a safe location, the app includes emergency access options. These options might require additional verification steps to ensure the user's safety and security.
- the feature is designed to provide a seamless and intuitive user experience.
- the app ensures that transitions between safe and non-safe locations are smooth and do not hinder the overall functionality of the app for the user.
- the Location Safety Feature of the application offers a powerful tool for enhancing privacy and security, particularly for users who require strict control over where and when they can access their sensitive data. This feature adds an additional layer of protection, ensuring that private information is only accessible in environments where the user feels safe and secure.
- the Phone Sense Feature of the application utilises the advanced sensory capabilities of modern smartphones to detect environmental risks and alert users to
- SUBSTITUTE SHEET (RULE 26) potential dangers. This feature is particularly designed to enhance personal safety by actively monitoring surroundings and providing timely notifications.
- the app leverages various built-in sensors of the smartphone, such as sound, light, motion, pressure, temperature, touch, location, magnetic fields, and proximity sensors.
- the app When the app detects unusual activity or environmental changes that deviate from the norm, it triggers an alert to the user. For instance, if it detects motion or sound levels that are irregular for the time and location, it will notify the user.
- the type of alert can vary based on user preferences and the nature of the detected risk. Alerts can range from subtle notifications to more urgent warnings.
- the app can 'learn' from user feedback and environmental patterns to reduce false alarms and enhance accuracy in risk detection.
- the app can facilitate quick access to emergency contacts or services. This might include direct communication with local law enforcement or emergency responders.
- the app can also provide real-time location data to emergency services if the user consents, enabling faster and more effective responses.
- the app is optimised for efficient battery usage and resource management, ensuring that continuous monitoring does not significantly impact the phone's performance.
- the Phone Sense Feature provides a sophisticated and proactive approach to personal safety.
- the smartphone's sensory capabilities it offers users a dynamic and intelligent system for environmental monitoring, risk detection, and timely alerts, enhancing their ability to respond to potential threats effectively.
- the Risk Alert Feature of the application is a critical component designed to enhance the personal safety of users by enabling them to proactively set alerts for potentially hazardous situations. This feature is particularly crucial for individuals who may find themselves in scenarios where there is a heightened risk of danger.
- the app allows users to specify the nature of the risk and the expected duration of the situation. For example, a user might set an alert for the time they anticipate walking home from work late at night.
- the app monitors the duration of the situation as specified by the user. If the user does not check-in or disable the alert after the predetermined time, the app initiates an emergency protocol.
- the emergency protocol involves escalating notifications to the user, starting with reminders and progressing to more urgent alerts if there is no response.
- the app automatically notifies designated emergency contacts or the police.
- the notification includes relevant information such as the user's location, the nature of the risk alert set, and any additional information the user has entered.
- Users can manage and update their list of emergency contacts within the app. They can specify which contacts should be notified in different types of scenarios.
- the app also provides an option for users to directly contact emergency services if they find themselves in immediate danger.
- SUBSTITUTE SHEET (RULE 26) The app incorporates features to minimise false alarms. Users have the option to cancel or update the risk alert if the situation changes or the risk subsides.
- All user data and settings related to risk alerts are securely stored and encrypted.
- the user's location and personal information are only shared with emergency contacts or authorities if an alert is activated.
- the app prioritises user privacy, ensuring that sensitive information is only used in the context of the risk alert and emergency response.
- the Risk Alert Feature is an essential safety tool within the application, empowering users to take proactive measures in managing their personal safety. It provides a customisable, user-driven approach to risk assessment and emergency notification, enhancing the user's ability to navigate potentially hazardous situations with an added layer of security.
- Secure Pose Feature Illustrate the innovative security measure where the user must perform a specific action to access or hide sensitive data, especially useful in abusive relationships.
- the Secure Pose Feature of the application is a novel security measure requiring users to maintain an unnatural and specific physical action to access or conceal sensitive data. This feature is particularly valuable in contexts such as abusive relationships, where maintaining the confidentiality of personal information is crucial, and the ability to quickly hide that information can be vital.
- This pose is intentionally chosen to be non-instinctive so that in a normal, relaxed state, the user can maintain it to access sensitive data, but in a startled or stressed state, their natural reaction would be to abandon the pose.
- the application employs advanced machine learning algorithms to learn and recognise the user-defined pose through the phone’s camera.
- This learning process ensures that the app responds accurately to the specific pose, enhancing security and user experience.
- the app automatically hides the sensitive data, switching to a neutral or decoy screen. This reaction is crucial for situations where an immediate response is required to maintain privacy.
- the app can recognise an alternative emergency action. Performing this action discreetly disables access to sensitive features or the entire app, which can be explained as a malfunction to an abuser.
- the Secure Pose Feature necessitates continuous but discreet monitoring by the phone’s camera. This monitoring respects user privacy, as no images or videos are recorded or stored.
- the feature is specifically designed for scenarios where quick and discreet control over personal data is essential, such as in abusive relationships or other high-risk environments.
- the Secure Pose Feature provides a unique and effective method for protecting personal data, specifically engineered for situations where conventional security measures might be compromised. Its design caters to instinctive human reactions in stressful situations, thus adding an extra layer of security and privacy for the user.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This mobile application is an innovative solution designed to address the growing need for personal safety, privacy, and emotional support in the digital age. Combining features like secure messaging, risk alerts, therapeutic tools, and privacy safeguards, it offers a comprehensive approach to managing personal well-being. Tailored for a wide range of users, from those in vulnerable situations to individuals seeking a private space for emotional processing, this application stands as a pivotal tool in modern personal security and therapeutic communication.
