WO2017124172A1 - Gps security device - Google Patents
Gps security device Download PDFInfo
- Publication number
- WO2017124172A1 WO2017124172A1 PCT/CA2016/050048 CA2016050048W WO2017124172A1 WO 2017124172 A1 WO2017124172 A1 WO 2017124172A1 CA 2016050048 W CA2016050048 W CA 2016050048W WO 2017124172 A1 WO2017124172 A1 WO 2017124172A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security device
- housing
- security
- electrical contact
- contacts
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/016—Personal emergency signalling and security systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/005—Alarm destination chosen according to a hierarchy of available destinations, e.g. if hospital does not answer send to police station
Definitions
- the present invention relates to personal security, and more particularly transmission of audio and/or Global Positioning System (GPS) data for personal security.
- GPS Global Positioning System
- a security device comprising:
- an elongate telescopic housing comprising a first portion telescopically coupled to a second portion, the housing telescopically slidable from an expanded position to a collapsed position;
- a microphone a GPS module, a network communications module and a power source contained in the housing;
- first electrical contact and a second electrical contact in a disengaged position lacking electrical communication when the housing is in an expanded position; the first electrical contact and the second electrical contact in an engaged position providing electrical communication when the housing is in a collapsed position,
- the network communications module configured to initiate a security protocol to simultaneously contact a plurality of trusted personal contacts, each of the trusted personal contacts being a natural and individual person known to a user of the security device.
- a security device comprising: an elongate telescopic housing comprising a first portion telescopically coupled to a second portion, the housing telescopically slidable from a first position to a second position; a microphone, a location module, a network communications module and a power source contained in the housing; and a controller generating an activation signal when the housing is moved from the first position to the second position.
- Figure 1 shows side, front and back elevational views of a security device
- Figure 2 shows a sequence of cross-sectional views during mechanical manipulation of the security device shown in Figure 1 ;
- Figure 3 shows a sequence of cross-sectional views during mechanical manipulation of a variant of the security device shown in Figure 2;
- Figure 4 shows a schematic representation of a security system incorporating the security device shown in Figure 1 ;
- Figure 5 shows a flow diagram of steps for initial set-up of the security device shown in Figure 1 ;
- Figure 6 shows a flow diagram of steps for a security protocol activated by use of the security device shown in Figure 1.
- FIG. 1 shows side, front and back elevational views of the security device 10.
- the security device 10 comprises a housing having an elongate barrel structure composed of two co-axial and telescopically coupled tubular portions, a top portion 12 and a bottom portion 14. Both the top portion 12 and the bottom portion 14 define hollow interior chambers for holding electrical and mechanical components of the security device 10 and both provide open ends at their telescopic junction.
- the top portion 12 comprises a pair of opposing finger/thumb grips at a bottom end and a safety button 18 at a top end.
- the top portion 12 further comprises a plurality of apertures 22 communicative with an interior chamber of the housing and a microphone disposed therein for capturing surrounding audio data.
- a clip 24 is attached to the top portion 12, which provides for the security device 10 to be attached to a clothing item worn by the holder of the security device 10.
- the bottom portion 14 comprises a top end configured to telescopically couple with the bottom end of top portion 12 and a bottom end coupled to false button 20.
- False button 20 may provide an aesthetic symmetry for safety button 18, and additionally may act as a cap for a reservoir of a security related compound such as pepper spray, a UV detected liquid marker, and the like.
- the top portion 12 and the bottom portion 14 are telescopically coupled such that the bottom portion 14 can slide along the bottom end of top portion 12 to cover opposing finger/thumbs grips 16.
- the housing of the security device 10 is telescopically collapsible and can move from an expanded position to a collapsed position.
- Figure 2 shows three axial cross-section views illustrating sequential steps (A to C) of manual manipulation of the security device 10 to move from an expanded position to a collapsed position.
- Figure 2 A shows the security device 10 in an expanded position.
- the top end of bottom portion 14 of the housing is telescopically coupled in an expanded position to the bottom end of top portion 12 such that opposing finger/thumb grips 16 are uncovered and accessible.
- the housing is resiliently biased to the expanded position by a first compression spring 26 providing a first end attached to anchor block 28 located proximal to the bottom end of top portion 12 and a second end attached to corresponding and axially aligned anchor point 30 located within the bottom portion 14.
- a first axial projection 32 extends axially upward and outward of the top end of the bottom portion 14 and into the bottom end of top portion 12.
- Axial projection 32 terminates with a threaded bolt 34 and provides a first electrical contact 36 at a central location along its axial length.
- the bottom portion 14 defines an interior chamber 38 for not only holding mechanical components such as compression spring 26 and axial projection 32, but also for holding electrical components for cellular network communication and GPS data transmission 40 for example, a memory drive, a battery, a battery recharge connector, a Subscriber Identity Module (SEVI) card, a cellular network communication module, a processor, a USB connector, a GPS module and the like.
- SEVI Subscriber Identity Module
- the top portion 12 also defines an interior chamber 42 for holding mechanical and electrical components.
- a shutter frame 44 provided within interior chamber 42 at a central position along the axial length of top portion 12 defines a central aperture co-axial with the top portion 12.
- a shutter 46 coupled to the shutter frame 44 covers the central aperture when the shutter 46 is in a closed position (shown in Figure 2A) while allowing access to the central aperture when the shutter 46 is in an open position (shown in Figure 2B).
- Shutter 46 is biased to a closed position and mechanical contact of shutter actuator 48 controls movement of shutter 46 from a closed position to an open position.
- the first axial projection 32 abuts shutter 46 and is prevented from passing through the central aperture of shutter frame 44.
- the safety button 18 is disposed at the top end of top portion 12.
- the safety button 18 is movable from an extended position to a depressed position by manual manipulation.
- the safety button 18 is resiliently biased to the extended position by a second compression spring 50 providing a first end attached to shutter frame 44 and a second end attached to corresponding and axially aligned anchor point 52 located proximal to the top end of the top portion 12.
- a second axial projection 54 extends axially downward from the top end of the top portion 12 towards a surface of the shutter frame 44 that faces the top end of the top portion 12.
- Both the first axial projection 32 and the second axial projection 54 are elongate arm- like structures, each defining a longitudinal axis that is substantially parallel to the longitudinal axis of the housing.
- the first axial projection 32 provides a first mating surface supporting a surface of the first electrical contact 36
- the second axial projection 54 provides a second mating surface supporting a surface of the second electrical contact
- the first and second mating surfaces abut when the housing is in a collapsed position.
- Motor 60 drives a spindle 62 with a single degree of freedom of rotational motion in a clockwise or counterclockwise direction to engage or disengage the threaded bolt 34 located at the end of the first axial projection 32.
- Spindle 62 is a cylindrical rod having first and second ends, attached at its first end to a drive shaft of motor 60 and defining a threaded bore 64 at its second end. Threaded bore 64 is axially aligned with threaded bolt 34, and threaded bore 64 is sized to threadingly engage and receive threaded bolt 34.
- motor 60 begins rotation so that threaded bore 64 captures threaded bolt 34 as manual pushing brings the tip of the threaded bolt 34 to the opening of threaded bore 64.
- the motor 60 rotation also produces a vibration that can be sensed by the holder of the security device 10 serving as a useful indicator that a fully collapsed position has been achieved and that security protocols have been initiated.
- a predetermined security code can be entered into a system incorporating the security device 10 and a signal can be sent through cellular network communication to security device 10 to initiate a disengaging rotation (an opposite rotation compared to rotation that captures threaded bolt 34) to release threaded bolt 34 and return the bottom portion 14 to its expanded position by motive force from compression spring 26 and return safety button 18 to its raised position by motive force from compression spring 50.
- Figure 3 shows three axial cross-section views illustrating sequential steps (A to C) of manual manipulation of a variant security device 70 to move from an expanded position to a collapsed position.
- Figure 3A shows the security device 70 in an expanded position.
- Security device 70 differs from security device 10 by replacing the locking mechanism of a threaded bore and bolt with a retractable latch electrical contact 72 and a latch receptacle electrical contact 76.
- a minor difference is a positioning of retractable latch electrical contact 72 at a terminal of the first axial projection 32 and positioning of the latch receptacle electrical contact 76 at a terminal of the second axial projection 54 compared to the more central positioning of first and second electrical contacts, 32 and 56, in security device 10.
- Motor 60 and spindle 62 may be maintained to provide a vibrational indicator of electrical communication between retractable latch electrical contact 72 and latch receptacle electrical contact 76.
- Retractable latch electrical contact 72 is housed within the first axial projection 32.
- Retractable latch electrical contact 72 is moveable from an extended position (shown in Figure 3) to a retracted position (not shown) and is resiliently biased to the extended position.
- the first axial projection 32 defines a chamber (not shown for receiving retractable latch 72 when it is in a retracted position.
- Figure 3C As the bottom portion 14 is pushed to a collapsed position ( Figure 3C) and the first axial projection 32 passes through the central aperture of shutter frame 44 retractable latch 72 abuts an end or contacting edge of the second axial projection 54 and is forced to a retracted position.
- the retractable latch electrical contact 72 and second axial projection 54 abutting interaction is configured to maintain the retractable latch electrical contact 72 in a retracted position until the bottom portion 14 is in a sufficiently collapsed position to align the retractable latch electrical contact 72 with the latch receptacle electrical contact 76, at which point the retractable latch moves to an extended position due to its biasing force and locks the bottom portion 14 in a collapsed position and produces electrical communication between latched electrical contacts 72 and 76.
