WO2025166412A1 - System and method for securely capturing contemporaneous events - Google Patents
System and method for securely capturing contemporaneous eventsInfo
- Publication number
- WO2025166412A1 WO2025166412A1 PCT/AU2025/050084 AU2025050084W WO2025166412A1 WO 2025166412 A1 WO2025166412 A1 WO 2025166412A1 AU 2025050084 W AU2025050084 W AU 2025050084W WO 2025166412 A1 WO2025166412 A1 WO 2025166412A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- software application
- user
- user device
- data
- icon
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/65—Environment-dependent, e.g. using captured environmental data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72418—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
- H04M1/72424—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with manual activation of emergency-service functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72469—User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
Definitions
- the invention relates to a system and method for securely capturing contemporaneous events. Especially but not exclusively, the invention relates to a system and method for securely capturing contemporaneous events in the environment of a user for personal security and safety of the user.
- the invention may be used for improving personal safety of a user of a communications device in a violence such as a domestic violence environment and will be described hereinafter with reference to this application. However, it will be appreciated that the invention is not limited to this particular field of use. It may be used for other purposes such as emotional tracking for legal and/or medical applications.
- the panic button functionality enables victims to transmit an emergency signal / request for assistance to others, e.g. to one or more family members, neighbours, emergency authorities, etc.
- the touching of the panic button or icon initiates a corresponding software application, and the user is then able to navigate the software application in order to initiate the emergency contact.
- an abuser can easily prevent a victim from contacting others for assistance by stealing or intentionally damaging / destroying the device which the victim was intending to use to contact a family member, neighbour or emergency service provider.
- the abuser may physically prevent the victim from accessing the emergency software application, e.g. by deleting the software application, or by preventing the victim from selecting the relevant touchscreen icon that executes the software application (or functionality thereof).
- Audio and/or video of an abuse taking place, or the circumstances leading up to the abuse taking place, or even the actions of an abuser following an abuse often forms critical evidence.
- most portable handheld devices such as mobile phones enable the recording of audio and/or video
- the software applications that are used to operate such hardware are typically not easily accessible, and importantly, do not lend themselves to being accessed quickly and discreetly by victims of abuse, i.e. in a surreptitious manner, such that the abuser is not aware that the victim’s device / software application is being accessed and/or is operational at the relevant time.
- the software application provides a prompt to the user to replace the first software application icon with the second software application icon.
- the software application is configured to automatically determine whether the second software application icon requires modification, including resizing or reformatting, and apply the any required modifications before changing the first software application icon to the second software application icon.
- the display of the user device may be configured to automatically dim to reduce visibility and/or to minimise the risk of drawing attention.
- the software application is configured to default to storing recorded data in a data storage facility, unless the user adjusts the settings to store the recorded data on the user device.
- the software application is configured to be actuated and/the SOS activation is configured to be triggered using least one of the following: selecting an icon on a touchscreen of the user device; at least one physical button of the user device; at least one voice command; detection of the orientation of the user device, or facial recognition.
- system further provides additional user icons, each having a graphical representation different from the graphical representations of other icons displayed on the user device.
- the software application requires registration of an image of the user during installation and remains inoperable or hidden unless the application receives a matching user image captured by the data capture module at a predetermined sampling rate, the data capture module being in a form of a camera, or a camara and microphone.
- the user device comprises a display screen, and the software application is configured to modify its visual representation by displaying the first software application icon on the display screen and replacing the first software application icon with the second software application icon.
- the secure communication link between the user device and the remote server uses end-to-end encryption to protect the recorded data during transmission.
- the user device upon activating the data capture module or actuating the software application, or triggering any other emergency feature of or associated with the software application, the user device is configured to automatically dim its display (e.g. to prevent detection).
- the software application comprises its own location settings independent of the location settings of the user device, and wherein, when the software application’s location settings are enabled, the software application is configured to determine the location of the user device and automatically identify and/or communicate with at least one service provider near the determined location.
- a photo and identification are required for identity verification.
- the software application is configured to automatically scan the identify information against the photo (e.g., for identity matching).
- the software application is further configured to determine at least one user attribute from the provided identity information, wherein the user attribute comprises at least one of gender, age, or address information.
- the software application upon determining that a current location of the user, is further configured to display emergency contact details relevant to the user’s current location.
- the directory is configured to establish a secure, access- controlled platform for the service provider to register and be listed while restricting visibility of their information from unauthorised users.
- the directory is configured to categorise service providers based on the location of the user device.
- the directory is configured to categorise service providers based on the gender, age and auto-setting, user selection of the medical profession and/or other criteria.
- the software application is configured to operate in incognito mode, running discreetly in the background without appearing in standard settings of the user device, and wherein all configurations and settings of the software application are contained within the software application itself (e.g., subscribed account of the software application itself) for preventing unauthorised modifications or for preventing drawing undesirable attention.
- the software application remains completely concealed from services (e.g. accounting) unless accessed via an associated the storage facility such as cloud storage facility, rather than being stored on the user device.
- the software application comprises an authentication monitoring module that is configured to detect multiple failed login attempts.
- the emergency alert comprises one or more of location data, contact details, and a pre-set message, which can be configured to notify the emergency contact(s) (e.g., police).
- the emergency contact(s) e.g., police
- the user device is a cellular device
- the software application is configured to detect the proximity of the user device and a predefined external device that is also a cellular device by monitoring cell tower connections, wherein proximity detection is based on identifying when both devices are connected to the same or nearby cell towers.
- the software application upon detecting the predefined external device within a predefined range of the user device, is configured to automatically generate and transmit an alert to the user device.
- the software application is configured to retrieve and analyse historical cell tower connection data to determine whether the predefined external device was within the predefined range during the period the user device was off, and upon such determination, generate and transmit an alert to the user device and/or an emergency contact, and preferably, stored as a back up, e.g., in the data storage facility
- access to stored information requires user authentication through credentials associated with the generated email account.
- the registration includes sending an automated message with login details, the message being configured to be removed from the user device after a predetermined period
- the software application is further configured to analyse verbal and non-verbal emotional indicators within the recorded data using an artificial intelligence (Al) module for detecting patterns of coercion or distress.
- Al artificial intelligence
- the software application is configured to generate a graphical representation of emotional data over time for review by authorised personnel.
- the software application is configured to categorise and display behavioural patterns based on user-selected emotional indicators, timestamped location data, and recorded interactions on the user device.
- the present invention resides in a computer-implemented method for securely capturing and storing contemporaneous events, the method comprising: executing, on a user device, a software application configured to capture and store recorded data; modifying a visual representation of the software application by displaying a first software application icon on the user device and replacing the first software application icon with a second software application icon that is visually distinct from the first software application icon, thereby disguising presence of the software application on the user device; initiating and controlling a recording function via the software application to capture realtime environmental events as recorded data using at least one data capture module of or associated with the user device; processing the recorded data for secure transmission; establishing a secure communication link between the user device and a remote server (or store in back end until connection is made) transmitting the recorded data from the user device to the remote server via the secure communication link (preferably, even if software application is not open); receiving, at the remote server, the transmitted recorded data from the user device; relaying, by the remote server, the recorded data to a data storage facility
- the step of storing the recorded data in the data storage facility for subsequent retrieval is performed using a remote server.
- the present invention resides in a system for securely capturing contemporaneous events, the system comprising: at least one user device; a remote server in communication with the user device; and a data storage facility in communication with the remote server, wherein the user device comprises: a processing unit, preferably, a storage medium, and a a display screen, wherein the processing unit is configured to execute a software application (preferably, stored in the storage medium,) the software application being configured to: modify its visual representation by displaying a first software application icon on the display screen and changing the first software application icon to a second software application icon that is visually distinct from the first software application icon, thereby disguising presence of the software application on the user device, activate a data capture module that is part of or external to but operatively connected to the user device to record environmental events in real-time as a recorded data, and establish a secure communication channel with the remote server for transmitting the recorded data, such that the recorded data is transmitted to and stored by the data storage facility, wherein the remote server is configured to receive the
- the present invention resides in a method of securely capturing contemporaneous events in the environment of a user, the method comprising the steps of: providing application installation instructions to a user communications device (i.e., a user device) such that the device displays an icon representing the application with a first graphical representation; executing the installation application on the communications device such that the device initiates a user application (i.e., a software application) such that the device displays an icon with a second graphical representation which is different to the first graphical representation; configuring the communications device via actuation of the user application to record events in the environment of the user; automatically uploading or transmitting the recorded events to a remote storage device or a remote server.