Description
Title of the Invention
"Comprehensive Personal Safety and Therapeutic Mobile Application"
Field of the Invention
This invention pertains to the field of mobile applications, particularly those emphasizing the integration of various functionalities for personal safety, privacy, emotional wellbeing, and therapeutic communication. It is uniquely designed to cater to individuals seeking digital solutions for safety and privacy in everyday life and those in more critical scenarios such as abusive relationships or mental health challenges. The application leverages a cloud-based platform to enhance security and scalability, integrates with social media identity providers for ease of access, and utilizes dedicated storage for message security.
*See Figures 1 to 4
Background of the Invention
In recent years, the escalating need for innovative digital solutions in the realms of personal safety, privacy, and emotional support has become increasingly evident. This need largely arises from the growing prevalence of challenging personal circumstances, including abusive relationships and widespread mental health issues, notably depression and related conditions.
Traditional approaches to personal safety and mental health support, while valuable, often fall short in offering discreet, accessible, and holistic solutions. This gap is particularly evident in situations of covert abuse, such as coercive control, where individuals may not immediately recognize the abusive nature of their circumstances. The path to recognition and seeking help can be protracted and convoluted, often requiring more subtle and ongoing forms of support than those offered by conventional domestic abuse systems.
This invention, "Comprehensive Personal Safety and Therapeutic Mobile Application," is a response to these complex challenges, inspired in part by personal observations and experiences that have highlighted the intricacies and often hidden nature of such situations. It aims to provide a private and secure platform for individuals to manage their mental health and communicate safely, especially for those who are not yet ready to seek professional help.
The pervasive issue of mental health, particularly depression, adds another layer to these challenges. In the UK, about 1 in 6 adults struggle with depression, with a marked disparity in treatment seeking between genders. The pandemic has i
SUBSTITUTE SHEET (RULE 26)
intensified these issues, with depression rates significantly higher than pre-pandemic levels. In the workplace, the impact is profound, with over half of the employees experiencing symptoms of depression, yet only a small percentage seeking mental health support.
By integrating features for secure communication, environmental risk detection, and Al-driven therapeutic interaction, this application caters to a diverse user base, ranging from victims of subtle forms of abuse to those grappling with mental health challenges like depression. It represents a comprehensive tool for personal safety, emotional processing, and self-help, thereby filling a critical void in the current digital landscape for personal wellbeing.
The application's foundation is laid on a dedicated and secure cloud infrastructure, ensuring that user privacy and data integrity are paramount. Utilizing services such as Azure API Management allows for advanced security and routing functions, ensuring that all user interactions, from profile management to message encryption, are secure and reliable. This technological backbone is essential in creating a trustworthy environment, particularly for users navigating the complexities of personal risk and mental health challenges.
Summary of the Invention
The invention presents a multi-featured mobile application that leverages a secure cloud infrastructure to provide users with tools for safety, privacy, and emotional wellbeing. The application integrates with popular social media identity providers for Single Sign-On (SSO), offering ease of access while maintaining stringent security standards. A dedicated storage solution ensures the confidentiality of messages, underpinned by rigorous access controls and data sovereignty considerations, with initial implementation in EMEA and expansion plans to other regions. Core APIs facilitate a seamless and secure user experience across the application's various features, from secure communication to environmental risk detection, all supported by the robust Microsoft Azure cloud platform.
Detailed Description of the Invention
The invention provides a multi-faceted mobile application, hosted on a dedicated Microsoft Azure cloud platform tenant, enhancing user experience through advanced Azure API Management for routing and security. This robust platform integrates seamlessly with popular social media identity providers for Single Sign-On (SSO), offering users streamlined access while upholding stringent security protocols.
*See Figure 4
Azure API Management: At the core of the application's architecture is the Azure API Management gateway, which empowers the platform with sophisticated API routing capabilities, bolstered by advanced security options. This gateway ensures that all user interactions, from profile management to message encryption, are conducted in a secure and reliable manner.
2
SUBSTITUTE SHEET (RULE 26)
User Service Functionality: The Toll user service is a comprehensive feature that addresses all aspects of user engagement with the platform. It manages profile information, preferences, and contact lists, and monitors user activities, providing a tailored experience for each individual.
Message Service and Metadata Datastore: The message service and metadata datastore are integral components that provide basic message handling capabilities. They are responsible for tracking messages, their recipients, and managing the release dates, ensuring a seamless communication flow within the application.
Analytics and API Services: Enhancing the application's functionality are the analytics and various API services. The analytics service offers insightful message and user analytics, crucial for personalizing the user experience. The sensor API service leverages the smartphone's hardware to enhance user interaction, while the location API service processes geolocation events, contributing to the platform's safety features.
Data Storage and Security: A dedicated S3 storage solution ensures the secure storage of messages, with initial implementation in the EMEA region. Access to these storage accounts is tightly controlled, reflecting the application's commitment to data integrity and sovereignty, with plans to expand to the Americas and APAC regions.
In summary, the application embodies a secure, user-centric environment supported by a reliable cloud infrastructure. Its comprehensive set of features are designed to cater to the modern user's need for privacy, safety, and emotional well-being.