- a predetermined security code can be entered into a system incorporating the security device 70 and a signal can be sent through cellular network communication to security device 70 to initiate a retraction mechanism (not shown) housed with the first axial projection 32 to move retractable latch electrical contact 72 to a retracted position to release first and second axial projections, 32 and 54, from a latched connection and return the bottom portion 14 to its expanded position by motive force from compression spring 26 and return safety button 18 to its raised position by motive force from compression spring 50.
- a retraction mechanism housed with the first axial projection 32 to move retractable latch electrical contact 72 to a retracted position to release first and second axial projections, 32 and 54, from a latched connection and return the bottom portion 14 to its expanded position by motive force from compression spring 26 and return safety button 18 to its raised position by motive force from compression spring 50.
- a mechanical alternative to computer mediated release of the latched connection is to manually release the latched connection by inserting a pin instrument through reset aperture 74 and a correspondingly aligned bore (not shown) formed in the second axial projection 54 to move retractable latch electrical contact 72 to a retracted position.
- Manual release and computer mediated release mechanisms may be included alone or in combination.
- FIG. 4 shows a block diagram schematic of a security system 100 incorporating the security device 10.
- the telescopic housing of security device 10 comprises a top portion 12 and a bottom portion 14 telescopically coupled to each other.
- the bottom portion 14 houses a processor 80, a rechargeable battery 81, a memory 83, a cellular network transceiver 84, a SIM card 85, a GPS transceiver 86, a clock 88 and input/output port 89 all operably connected and communicative through computer bus 90.
- the input/output port 89 is accessible from an exterior surface of the bottom portion 14.
- a recharge port 82 connected to the rechargeable battery is also accessible from an exterior surface of the bottom portion 14.
- the input/output port 89 and the recharge port 82 may be provided as a single port combining both functions, for example a USB connector.
- the components housed within the bottom portion 14 remain active whenever sufficient power is provided by rechargeable battery 81 or recharge port 82, allowing GPS data to be communicated through a cellular communications network 102 at any time independent of the collapsed or expanded position of the telescopic housing of security device 10.
- the top portion 12 houses a microphone 94 and a vibrator 96. Components housed in the top portion remain inactive and isolated from computer bus 90 until switch 98 is closed.
- Switch 98 is a general symbolic designation representing the two step mechanical manipulation shown in Figure 2 (ie., a first step of depressing safety button 18 followed by a second step of telescopically collapsing the bottom portion 14 along the top portion 12) that aligns first and second electrical contacts in an engaged electrically communicative position.
- switch 98 is biased to an open position and is moved to a closed position upon successful completion of the two step mechanical manipulation shown in Figure 2.
- microphone 94 is activated and captured audio data may be stored in memory 83 and communicated over cellular communications network 102.
- Closing of switch 98 also initiates a security protocol, programmable computer code for which may be stored in memory 83 and executed by processor 80.
- processor 80 accesses a plurality of predetermined phone numbers stored in the SF card 85 and/or memory 83 and instructs the cellular network transceiver 84 to simultaneously call all of the plurality of predetermined phone numbers to simultaneously interrogate cellular phone devices of a plurality of trusted personal contacts 106 that are previously established as being known to the owner of the security device 10.
- the security protocol includes rules to determine the number of times the simultaneous call to the plurality of predetermined phone numbers is made without answer before switching to a call to an alternative phone number(s).
- a tiered categorization of personal contacts may be preset with simultaneous calls attempted to a plurality of trusted primary contacts followed by simultaneous calls to a plurality of trusted secondary contacts if connection with at least one primary contact is unsuccessful. Also, in the event that connection with at least one primary contact is unsuccessful a call can be made to connect with an official emergency response service 108 such as police, ambulance, firemen, and the like. Calls from security device 10 may be made directly to a plurality of trusted personal contacts 106 or may be mediated through a security service 104 set to monitor and assess security protocol implementations for security device 10.
- the security service 104 is an optional feature that may include one or more human operators and/or may be implemented by computer and algorithmic processing to assist efficient connection of a distress call to at least one trusted personal contact.
- the system 100 will accommodate a plurality of security devices, such as security device 10 or 70, with each security device assigned to a registered owner and programmed to initiate a security protocol customized to each owner's preferences and trusted personal contact call list.
- the system 100 can include a security service 104 to monitor and assist security protocol implementations from a plurality of security devices.
- the system 100 may also include websites and technical support to help owner's customize aspects of a security protocol.
- a security device such as security device 10 or 70
- the purchaser/owner upon purchase of a security device, such as security device 10 or 70, the purchaser/owner receives a security device packaged in a box similar to that in which a cellular phone would be sold with the packaging containing a clip, USB cable, and electric wall plug adapter for charging.
- a pamphlet will be included providing instructions for initial set-up and operation of the security device.
- Set-up and operation of the security device may be performed by a registered owner or alternatively a registered user if the owner purchased the security device with the intention of providing or gifting it to another individual (eg., a family member). Therefore, in this example owner and user are interchangeable.
- Initial set-up of the security device may be performed in any convenient manner.
- the input/output port is a USB connector formed in the clip of the security device. Instructions will direct owners to connect 110 the security device to the owner's computer by connecting a first end of a USB cable to the security device and a second end of the USB cable to the USB port of their computer.
- the owner will then go to the website and download and install 112 a software program for set-up of the security device onto their computer.
- This program will allow the owner to register 114 their security device using the unique identification number listed in the pamphlet as well as a sticker attached to the inside of the packaging box.
- the owner will be prompted to create a username and password and input the unique identification number to the website to ensure that the security device was not stolen.
- the owner will proceed to select initial set-up options 116 and provide initial set-up data - for example, recording the physical parameters 118 of the person that will be wearing the device (i.e. height, weight, hair colour, ethnicity, age).
- a numerical code (similar to that of a phone number) will be provided to the owner. That will now be the number linking the security device to the emergency contacts. The owner will then be prompted to download a software application to their mobile phone and input the username, password and identification number. Once this information is confirmed, a message will appear in the mobile phone software application stating that this application is now linked to the security device 120. The owner is then able to select and program options for the security protocol 122 with the mobile phone connection to the security device and/or to a remote system server.
- the registered owner is then prompted to input a plurality of numbers (eg., 4 to 10 mobile phone numbers) of the trusted individuals whom the owner would like to be their plurality of trusted personal contacts 124.
- a further step to confirm each of these numbers may be included.
- the names and numbers of the plurality of trusted personal contacts are confirmed, if the number listed is a mobile, that trusted personal contact will receive a text 126 stating that they have been selected by the registered owner of the security device as an emergency contact and providing a unique numerical code. If they accept, the trusted personal contact will then be prompted to download a software application which works in conjunction with the security device, once activated. After downloading the software application to their phone, the trusted personal contact will input the numerical code 128 stated in the text into the appropriate fields in the software application user interface.
- a further step to confirm the numerical code may be included.
- the trusted personal contact will receive a message 130 within the software application stating that the trusted personal contact is now connected to the security device owned by the registered owner.
- Each trusted personal contact connected to the security device receives GPS data from the security device 132 at a predetermined frequency set by the owner.
- the software application may interrogate the trusted personal contact to confirm their status as a trusted personal contact and to confirm their contact information. If the trusted personal contact negates their status and withdraws, then a message will be sent to the software application of the registered owner stating that their trusted personal contact no longer wishes to be contacted in the event of an emergency. The owner is then prompted to replace the number of the withdrawn trusted personal contact with another one.
- the new trusted personal contact will go through the same process as listed above when someone is chosen as a trusted personal contact.
- the security device can be associated with Twitter and GPS location data can be sent to their Twitter followers.
- the security device can be programmed to adjust frequency of GPS updates to Twitter by using the same software program installed on the owner's computer during initial set-up. Once the names and numbers are confirmed, the registered owner will then be queried as to how many rings and/or how many repeat calls they wish to have the plurality of trusted personal contacts receive before the call is redirected to Emergency Response Service Personnel (Police, Fire, Ambulance, etc.). Numbers of rings and/or numbers of repeat calls may be specified for each individual trusted personal contact.
- the security device owner as well as the plurality of trusted personal contacts, can obtain battery charge/life data as well as the location data at any time by the user interface of software application installed on their respective mobile phones.
- Historical location data for a security device for the previous one or more hours (eg., 3 hours) set by pre-determined tracking intervals specified by the owner during set-up or any time afterwards may also be accessed by the owner or the plurality of trusted personal contacts as desired.
- an owner has mechanically manipulated the security device 140 to activate a preset security protocol which initiates a distress call from the security device simultaneously calling 142 the predetermined plurality of trusted personal contacts.
- the owner has set the security device to let a first simultaneous call last for 3 rings followed by a second simultaneous call of 3 rings before redirecting 150 the call to Emergency response service personnel. If anyone of the trusted personal contacts answers 144 the call, then incoming call indicators such as ringing and vibrating will stop for the other contacts 146. However, the other trusted personal contacts will still be able to answer and merge into the call 148. There will be a limit as to how many people can merge into the one call.