- the method further includes the step of configuring the communications device to display only a third icon with a third graphical representation which is different to the first or second graphical representations.
- the icon having the first graphical representation is removed from any display once the installation application is executed.
- the icon having the second graphical representation is removed from any display on the device once the installed application is executed.
- the first, second or third graphical representations are user selectable or adapted from a preselected user icon image.
- the remote storage device is inaccessible by the communication device via the user application.
- the recorded events comprise data acquired by at least one data communication module (e.g., microphone, cameras or inertial sensor) of or associated with the communications device.
- data communication module e.g., microphone, cameras or inertial sensor
- the recorded events comprise data acquired by the communications device including from one or more microphones, cameras or inertial sensors.
- user actuation of the application includes touchscreen entry, rapid tapping of touchscreen, voice command, facial recognition image, and/or communication device orientation.
- the communications device communicates with the remote storage device via a cellular telephone network or the Internet.
- when user actuation is by user touchscreen entry method further includes providing additional user icons each having a respective graphical representation being different to other icon graphical representations.
- the remote data storage is stored in the storage facility (e.g. cloud) whereby the user executed application records data and sends to the remote data storage until a user command is received to discontinue application execution or recorded data upload.
- the user command to discontinue application execution is provided in the form of an alphanumeric password or a user voice command.
- the remotely stored data is encrypted and password protected.
- the actuation is adjustable based on user settings to trigger different responses, including actions associated with an identified abuser or victim.
- the method further includes the step of configuring the user application to be actuated in response to one or more predetermined user facial expressions, or proximity of an independent predetermined person.
- the method further includes the step of user training the application for user facial expressions, images of one or more independent predetermined people, specific voice commands, and/or voice stress tones (preferably for acting, monitoring or assisting).
- the user application is configured to communicate with a remote training database configured to receive user facial expressions, images of one or more independent predetermined people, specific voice commands, and/or voice stress tones such that machine learning or artificial intelligence algorithms of the training database are configured to communicate with the user application to validate or predict the user facial expressions, independent predetermined people, voice commands and/or voice stress tones, and preferably to suggest action(s) to be taken if emergency function is activated.
- a remote training database configured to receive user facial expressions, images of one or more independent predetermined people, specific voice commands, and/or voice stress tones such that machine learning or artificial intelligence algorithms of the training database are configured to communicate with the user application to validate or predict the user facial expressions, independent predetermined people, voice commands and/or voice stress tones, and preferably to suggest action(s) to be taken if emergency function is activated.
- the method further includes the step of configuring the communications device to duplicate a device unlock screen, a first unlock screen configured receive a password set by the user application such that causes the communication device to present a second unlock screen being the device’s unlock screen requiring the device’s unlock password.
- the method further includes the step of registering a user’s image at installation such that the user application is configured to be inoperable or not visible absent receiving an image from a device camera sampled at a predetermined rate.
- the present invention resides in computer-implemented method of providing assistance to a user in a conflict or crisis situation, including providing, by one or more processors, a software application for download via an application store for installation on at least one user’s device (i.e., at least one user device), the software application appearing as an icon on the user device once downloaded and having a first graphical representation, providing, by one or more processors, a prompt to the user to change the first graphical representation to a second different graphical representation therefore disguising the availability of the software application on the user’s device, providing, by one or more processors, a recording function via the software application that enables user activated recording of video and/or audio using hardware of or associated with the user device, and causing, by one or more processors, any video and/or audio captured using the recording function to be uploaded substantially in real-time to data storage facility (e.g., a cloud storage facility), thereby ensuring that any recorded video and/or audio is recorded and stored as the recording transpires, such that
- data storage facility
- the data storage facility is in communication with a remote server that is operatively connected to the user’s device (i.e., a user device).
- system may further comprise a third component configured to capture and store data upon activation, wherein the third component is located on a separate device.
- the third component is configured to activate features (e.g., recording or an emergency/SOS function), with the captured data being stored in a remote data storage facility or an associated user device.
- features e.g., recording or an emergency/SOS function
- the first graphical representation includes one or more of a title or logo of the software application, hence the first graphical representation that is automatically nominated for the software application will not disguise the software application.
- the second graphical representation selected by the user may include one or more of an icon associated with another software application operating on the user device, a graphical representation that is available for selection from an icon library, a historical photo stored in a photo library of the user device, or a photo or screenshot captured by the user using the device, and preferably scaled/resized automatically to represent original icon.
- the second graphical representation may be selected to disguise the nature of the software application.
- the person skilled in the art will appreciate that where the user is a potential victim of abuse, the ability to disguise the icon relating to a software application that enables the victim of abuse to record abuse events and seek assistance, makes it more difficult, or impossible, for an abuser to identify the presence of the software application on the victim’s device.
- the method further includes identifying, by one or more processors, whether editing of the selected second graphical representation is required (e.g. re-sizing, etc) to fit the icon previously displayed, and based on determining that such editing is required, performing the required editing.
- editing of the selected second graphical representation e.g. re-sizing, etc
- the method further includes, based upon acceptance of the second graphical representation by the user, the system replacing the first graphical representation with the second graphical representation.
- the removed/replaced icon is not locatable within the user device.
- the software application further enables the user to define a preferred method for enabling the user to activate the recording function in a discreet manner. For example, the user may select that activation of the recording function may be initiated by the user by touching an icon on the user device touchscreen. Where the user may prefer to have the ability to activate the recording function more surreptitiously, the user may select that activation of the recording function is initiated by the user activating a physical button of the device without the requirement to observe the screen of the device (e.g. a volume button, a short duration press of a power button, etc).
- a physical button of the device without the requirement to observe the screen of the device (e.g. a volume button, a short duration press of a power button, etc).
- the software application provides additional functionality including one or more of a user diary for incident (e.g. domestic violence) recordal and reporting, a calendar that enables users to store information and make calendar appointments, including providing the ability to view previously attended appointments, a daily planner (operable to provide visual reminders to users), an emergency assistance service provider directory with links to service provider websites to assist users seeking to locate and make contact with an appropriate service provider, and to also assist service providers in promoting/providing their services.
- a user diary for incident e.g. domestic violence
- a calendar that enables users to store information and make calendar appointments, including providing the ability to view previously attended appointments
- a daily planner operble to provide visual reminders to users
- an emergency assistance service provider directory with links to service provider websites to assist users seeking to locate and make contact with an appropriate service provider and to also assist service providers in promoting/providing their services.
- One or more of the abovementioned additional functions may be directly related to the conflict or crisis situation.
- the user may log (and thereby store) various events and interactions with their abuser, or with service providers assisting the user to deal with the conflict or crisis situation, in the user diary, calendar, daily planner, etc.
- the logging and storage of such information may provide additional evidence that assists the user to prove the guilt of an alleged abuser.
- the directory may function as a medical directory encompassing health and physical wellbeing services, providing access to service providers that are otherwise protected or not publicly listed for safety reasons. Users may also have the ability to request the addition of new medical service providers so that they have broader access to essential support. Additionally, the platform may allow advertising of these protected services and facilitate future service expansion. To increase the chances of connecting victims with the right services, the system may enable direct service requests from any subscriber to professionals based on their specific needs. Users may also log/enter financial, emotional, and medical impacts, so that important information is retained. The main features may function without requiring an internet connection, allowing users to document incidents, interactions, and emotional tracking data in real time. This recorded information may support credibility, document actions that are taken for protection, and can also serve as evidence in legal or other relevant proceedings. In one embodiment, the software application also enables the user to access an SOS facility such that a message is transmitted to pre-defined emergency contacts indicating that the user is in a state of distress as a result of the conflict or crisis situation.
- activation of the recording function automatically causes the SOS facility to be activated.
- the SOS facility further enables SOS emergency indications to be transmitted to the pre-defined emergency contacts of the user, including indications regarding one or more of GPS coordinates of the user device at the time the SOS function is activated, updates to any changes to the physical location of the user device by repeated transmission of GPS coordinates as those coordinates change, any associated video and/or audio captured using the recording function, and additional information uploaded by the user using the abovementioned additional functionality of the software application, including the diary, calendar, and/or daily planner.
- video and/or audio may be accompanied by GPS location data of the user’s device.
- the one or more processors is configured to provide permission-based access. This may be suitable for law enforcement (e.g., police) in cases where the user and software application are missing, or the user is unable to advocate for themselves. This access may be enabled via an administrative function, requiring a case number to authorise information release to relevant authorities.