Secure Communication Feature
*See Figures 1 to 4
The Secure Communication Feature of the application is designed to provide users with a private and secure platform for sending and storing personal notes and messages. This feature is particularly tailored to meet the needs of individuals who require confidential communication with loved ones or entities like charities, legal advisors, and law enforcement agencies. The app's secure messaging system is underpinned by a dedicated S3 storage location, ensuring encrypted and safe storage of messages. The API management system routes messages securely, protecting the integrity of user data.
Personal Notes and Messages:
Users can compose and send personal notes and messages directly from the app. These messages are encrypted to ensure privacy and security.
The app allows users to specify recipients for these messages, which can include family members, friends, or other trusted individuals.
3
SUBSTITUTE SHEET (RULE 26)
Messages can be scheduled to be sent at a future date or triggered by specific events, offering users the flexibility to communicate their thoughts and feelings at appropriate times.
Vault for Secure Storage:
The app includes a 'vault' feature where users can securely store sensitive information, documents, or messages.
This vault is protected by advanced encryption and can only be accessed by the user or designated individuals under predefined conditions.
The stored data in the vault remains inaccessible to others, including the app developers, ensuring complete privacy.
Time-Marking Feature
*See Figure 5
Integration with Secure Communication and Data Release:
Functionality:
The application includes a time-marking feature, allowing users to mark specific points in time using a dedicated button within the app interface. This functionality is particularly useful for organising messages or notes chronologically, highlighting significant moments, or setting up reminders for future reference.
User Interaction:
Users can activate the time-marking feature by pressing a button when composing or viewing messages and notes. This action timestamps the message or note with the current date and time, making it easy to locate or reference in the future.
Purpose and Utility:
The time-marking feature serves multiple purposes, including helping users organise their data more effectively, flagging important messages for easy retrieval, and aiding in setting conditions for data release in the vault feature.
For instance, users can use this feature to mark important life events or moments of significance, which can then be used as triggers for releasing messages from the vault or as reminders for future actions.
Integration with Application's Overall Functionality:
Seamless Integration:
This feature is seamlessly integrated into the application, ensuring that it complements the existing secure communication and data viewing functionalities.
It enhances the user's ability to manage their data within the app effectively, adding an extra layer of personalisation and utility.
4
SUBSTITUTE SHEET (RULE 26)
Privacy and Security:
As with all features of the application, the time-marking functionality adheres to strict privacy and security protocols, ensuring that all timestamps and associated data remain confidential and secure.
Two-Way Contact with Charities, Lawyers, and Police:
A unique aspect of this feature is the ability to establish two-way communication channels with charities, legal advisors, and police.
Users can discreetly seek advice, report incidents, or request assistance directly through the app.
This functionality is vital for users in sensitive situations, such as those dealing with domestic abuse, legal disputes, or needing immediate assistance from law enforcement.
User Interface and Accessibility:
The user interface is designed to be intuitive and user-friendly, allowing easy navigation and operation of the communication features.
Accessibility options are available to cater to users with different abilities, ensuring that the app is inclusive and usable by a broad audience.
Users can access the platform through a web application or native mobile application, both designed for a full range of functionalities and supported by a dedicated Microsoft Azure cloud platform tenant.
Privacy and Data Protection:
The application adheres to strict privacy policies and data protection protocols. User data is handled with the utmost confidentiality and in compliance with relevant privacy laws.
Regular updates and security audits are performed to maintain the highest level of data security and to protect against potential cyber threats.
In summary, the Secure Communication Feature of the application is a comprehensive solution for private and secure communication tailored to the needs of individuals seeking a reliable platform for sensitive conversations and data storage. This feature integrates advanced security measures with user-friendly functionalities, making it an indispensable tool for personal safety and privacy.
5
SUBSTITUTE SHEET (RULE 26)
Data Viewing and Release
*See Figures 1 to 4
This section of the patent describes the application’s functionality related to the viewing and release of stored data, including personal notes, messages in the vault, and messages designated for loved ones. The focus is on balancing ease of access for authorised users while maintaining stringent security measures to protect sensitive information.
Viewing Old Data:
The application is designed to provide straightforward access to previously stored data for authorised users. This includes personal notes, messages, and any other stored documents.
Access to this data is protected by multi-factor authentication methods, ensuring that only the user or individuals with granted permissions can view it.
For additional security, certain sensitive data may require more rigorous authentication processes, which may include biometric verification or security questions.
The application also includes a user-friendly search and filter system, allowing users to quickly and easily locate specific messages or notes based on various parameters such as date, recipient, or keywords.
Release Conditions for Vault and Loved Ones' Messages:
The application’s vault feature allows users to set specific conditions under which the stored data will be released or made accessible to designated individuals.
Conditions for release can include specific dates, events (e.g., the user's incapacitation or death), or trigger-based scenarios (e.g., failure to respond within a set period).
For messages intended for loved ones, users can schedule the release for significant future dates (e.g., a child's 18th birthday, anniversaries) or contingent upon specific life events.
The application ensures that these conditions are securely encrypted and cannot be altered once set, except by the original user, under authenticated conditions.
In scenarios involving legal or emergency situations, the application can facilitate expedited data release to law enforcement or legal representatives, provided the requisite legal processes and verifications are followed.
Security and Privacy in Data Release:
The application incorporates advanced encryption and security protocols to safeguard the data during storage and upon release.
6
SUBSTITUTE SHEET (RULE 26)
Privacy is a paramount concern; as such, the application is designed to minimise data exposure and ensure that only intended recipients gain access to released data.
Regular updates and security patches are implemented to address any emerging vulnerabilities, ensuring the integrity and confidentiality of the stored data.