- the owner of the security device will feel a vibration once the mechanical manipulation of the security device is completed to activate a security protocol that initiates a simultaneous call to the plurality of trusted personal contacts. When anyone of the trusted personal contacts answers the call, the owner will feel 2 vibrations, one second apart 152.
- All of the trusted personal contacts - regardless of being the one to answer the call, of merging into the call or not merging into the call - will be able to use the software application 162 installed on their respective mobile phones to view a map of where the registered owner is, as well as velocity of movement, direction of movement, the duration of the signal, and distance of the respective trusted personal contact from the security device. All of this information will be visible for any trusted personal contact that opens the software application during the distress call. If no one answers the distress call within the specified amount of rings, the call is redirected to an emergency response service and/or a message can be sent to the police concerning the whereabouts of the registered owner with the physical parameters communicated from the security device.
- the trusted personal contacts are only able to listen. In this example, the trusted personal contacts are not able to speak to the owner of the security device as it is not equipped with a speaker so as not to risk sound from the speaker drawing attention of an abductor or some other subject having criminal intent.
- the security device will record all audio 154 (registered users voice, background noise, etc), for the duration of the battery life. Of the trusted personal contacts, a maximum of 4 of them will be primary contacts. Once a primary contact answers and assesses 156 a distress call, they will be given priority as to whether or not to merge the call with local authorities 158.
- Helpers will list the distance each contact is from the point of the security device, for each contact that answered the distress call or merged into the distress call.
- Steps to deactivate the security protocol may be preset to a desired method, but will typically include an option to transfer 160 recorded audio and/or GPS data from the security device to the owners computer.
- the security protocol is deactivated by connecting the security device to the registered user's computer and turning it off using the installed software program. When it is connected to the computer, the program will ask the registered owner if they would like to save the audio. If the user selects "Yes", then it will be stored in an appointed file.
- security protocol deactivation is achieved by opening the software application on the registered owner's phone and selecting the "Off function. They will then be asked for their password. Once entered correctly, the security protocol will be turned off. They will also be asked whether they want to save the audio.
- the audio will be saved to the memory of the security device.
- one of the primary contacts will have the option the end the distress call once they are within range of the security device. The next time the registered owner connects their security device to their computer, all the saved data such as the location of where the registered owner activated the security protocol, the duration of the distress call, and audio will automatically be stored in the program.
- the security device may be shaped and sized as desired. Typically, the security device will be small enough to avoid notice or be easily concealable, for example within a pocket or a fold of clothing. As shown in Figures 1 to 3 the security device is shaped as a clip, roughly the size of a barrette and is made of plastic. It is black and can be clipped anywhere on a person. Other shapes and sizes may be used to suit a desired implementation.
- a two-step mechanical manipulation activates a security protocol. For example, to activate a button located on top of the security device is pressed, and then the bottom of the device is squeezed towards the top. Only when both top and bottom portions of the device are squeezed together is the security protocol activated.
- This two-step mechanical manipulation prevents accidental activations.
- Other two-step mechanical manipulations may be used as desired as long as a telescopic mechanism is maintained. In some implementations, a one-step manipulation of the telescopic collapsing mechanism may suffice.
- Security protocol activation need not be limited to a collapsing mechanism.
- an activating telescopic mechanism can include a security device resiliently biased to a collapsed position that activates a security protocol when the housing is manually maneuvered to an expanded position.
- a shutter mechanism is optional, particularly when a one-step manipulation of the telescopic mechanism is sufficient to activate the security protocol.
- the shutter may take any conventional form including hinged, retractable or sliding covers to open and close an aperture.
- a camera may be optionally included. However, a camera operating continuously will drain battery power. Therefore, camera use will likely not be continuous and security protocol rules may limit the total time of camera activity.
- the first trusted personal contact to answer a distress call may be given the responsibility of initially activating the camera from the mobile phone application and then subsequently turning the camera on and off within the preset time limits for camera activity.
- the vibrator is an optional component.
- the vibrator may be used to indicate multiple events by providing a different vibration pattern for each type of event. For example, a single vibration burst coincident with security protocol activation as compared with two vibration bursts, one second apart, when a distress call is answered.
- the vibrator may be replaced with any other suitable indicator, for example a diode emitting visible light. The diode could be hidden under a moveable cover, such as false button 20 so as to avoid attraction of unintended attention to the diode. Typically, an audible indicator will not be used.
- the basis of the security protocol is that a distress call is initially sent simultaneously to a plurality of trusted personal contacts rather than a corporate emergency response center or official emergency service personnel. This avoids a disadvantage of high overhead cost of an emergency response center which increases the cost that consumers pay to purchase and operate the security device. This also provides an advantage of one or more personal contacts being better suited to assess urgency of a distress call based on familiarity with tone of voice, behavioural tendencies, pre-arranged safety words, daily routines, and the like compared to a stranger at a corporate response center. Provided that a distress call is sent simultaneously to a plurality of trusted personal contacts, further aspects of the security protocol may be adjusted as desired.
- the simultaneous distress call may be sent in a co-ordinated scheme so that a single connection with any one of the plurality of trusted personal contacts stops the incoming call indicators for the remaining trusted personal contacts.
- a symbol/icon will then appear at the top of each trusted personal contact's mobile phone display indicating that the software application is opened due to the activated security protocol.
- a small description as to whether or not the security protocol is still activated may be provided, as well as the time of the activation and the duration.
- the trusted personal contact clicks on the symbol/icon the application will open a graphic interface on the mobile phone display providing location, time and audio information as suited to a particular implementation.
- a tiered responsibility of trusted personal contacts may be preset so that if the trusted personal contact that answers the distress call is not a primary contact, that contact will lose the ability to merge the call with local law enforcement to the first primary contact to merge into the call. In another example, all trusted personal contacts who answer the call, will have the option to text one another.
- the security protocol will typically include a redialing feature to mitigate a risk of a dropped distress call or a distress call being answered by a voicemail.
- GPS Global System for Mobile device
- GPS Global Positioning System device
- Assisted Global Positioning System any type of GPS
- the GPS may be replaced or supplemented with other modules having a location function, for example cell phone tower triangulation.
- the GPS data transmission may be modified to accommodate the age of the user of the security device. For example, if the user is a minor, the system may allow the primary contacts to be alerted once the security device moves outside of a pre-determined area. In another example, a user over the age of majority may have the option of interrupting communication of GPS information within a time frame. For instance, a user may wish to purchase a gift for a trusted personal contact, and does not want that contact to know or suspect where the gift is being purchased.
- the security device may dispense chemical compositions as part of an activated security protocol. Once a security protocol is activated, a light spray of a liquid can be dispensed onto a user's fingers or hand.
- a security protocol Once a security protocol is activated, a light spray of a liquid can be dispensed onto a user's fingers or hand.
- the security devices shown in Figures 1 to 3 may be adapted to dispense the liquid from the bottom portion 14 upon removal of false button 20. This liquid will be black light visible for 3 to 5 days. Once the user has this one their hand, they can smear it on their attacker or person creating the unsafe conditions. The harassing individuals, if caught, will then have a black light put on them and the liquid will then show.
- liquids from each security device may have a unique composition such as a unique combination of concentrations of marker compounds so that each liquid can be uniquely linked to a specific security device.
- a sample of the liquid may be taken from the accused to determine which security device the liquid came from to help with the investigation of a criminal case.
- the liquid and its marking function can help to determine whether or not the accused was the assailant in question by linking them to the user of the security device and supplementing GPS and audio recording evidence.
- the security device may include a mechanism for the user to speak with a trusted personal contact that answers a distress call. For example, upon activating the security protocol an ear piece that is wirelessly linked (eg, Bluetooth) to the security device may be released for the user to put into their ear. This ear piece may be attached to the bottom portion of the security device until activated.
- the security devices shown in Figures 1 to 3 may be adapted to release an ear piece from the bottom portion 14 upon removal of false button 20. The user will then put this ear piece into their ear, and be able to speak to anyone who has answered the distress call. Conversations occurring while the security protocol is active may be recorded and stored in the memory of the security device, until transferred or discarded.
- Remote centrally located network linked servers and/or human monitors may assist, control or intervene with any part of the security device set-up process or security protocol process.
- the security device may be operated with any type of controller module including a processor, microcontroller, microprocessor, system on chip for sensing a mechanical manipulation of the housing, generating a signal to activate a security protocol and sequence control signal to execute the activated security protocol.
- controller module including a processor, microcontroller, microprocessor, system on chip for sensing a mechanical manipulation of the housing, generating a signal to activate a security protocol and sequence control signal to execute the activated security protocol.
- the communication network for the security device need not be limited to a cellular phone network.
- the network may be a single network or a combination of multiple networks.
- the network may include the internet and/or one or more intranets, landline networks, wireless networks, and/or other appropriate types of communication networks.
- the network may comprise a wireless telecommunications network (e.g., cellular phone network) adapted to communicate with other communication networks, such as the Internet.
- the computer network when a computer network is used, the computer network will make use of a TCP/IP protocol (including protocols based on TCP/IP protocol, such as HTTP, HTTPS or FTP).
- Communication between remote servers and mobile phones involved in a security device set-up or an activated security protocol may be adapted to follow any computer communication standard including Extensible Markup Language (XML), Hypertext Transfer Protocol (HTTP), Java Message Service (JMS), Simple Object Access Protocol (SOAP), Lightweight Directory Access Protocol (LDAP), and the like.