- law enforcement e.g., police
- This access may be enabled via an administrative function, requiring a case number to authorise information release to relevant authorities.
- the system provides a recording function that enables user-activated video and/or audio recording, with real-time or near real-time uploading to a secure data storage facility, such as cloud storage facility. Additionally, recorded data may be linked to a chosen email account, allowing secure storage and retrieval.
- a secondary login option may be available in the storage system, enabling users to grant access to authorities or caseworkers when needed so that critical evidence remains accessible even if the user's device is deactivated or damaged.
- system further comprises a remote server and the data storage facility is in operative communication with the remote server and the user device.
- the present invention resides in a computer-readable medium that when executed on a computer, causes one or more processors of the computer to perform steps including providing a software application for download via an application store for installation on at least one user’s device (i.e., at least one user device), the software application appearing as an icon on the user device once downloaded and having a first graphical representation, providing a prompt to the user via the software application to change the first graphical representation to a second different graphical representation thereby disguising the software application, providing a recording function via the software application that enables user activated recording of video and/or audio using hardware associated with the user device, and causing any video and/or audio captured using the recording function to be uploaded substantially in real-time to a data storage facility (e.g.
- the system or software application include a logging feature for automatically recording time, date, location, and nearby phone numbers at the time of SOS activation. Users may predefine a list of individuals whose proximity causes distress, allowing the system to automatically flag and log their presence when an SOS is triggered. If any of these individuals are detected near the user’s location during activation, the system may highlight their presence within the immediate vicinity.
- the cloud storage facility is in communication with a remote server that is operatively connected to at least one user device).
- FIG. 1 provides an overview of a system according to an embodiment of the present invention showing, in particular, the interaction of various system components;
- FIG. 2 illustrates a diagram associated with an exemplary server component of the system illustrated in FIG. 1 ;
- FIG. 4 illustrates an exemplary flow diagram of a process that enables the user to change the first graphical representation associated with an app icon to a second different graphical representation therefore disguising the availability of the software application on the user’s device;
- FIG. 5 illustrates an exemplary flow diagram of a process that enables the user to activate a recording function that enables recording of video and/or audio in a conflict or crisis situation, the recording uploaded substantially in real-time as the conflict or crisis situation transpires to a data storage facility;
- FIG. 6 illustrates a further exemplary interface which provides an SOS facility to be activated, wherein SOS emergency indications are transmitted to pre-defined contacts of the user;
- FIG. 7 illustrates a further exemplary interface for accessing various additional functionality of the software application including a diary, daily planner, calendar, and directories.
- the pre3sent invention may implement visual prompts, providing a more accessible interface for individuals who struggle to navigate conventional systems. Furthermore, it may facilitate emotional tracking for both non-verbal and verbal users. It may be used for assessing psychological impacts, support suicide prevention, identify safe or unsafe spaces etc.
- FIG. 1 there is shown a system and method of providing assistance to a user (30) (also referred to herein as a victim) in a conflict or crisis situation involving an actual or potential abuser (62).
- the system and method provide a platform that hosts a computer-executable software application (40), wherein the application (40) is accessible by a plurality of users (30) who prefer to have access to safe and private interaction with a software application capable of recording the user’s input, including details relating to incidents experienced by the user (30) and any additional information that may be relevant with respect to a particular conflict or crisis situation experienced by the user (30).
- the system utilises a remote server (20) in communication with one or more data communication devices , i.e., one or more user devices (50) associated with user(s) (30).
- the system may include an activation component that can trigger the SOS function/emergency function or other automated safety features so that important security or emergency measures can be activated as needed.
- the remote server (20) may be a central server or remote central server and it may maintain one or more processors and/or databases for performing functions, including providing the software application (40) for download via an application store for installation on the user’s device (50).
- the software application (40) (which may also be referred to as user application (50)) appears as an icon (55) on the user device (50) once downloaded, the icon having a first graphical representation.
- the central server (20 via software application (40), provides a prompt to the user (30) to change the appearance of the icon (55) to a second (different) graphical representation (60), therefore disguising the availability of the software application (40) on the user’s device (50).
- the user (30) may access the software application (40) in a discrete manner that will prevent or at least reduce the opportunity for others to gain access to the software application (40) and/ information / data / media stored thereon.
- the icon may be invisible and accessed by tapping an existing home screen icon or similar on the user device (50).
- the user (30) may also choose to access the software application (40) by selecting one or two existing icons, where one icon opens another software application and the second, when combined with face recognition, triggers SOS activation/activation of emergency feature.
- the remote server or one or more processors and/or databases associated with the remote server (20) may be utilised to perform additional functions including providing a recording function, also implemented by the software application (40), that enables the user (30) to activate recording of video and/or audio (70) of the situation as it transpires.
- a recording function also implemented by the software application (40)
- This may be achieved using hardware/data capture module of or associated with the user device (50), and any video and/or audio (70) captured using the recording function is uploaded in substantially real-time to a data storage facility/remote data storage facility, most preferably a cloud storage facility (75).
- the data storage facility may be a company storage facility or a private storage facility.
- data security may be strengthened through access controls, security locks, and measures to prevent unauthorised access to the user device (50), including restrictions on multiple failed login attempt.
- the platform provides a means by which users (30) (i.e., victims of abuse or potential abuse) may record and store information at an appropriate time in the lead up to, during, or following an episode of abuse. Such information may represent important evidence and may prove extremely useful when seeking to prove the guilt of an abuser (62) in a court of law.
- the abuser (62) becomes aware of the operation of the device/software application and seeks to deactivate or damage the user device (50), at least previously captured video and/or audio (70) will already have been sent to and stored by the cloud storage facility (75) through the use of the recording function. If the user device (50) is out of range, turned off, or otherwise unable to communicate with the remote server, the recorded data may be stored on the user device (50) or backend of the software application until communication, such as via Wi-Fi, becomes available. Upon re-establishing communication, the stored recorded data may be automatically transmitted to the remote server (20).
- a user (30) may be any victim of abuse or potential abuse, and the present invention is not limited to any one category of abuse.
- the user (30) may be a victim of domestic violence, sexual abuse, financial abuse, emotional or psychological abuse, physical abuse, coercive abuse or control, bullying etc.
- the user (30) is not limited to any one particular age group, and the abuse may involve mature age individuals, youth and families alike.
- the remote server (20) may also be configured to interact with items used for remote activation, such as a physical button or a camera-based trigger.
- the steps described herein may be executed by the one or more user devices (50), wherein such operations are facilitated by the software application (40) operating on the user device (20) or each user device (20).
- the server (20) may be programmed to provide all or most of the processing functions described herein, where they cannot be provided locally on the user device(s) (50) or where it may be commercially or technically impractical to implement such arrangements.
- the steps described herein as performed by a user device (50), or components thereof may be associated with hardware that is located externally of the device (50) such as the remote server (20) for example (i.e., in a distributed architecture). Different arrangements are possible in this regard, and alternate variations will be apparent to the skilled addressee.
- Segment 600 of FIG. 1 illustrates further functionality of the software application (40) comprising or being in the form of an SOS facility that enables emergency messages or the like to be transmitted to a pre-defined emergency contact list of the user (30), as further detailed in FIG. 6.
- pre-defined contact list may be set up by the user.
- Segment 700 of FIG. 1 illustrates example interfaces according to the embodiment described herein reflecting additional functionality of the software application, including a diary, daily planner, calendar and directory which the user (30) may access and utilise to view and/or store information, including in relation to an abuser or potential abuser (62) and/or a particular conflict or crisis situation encountered by the user (30).
- system (40) may support emotional tracking and incident reporting, with a provision of dedicated space to add case numbers for documentation purposes.
- User account register (100) storing user details such as name, age, address, contact details, identifiers such as driver’s license or passport details of the user (30), and any additional data which may be relevant for the purpose of identifying each user (30).
- adding photo or image may be a mandatory step. Where possible, such details may be verified using identification verification services, and each user (30) may also be required to provide an image of themselves for further identity verification;
- Data processing functionality (105) for processing user input commands and other data received through operation of the software application (40) or from elsewhere, and to generate relevant outputs for display.
- the data processing functionality (105) of the remote server (20) may be responsible for receiving a user command to update the graphical representation of the software application icon (55) on the user device (50) and to cause the icon to update in accordance with the user instructions.