In conclusion, the Data Viewing and Release feature of the application strikes a balance between user accessibility and stringent security. It provides a secure and user-friendly platform for storing and managing sensitive data, with customisable release conditions to cater to the diverse needs and preferences of the users. The application's robust security measures ensure that personal data, whether stored in the vault or intended for loved ones, remains protected and private until the specified conditions for release are met.
Therapy Feature
*See Figure 6
The Therapy Feature of the application is a unique and innovative aspect that enables users to gain a detached perspective on their personal issues. This is achieved through a process of story reframing, where users interact with a cyber friend - an Al-generated character - who narrates the user's experiences back to them. This method is designed to offer users new insights and understanding of their situations.
Story Recording and Reframing:
Users begin by recording their stories, incidents, and feelings via the app. This can be done over time, allowing for a comprehensive narrative of their experiences.
The recording process itself is therapeutic, as it encourages users to articulate and externalise their thoughts and emotions.
Cyber Friend Creation:
After recording their stories, users are prompted to create their 'cyber friend.' This involves selecting from various characteristics to form a persona that is relatable yet distinctly different from themselves.
The Al in the app then generates this cyber friend, complete with a unique voice and visual representation, ensuring that the character feels like a separate entity.
Narrative Playback:
At a time of their choosing, users can interact with their cyber friend, who recounts the user's own experiences as if they were their own.
Hearing one's personal story from an external perspective allows users to detach from their emotional biases and view their situations more objectively.
7
SUBSTITUTE SHEET (RULE 26)
Emotional Impact and Realisation:
This process often leads to profound emotional responses, as users may recognise the severity or reality of their situations more clearly when presented by someone else.
It can be a catalyst for users to seek further help or make significant life changes, especially in recognising and addressing situations like abuse or mental health struggles.
Privacy and Control:
The therapy feature is designed with utmost privacy in mind. All interactions are encrypted, and the generated cyber friend exists only within the user's account.
Users have complete control over when and how they engage with this feature, ensuring a safe and private environment for personal exploration and growth.
Support and Resources:
Following the interaction with the cyber friend, the app provides users with access to additional support resources. This may include links to counselling services, legal advice, or emergency support, depending on the nature of the user's experiences.
In summary, the Therapy Feature of the application represents a novel approach to personal therapy, leveraging technology to provide users with a unique tool for selfreflection and emotional processing. This feature empowers users to gain new perspectives on their personal challenges in a safe, private, and controlled environment, potentially guiding them towards meaningful personal development and external support.
Location Safety Feature
*See Figure 7
The Location Safety Feature of the application is a sophisticated functionality designed to enhance user privacy and security by leveraging location-based access controls. This feature allows users to set designated 'safe locations' where they can access their private data, ensuring that sensitive information is only available in secure environments.
Setting Safe Locations:
Users can define specific geographical locations as 'safe' within the app. These locations are places where the user feels secure and unobserved, such as a personal residence, a trusted friend's house, or a public space deemed safe.
The app utilises GPS and other location services to accurately identify these designated areas.
8
SUBSTITUTE SHEET (RULE 26)
Access Control Based on Location:
Access to certain sensitive features of the app, like viewing stored personal messages or accessing the vault, is restricted to when the user is within one of their predefined safe locations.
When the user attempts to access these features outside of a safe location, the app will either deny access or provide limited functionality based on the user's settings.
Privacy and Security Protocols:
This feature is integrated with advanced encryption and security protocols to ensure that the user's location data and the conditions of access are protected.
The app does not store location history, ensuring user privacy and adhering to data protection standards.
User Customization and Flexibility:
Users have the flexibility to add, remove, or modify their safe locations as their situations or preferences change.
The app also allows for temporary adjustments to safe locations, accommodating situations like travel or temporary stays at different places.
Emergency Access Options:
In case of emergencies or unforeseen circumstances where the user needs to access their data outside of a safe location, the app includes emergency access options. These options might require additional verification steps to ensure the user's safety and security.
Seamless User Experience:
While prioritising security, the feature is designed to provide a seamless and intuitive user experience. The app ensures that transitions between safe and non-safe locations are smooth and do not hinder the overall functionality of the app for the user.
In summary, the Location Safety Feature of the application offers a powerful tool for enhancing privacy and security, particularly for users who require strict control over where and when they can access their sensitive data. This feature adds an additional layer of protection, ensuring that private information is only accessible in environments where the user feels safe and secure.
Phone Sense Feature
*See Figure 8
The Phone Sense Feature of the application utilises the advanced sensory capabilities of modern smartphones to detect environmental risks and alert users to
9
SUBSTITUTE SHEET (RULE 26)
potential dangers. This feature is particularly designed to enhance personal safety by actively monitoring surroundings and providing timely notifications.
Integration with Phone Sensors:
The app leverages various built-in sensors of the smartphone, such as sound, light, motion, pressure, temperature, touch, location, magnetic fields, and proximity sensors.
These sensors work collectively to monitor environmental conditions and detect any anomalies or changes that could indicate potential risks or threats.
Alert Mechanism:
When the app detects unusual activity or environmental changes that deviate from the norm, it triggers an alert to the user. For instance, if it detects motion or sound levels that are irregular for the time and location, it will notify the user.
The type of alert can vary based on user preferences and the nature of the detected risk. Alerts can range from subtle notifications to more urgent warnings.
User Customization and Learning:
Users can customise sensitivity settings and define what types of changes or levels should trigger an alert. This customisation allows the app to be tailored to individual needs and environments.