- XML Extensible Markup Language
- HTTP Hypertext Transfer Protocol
- JMS Java Message Service
- SOAP Simple Object Access Protocol
- LDAP Lightweight Directory Access Protocol
- the remote server computer may be any combination of hardware and software components used to store, process and/or provide images, audio, location data, and action options for trusted personal contacts and/or security device users.
- the server computer components such as storage systems, processors, interface devices, input/output ports, bus connections, switches, routers, gateways and the like may be geographically centralized or distributed.
- the server computer may be a single server computer or any combination of multiple physical and/or virtual servers including for example, a web server, an image server, an application server, a bus server, an integration server, an overlay server, a meta actions server, and the like.
- the server computer components such as storage systems, processors, interface devices, input/output ports, bus connections, switches, routers, gateways and the like may be configured to run one or more applications to, for example, monitoring and compiling location data for a plurality of security devices, maintaining records for each registered user of a security device including records for physical parameters and head shot image, periodically confirming a trusted personal contact data table for each security device; activating mobile phone alerts during an activated security protocol, providing action options through mobile phone displays during an activated security protocol, and providing an established protocol for communication with an Emergency Response Service.
- the security device set-up may include submission of one or more current pictures of a registered user.
- the system may accommodate any image file including JPEG, PNG, GIF, PDF, RAW, BMP, TIFF, MP3, WAV, WMV, MOV, MPEG, AVI, FLV, WebM, 3 GPP, SVI and the like.
- Set-up and security protocol data, prompts and actions may be represented by any convenient form or user interface element including, for example, a window, a tab, a text box, a button, a hyperlink, a drop down list, a list box, a check box, a radio button box, a cycle button, a datagrid or any combination thereof.
- the user interface elements may provide a graphic label such as any type of symbol or icon, a text label or any combination thereof. Any desired spatial pattern or timing pattern of appearance of user interface elements may be accommodated by a computing device linked to the security device or a networked system incorporating the same. Parameters or selections may be represented through visual and/or audio interface. Any combination of touch command, voice command or pointer commands may be accommodated.
- the security device and networked systems incorporating the same as described herein and each variant, modification or combination thereof may also be implemented as a method or code on a non-transitory computer readable medium (i.e. a substrate).
- the computer readable medium is a data storage device that can store data, which can thereafter, be read by a computer system. Examples of a computer readable medium include read-only memory, random-access memory, CD-ROMs, magnetic tape, optical data storage devices and the like.
- the computer readable medium may be geographically localized or may be distributed over a network coupled computer system so that the computer readable code is stored and executed in a distributed fashion.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Health & Medical Sciences (AREA)
- Environmental & Geological Engineering (AREA)
- Public Health (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
Abstract
Described herein is a security device comprising: an elongate telescopic housing comprising a first portion telescopically coupled to a second portion, the housing telescopically slidable from an expanded position to a collapsed position; a microphone, a GPS module, a network communications module and a power source contained in the housing; a first electrical contact and a second electrical contact in a disengaged position lacking electrical communication when the housing is in an expanded position; the first electrical contact and the second electrical contact in an engaged position providing electrical communication when the housing is in a collapsed position; a controller generating an activation signal when the first electrical contact and the second electrical contact are in the engaged position; and the network communications module configured to simultaneously contact a plurality of trusted personal contacts upon receiving the activation signal, each of the plurality of trusted personal contacts being a natural and individual person known to a user of the security device.
Description
GPS SECURITY DEVICE
BACKGROUND OF THE INVENTION
Field of the Invention
The present invention relates to personal security, and more particularly transmission of audio and/or Global Positioning System (GPS) data for personal security.
Description of the Related Art
Emergency situations arising by accident or criminal intent is a constant risk. Functional solutions to mitigate this risk have been provided in the form of personal devices that transmit GPS and audio information as described for example in US Patent No 8461983 by McCauley (published 11 June 2013) or US Patent Publication No 2007/0182548 by Raad (published 09 August 2007).
Current GPS security devices require an emergency control center to monitor GPS data and distress calls. The operation of the control center is made expensive by responding to unintentional distress calls where a holder of a security device initiates a distress protocol by accident or misinterprets a benign occurrence as a threat. The expense of operating a control center has been a significant impediment to wide adoption of GPS security devices for personal security.
Accordingly, there is a continuing need for alternative GPS security devices and security systems incorporating the same.
SUMMARY OF THE INVENTION
In an aspect there is provided, a security device comprising:
an elongate telescopic housing comprising a first portion telescopically coupled to a second portion, the housing telescopically slidable from an expanded position to a collapsed position;
a microphone, a GPS module, a network communications module and a power source contained in the housing;
a first electrical contact and a second electrical contact in a disengaged position lacking electrical communication when the housing is in an expanded position;
the first electrical contact and the second electrical contact in an engaged position providing electrical communication when the housing is in a collapsed position,
the network communications module configured to initiate a security protocol to simultaneously contact a plurality of trusted personal contacts, each of the trusted personal contacts being a natural and individual person known to a user of the security device.
In another aspect there is provided a security device comprising: an elongate telescopic housing comprising a first portion telescopically coupled to a second portion, the housing telescopically slidable from a first position to a second position; a microphone, a location module, a network communications module and a power source contained in the housing; and a controller generating an activation signal when the housing is moved from the first position to the second position.
In further aspects systems and methods incorporating the security device are also provided.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 shows side, front and back elevational views of a security device;
Figure 2 shows a sequence of cross-sectional views during mechanical manipulation of the security device shown in Figure 1 ;
Figure 3 shows a sequence of cross-sectional views during mechanical manipulation of a variant of the security device shown in Figure 2;
Figure 4 shows a schematic representation of a security system incorporating the security device shown in Figure 1 ;
Figure 5 shows a flow diagram of steps for initial set-up of the security device shown in Figure 1 ;
Figure 6 shows a flow diagram of steps for a security protocol activated by use of the security device shown in Figure 1.
DETAILED DESCRIPTION OF PREFERRED EMB ODF ENT S
Referring to the drawings, a security device 10 will be described. Figure 1 shows side, front and back elevational views of the security device 10. The security device 10 comprises a housing having an elongate barrel structure composed of two co-axial and telescopically
coupled tubular portions, a top portion 12 and a bottom portion 14. Both the top portion 12 and the bottom portion 14 define hollow interior chambers for holding electrical and mechanical components of the security device 10 and both provide open ends at their telescopic junction. The top portion 12 comprises a pair of opposing finger/thumb grips at a bottom end and a safety button 18 at a top end. The top portion 12 further comprises a plurality of apertures 22 communicative with an interior chamber of the housing and a microphone disposed therein for capturing surrounding audio data. A clip 24 is attached to the top portion 12, which provides for the security device 10 to be attached to a clothing item worn by the holder of the security device 10. The bottom portion 14 comprises a top end configured to telescopically couple with the bottom end of top portion 12 and a bottom end coupled to false button 20. False button 20 may provide an aesthetic symmetry for safety button 18, and additionally may act as a cap for a reservoir of a security related compound such as pepper spray, a UV detected liquid marker, and the like.
The top portion 12 and the bottom portion 14 are telescopically coupled such that the bottom portion 14 can slide along the bottom end of top portion 12 to cover opposing finger/thumbs grips 16. By sliding the bottom portion 14 on the top portion 12 the housing of the security device 10 is telescopically collapsible and can move from an expanded position to a collapsed position.
Figure 2 shows three axial cross-section views illustrating sequential steps (A to C) of manual manipulation of the security device 10 to move from an expanded position to a collapsed position. Figure 2 A shows the security device 10 in an expanded position. The top end of bottom portion 14 of the housing is telescopically coupled in an expanded position to the bottom end of top portion 12 such that opposing finger/thumb grips 16 are uncovered and accessible. The housing is resiliently biased to the expanded position by a first compression spring 26 providing a first end attached to anchor block 28 located proximal to the bottom end of top portion 12 and a second end attached to corresponding and axially aligned anchor point 30 located within the bottom portion 14. A first axial projection 32 extends axially upward and outward of the top end of the bottom portion 14 and into the bottom end of top portion 12. Axial projection 32 terminates with a threaded bolt 34 and provides a first electrical contact 36 at a central location along its axial length. The bottom portion 14 defines
an interior chamber 38 for not only holding mechanical components such as compression spring 26 and axial projection 32, but also for holding electrical components for cellular network communication and GPS data transmission 40 for example, a memory drive, a battery, a battery recharge connector, a Subscriber Identity Module (SEVI) card, a cellular network communication module, a processor, a USB connector, a GPS module and the like.
The top portion 12 also defines an interior chamber 42 for holding mechanical and electrical components. A shutter frame 44 provided within interior chamber 42 at a central position along the axial length of top portion 12 defines a central aperture co-axial with the top portion 12. A shutter 46 coupled to the shutter frame 44 covers the central aperture when the shutter 46 is in a closed position (shown in Figure 2A) while allowing access to the central aperture when the shutter 46 is in an open position (shown in Figure 2B). Shutter 46 is biased to a closed position and mechanical contact of shutter actuator 48 controls movement of shutter 46 from a closed position to an open position. When shutter 46 is in a closed position, the first axial projection 32 abuts shutter 46 and is prevented from passing through the central aperture of shutter frame 44.