- the data processing functionality (105) may also manage the transmission of video and/or audio captured using the user device (50) to the cloud storage facility (75), and process and action requests to activate an SOS facility including to transmit the relevant emergency notifications to relevant emergency contacts of the user (30).
- the data processing functionality (105) may also manage instructions received from authorities (e.g.
- emergency contacts may have the ability to forward recorded data and location information to a third party so that they receive realtime updates and access to the live feed;
- a data structure (110) that identifies the relationship between users (30) or accounts established on behalf of users, and locally and/or remotely stored data associated with the user (30) or user account. For example, there will be a relationship between each user account and information uploaded by the user using, for example, the diary, calendar, and daily planner facilities as well as incident details / history and contacts of the user (30) including emergency.
- the storage and indexing of such information utilising the data structure (110) facilitates fast and efficient retrieval of such information for various purposes including for the generation of reports relating to individual users (30).
- the system may include independent reporting with an option to add a case number, allowing for structured documentation of incidents.
- phone recordings and saved messages may be stored, with an option to transmit messages for transcription into a specific file format to allow easier documentation and retrieval of the information;
- An app icon library (115) storing default graphical representations may be available for selection by the user (30) when the user (30) is seeking to hide / disguise the software application (40) on their device interface;
- FIG. 2 also depicts that remote server (20) is configured to enable communication (140) with one or more user devices (50) and, in particular, the software application (40) operating on the user device (50) or each user device (50). Such communications may occur via the internet or similar network.
- a login email and sign-up notifications may be sent via text message to the designated user device (50) if the user device (50) is a cellular device.
- These messages may be automatically deleted after a predefined time period, such as 10 minutes, to improve security and prevent unauthorised access.
- the software application (40) may not link to personal email accounts, and users may be notified that sign-up notifications and login emails will auto-delete after a set period (e.g., 10 minutes) for security purposes.
- the user (30) may also be prompted to answer various questions relating to “user preferences”, including in relation to privacy. For example, the extent to which the user’s information may be shared and/or accessed by emergency authorities, service providers and the like, may be controlled by the user (30) according to their preferences. Users (30) may be encouraged to enable reports relating to any recorded video/audio relating to incidents (encounters with abusers), and any additional related interactions with the software application (40), including information uploaded to the user’s calendar, diary and daily planner, to be generated and made accessible to external parties such as emergency authorities in emergency situations. For example, if the user (30) has recorded experiencing a conflict or crisis situation (e.g. by activating the recording function and/or the SOS facility), and cannot subsequently be reached, this may automatically trigger the generation and transmission of a report to the relevant emergency authorities.
- the report may optionally include audio and/or video recorded by the user (30).
- the sharing and access of user information by emergency authorities or service providers may be approved in settings or during setup.
- FIG. 4 shows in greater detail Segment 400 of FIG. 1 and, in particular, the display of a default icon (55) on the user device (50), and a prompting of the user (30) to change the graphical representation associated with the icon such that a disguised icon (60) is displayed.
- the icon may be changed by the user (30) using interface (170), wherein interface (170A) represents the initial device interface in which icon (55) is displayed, and interface (170B) represents the subsequent device interface in which the disguised icon (60) is displayed.
- the first icon (55) may include one or more of a title or logo of the software application, hence the first icon (55) that is automatically generated for the software application (40) will not disguise the software application (40).
- the second icon (60) selected by the user (30) will be different to the first icon (55) and may include any graphical representation selected by the user.
- the graphical representation could be an icon associated with another software application operating on the user device (50), a graphical representation that is available for selection from the app icon library (115), a historical photo stored in a photo library of the user device, or a photo or a screenshot captured by the user (30) using the device (50) or photo generated using Artificial Intelligence (Al).
- the chosen photo or graphical representation may be rescaled or adjusted in size to match the original icon’s dimensions of the software application (40).
- the interface (170) may provide editing facilities that enable the user (30) to manually re-size the graphical representation such that it is sized to fit the icon previously displayed. Alternatively, such editing may be performed automatically using appropriate digital techniques.
- the re-sizing process may be such that it allows the image or photos to fit neatly within the small space of an icon or widget of the software application (40) while preserving detail and avoiding pixelation.
- the re-sizing process may allow that the image or photo matches the exact quality and dimensions of all other widgets on the device, preserving detail and avoiding pixelation.
- FIG. 5 shows in greater detail Segment 500 of FIG. 1 and, in particular, the activation of a recording function provided by the software application (40) when the user (30) considers that a particular conflict or crisis situation is occurring, or is likely to occur.
- a recording function may be activated in any appropriate manner, and it is to be understood that the present invention is not limited to any one means of activating the recording function.
- a prompt may be provided in a recording function interface (180) associated with the software application (40) which enables the user (30) to touch the screen (display screen) in order to activate the recording function.
- Alternative activation method may include tapping a specific portion of the user device (50), e.g., back camera, to trigger recording function. The same may apply for SOS activation.
- a button (66) associated with the device (50) e.g. a power or volume button
- the user (30) may select the activation means of the recording function which may be initiated by the user activating the physical button (66) without the requirement to observe the screen of the device (50) (e.g. by pressing or holding down for a short duration one of the buttons (66)).
- the means by which the recording function is activated may be pre-defined according to a preference of the user, and it is to be understood that such a preference may be selected by the user (30) when first registering to use the software application (40). Such preference may be selected and/or stored using settings of the software application (40) and not the settings of the user device (50)
- the recording function may be voice-activated, allowing the user (30) to initiate recording by speaking a predefined voice command, i.e., predefined key phrase or word, such as "ICE CREAM” or "DUNE.”
- predefined key phrase or word such as "ICE CREAM” or "DUNE.”
- these pre -determined key words or phrases may be chosen to avoid any detection by an abuser so that the activation of the recording function is discreet and does not raise suspicion.
- the user device (50) may automatically start recording, providing a hands-free activation method that improves accessibility and usability, particularly in emergency situations where direct interaction with the user device (50) may not be feasible or possible.
- an incident details / history interface in which the software application (40) itself records details which have been input by the user (30) in relation to a particular incident or a particular conflict or crisis situation involving an abuser or potential abuser (62).
- Such data could be stored locally on the user device memory, or in a database associated with the remote server (20). Therefore, in addition to video/audio being automatically uploaded in realtime to the cloud storage facility (75) based on activation of a recording function, the same or similar data may be recorded by the user (30) and such data may be stored by the user device (50) or remote server (20) in associated with the particular user’s account.
- Such details may include the location and time of the incident, as well as details relating to the type of incident and what occurred (assuming the victim is able to enter such details following the abuse episode).
- An example of an incident recordal may be “the abuser yelled at me” or “the abuser physically assaulted me”, etc.). It will be appreciated that the recordal and storing of such data and information enables users (30) to establish a log of various events and interactions with their abuser (62).
- Incident records, including time, date, and event details may be linked to the system, which may be emotional tracking system. Users may have the option to attach photos or share records within the system for more detailed documentation.
- the SOS facility may trigger an ongoing alarm until acknowledged by the recipient.
- the user may have the option to record the room/situation/surrounding event before enabling the SOS function.
- the system may also detect Al-identified tones in the voices of the abuser (62) or victim/user (30) and respond accordingly.
- emergency messages may include the option to forward live location to a third party for continuous tracking.
- Emergency contacts may include case workers and medical support personnel.
- the emergency message may also include a present location (80) of the user (30) and may further provide updates to any changes to the physical location of the user device (50) by repeated transmission of GPS coordinates, as those coordinates change.
- the software application (40) may also enable additional functionality, including, but not limited to incorporating any captured video and/or audio (70) (based upon activation of the recording function) into the SOS message that is sent to emergency contacts, as well as any additional information uploaded by the user (30) through their various interactions with the software application (40), including interactions with additional facilities provided by the application (40) including those described in further detail below.
- the emergency message may include the user’s current location and provide real-time GPS updates as the user’s location changes. If additional recording is required, this may be activated through an emergency recording feature. If the SOS function is accessed a second time, a prompt to cancel may appear. When an emergency contact opens the SOS, the main account holder may see their details turn visually distinctive (e.g. red) in the settings, thereby functioning as a silent indicator that the SOS has been viewed by the recipient.
- visually distinctive e.g. red
- the SOS message sent to an emergency contact may include audio and/or video recordings captured by the user (50).
- the inclusion of such recordings may provide a significant advantage by offering real-time evidence of the situation.