Over time, the app can 'learn' from user feedback and environmental patterns to reduce false alarms and enhance accuracy in risk detection.
Emergency Response Integration:
In situations where a significant risk is detected, the app can facilitate quick access to emergency contacts or services. This might include direct communication with local law enforcement or emergency responders.
The app can also provide real-time location data to emergency services if the user consents, enabling faster and more effective responses.
Privacy and Data Security:
While the app utilises various sensors, it is designed with a strong emphasis on privacy and data security. Sensory data used for risk detection is processed locally on the device, and any data transmission is encrypted.
Users have control over which sensors are active and can adjust settings to balance privacy concerns with safety features.
Battery and Resource Management:
The app is optimised for efficient battery usage and resource management, ensuring that continuous monitoring does not significantly impact the phone's performance.
Users are provided with options to adjust the frequency and intensity of monitoring based on their current battery levels and usage patterns.
10
SUBSTITUTE SHEET (RULE 26)
In summary, the Phone Sense Feature provides a sophisticated and proactive approach to personal safety. Utilising the smartphone's sensory capabilities, it offers users a dynamic and intelligent system for environmental monitoring, risk detection, and timely alerts, enhancing their ability to respond to potential threats effectively.
Risk Alert Feature
*See Figure 9
The Risk Alert Feature of the application is a critical component designed to enhance the personal safety of users by enabling them to proactively set alerts for potentially hazardous situations. This feature is particularly crucial for individuals who may find themselves in scenarios where there is a heightened risk of danger.
Setting Up Risk Alerts:
Users can set up risk alerts by identifying scenarios or conditions they perceive as potentially dangerous. This could include walking alone at night, meeting with someone they don't trust, or entering an unfamiliar area.
The app allows users to specify the nature of the risk and the expected duration of the situation. For example, a user might set an alert for the time they anticipate walking home from work late at night.
Customizable Alert Mechanism:
Once a risk alert is set, the app monitors the duration of the situation as specified by the user. If the user does not check-in or disable the alert after the predetermined time, the app initiates an emergency protocol.
The emergency protocol involves escalating notifications to the user, starting with reminders and progressing to more urgent alerts if there is no response.
Notification of Emergency Contacts or Police:
If the user fails to respond within a set time frame after the alert is triggered, the app automatically notifies designated emergency contacts or the police.
The notification includes relevant information such as the user's location, the nature of the risk alert set, and any additional information the user has entered.
Emergency Contact Management:
Users can manage and update their list of emergency contacts within the app. They can specify which contacts should be notified in different types of scenarios.
The app also provides an option for users to directly contact emergency services if they find themselves in immediate danger.
User Discretion and False Alarm Prevention:
11
SUBSTITUTE SHEET (RULE 26)
The app incorporates features to minimise false alarms. Users have the option to cancel or update the risk alert if the situation changes or the risk subsides.
In cases where an alert is triggered but no actual danger is present, the user can quickly inform their emergency contacts or the police to prevent unnecessary response.
Privacy and Security:
All user data and settings related to risk alerts are securely stored and encrypted. The user's location and personal information are only shared with emergency contacts or authorities if an alert is activated.
The app prioritises user privacy, ensuring that sensitive information is only used in the context of the risk alert and emergency response.
In summary, the Risk Alert Feature is an essential safety tool within the application, empowering users to take proactive measures in managing their personal safety. It provides a customisable, user-driven approach to risk assessment and emergency notification, enhancing the user's ability to navigate potentially hazardous situations with an added layer of security. Secure Pose Feature: Illustrate the innovative security measure where the user must perform a specific action to access or hide sensitive data, especially useful in abusive relationships.
Secure Pose Feature
*See Figures 10 to 13
The Secure Pose Feature of the application is a novel security measure requiring users to maintain an unnatural and specific physical action to access or conceal sensitive data. This feature is particularly valuable in contexts such as abusive relationships, where maintaining the confidentiality of personal information is crucial, and the ability to quickly hide that information can be vital.
Unnatural Action for Access Control:
Users set an unnatural or unique pose that is unlikely to be used in daily activities, such as an unusual hand position or a specific facial expression.
This pose is intentionally chosen to be non-instinctive so that in a normal, relaxed state, the user can maintain it to access sensitive data, but in a startled or stressed state, their natural reaction would be to abandon the pose.
Learning and Recognition Process:
The application employs advanced machine learning algorithms to learn and recognise the user-defined pose through the phone’s camera.
This learning process ensures that the app responds accurately to the specific pose, enhancing security and user experience.
12
SUBSTITUTE SHEET (RULE 26)
Mechanism for Hiding Data:
When the user is in a normal state, they can maintain the pose to view their sensitive data. However, if the user is startled, surprised, or in any way distressed, their instinctive reaction will likely be to drop the pose.
As soon as the pose is abandoned, the app automatically hides the sensitive data, switching to a neutral or decoy screen. This reaction is crucial for situations where an immediate response is required to maintain privacy.
Emergency Disabling Feature:
In addition to the primary secure pose, the app can recognise an alternative emergency action. Performing this action discreetly disables access to sensitive features or the entire app, which can be explained as a malfunction to an abuser.
Privacy and Continuous Monitoring:
The Secure Pose Feature necessitates continuous but discreet monitoring by the phone’s camera. This monitoring respects user privacy, as no images or videos are recorded or stored.
Adaptability in High-Risk Situations:
The feature is specifically designed for scenarios where quick and discreet control over personal data is essential, such as in abusive relationships or other high-risk environments.