The safety button 18 is disposed at the top end of top portion 12. The safety button 18 is movable from an extended position to a depressed position by manual manipulation. The safety button 18 is resiliently biased to the extended position by a second compression spring 50 providing a first end attached to shutter frame 44 and a second end attached to corresponding and axially aligned anchor point 52 located proximal to the top end of the top portion 12. A second axial projection 54 extends axially downward from the top end of the top portion 12 towards a surface of the shutter frame 44 that faces the top end of the top portion 12. Manually pushing the safety button 18 to overcome the biasing force of the second compression spring 50 and move the safety button to the depressed position (Figure 2B) brings the second axial projection 54 into contact with shutter actuator 48 which in turn moves shutter 46 to an open position allowing communicative access through the central aperture of shutter frame 44. The second axial projection 54 provides a second electrical contact 56 at a central location along its axial length.
Both the first axial projection 32 and the second axial projection 54 are elongate arm- like structures, each defining a longitudinal axis that is substantially parallel to the
longitudinal axis of the housing. The first axial projection 32 provides a first mating surface supporting a surface of the first electrical contact 36, the second axial projection 54 provides a second mating surface supporting a surface of the second electrical contact, and the first and second mating surfaces abut when the housing is in a collapsed position.
With safety button 18 manually held in the depressed position to contact shutter actuator 48 and thereby hold shutter 46 in an open position, manually pushing the bottom portion 14 to overcome the biasing force of the first compression spring 26 moves the bottom portion to a collapsed position with concomitant passage of the first axial projection 32 through the central aperture of the shutter frame 44. As bottom portion 14 is pushed to a collapsed position the first axial projection 32 slidably abuts the second axial projection 54 and the first electrical contact 36 engages second electrical contact 56 (Figure 2C) providing current to electrical components housed within top portion 12 including an audio recorder 58 and a motor 60. Motor 60 drives a spindle 62 with a single degree of freedom of rotational motion in a clockwise or counterclockwise direction to engage or disengage the threaded bolt 34 located at the end of the first axial projection 32. Spindle 62 is a cylindrical rod having first and second ends, attached at its first end to a drive shaft of motor 60 and defining a threaded bore 64 at its second end. Threaded bore 64 is axially aligned with threaded bolt 34, and threaded bore 64 is sized to threadingly engage and receive threaded bolt 34. Once the first electrical contact 36 sufficiently engages the second electrical contact 56 to allow communication of current, motor 60 begins rotation so that threaded bore 64 captures threaded bolt 34 as manual pushing brings the tip of the threaded bolt 34 to the opening of threaded bore 64. The motor 60 rotation also produces a vibration that can be sensed by the holder of the security device 10 serving as a useful indicator that a fully collapsed position has been achieved and that security protocols have been initiated. Once security protocols are cleared and the security threat has been resolved, a predetermined security code can be entered into a system incorporating the security device 10 and a signal can be sent through cellular network communication to security device 10 to initiate a disengaging rotation (an opposite rotation compared to rotation that captures threaded bolt 34) to release threaded bolt 34 and return the bottom portion 14 to its expanded position by motive force from
compression spring 26 and return safety button 18 to its raised position by motive force from compression spring 50.
Figure 3 shows three axial cross-section views illustrating sequential steps (A to C) of manual manipulation of a variant security device 70 to move from an expanded position to a collapsed position. Figure 3A shows the security device 70 in an expanded position. Security device 70 differs from security device 10 by replacing the locking mechanism of a threaded bore and bolt with a retractable latch electrical contact 72 and a latch receptacle electrical contact 76. A minor difference is a positioning of retractable latch electrical contact 72 at a terminal of the first axial projection 32 and positioning of the latch receptacle electrical contact 76 at a terminal of the second axial projection 54 compared to the more central positioning of first and second electrical contacts, 32 and 56, in security device 10. Motor 60 and spindle 62 may be maintained to provide a vibrational indicator of electrical communication between retractable latch electrical contact 72 and latch receptacle electrical contact 76.
Retractable latch electrical contact 72 is housed within the first axial projection 32.
Retractable latch electrical contact 72 is moveable from an extended position (shown in Figure 3) to a retracted position (not shown) and is resiliently biased to the extended position. The first axial projection 32 defines a chamber (not shown for receiving retractable latch 72 when it is in a retracted position. As the bottom portion 14 is pushed to a collapsed position (Figure 3C) and the first axial projection 32 passes through the central aperture of shutter frame 44 retractable latch 72 abuts an end or contacting edge of the second axial projection 54 and is forced to a retracted position. The retractable latch electrical contact 72 and second axial projection 54 abutting interaction is configured to maintain the retractable latch electrical contact 72 in a retracted position until the bottom portion 14 is in a sufficiently collapsed position to align the retractable latch electrical contact 72 with the latch receptacle electrical contact 76, at which point the retractable latch moves to an extended position due to its biasing force and locks the bottom portion 14 in a collapsed position and produces electrical communication between latched electrical contacts 72 and 76. Once security protocols are cleared and the security threat has been resolved, a predetermined security code can be entered into a system incorporating the security device 70 and a signal can be sent
through cellular network communication to security device 70 to initiate a retraction mechanism (not shown) housed with the first axial projection 32 to move retractable latch electrical contact 72 to a retracted position to release first and second axial projections, 32 and 54, from a latched connection and return the bottom portion 14 to its expanded position by motive force from compression spring 26 and return safety button 18 to its raised position by motive force from compression spring 50. A mechanical alternative to computer mediated release of the latched connection is to manually release the latched connection by inserting a pin instrument through reset aperture 74 and a correspondingly aligned bore (not shown) formed in the second axial projection 54 to move retractable latch electrical contact 72 to a retracted position. Manual release and computer mediated release mechanisms may be included alone or in combination.
Figure 4 shows a block diagram schematic of a security system 100 incorporating the security device 10. The telescopic housing of security device 10 comprises a top portion 12 and a bottom portion 14 telescopically coupled to each other. The bottom portion 14 houses a processor 80, a rechargeable battery 81, a memory 83, a cellular network transceiver 84, a SIM card 85, a GPS transceiver 86, a clock 88 and input/output port 89 all operably connected and communicative through computer bus 90. The input/output port 89 is accessible from an exterior surface of the bottom portion 14. A recharge port 82 connected to the rechargeable battery is also accessible from an exterior surface of the bottom portion 14. The input/output port 89 and the recharge port 82 may be provided as a single port combining both functions, for example a USB connector. The components housed within the bottom portion 14 remain active whenever sufficient power is provided by rechargeable battery 81 or recharge port 82, allowing GPS data to be communicated through a cellular communications network 102 at any time independent of the collapsed or expanded position of the telescopic housing of security device 10.
The top portion 12 houses a microphone 94 and a vibrator 96. Components housed in the top portion remain inactive and isolated from computer bus 90 until switch 98 is closed. Switch 98 is a general symbolic designation representing the two step mechanical manipulation shown in Figure 2 (ie., a first step of depressing safety button 18 followed by a second step of telescopically collapsing the bottom portion 14 along the top portion 12) that
aligns first and second electrical contacts in an engaged electrically communicative position. Thus, switch 98 is biased to an open position and is moved to a closed position upon successful completion of the two step mechanical manipulation shown in Figure 2. Once switch 98 is closed, microphone 94 is activated and captured audio data may be stored in memory 83 and communicated over cellular communications network 102. Closing of switch 98 also initiates a security protocol, programmable computer code for which may be stored in memory 83 and executed by processor 80. For example, as part of the security protocol, processor 80 accesses a plurality of predetermined phone numbers stored in the SF card 85 and/or memory 83 and instructs the cellular network transceiver 84 to simultaneously call all of the plurality of predetermined phone numbers to simultaneously interrogate cellular phone devices of a plurality of trusted personal contacts 106 that are previously established as being known to the owner of the security device 10. The security protocol includes rules to determine the number of times the simultaneous call to the plurality of predetermined phone numbers is made without answer before switching to a call to an alternative phone number(s). For example, a tiered categorization of personal contacts may be preset with simultaneous calls attempted to a plurality of trusted primary contacts followed by simultaneous calls to a plurality of trusted secondary contacts if connection with at least one primary contact is unsuccessful. Also, in the event that connection with at least one primary contact is unsuccessful a call can be made to connect with an official emergency response service 108 such as police, ambulance, firemen, and the like. Calls from security device 10 may be made directly to a plurality of trusted personal contacts 106 or may be mediated through a security service 104 set to monitor and assess security protocol implementations for security device 10. The security service 104 is an optional feature that may include one or more human operators and/or may be implemented by computer and algorithmic processing to assist efficient connection of a distress call to at least one trusted personal contact.
In operation, the system 100 will accommodate a plurality of security devices, such as security device 10 or 70, with each security device assigned to a registered owner and programmed to initiate a security protocol customized to each owner's preferences and trusted personal contact call list. The system 100 can include a security service 104 to monitor and assist security protocol implementations from a plurality of security devices. The
system 100 may also include websites and technical support to help owner's customize aspects of a security protocol.
As an example, upon purchase of a security device, such as security device 10 or 70, the purchaser/owner receives a security device packaged in a box similar to that in which a cellular phone would be sold with the packaging containing a clip, USB cable, and electric wall plug adapter for charging.