- the emergency contact may also have the capability to forward the received message via text or email to a third party, such as law enforcement or other relevant authorities, to provide immediate context. Additionally, this recorded information may serve as evidence in legal proceedings, supporting prosecution or other necessary actions. Also, such information will provide indication to the recipient(s) regarding the level of danger and the type of assistance required.
- the SOS feature may be configured to record for a predetermined time before automatically sending the captured data to emergency contacts. Additionally, recording options may include SOS recording, emergency recording, independent reporting, and emotional tracking. This recorded data can serve as evidence in legal or similar proceedings or aid in determining the level of danger and required assistance for the recipient.
- an administrative function may be provided within the software application (40) to facilitate access to law enforcement or other relevant authorities (e.g., police).
- the administrator may have the ability to grant access to an account to such authorities, with a corresponding case number recorded in the system for the purpose of tracking and verification. This case number may be linked to the account, with no option for manual override before accessing or forwarding information. Additionally, user approval in settings may be required before enabling such access.
- FIG. 7 shows in greater detail Segment 700 of FIG. 1 and, in particular, various additional example interfaces associated with the software application that provide various additional functionality and assistance to users (30).
- the additional interfaces (220) may provide a diary for allowing users to record incident details, a calendar that enables users (30) to store information and make calendar appointments including the ability to view previously attended appointments, a daily planner operable to provide visual reminders to users, and a directory (90) which lists all of the user’s contacts, including emergency contacts, as well as goods/service providers of interest to the user (30).
- the directory (90) may also provide links to goods/service provider websites to assist users seeking to locate and make contact with the goods/service providers.
- the emergency contacts may not be in the directory (90) unless the user (30) adds them to the directory (90).
- the emergency contacts may remain hidden in settings of the software application (40).
- the system may be designed to support crisis survival and post-crisis recovery, offering tools such as scheduled reminders, actual image displays, and forwarding options for incident records.
- the calendar may be configured to display event completion status and associated notes, with an option to link records to emotional tracking via photos or forwarded applications.
- the software application (40) may provide a tracking feature, allowing users (30) to log details about completed, missed, rescheduled or new appointments. This feature may be integrated with the calendar to display past appointments with notes, follow-up reminders, or outstanding tasks. Additionally, such data may be linked to emotional tracking. Users may be able to attach photos, notes, or forward relevant information to support services or applications.
- the directory (90) may also facilitate access to goods/service providers, including those not publicly listed for security reasons. This can help to increase access to relevant services while ensuring that emergency contacts and service listings align with internal client needs rather than assumed matches. Additionally, referrals may be managed to reduce incorrect recommendations, aiming to minimise financial and mental health impacts, including suicide risks.
- the directory (90) of service provider may be structured to maximise recovery by offering comprehensive categorisation and classification of user groups so that the users can efficiently connect with appropriate service providers based on their specific requirement.
- any information or interactions recorded using the additional interfaces (220) may be directly related to a particular conflict or crisis situation relating to a particular abuser (62). Accordingly, by interacting with the additional functionality of the application (40), the user (30) is effectively creating a log regarding various events and interactions with their abuser (62) and related parties who may be assisting the user (30) deal with the crisis or conflict situation (e.g. doctors, therapists, etc.). In this way, additional evidence that may assist the user (30) to prove the guilt of an alleged abuser (62) is recorded, and the software application (40) will be capable of generating reports in relation to such data that can easily be transmitted to relevant authorities if the need arises.
- the system may allow tracking of appointments and outcomes, linking them to emotional tracking data to reduce overwhelm. This can allow users (30) to demonstrate credibility, providing a log of actions taken for self-care and support for loved ones. Additionally, users (30) may be able to gather and transmit relevant data from a single calendar portal that consolidates entries from various sources, for access to such data when needed.
- Incident reporting may be configured to be sent based on date, specific groups, or individual recipients.
- Incident reporting may include the option to add a case number or heading, along with customisable settings for storage preferences and organisation. This feature can also be utilised for family behaviours or situations, discrimination cases, racial incidents, and other related matters.
- an SOS alert may be automatically sent to emergency contacts as a welfare check.
- the software application (40) may allow users (30) to reactivate a locked account via a cloud system by verifying their identity through ID submission or security questions, for secure access restoration.
- a means of securely capturing contemporaneous events when the user (30) is in a threatening or potentially threatening situation may be provided.
- application installation instructions may be downloaded to a user device (50) e.g., smart phone or other communications device.
- the software application (40) installation instructions may be displayed on the user device (50) by an icon representing the software application (40) with a first graphical representation.
- the first graphical representation of the software application (40) installation instructions may be selected or actuated and this may initiate a user application, i.e., software application (40) (as described in the above).
- the user device (50) may display an icon for the user application with a second graphical representation which is different to the first graphical representation. Preferably there may be no relationship between the first and second icons.
- Actuation of the software application (40) may configure the user device (50) to record events in the immediate environment of the user encompassing the threatening situation.
- the user device (50) may automatically upload the recorded events to a remote storage device or remote server (20).
- the communications device i.e., the user device (50) may be configured to display only a third icon with a third graphical representation when the software application (40) is actuated.
- the third graphical representation may not be the same as either the first or second graphical representations.
- the first graphical representation may be removed from display on the user device.
- the first representation may be that of the downloaded application provided by a distributor and may thus be searchable by an abuser (62).
- the icon having the second graphical representation may be removed (and may not be retrievable in deleted photos or similar storage locations) from any display on the device once the installed software application (40) is executed.
- the first, second or third graphical representations are preferably user selectable such as from a list and ideally would otherwise represent a conventional app icon on the user device display.
- the graphical representations can be defined by a user created image.
- the software application (40) may be launched, i.e., actuated by user touchscreen entry method which further includes providing additional user icons each having a respective graphical representation being different to other icon graphical representations. These additional user icons can preferably be displayed depending on what device input is being recorded, for example, voice or camera video.
- the communication device i.e., the user device (50) can be configured to display an alternative application user interface.
- an alternative may be a calculator amongst many other choices.
- the device can be configured to receive user input to actuate the application including by touchscreen entry, voice command, user facial recognition image, voice recognition or communication device orientation.
- the communications device i.e., the user device (50) may communicate with the remote storage device or a remote server (20) via a cellular telephone network or the Internet.
- the remote server (20) may be rendered inaccessible such as by MAC number on a smart phone to be viewed, read or downloaded by the communication device, i.e., the user device (50) via the software application (40). This data may be accessible from the device after some predetermined time, and is preferably accessible by any other user device at any time.
- data may be stored on the software application (40) (e.g., in the storage medium of the user device (50)) and sent to the remote server (20) when the internet or cellular telephone network is available.
- the software application (40) on the user device (50) need not be open to send the data to remote server or to emergency contacts.
- the data When the data is stored on the software application (40) it may only be accessible through the software application (50) and through no other program or settings of the user device (50).
- the software application may generate a unique email address for each user, which may be linked with the system for secure communication and data management.
- This email may be integrated with cloud storage facility (75) or remote server (20) to improve security, whilst ensuring user privacy and protection from unauthorised access.
- the software application (40) may generate unique email accounts to prevent traceability through standard email hacking attempts by potential abusers or third parties.
- the user may receive a login code and a system-generated email address that is linked to the storage system.
- access to stored information within the software application (40) may be controlled by requiring the user (30) to input the assigned email address and login code, thereby reducing the chances of any traces of the user’s access being left on commonly searched platforms, email accounts, or cloud storage.
- the system may further provide an optional subscription for additional security functionalities, including expanded storage capabilities.
- the recorded events can be composed of data acquired by many sources associated with or integrated into the user device (50).
- a user device (50) such as a user smart phone can include data from one or more data capture modules such as but not limited to microphones, cameras, ambient lighting sensors or inertial sensors.
- the user device (50) may be configured to record and send or stream data from the data capture modules, i.e., device sensors to the remote data storage until a user command is received to discontinue application execution.
- data capture modules i.e., device sensors
- the remote data storage may be configured to record and send or stream data from the data capture modules, i.e., device sensors to the remote data storage until a user command is received to discontinue application execution.
- recorded data being encrypted and stored on the user device (50) such as when communications network is unavailable, data recorded until the data is uploaded to the remote storage.
- the user device (50) can also be configured to forward or transmit the remotely stored data to one or more third parties such a security or law enforcement in response to the disconnection of the communications device, i.e., user device (50) and wherein a user command to disconnect application execution is not provided.