In essence, the Secure Pose Feature provides a unique and effective method for protecting personal data, specifically engineered for situations where conventional security measures might be compromised. Its design caters to instinctive human reactions in stressful situations, thus adding an extra layer of security and privacy for the user.
SUBSTITUTE SHEET (RULE 26)
Claims
1. A method for secure communication in a mobile application comprising: a) A messaging module that enables users to compose, send, and receive encrypted personal notes and messages within the mobile application environment. b) An encryption mechanism that encrypts the contents of messages and notes, ensuring that they are readable only by the intended recipient(s) and remain confidential during transmission and storage. c) A scheduling feature that allows users to set specific future dates or events as conditions for the automated release or sending of the stored messages and notes. d) A storage module, referred to as a 'vault', for securely storing personal notes and messages, wherein the stored data is encrypted and accessible only under predefined user-specified conditions. e) A customisable setting within the mobile application that permits users to define and modify the conditions for the release of messages, such as specific dates, occurrences of particular events, or other user-defined triggers. f) An interface that allows users to easily interact with and manage their encrypted messages and notes, including functionalities for composing, scheduling, storing, and setting conditions for release.
2. The method of claim 1, wherein the encryption mechanism includes: a) End-to-end encryption protocols to ensure that messages are encrypted on the sender's device and decrypted only on the recipient's device. b) Secure encryption algorithms compliant with industry standards for data protection and privacy.
3. The method of claim 1, wherein the scheduling feature further includes: a) A user-friendly interface for selecting dates from a calendar view and inputting event-based conditions. b) Options for recurring events or dates for repeated message release.
4. The method of claim 1, wherein the vault feature further includes: a) Multi-factor authentication processes for accessing the vault, including options for biometric verification. b) Capabilities for organising stored messages and notes categorically or based on user-defined parameters.
SUBSTITUTE SHEET (RULE 26)
Claim 2: Vault Feature with Conditional Access
1. A digital vault feature within a mobile application comprising: a) A secure storage module designed for the encrypted storage of sensitive user data, including but not limited to personal notes, messages, documents, and multimedia files. b) An access control system that restricts entry to the vault based on predefined conditions set by the user.
2. The digital vault feature of claim 1, wherein the predefined conditions for access include: a) Time-based triggers, allowing the vault to be accessible only during specific times or dates as determined by the user. b) Event-based triggers, enabling the vault to become accessible when certain user- defined events occur.
3. The digital vault feature of claim 1, wherein the secure storage module includes: a) Encryption protocols that secure the contents of the vault, ensuring data confidentiality and protection against unauthorised access. b) A user interface that allows users to easily add, remove, or view contents within the vault and set or modify access conditions.
4. The digital vault feature of claim 1 , further comprising: a) A mechanism to automatically lock the vault and re-encrypt its contents when access conditions are not met or when a potential security breach is detected. b) An audit trail feature that records attempts to access the vault, including successful and unsuccessful entry attempts.
5. The digital vault feature of claim 1, wherein the access control system further includes: a) Multi-factor authentication processes for verifying the identity of the user attempting to access the vault. b) Options for emergency access protocols in situations where the user is unable to meet the predefined conditions due to unforeseen circumstances.
Claim 3: Location-Based Data Access Control
1. A system within a mobile application for controlling access to sensitive features comprising: a) A location-based access control module that restricts the use of certain application features based on the user's geographical location.
15
SUBSTITUTE SHEET (RULE 26)
b) A functionality that allows users to define and designate specific geographical areas as 'safe locations' for accessing private data within the application.
2. The system of claim 1, wherein the location-based access control module includes: a) Integration with the device's GPS and other location services to accurately determine the user's current geographical position. b) A mechanism to compare the user's current location with the predefined safe locations and grant or restrict access to sensitive features accordingly.
3. The system of claim 1, wherein the user-defined safe locations feature includes: a) An interface within the application allowing users to select and mark geographical areas as safe locations using a map or address input. b) The ability for users to modify, add, or remove safe locations as needed, with changes immediately reflected in the access control settings.
4. The system of claim 1, further comprising: a) A security protocol that automatically disables access to certain sensitive features when the user is outside the predefined safe locations. b) Customizable notifications that alert the user when they attempt to access restricted features from an unapproved location.
5. The system of claim 1, wherein the sensitive features controlled by the location-based access include: a) Viewing or editing of encrypted personal messages and notes stored in the application. b) Access to the application's digital vault and its contents. c) Other user-designated features that require enhanced privacy and security.
Claim 4: Environmental Risk Detection via Phone Sensors
1. An environmental risk detection system in a mobile application comprising: a) Integration with a smartphone's built-in sensors to monitor various environmental factors, including but not limited to sound, light, motion, pressure, temperature, and proximity. b) A processing unit within the application that analyses sensor data to detect anomalies or changes indicative of potential hazards or risks in the user's environment.
16
SUBSTITUTE SHEET (RULE 26)
2. The system of claim 1, wherein the environmental risk detection includes: a) Sound sensor integration for detecting unusual noise levels or patterns. b) Light sensor utilisation for identifying changes in lighting conditions that may signify risk. c) Motion detection capabilities for sensing unexpected movement in the vicinity of the user.
3. The system of claim 1, wherein the application includes: a) Customizable sensitivity settings, allowing users to adjust the thresholds for what constitutes an environmental risk based on personal preferences or specific environmental conditions. b) Various alert types that can be selected by the user, ranging from discreet notifications to more urgent alarms, based on the nature and severity of the detected risk.