A pamphlet will be included providing instructions for initial set-up and operation of the security device. Set-up and operation of the security device may be performed by a registered owner or alternatively a registered user if the owner purchased the security device with the intention of providing or gifting it to another individual (eg., a family member). Therefore, in this example owner and user are interchangeable. Initial set-up of the security device may be performed in any convenient manner. In this example, the input/output port is a USB connector formed in the clip of the security device. Instructions will direct owners to connect 110 the security device to the owner's computer by connecting a first end of a USB cable to the security device and a second end of the USB cable to the USB port of their computer. The owner will then go to the website and download and install 112 a software program for set-up of the security device onto their computer. This program will allow the owner to register 114 their security device using the unique identification number listed in the pamphlet as well as a sticker attached to the inside of the packaging box. The owner will be prompted to create a username and password and input the unique identification number to the website to ensure that the security device was not stolen. After the product has been verified as being legally sold, the owner will proceed to select initial set-up options 116 and provide initial set-up data - for example, recording the physical parameters 118 of the person that will be wearing the device (i.e. height, weight, hair colour, ethnicity, age). After the physical parameters have been entered, a numerical code (similar to that of a phone number) will be provided to the owner. That will now be the number linking the security device to the emergency contacts. The owner will then be prompted to download a software application to their mobile phone and input the username, password and identification number. Once this information is confirmed, a message will appear in the mobile phone software application stating that this application is now linked to the security device 120. The owner is then able
to select and program options for the security protocol 122 with the mobile phone connection to the security device and/or to a remote system server.
The registered owner is then prompted to input a plurality of numbers (eg., 4 to 10 mobile phone numbers) of the trusted individuals whom the owner would like to be their plurality of trusted personal contacts 124. A further step to confirm each of these numbers may be included. Once the names and numbers of the plurality of trusted personal contacts are confirmed, if the number listed is a mobile, that trusted personal contact will receive a text 126 stating that they have been selected by the registered owner of the security device as an emergency contact and providing a unique numerical code. If they accept, the trusted personal contact will then be prompted to download a software application which works in conjunction with the security device, once activated. After downloading the software application to their phone, the trusted personal contact will input the numerical code 128 stated in the text into the appropriate fields in the software application user interface. A further step to confirm the numerical code may be included. Once the numerical code is confirmed, the trusted personal contact will receive a message 130 within the software application stating that the trusted personal contact is now connected to the security device owned by the registered owner. Each trusted personal contact connected to the security device receives GPS data from the security device 132 at a predetermined frequency set by the owner. Periodically, for example once a month, the software application may interrogate the trusted personal contact to confirm their status as a trusted personal contact and to confirm their contact information. If the trusted personal contact negates their status and withdraws, then a message will be sent to the software application of the registered owner stating that their trusted personal contact no longer wishes to be contacted in the event of an emergency. The owner is then prompted to replace the number of the withdrawn trusted personal contact with another one. After the withdrawn number is replaced with a new one, the new trusted personal contact will go through the same process as listed above when someone is chosen as a trusted personal contact. If the registered owner has a Twitter account, the security device can be associated with Twitter and GPS location data can be sent to their Twitter followers. The security device can be programmed to adjust frequency of GPS updates to Twitter by using the same software program installed on the owner's computer during initial set-up.
Once the names and numbers are confirmed, the registered owner will then be queried as to how many rings and/or how many repeat calls they wish to have the plurality of trusted personal contacts receive before the call is redirected to Emergency Response Service Personnel (Police, Fire, Ambulance, etc.). Numbers of rings and/or numbers of repeat calls may be specified for each individual trusted personal contact.
The security device owner as well as the plurality of trusted personal contacts, can obtain battery charge/life data as well as the location data at any time by the user interface of software application installed on their respective mobile phones. Historical location data for a security device for the previous one or more hours (eg., 3 hours) set by pre-determined tracking intervals specified by the owner during set-up or any time afterwards may also be accessed by the owner or the plurality of trusted personal contacts as desired.
In a specific example, an owner has mechanically manipulated the security device 140 to activate a preset security protocol which initiates a distress call from the security device simultaneously calling 142 the predetermined plurality of trusted personal contacts. The owner has set the security device to let a first simultaneous call last for 3 rings followed by a second simultaneous call of 3 rings before redirecting 150 the call to Emergency response service personnel. If anyone of the trusted personal contacts answers 144 the call, then incoming call indicators such as ringing and vibrating will stop for the other contacts 146. However, the other trusted personal contacts will still be able to answer and merge into the call 148. There will be a limit as to how many people can merge into the one call.
The owner of the security device, will feel a vibration once the mechanical manipulation of the security device is completed to activate a security protocol that initiates a simultaneous call to the plurality of trusted personal contacts. When anyone of the trusted personal contacts answers the call, the owner will feel 2 vibrations, one second apart 152.
All of the trusted personal contacts - regardless of being the one to answer the call, of merging into the call or not merging into the call - will be able to use the software application 162 installed on their respective mobile phones to view a map of where the registered owner is, as well as velocity of movement, direction of movement, the duration of the signal, and distance of the respective trusted personal contact from the security device. All of this information will be visible for any trusted personal contact that opens the software
application during the distress call. If no one answers the distress call within the specified amount of rings, the call is redirected to an emergency response service and/or a message can be sent to the police concerning the whereabouts of the registered owner with the physical parameters communicated from the security device.
When the security device security protocol is activated, and one of the plurality of trusted personal contacts answers the distress call, the trusted personal contacts are only able to listen. In this example, the trusted personal contacts are not able to speak to the owner of the security device as it is not equipped with a speaker so as not to risk sound from the speaker drawing attention of an abductor or some other subject having criminal intent. Once someone answers the distress call, the security device will record all audio 154 (registered users voice, background noise, etc), for the duration of the battery life. Of the trusted personal contacts, a maximum of 4 of them will be primary contacts. Once a primary contact answers and assesses 156 a distress call, they will be given priority as to whether or not to merge the call with local authorities 158. They can also turn off the distress call to other contacts who are not primary. As well as text other individuals who are closer to the security device 164. They will know this by pulling down the tab listed as "Helpers" in the software application. The Helpers function will list the distance each contact is from the point of the security device, for each contact that answered the distress call or merged into the distress call.
Steps to deactivate the security protocol may be preset to a desired method, but will typically include an option to transfer 160 recorded audio and/or GPS data from the security device to the owners computer. In one example, the security protocol is deactivated by connecting the security device to the registered user's computer and turning it off using the installed software program. When it is connected to the computer, the program will ask the registered owner if they would like to save the audio. If the user selects "Yes", then it will be stored in an appointed file. In another example, security protocol deactivation is achieved by opening the software application on the registered owner's phone and selecting the "Off function. They will then be asked for their password. Once entered correctly, the security protocol will be turned off. They will also be asked whether they want to save the audio. If they select "Yes", the audio will be saved to the memory of the security device. In a further
example, one of the primary contacts will have the option the end the distress call once they are within range of the security device. The next time the registered owner connects their security device to their computer, all the saved data such as the location of where the registered owner activated the security protocol, the duration of the distress call, and audio will automatically be stored in the program.
An illustrative version and several variants of a GPS security device and a system and method incorporating the same have been described above without any intended loss of generality. Further examples of modifications and variation are now provided. Still further variants, modifications and combinations thereof are contemplated and will be apparent to the person of skill in the art.
The security device may be shaped and sized as desired. Typically, the security device will be small enough to avoid notice or be easily concealable, for example within a pocket or a fold of clothing. As shown in Figures 1 to 3 the security device is shaped as a clip, roughly the size of a barrette and is made of plastic. It is black and can be clipped anywhere on a person. Other shapes and sizes may be used to suit a desired implementation.
As shown in Figures 2 and 3 a two-step mechanical manipulation activates a security protocol. For example, to activate a button located on top of the security device is pressed, and then the bottom of the device is squeezed towards the top. Only when both top and bottom portions of the device are squeezed together is the security protocol activated. This two-step mechanical manipulation prevents accidental activations. Other two-step mechanical manipulations may be used as desired as long as a telescopic mechanism is maintained. In some implementations, a one-step manipulation of the telescopic collapsing mechanism may suffice.
Security protocol activation need not be limited to a collapsing mechanism. For example, an activating telescopic mechanism can include a security device resiliently biased to a collapsed position that activates a security protocol when the housing is manually maneuvered to an expanded position.
A shutter mechanism is optional, particularly when a one-step manipulation of the telescopic mechanism is sufficient to activate the security protocol. When included the
shutter may take any conventional form including hinged, retractable or sliding covers to open and close an aperture.
A camera may be optionally included. However, a camera operating continuously will drain battery power. Therefore, camera use will likely not be continuous and security protocol rules may limit the total time of camera activity. The first trusted personal contact to answer a distress call may be given the responsibility of initially activating the camera from the mobile phone application and then subsequently turning the camera on and off within the preset time limits for camera activity.
Holding of the collapsed position of the telescopic housing is sufficient to indicate that a security protocol has been activated. Thus, the vibrator is an optional component. When included the vibrator may be used to indicate multiple events by providing a different vibration pattern for each type of event. For example, a single vibration burst coincident with security protocol activation as compared with two vibration bursts, one second apart, when a distress call is answered. Furthermore, the vibrator may be replaced with any other suitable indicator, for example a diode emitting visible light. The diode could be hidden under a moveable cover, such as false button 20 so as to avoid attraction of unintended attention to the diode. Typically, an audible indicator will not be used.