- a user command to disconnect application execution is not provided.
- the user command to discontinue application execution is preferably provided in the form of an alphanumeric password or a user voice command.
- facial or voice recognition functionality may be used for that purpose.
- the user device (50) is configured to allow the user training the software application (40) for user facial expressions that represent distress, images of one or more independent predetermined people (e.g., abuser (62)), specific voice commands, key words, key phrases and/or voice stress tones.
- the software application (40) may be actuated and sensed data streamed.
- Artificial intelligence may be used to identify a user facial expression or voice stress tone to actuate the user application to send data.
- the software application (40) may be configured to communicate with a remote training database configured to receive user facial expressions, images of one or more independent predetermined people, specific voice commands, and/or voice stress tones such that machine learning or artificial intelligence algorithms of the training database are configured to communicate with the user application to validate or predict the user facial expressions, independent predetermined people, voice commands and/or voice stress tones.
- the facial images representing user distress can be predictively characterised, for example, using a convolutional neural network and training this with user provided distressed facial expressions.
- voice stress detection to actuate the software application (40) where an artificial neural network can be trained and deployed for natural language processing (including using large language models) and tone recognition.
- Continual learning can be provided to accommodate user aging, or temporary changes in appearance such as wearing make up or being sun burned.
- the user device (50) may be configured to duplicate a standard device lock/unlock screen.
- the first unlock screen may receive a password set by or associated with the software application (40). Correct entry of the first password may cause the communication device, i.e., the user device (50) to present a second unlock screen that is the user device’s inbuilt unlock screen requiring the user device’s usual unlock password.
- the user’s image may be registered at installation of the software application (40) so that the user device (50) is configured to disable the software application (40), and most preferably hide any software application icon on the user device (50), if an image from a device camera sampled at a predetermined rate is not that of or associate with the registered user.
- the software application (40) automatically uploads all recorded event data to the remote storage and the application may be run in background/non- visible memory, i.e., storage medium of the user device (50) presenting no GUI. This way, when the face of the user (30) is not detected the Graphical User Interface (GUI) of the software application (40) becomes invisible.
- GUI Graphical User Interface
- the software application (40) may have its own location settings which may be different from the general location settings of the user device (50).
- the directory (90) may organise services based the location of the device, however it may only function if the software application’s own location settings are enabled.
- identity information include a passport number or driving licence number.
- the user (30) may be prompted to capture an image of an identity document. This identity information may be utilised to retrieve relevant details that enable the software application (40) to filter services, ensuring that the user (30) is presented only with options of goods/services relevant to them.
- one such relevant detail may be gender identification, which can be determined from the identity information of the user (30). Based on this determination, the software application (40) may tailor the directory (90) to display only goods or services pertinent to the identified gender. For example, if the user (30) is identified as female, the directory (90) may present links, contact details, or other relevant information related to women's safety organisations and services specifically catering to females. Similarly, if the user (30) is identified as male or transgender, the directory (90) may provide links, contact details, or other information relevant to the specific needs of that gender while filtering out non-relevant goods/services for that specific gender.
- the remote server may derive such relevant details either directly from the identity information provided by the user (30) or by communicating with external databases, such as those maintained by the identity-issuing authority (e.g., government databases). If multiple users are to access the software application (40), each individual may be required to provide their own identity information. In cases where younger users do not possess an official identification document, the software application (40) may prompt them to provide an alternative form of identification, such as a birth certificate number or an image of a birth certificate.
- identity-issuing authority e.g., government databases
- gender identification is one example of the relevant details that may be extracted from the identity information
- additional types of user-specific data may also be utilised.
- age-related information may be used to filter and present age-appropriate services, such as youth protection services for younger users or senior safety services for elderly users.
- the user's address information may be employed to provide location-specific details, including the identification of nearby emergency services such as police stations or hospitals. If the software application (40) detects that the user is travelling, e.g., based on application location settings or passport details, it may provide relevant emergency contact information specific to their location, including embassy details, local hospitals, and police contact information within the vicinity or region.
- the remote server may obtain such relevant details either directly from the identity information submitted by the user (30) or by communicating with external databases, such as those maintained by the identity-issuing authority (e.g., government databases).
- the location settings of the user device (50) may be independent from and may not operate the location settings of the software application (40).
- the software application (40) may have its own settings for each feature except SOS.
- the software application (40) may be configured to obtain user identity information, determine one or more user attributes (e.g., gender, age, location etc.) from the identity information and filter goods and/or services based on user attributes.
- the software application (40) may tailor the directory (90) based on the user attributes to generate only information on the user device (50) that is relevant to that user.
- facial and voice recognition functionality may be used so that only authorised users can access specific services within the directory (90).
- the directory (90) may provide a secure platform where service providers, such as women's crisis centres, can be listed while maintaining confidentiality.
- a service provider such as women’s crisis centre, which would typically refrain from public advertising due to security or concerns or any other reasons, may securely register on the directory (90) so that the information of that service provider is presented only to verified users of the user device (50).
- the verification process may involve matching the user's ID with their registered user device (50) to confirm ownership of that user device (50), thereby allowing only legitimate users to access relevant services while preventing unauthorised access from potential abusers.
- the software application (40) may include a secure identity verification system where during the registration process, the user (30) may be required to provide a live photo and an official identity document, such as a passport or driving licence, which is captured at the time of sign-up and stored in an attached cloud database. This data may remain linked to the account, even in the event of account deletion for traceability and preventing unauthorised identity changes. Additionally, to mitigate or reduce risks associated with fake accounts and identity fraud, any false or duplicate accounts may be linked to a verified photo to avoid unauthorised access to services.
- an official identity document such as a passport or driving licence
- the software application (40) further restrict the use of saved or Al-generated photos, so that only live photos taken at the time of registration are used for verification, thereby reducing the possibility of manipulated identities
- the directory (90) may be configured to filter service options based on verified identity details, such as gender so that users (30) are presented only with relevant and appropriate service providers.
- the directory (90) may be configured to organise services based on the user’s location, provided the software application’s location settings are enabled.
- a user logs in or registers, they may be required to provide identity information, such as a passport number or driving licence number.
- the system may prompt the user to capture a live photo of an identity document, which will be stored in an attached cloud and remain even if the account is deleted.
- This identity verification process can prevent identity theft and ensures that only genuine service providers can be accessed. Fake accounts are linked to a photo, which helps to prevent unauthorised access and fraud.
- the system may not store saved photos but only live photos captured during the registration process.
- the software application (40) may require strict identity verification to access certain services, particularly those designated as high-security services.
- the user (30) may be asked to provide both a valid photo ID and a live photo to complete the registration process.
- identity verification may be linked to an approved main account, so that there is a parental or guardian oversight for access to specific services.
- the software application (40) may include automated security checks to flag users with prior criminal activity. If a user has a history of abuse charges, the system may restrict or suspend their account access, particularly for youth protection services or senior safety services. Additionally, Al-driven detection mechanisms may be implemented to identify and flag suspicious behaviour based on historical data, preventing users with a history of abuse from accessing vulnerable user groups.
- the user device (50) may automatically dim its display to avoid detection. This can prevent an abuser or unauthorised person from noticing the activation of the app or its emergency feature. Additionally, and/or alternatively, any other audible or visible indicators of the user device (50) may also be suppressed or disabled to maintain discretion. In that way, the user (30) can activate emergency functions, such as recording or SOS features, without raising suspicion, thereby improving their safety in such situations.
- emergency functions such as recording or SOS features
- the software application (40) may operate in incognito mode, running discreetly in the background without appearing in standard settings of the user device (50). While an icon may still be visible in the settings of the user device (50), it may remain nonfunctional, thereby preventing access or modifications from an unauthorised person such as the abuser (62). All configurations or settings of the software application (40) may be contained within the software application (40) itself so that no settings can be adjusted outside of the software application (40). The software application (40) may not be linked to any social media or any third party email account to improve the privacy and security for the user (30)
- the software application (40) may include a security feature that detects multiple failed login attempts. For example, if multiple number of unsuccessful attempts (e.g., three unsuccessful attempts) occur, the software application (40) may automatically send an SOS alert to a designated emergency contact(s). This alert includes a pin that allows the emergency contact or service provider to access the user’s device (50) if needed. It may also prompt the emergency contact or service provider to check on the user, to allow a quick response in case of unauthorised access or a potential security risk.