4. The system of claim 1, further comprising: a) An emergency response protocol that can be triggered automatically based on certain types of detected risks, including the option to notify emergency services or pre-designated contacts. b) A user interface for reviewing and responding to alerts, and for configuring the system's settings according to individual needs and circumstances.
5. The system of claim 1, wherein the integration with the smartphone's sensors includes: a) Optimizing battery usage and resource management to ensure continuous monitoring without significant impact on the device's performance. b) Ensuring data privacy and security in the collection and processing of environmental sensor data.
Claim 5: Risk Alert System with Emergency Notification
1. A risk alert system within a mobile application, comprising: a) A feature allowing users to set up alerts for situations they perceive as potentially dangerous, wherein users can specify the nature and duration of the potential danger. b) An interactive interface for users to input details about the risk, including location, time frame, and specific nature of the perceived danger.
2. The risk alert system of claim 1, wherein the alert mechanism includes: a) A countdown timer corresponding to the duration specified by the user, during which the user is expected to respond or check in to indicate safety.
17
SUBSTITUTE SHEET (RULE 26)
b) Progressive alerts to the user as the end of the specified duration approaches, escalating in urgency if the user does not respond.
3. The risk alert system of claim 1, wherein the emergency notification mechanism includes: a) Automatic notification to pre-designated emergency contacts or authorities if the user fails to respond or check in within the specified timeframe. b) Transmission of relevant information to the notified parties, including the user's location, nature of the alert, and any additional information provided by the user.
4. The risk alert system of claim 1, further comprising: a) Customization options for users to select their preferred emergency contacts, including friends, family, or emergency services. b) A user-defined protocol for false alarm prevention, allowing users to quickly inform contacts or authorities in case of a mistakenly triggered alert.
5. The risk alert system of claim 1, wherein the system includes: a) A user-friendly setup process for defining risk scenarios and corresponding alerts. b) Security features to ensure that the risk alert settings and user responses are kept confidential and secure.
Claim 6: Secure Pose for Data Privacy
1. A security system within a mobile application for data privacy, comprising: a) A feature requiring the user to perform a predetermined, non-instinctive physical action to access or hide sensitive data within the application. b) A recognition mechanism using the device’s camera to detect and confirm the user's specific physical action.
2. The security system of claim 1, wherein the predetermined physical action includes: a) An action or pose that is not commonly performed in everyday activities, ensuring that it is distinctive and deliberate when used to access data. b) The ability for the user to select and customise their unique action or pose from a range of options provided by the application.
3. The security system of claim 1, wherein the feature is designed to:
18
SUBSTITUTE SHEET (RULE 26)
a) Automatically hide or secure the sensitive data when the user discontinues the predetermined physical action, particularly in situations where the user is under duress or startled. b) React to the natural instinct of the user to drop the pose under stress, thereby enhancing the security and privacy of the data.
4. The security system of claim 1, further comprising: a) An alternative emergency action recognisable by the application, which when performed, temporarily disables access to the sensitive data or specific features of the app. b) A functionality allowing the user to explain the emergency action as a technical malfunction, providing plausible deniability in coercive situations.
5. The security system of claim 1, wherein the recognition mechanism includes: a) Advanced image processing algorithms capable of accurately detecting the user’s specific pose or action in various lighting and environmental conditions. b) Continuous monitoring capability, ensuring that access to sensitive data is maintained only while the pose is actively held.
Claim 7: Al-Powered Therapeutic Interaction
1. An Al-driven feature within a mobile application, comprising: a) A functionality enabling users to record and narrate their personal experiences, thoughts, and incidents within the application. b) An artificial intelligence module that processes these recordings and generates a cyber friend - a virtual character - to provide feedback and interact with the user.
2. The Al-driven feature of claim 1, wherein the cyber friend generation includes: a) A user interface allowing users to select attributes and characteristics for their cyber friend, ensuring that the virtual character is relatable yet distinct from the user. b) An Al algorithm that creates a personalized cyber friend based on user preferences, capable of narrating the user’s own experiences as if they were its own.
3. The Al-driven feature of claim 1, wherein the therapeutic interaction includes: a) The cyber friend presenting the user's recorded narratives from a detached perspective, enabling users to gain new insights and understandings of their situations.
19
SUBSTITUTE SHEET (RULE 26)
b) Dialogue and interaction features that allow users to engage in conversations with the cyber friend, further facilitating self-reflection and emotional processing.
4. The Al-driven feature of claim 1, further comprising: a) Privacy safeguards ensuring that all recordings and interactions with the cyber friend are confidential and securely stored within the application. b) An option for users to receive additional therapeutic resources or directions to professional help based on their interactions with the cyber friend.
5. The Al-driven feature of claim 1, wherein the user interface for recording experiences includes: a) Tools for users to easily record, edit, and organize their narratives within the application. b) Features that support various formats of input, including voice recording, text entry, and video.
Claim 8: Integration of Multi-Feature Safety and Wellness Application
1. A comprehensive mobile application, comprising: a) An integrated system that combines features for secure communication, environmental risk detection, therapeutic interaction, and privacy into a unified platform. b) Modules within the application that function cohesively, providing a seamless user experience while addressing various aspects of personal safety and emotional wellbeing.
2. The mobile application of claim 1, wherein the secure communication feature includes: a) Encrypted messaging capabilities for private and secure communication with designated recipients. b) A digital vault for the secure storage of sensitive data, accessible only under predefined user-set conditions.