The basis of the security protocol is that a distress call is initially sent simultaneously to a plurality of trusted personal contacts rather than a corporate emergency response center or official emergency service personnel. This avoids a disadvantage of high overhead cost of an emergency response center which increases the cost that consumers pay to purchase and operate the security device. This also provides an advantage of one or more personal contacts being better suited to assess urgency of a distress call based on familiarity with tone of voice, behavioural tendencies, pre-arranged safety words, daily routines, and the like compared to a stranger at a corporate response center. Provided that a distress call is sent simultaneously to a plurality of trusted personal contacts, further aspects of the security protocol may be adjusted as desired. For example, the simultaneous distress call may be sent in a co-ordinated scheme so that a single connection with any one of the plurality of trusted personal contacts stops the incoming call indicators for the remaining trusted personal contacts. A symbol/icon will then appear at the top of each trusted personal contact's mobile phone display indicating
that the software application is opened due to the activated security protocol. A small description as to whether or not the security protocol is still activated may be provided, as well as the time of the activation and the duration. When the trusted personal contact clicks on the symbol/icon, the application will open a graphic interface on the mobile phone display providing location, time and audio information as suited to a particular implementation. In another example, a tiered responsibility of trusted personal contacts may be preset so that if the trusted personal contact that answers the distress call is not a primary contact, that contact will lose the ability to merge the call with local law enforcement to the first primary contact to merge into the call. In another example, all trusted personal contacts who answer the call, will have the option to text one another.
The security protocol will typically include a redialing feature to mitigate a risk of a dropped distress call or a distress call being answered by a voicemail.
Any type of GPS may be used, for example Global System for Mobile device, a Global Positioning System device and/or an Assisted Global Positioning System. The GPS may be replaced or supplemented with other modules having a location function, for example cell phone tower triangulation.
The GPS data transmission may be modified to accommodate the age of the user of the security device. For example, if the user is a minor, the system may allow the primary contacts to be alerted once the security device moves outside of a pre-determined area. In another example, a user over the age of majority may have the option of interrupting communication of GPS information within a time frame. For instance, a user may wish to purchase a gift for a trusted personal contact, and does not want that contact to know or suspect where the gift is being purchased.
The security device may dispense chemical compositions as part of an activated security protocol. Once a security protocol is activated, a light spray of a liquid can be dispensed onto a user's fingers or hand. For example, the security devices shown in Figures 1 to 3 may be adapted to dispense the liquid from the bottom portion 14 upon removal of false button 20. This liquid will be black light visible for 3 to 5 days. Once the user has this one their hand, they can smear it on their attacker or person creating the unsafe conditions. The harassing individuals, if caught, will then have a black light put on them and the liquid will
then show. Additionally, liquids from each security device may have a unique composition such as a unique combination of concentrations of marker compounds so that each liquid can be uniquely linked to a specific security device. A sample of the liquid may be taken from the accused to determine which security device the liquid came from to help with the investigation of a criminal case. The liquid and its marking function can help to determine whether or not the accused was the assailant in question by linking them to the user of the security device and supplementing GPS and audio recording evidence.
The security device may include a mechanism for the user to speak with a trusted personal contact that answers a distress call. For example, upon activating the security protocol an ear piece that is wirelessly linked (eg, Bluetooth) to the security device may be released for the user to put into their ear. This ear piece may be attached to the bottom portion of the security device until activated. The security devices shown in Figures 1 to 3 may be adapted to release an ear piece from the bottom portion 14 upon removal of false button 20. The user will then put this ear piece into their ear, and be able to speak to anyone who has answered the distress call. Conversations occurring while the security protocol is active may be recorded and stored in the memory of the security device, until transferred or discarded.
Remote centrally located network linked servers and/or human monitors may assist, control or intervene with any part of the security device set-up process or security protocol process.
The security device may be operated with any type of controller module including a processor, microcontroller, microprocessor, system on chip for sensing a mechanical manipulation of the housing, generating a signal to activate a security protocol and sequence control signal to execute the activated security protocol.
The communication network for the security device need not be limited to a cellular phone network. The network may be a single network or a combination of multiple networks. For example, the network may include the internet and/or one or more intranets, landline networks, wireless networks, and/or other appropriate types of communication networks. In another example, the network may comprise a wireless telecommunications network (e.g., cellular phone network) adapted to communicate with other communication networks, such
as the Internet. In some examples, when a computer network is used, the computer network will make use of a TCP/IP protocol (including protocols based on TCP/IP protocol, such as HTTP, HTTPS or FTP).
Communication between remote servers and mobile phones involved in a security device set-up or an activated security protocol may be adapted to follow any computer communication standard including Extensible Markup Language (XML), Hypertext Transfer Protocol (HTTP), Java Message Service (JMS), Simple Object Access Protocol (SOAP), Lightweight Directory Access Protocol (LDAP), and the like.
The remote server computer may be any combination of hardware and software components used to store, process and/or provide images, audio, location data, and action options for trusted personal contacts and/or security device users. The server computer components such as storage systems, processors, interface devices, input/output ports, bus connections, switches, routers, gateways and the like may be geographically centralized or distributed. The server computer may be a single server computer or any combination of multiple physical and/or virtual servers including for example, a web server, an image server, an application server, a bus server, an integration server, an overlay server, a meta actions server, and the like. The server computer components such as storage systems, processors, interface devices, input/output ports, bus connections, switches, routers, gateways and the like may be configured to run one or more applications to, for example, monitoring and compiling location data for a plurality of security devices, maintaining records for each registered user of a security device including records for physical parameters and head shot image, periodically confirming a trusted personal contact data table for each security device; activating mobile phone alerts during an activated security protocol, providing action options through mobile phone displays during an activated security protocol, and providing an established protocol for communication with an Emergency Response Service.
The security device set-up may include submission of one or more current pictures of a registered user. The system may accommodate any image file including JPEG, PNG, GIF, PDF, RAW, BMP, TIFF, MP3, WAV, WMV, MOV, MPEG, AVI, FLV, WebM, 3 GPP, SVI and the like.
Set-up and security protocol data, prompts and actions may be represented by any convenient form or user interface element including, for example, a window, a tab, a text box, a button, a hyperlink, a drop down list, a list box, a check box, a radio button box, a cycle button, a datagrid or any combination thereof. Furthermore, the user interface elements may provide a graphic label such as any type of symbol or icon, a text label or any combination thereof. Any desired spatial pattern or timing pattern of appearance of user interface elements may be accommodated by a computing device linked to the security device or a networked system incorporating the same. Parameters or selections may be represented through visual and/or audio interface. Any combination of touch command, voice command or pointer commands may be accommodated.
The security device and networked systems incorporating the same as described herein and each variant, modification or combination thereof may also be implemented as a method or code on a non-transitory computer readable medium (i.e. a substrate). The computer readable medium is a data storage device that can store data, which can thereafter, be read by a computer system. Examples of a computer readable medium include read-only memory, random-access memory, CD-ROMs, magnetic tape, optical data storage devices and the like. The computer readable medium may be geographically localized or may be distributed over a network coupled computer system so that the computer readable code is stored and executed in a distributed fashion.
Embodiments described herein are intended for illustrative purposes without any intended loss of generality. Still further variants, modifications and combinations thereof are contemplated and will be recognized by the person of skill in the art. Accordingly, the foregoing detailed description is not intended to limit scope, applicability, or configuration of claimed subject matter.
Claims
1. A security device comprising:
an elongate telescopic housing comprising a first portion telescopically coupled to a second portion, the housing telescopically slidable from an expanded position to a collapsed position;
a microphone, a GPS module, a network communications module and a power source contained in the housing;
a first electrical contact and a second electrical contact moving from a disengaged position to an engaged position providing electrical communication when the housing is moved from the expanded position to the collapsed position;
a controller generating an activation signal when the first electrical contact and the second electrical contact are in the engaged position; and
the network communications module configured to simultaneously contact a plurality of trusted personal contacts upon receiving the activation signal, each of the plurality of trusted personal contacts being a natural and individual person known to a user of the security device.
2. The security device of claim 1, wherein the housing is resiliently biased to an expanded position.
3. The security device of claim 1, further comprising a safety mechanism supported within an interior chamber of the housing, the safety mechanism moveable from a closed position to an open position, the closed position of the safety mechanism limiting telescopic movement of the housing, the open position of the safety mechanism permitting telescopic movement of the housing and permitting movement of the first and second electrical contacts to the engaged position.
4. The security device of claim 3, wherein the safety mechanism comprises a safety button accessible from an exterior surface of the housing, the safety button controlling a shutter located centrally within the interior chamber of the housing, an open position of the shutter permitting telescopic movement of the housing and permitting movement of the first and second electrical contacts to the engaged position.
5. The security device of claim 4, wherein the shutter is biased to a closed position.
6. The security device of claim 1, wherein the first electrical contact is supported on a first projection arm and the second electrical contact is supported on a second projection arm.
7. The security device of claim 6, wherein the first and second projection arms each define a longitudinal axis that is substantially parallel to a longitudinal axis defined by the housing.
8. The security device of claim 7, wherein the first projection arm provides a first mating surface supporting a surface of the first electrical contact, the second projection arm provides a second mating surface supporting a surface of the second electrical contact, and the first and second mating surfaces abut when the housing is in a collapsed position.