- a security feature that detects multiple failed login attempts. For example, if multiple number of unsuccessful attempts (e.g., three unsuccessful attempts) occur, the software application (40) may automatically send an SOS alert to a designated emergency contact(s). This alert includes a pin that allows the emergency contact or service provider to access the user’s device (50) if needed. It may also prompt the emergency contact or service provider to check on the user, to allow a quick response in case of unauthorised access or a potential security risk.
- SOS alert may include audio and/or video messages.
- cell phones connect to nearby cell towers to stay connected to the network, which is called "pinging."
- the software application may uses this process of pinging to detect when certain phone numbers are near. This could be the phone number of the user’s device (50), which helps track their location or movements. It could also detect the phone number of a specific person, like a pre-determined abuser, when their cell phone connects to the same or a nearby tower. By recognising when these two phones are in the same area, the software application may alert the user (50) or take other protective actions.
- the software application (40) may send an alert to the user (30) to allow the user (30) to take necessary protective actions. Additionally, if the cell phone device of the abuser (62) is turned off while within this range, the user (30) may receive a notification, followed by another alert if the cell phone device of the abuser (62) is powered back on within that same radius.
- the software application (40) may be configured to remain undetectable within the settings of the user device (50) to improve security.
- the software application (40) may be excluded from the list of installed applications or may be disguised under an alternative name and icon to prevent suspicion.
- the software application (40) may not appear in the settings of user device (50) at all and may run discreetly in the background without a visible interface, so that it can still operate while minimising the risk of detection by unauthorised parties.
- the software application (40) may be configured to be disguised under an alias name to prevent suspicion.
- the system may further comprise a web-based portal.
- This portal may be configured to allow authorised personnel to set up accounts for users in service provider environments without requiring installation of the software application on the user devices of such service providers. Request to have remote access to the user device (50) may be sent from the webbased portal.
- the diagrams of embodiments herein illustrate one or more control or processing units.
- the processing or control units may represent circuits, circuitry, or portions thereof that may be implemented as hardware with associated instructions (e.g., software stored on a tangible and non-transitory computer readable storage medium, such as a computer hard drive, ROM, RAM, or the like) that perform the operations described herein.
- the hardware may include state machine circuitry hardwired to perform the functions described herein.
- the hardware may include electronic circuits that include and/or are connected to one or more logicbased devices, such as microprocessors, processors, controllers, or the like.
- One or more processors as described herein are configured to execute a set of instructions that are stored in one or more data storage units or elements (such as one or more memories), in order to process data.
- the one or more processors may include or be coupled to one or more memories.
- the data storage units may also store data or other information as desired or needed.
- the data storage units may be in the form of an information source or a physical memory element within a processing machine.
- the set of instructions may include various commands that instruct the one or more processors to perform specific operations such as the methods and processes of the various embodiments of the subject matter described herein.
- the set of instructions may be in the form of a software program.
- the software may be in various forms such as system software or application software. Further, the software may be in the form of a collection of separate programs, a program subset within a larger program or a portion of a program.
- the software may also include modular programming in the form of object-oriented programming.
- the processing of input data by the processing machine may be in response to user commands, or in response to results of previous processing, or in response to a request made by another processing machine.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Emergency Management (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Environmental & Geological Engineering (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Telephonic Communication Services (AREA)
Abstract
Disclosed in a system and method for securely capturing contemporaneous events, particularly for personal security of a user (30), while also being adaptable for various other applications, including legal and medical contexts. The system and method use a user device (50), a remote server (20), and a data storage facility in operative communication. A software application (40) running on the user device (50) is configured to modify its visual representation to disguise its presence and it activates a recording function to capture real-time environmental events. The recorded data is securely processed and transmitted for storage and retrieval.
Description
SYSTEM AND METHOD FOR SECURELY CAPTURING CONTEMPORANEOUS EVENTS
FIELD OF THE INVENTION
The invention relates to a system and method for securely capturing contemporaneous events. Especially but not exclusively, the invention relates to a system and method for securely capturing contemporaneous events in the environment of a user for personal security and safety of the user.
The invention may be used for improving personal safety of a user of a communications device in a violence such as a domestic violence environment and will be described hereinafter with reference to this application. However, it will be appreciated that the invention is not limited to this particular field of use. It may be used for other purposes such as emotional tracking for legal and/or medical applications.
BACKGROUND
It is estimated that significant numbers of people worldwide experience some form of abuse, including physical abuse, domestic violence, sexual abuse, financial abuse, psychological or emotional abuse, for example. Abuse often has adverse long-term consequences for victims and evidence of abuse if typically unavailable, especially in domestic environments. Such is typically apparent is demonstrably decreased schooling or academic performance. This also extends to nondomestic environments such as public places, sporting centres, care facilities, places of incarceration and bullying, whether in-person or online.
There exist devices and software applications executable on smart phones and other communications devices that provide physical or screen-based “panic button” functionality when a victim finds themselves in, or has experienced, an episode of abuse. The panic button functionality enables victims to transmit an emergency signal / request for assistance to others, e.g. to one or more family members, neighbours, emergency authorities, etc. The touching of the panic button or icon initiates a corresponding software application, and the user is then able to navigate the software application in order to initiate the emergency contact. However, there are a number of inherent problems associated with existing arrangements of this type.
For example, an abuser can easily prevent a victim from contacting others for assistance by stealing or intentionally damaging / destroying the device which the victim was intending to use to contact a family member, neighbour or emergency service provider. In addition, in circumstances where emergency contact can only be initiated by operating a software application on the victim’s
device, the abuser may physically prevent the victim from accessing the emergency software application, e.g. by deleting the software application, or by preventing the victim from selecting the relevant touchscreen icon that executes the software application (or functionality thereof).
There are also problems associated with the capability of such software applications to record and store information at an appropriate time in the lead up to, during, or following an episode of abuse. Audio and/or video of an abuse taking place, or the circumstances leading up to the abuse taking place, or even the actions of an abuser following an abuse, often forms critical evidence. Whilst most portable handheld devices such as mobile phones enable the recording of audio and/or video, the software applications that are used to operate such hardware are typically not easily accessible, and importantly, do not lend themselves to being accessed quickly and discreetly by victims of abuse, i.e. in a surreptitious manner, such that the abuser is not aware that the victim’s device / software application is being accessed and/or is operational at the relevant time.
It is understood that even when a victim of abuse is able to capture relevant audio and/or video using conventional devices / software, problems still arise when such data is only stored on the victim’s device (i.e. in device memory) or accessible via an app on the device. For example, if the abuser is able to gain access to the victim’s device during or following the abuse, the abuser can destroy the device to delete, or at least render inaccessible, any record of events captured and stored.
OBJECT OF THE INVENTION
It is an object of the invention to overcome or substantially ameliorate one or more of the disadvantages of the prior art, or to provide a useful alternative.
Additionally, or alternatively, it is an object of the present invention to provide a system and/or method for securely capturing contemporaneous events which overcomes or at least ameliorates some of the disadvantages described above, or which at least provides the public with a useful choice.
SUMMARY OF THE INVENTION
In a first aspect, the present invention resides in a system for securely capturing contemporaneous events, the system comprising: at least one user device, wherein the user device is a data communication device and is configured to execute a software application;
a remote server in communication with the user device; and a data storage facility in communication with the remote server, wherein the software application is configured to: modify its visual representation by displaying a first software application icon and replacing the first software application icon with a second software application icon that is visually distinct from the first software application icon, thereby disguising presence of the software application on the user device, activate and control a recording function that captures real-time environmental events as recorded data by activating at least one data capture module of or associated with the user device, process the recorded data for secure transmission, and establish a secure communication link with the remote server to transmit the recorded data, wherein the remote server is configured to receive the transmitted data from the user device and relay the data to the data storage facility for storage and subsequent retrieval.
In one embodiment, the remote server is configured to restrict access to the stored data based on at least one predefined authentication protocol.
In one embodiment, the software application is downloadable from an application store and, upon installation on the user device, is represented by the first software application icon displayed on the display screen.
In one embodiment, the software application provides a prompt to the user to replace the first software application icon with the second software application icon.
In one embodiment, the first software application icon is configured to appear under a generic or disguised name.
In one embodiment, the second software application icon is selectable by the user from one or more of: an icon associated with another software application operating on the user device; an icon available from a pre-defined icon library; a historical image stored in a photo library of the user device;
an image or screenshot captured by the user using the user device; an artificial intelligence (Al) generated image.