3. The mobile application of claim 1, wherein the environmental risk detection feature includes: a) Utilization of the smartphone’s built-in sensors to monitor and alert users to potential environmental hazards. b) Customizable alert settings that allow users to define what constitutes an environmental risk and how they wish to be notified.
20
SUBSTITUTE SHEET (RULE 26)
4. The mobile application of claim 1, wherein the therapeutic interaction feature includes: a) An Al-powered module that enables users to interact with a generated cyber friend for the purpose of therapeutic self-reflection and emotional processing. b) Tools for users to record their personal experiences and narratives, which are then reframed and presented by the cyber friend.
5. The mobile application of claim 1, wherein the privacy features include: a) A location-based data access control system that restricts access to certain app features based on the user’s geographical location. b) The Secure Pose feature, requiring users to perform a specific physical action to access or conceal sensitive data.
6. The mobile application of claim 1, further comprising: a) An interface designed to integrate the various features harmoniously, ensuring that users can easily navigate and utilise the full range of functionalities. b) Configurable settings across all features, enabling users to personalise the application according to their individual safety and well-being needs.
SUBSTITUTE SHEET (RULE 26)
Applications Claiming Priority (12)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB2217027.8 | 2022-11-12 | ||
GBGB2217027.8A GB202217027D0 (en) | 2022-11-16 | 2022-11-16 | A secure app for personal data & messages |
GB2300180.3 | 2023-01-05 | ||
GB202300181 | 2023-01-05 | ||
GB2300182.9 | 2023-01-05 | ||
GB2300181.1 | 2023-01-05 | ||
GB202300182 | 2023-01-05 | ||
GB202300180 | 2023-01-05 | ||
GBGB2306841.4A GB202306841D0 (en) | 2023-05-09 | 2023-05-09 | Phone sense |
GB2306841.4 | 2023-05-09 | ||
GB2310895.4 | 2023-07-16 | ||
GBGB2310895.4A GB202310895D0 (en) | 2023-07-16 | 2023-07-16 | Location marking |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024100369A1 true WO2024100369A1 (en) | 2024-05-16 |
Family
ID=89222038
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2023/000053 WO2024100369A1 (en) | 2022-11-12 | 2023-11-13 | Comprehensive personal safety and therapeutic mobile application |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2024100369A1 (en) |
-
2023
- 2023-11-13 WO PCT/GB2023/000053 patent/WO2024100369A1/en unknown
Non-Patent Citations (3)
Title |
---|
MARTIN R ALBRECHT ET AL: "Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong", ARXIV.ORG, CORNELL UNIVERSITY LIBRARY, 201 OLIN LIBRARY CORNELL UNIVERSITY ITHACA, NY 14853, 31 May 2021 (2021-05-31), XP081972229 * |
TELEGRAM TEAM: "Photo Editor and Passcode Lock", 25 February 2015 (2015-02-25), pages 1 - 1, XP093132835, Retrieved from the Internet <URL:https://telegram.org/blog/photo-editor-and-passcodes?setln=de> [retrieved on 20240219] * |
TELEGRAM TEAM: "Scheduled Messages, Reminders, Custom Cloud Themes and More", 5 September 2019 (2019-09-05), pages 1 - 1, XP093132897, Retrieved from the Internet <URL:https://telegram.org/blog/scheduled-reminders-themes> [retrieved on 20240219] * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yao et al. | Defending my castle: A co-design study of privacy mechanisms for smart homes | |
US10777060B2 (en) | Electronic device and computer application monitoring, alert, and intervention system and method | |
US10104122B2 (en) | Verified sensor data processing | |
US10237280B2 (en) | Management and control of mobile computing device using local and remote software agents | |
US11864051B2 (en) | Systems and methods for monitoring and managing use of mobile electronic devices | |
CA2925542C (en) | Portable system for managing events | |
US10064060B2 (en) | Fingerprint activation of a panic mode of operation for a mobile device | |
Ferdous et al. | Analysing privacy in visual lifelogging | |
US20190373219A1 (en) | Methods, systems, apparatuses and devices for facilitating management of emergency situations | |
KR20210147039A (en) | Generate unexpected location notifications | |
US20200358765A1 (en) | Remotely Configuring Communication Restrictions | |
US9959425B2 (en) | Method and system of privacy protection in antagonistic social milieu/dark privacy spots | |
CN106203125A (en) | Operating system and safety detection method, safety detection device and terminal | |
EP3166294B1 (en) | Systems and methods for monitoring and managing use of mobile electronic devices | |
JP2019168810A (en) | Information management device and program | |
WO2016164210A1 (en) | Electronic preemptive evidentiary escrow platform | |
WO2024100369A1 (en) | Comprehensive personal safety and therapeutic mobile application | |
Templeman et al. | Reactive security: Responding to visual stimuli from wearable cameras | |
US11405498B2 (en) | Audiovisual safety system | |
US11881069B2 (en) | Security devices and methods for regulating access to items secured within | |
CN104243476A (en) | Account protection method and device | |
O’Neill | Digital wormholes | |
SE1351104A1 (en) | Security system and electronic locking device for use therein, and an associated method for monitoring the handling of a security alarm event in a security alarm system | |
Singhal et al. | HacXBear: An Android App to Safeguard Mobile Theft | |
US11631312B2 (en) | Methods, systems, apparatuses, and devices for providing protection to users working in the field |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23822437 Country of ref document: EP Kind code of ref document: A1 |