9. The security device of claim 1, further comprising a reversible fastener mechanism to hold first and second electrical contacts in an engaged position.
10. The security device of claim 9, wherein the reversible fastener mechanism comprises a motor driven threaded bore and a corresponding threaded bolt, the threaded bore located proximal to an end of the first electrical contact and the threaded bolt located proximal to an end of the second electrical contact.
11. The security device of claim 10, wherein a rotation of the threaded bore to capture the threaded bolt is initiated by electrical communication between the first and second electrical contacts, and a counter rotation of the threaded bore to release the threaded bolt is initiated by a signal received by the network communications module.
12. The security device of claim 9, wherein the reversible fastener mechanism comprises a retractable latch and a latch receptacle, the retractable latch located proximal to an end of the first electrical contact and the latch receptacle located proximal to an end of the second electrical contact.
13. The security device of claim 9, wherein the reversible fastener mechanism comprises a retractable latch and a latch receptacle, a surface of the retractable latch supporting a surface of the first electrical contact and a surface of the latch receptacle supporting a surface of the second electrical contact.
14. The security device of claim 12 or 13, wherein the latch receptacle receives the retractable latch when the first and second electrical contacts are in the engaged position, and retraction of the retractable latch from the latch receptacle is initiated by a signal received by the network communications module.
15. The security device of claim 1, wherein the first portion and the second portion of the telescopic housing are co-axially aligned.
16. The security device of claim 15, wherein the microphone is contained in the first portion and the power source, the cellular communications module, and GPS module are contained in the second portion.
17. The security device of claim 16, wherein the microphone is activated when the housing is in the collapsed position and the first and second electrical contacts are in the engaged position.
18. The security device of claim 16, wherein the GPS module and the cellular communications module remain active in both the expanded position and the collapsed position of the housing.
19. The security device of claim 16, further comprising a memory and a clock contained in the second portion, the memory configured to record audio and GPS data linked to a time stamp.
20. The security device of claim 16, further comprising a vibrator mechanism contained in the first portion, the vibrator mechanism activated for a time-limited period when the housing is in the collapsed position and the first and second electrical contacts are in the engaged position.
21. A personal security system comprising:
a plurality of security devices each comprising a network communications module operably connected to a network and each comprising a memory for storing contact data for a plurality of trusted personal contacts, each of the plurality of trusted personal contacts being a natural and individual person known to a user of each security device;
each security device configured to activate a security protocol upon a mechanical manipulation of a housing of the security device;
the security protocol comprising a simultaneous contact from the network communications module of an activated security device to the plurality of trusted personal contacts.
22. A computer-implemented method for providing personal security comprising:
registering a user name, at least one physical parameter of the user and a unique identifier for a security device;
storing contact data for a plurality of trusted personal contacts in a memory of the security device, each of the plurality of trusted personal contacts being a natural and individual person known to a user of each security device;
activating a security protocol upon receiving a signal generated by a mechanical manipulation of a housing of the security device; and
simultaneously contacting the plurality of trusted personal contacts subsequent to the security protocol activation.
23. A computer readable medium embodying a computer program for providing personal security comprising:
computer readable code for registering a user name, at least one physical parameter of the user and a unique identifier for a security device;
computer readable code for storing contact data for a plurality of trusted personal contacts in a memory of the security device, each of the plurality of trusted personal contacts being a natural and individual person known to a user of each security device;
computer readable code for activating a security protocol upon receiving a signal generated by a mechanical manipulation of a housing of the security device; and
computer readable code for simultaneously contacting the plurality of trusted personal contacts subsequent to the security protocol activation.
24. A security device comprising:
an elongate telescopic housing comprising a first portion telescopically coupled to a second portion, the housing telescopically slidable from a first position to a second position;
a microphone, a location module, a network communications module and a power source contained in the housing; and
a controller generating an activation signal when the housing is moved from the first position to the second position.
25. The security device of claim 24, wherein the first position is an expanded position, the second position is a collapsed position and the housing is resiliently biased to the first position.
26. The security device of claim 24, wherein the second position is an expanded position, the first position is a collapsed position and the housing is resiliently biased to the first position.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CA2016/050048 WO2017124172A1 (en) | 2016-01-21 | 2016-01-21 | Gps security device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CA2016/050048 WO2017124172A1 (en) | 2016-01-21 | 2016-01-21 | Gps security device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017124172A1 true WO2017124172A1 (en) | 2017-07-27 |
Family
ID=59361116
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CA2016/050048 Ceased WO2017124172A1 (en) | 2016-01-21 | 2016-01-21 | Gps security device |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2017124172A1 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107565370A (en) * | 2017-10-18 | 2018-01-09 | 大族激光科技产业集团股份有限公司 | The optical gate control method and system of a kind of laser |
| CN109035693A (en) * | 2018-09-04 | 2018-12-18 | 大连大学 | The traceable adult safe bracelet in the position of more options mode |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2053622A (en) * | 1979-07-13 | 1981-02-04 | Emerald Electronics Ltd | Radio transmitter and alarm system |
| WO1984000428A1 (en) * | 1982-07-19 | 1984-02-02 | Hubert Matthew Du Vallon Lohan | Improvements in security warning devices |
| US20020080028A1 (en) * | 2000-12-06 | 2002-06-27 | Marlena Edwards | Emergency Alert system and thumb actuated button emergency alert communicator |
| US20100311387A1 (en) * | 2009-06-05 | 2010-12-09 | Melinda Marie Cameron | Panic activated locator (p.a.l.) |
| US20140120863A1 (en) * | 2009-11-11 | 2014-05-01 | Daniel Lee Ferguson | Wireless device emergency services connection and panic button, with crime and safety information system |
-
2016
- 2016-01-21 WO PCT/CA2016/050048 patent/WO2017124172A1/en not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2053622A (en) * | 1979-07-13 | 1981-02-04 | Emerald Electronics Ltd | Radio transmitter and alarm system |
| WO1984000428A1 (en) * | 1982-07-19 | 1984-02-02 | Hubert Matthew Du Vallon Lohan | Improvements in security warning devices |
| US20020080028A1 (en) * | 2000-12-06 | 2002-06-27 | Marlena Edwards | Emergency Alert system and thumb actuated button emergency alert communicator |
| US20100311387A1 (en) * | 2009-06-05 | 2010-12-09 | Melinda Marie Cameron | Panic activated locator (p.a.l.) |
| US20140120863A1 (en) * | 2009-11-11 | 2014-05-01 | Daniel Lee Ferguson | Wireless device emergency services connection and panic button, with crime and safety information system |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107565370A (en) * | 2017-10-18 | 2018-01-09 | 大族激光科技产业集团股份有限公司 | The optical gate control method and system of a kind of laser |
| CN107565370B (en) * | 2017-10-18 | 2020-05-01 | 大族激光科技产业集团股份有限公司 | Optical gate control method and system of laser |
| CN109035693A (en) * | 2018-09-04 | 2018-12-18 | 大连大学 | The traceable adult safe bracelet in the position of more options mode |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20120282886A1 (en) | Systems and methods for initiating a distress signal from a mobile device without requiring focused visual attention from a user | |
| CN104468837B (en) | The binding method and device of smart machine | |
| EP2930704B1 (en) | Method and device for remote intelligent control | |
| US20150215753A1 (en) | System and method for remote care and monitoring using a mobile device | |
| US20130231077A1 (en) | Personal security system | |
| US20100124900A1 (en) | Emergency alert feature on a mobile communication device | |
| EP3528481A1 (en) | Emergency call-for-help method and system based on fingerprint identification for mobile terminal, and mobile terminal | |
| US20120282877A1 (en) | Systems and methods for initiating a stand-by signal and a distress signal from a mobile device | |
| CN104113630A (en) | Emergency calling method and device of mobile electronic device | |
| JP2006526327A (en) | System for managing context related information, mobile station, method and computer program product | |
| CN105160742A (en) | Method and system for carrying out judgment, alarming and information shielding on forced unlocking | |
| US20140120860A1 (en) | Systems and methods for user customized security responses | |
| EP1898563A2 (en) | Method and system for remotely controlling domestic equipment | |
| US20120282878A1 (en) | Systems and methods for initiating a stand-by signal and a distress signal from a mobile device | |
| EP2605496B1 (en) | Access restriction to the resources of a terminal | |
| ES2304623T3 (en) | PROCEDURE AND SYSTEM FOR THE ENTRY OF USER INSTRUCTIONS OF A GOVERNABLE TELECOMMUNICATION DEVICE BY THE USER. | |
| US20140120872A1 (en) | Systems and methods for altering the properties of a mobile device in response to a make ready signal | |
| CN109167718A (en) | Message display method, device, terminal and storage medium in session window | |
| WO2017124172A1 (en) | Gps security device | |
| CN109903765A (en) | Sound control method and device | |
| EP2789154B1 (en) | Cellular telephone and computer program comprising means for generating and sending an alert | |
| CN103796155A (en) | Method and device for setting prompt according to content in text message | |
| GB2518424A (en) | Security System and Method | |
| CN109343710A (en) | Message reply method and device | |
| CN104902055B (en) | Contact person's creation method and device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16885471 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16885471 Country of ref document: EP Kind code of ref document: A1 |