In one embodiment, the software application is configured to automatically determine whether the second software application icon requires modification, including resizing or reformatting, and apply the any required modifications before changing the first software application icon to the second software application icon.
In one embodiment, the software application is configured to enable the user to activate the data capture module by using at least one of: selecting an icon on the display screen that is a touchscreen of the user device; at least one physical button of the user device; at least one voice command; a detection of the orientation of the user device, or a facial recognition.
In one embodiment, the recorded data comprises at least one of video or audio and is transmitted in real time or substantially in real-time to the remote server.
In one embodiment, if the user device is out of range, turned off, or otherwise unable to communicate with the remote server, the recorded data is stored on the user device until communication, becomes available.
In one embodiment, upon re-establishing communication, the stored recorded data is automatically transmitted to the remote server.
In one embodiment, the software application further comprises at least one of: a user diary for recording and reporting events related to a conflict or crisis situation; a calendar for scheduling and tracking events, including past appointments; a daily planner for providing visual reminders to the user; or a directory that is an emergency assistance service provider directory with links to website or other contact information of at least one service provider.
In one embodiment, the user diary, calendar, and daily planner is configured to allow the user to log and store interactions with an abuser or with the service provider.
In one embodiment, the software application comprises an emergency feature(or SOS facility or SOS feature or emergency function) configured to transmit a message (preferably, the message comprises an option to forward to phone number or email account of a third party) to at least one pre-defined emergency contact upon activation.
In one embodiment, wherein activation of the recording function automatically triggers the SOS facility.
In one embodiment, the SOS facility is configured to transmit emergency notifications to the pre-defined emergency contact(s), the notifications comprising at least one of: the GPS coordinates of the user device at the time of activation of the emergency function; real-time updates on the physical location of the user device via repeated transmission of updated GPS coordinates; video and/or audio recorded using the data capture module; or additional user-submitted information, including diary entries, calendar events, emotional tracking information and/or daily planner notes.
In one embodiment, if location tracking is enabled on the user device, live tracking continues even if the device is turned off.
In one embodiment, the SOS facility includes an option for user to enable automatic recording and transmission of audio and/or video upon SOS activation.
In one embodiment, upon the SOS activation or any emergency feature, the display of the user device may be configured to automatically dim to reduce visibility and/or to minimise the risk of drawing attention.
In one embodiment, the software application is configured to allow the user to change its visual representation by selecting from existing icons displayed by the user device, thereby concealing the application’s presence under a user-selected alternative icon.
In one embodiment, any recorded data transmitted to the remote server or to the pre-defined emergency contact(s) is accompanied by GPS location data of the user device at the time of recording.
In one embodiment, the software application is further configured to modify its visual representation by displaying a third software application icon, the third software application icon being visually distinct from both the first and second software application icons.
In one embodiment, the first software application icon is removed from the display upon execution of the software application installation process.
In one embodiment, the second software application icon is removed from the display upon execution of the installed software application.
In one embodiment, the first, second, and/or third software application icons are user- selectable or adapted from a preselected user icon image stored in the user device.
In one embodiment, the remote server is configured to store the transmitted recorded data in the data storage facility, wherein the stored data is inaccessible from the user device via the software application.
In one embodiment, the software application is configured to default to storing recorded data in a data storage facility, unless the user adjusts the settings to store the recorded data on the user device.
In one embodiment, the data capture module comprises at least one of: a microphone for capturing audio data, a camera for capturing video data, or an inertial sensor for detecting motion or orientation of the user device.
In one embodiment, the user device is configured to communicate with the remote server via at least one of: a cellular network, or an Internet connection.
In one embodiment, the software application is configured to be actuated and/the SOS activation is configured to be triggered using least one of the following: selecting an icon on a touchscreen of the user device; at least one physical button of the user device; at least one voice command;
detection of the orientation of the user device, or facial recognition.
In one embodiment, the system further provides additional user icons, each having a graphical representation different from the graphical representations of other icons displayed on the user device.
In one embodiment, actuation of the software application causes the user device to display an alternative user interface that is visually distinct from the standard user interface of the device.
In one embodiment, the recorded data is transmitted to the remote server (and preferably stored in a data storage facility), wherein the data upload continues until a user command is received to discontinue transmission.
In one embodiment, upon SOS activation, the software application is configured to enable automatic room recording and require user authentication (e.g., log in) for SOS deactivation.
In one embodiment, the software application further comprises an option to disable automatic locking of the user device when emergency settings are activated, while allowing its display to automatically dim.
In one embodiment, the user command to discontinue data transmission is provided in the form of at least one of: an alphanumeric password, or a user voice command.
In one embodiment, the recorded data stored in the remote server is encrypted and password protected.
In one embodiment, the remotely stored recorded data is automatically forwarded to at least one third party (preferably with a location information and contact information, e.g., phone number) in response to disconnection of the user device, wherein disconnection includes at least one of: loss of network connectivity, power-off of the user device, or removal of the software application from the user device (preferably while staying on back up).
In one embodiment, the software application is configured to be actuated in response to: at least one predetermined user facial expressions, proximity detection of an independent predetermined person, proximity detection of an independent predetermined user device, at least one predetermined voice commands, or a detected change in the user’s voice stress tone.
In one embodiment, the software application comprises a training function to allow the user to train the software application to recognise (and preferably to take necessary action based on): specific facial expressions, images of one or more independent predetermined people, specific voice commands, and/or specific voice stress tones.
In one embodiment, the software application is configured to communicate with a remote training database that is configured to receive user facial expressions, images of one or more independent predetermined people (or one or more pre-registered people), specific voice commands, and/or voice stress tones, wherein a machine learning or artificial intelligence algorithm processes the received data to validate or predict user actuation triggers.
In one embodiment, the software application is configured to duplicate a device unlock screen, wherein: a first unlock screen is displayed upon user device activation or upon unlocking the user device and requires entry of a password set within the software application, and upon successful entry of the first password, the software application presents a second unlock screen requiring entry of the device’s standard unlock password.
In one embodiment, face or voice recognition of the predetermined person is configured to trigger: concealment of the software application, screen dimming, and/or the recording.
In one embodiment, the software application requires registration of an image of the user during installation and remains inoperable or hidden unless the application receives a matching user image captured by the data capture module at a predetermined sampling rate, the data capture module being in a form of a camera, or a camara and microphone.
In one embodiment, the user device comprises a display screen, and the software application is configured to modify its visual representation by displaying the first software application icon on the display screen and replacing the first software application icon with the second software application icon.
In one embodiment, the user device includes a processing unit, and the software application is executed by the processing unit.
In one embodiment, the user device includes a storage medium, and the software application is stored in the storage medium.
In one embodiment, the secure communication link between the user device and the remote server uses end-to-end encryption to protect the recorded data during transmission.
In one embodiment, upon activating the data capture module or actuating the software application, or triggering any other emergency feature of or associated with the software application, the user device is configured to suppress or disable any audible or visible indicators.
In one embodiment, upon activating the data capture module or actuating the software application, or triggering any other emergency feature of or associated with the software application, the user device is configured to automatically dim its display (e.g. to prevent detection).
In one embodiment, the software application is further configured to transmit a message to an emergency contact, the message including data captured by the data capture module of the user device.
In one embodiment, the software application comprises its own location settings independent of the location settings of the user device, and wherein, when the software application’s location settings are enabled, the software application is configured to determine the location of the user device and automatically identify and/or communicate with at least one service provider near the determined location.
In one embodiment, the software application is configured to prompt the user to provide identity information during registration or login.
In one embodiment, the identity information comprises at least one of a passport number, driving licence number, birth certificate number, or an image of an identity document.
In one embodiment, a photo and identification are required for identity verification.
In one embodiment, the software application is configured to automatically scan the identify information against the photo (e.g., for identity matching).
In one embodiment, the software application is further configured to determine at least one user attribute from the provided identity information, wherein the user attribute comprises at least one of gender, age, or address information.
In one embodiment, the software application is configured to filter and display goods and/or services within the directory based on at least one user attribute, such that the user is presented only with relevant goods and/or services to the user of that user attribute.
In one embodiment, upon determining that a current location of the user, the software application is further configured to display emergency contact details relevant to the user’s current location.
In one embodiment, wherein the directory is configured to establish a secure, access- controlled platform for the service provider to register and be listed while restricting visibility of their information from unauthorised users.
In one embodiment, the directory is configured to display service provider information only to verified users of the user device, wherein verification comprises matching the user's identity information with their registered user device.
In one embodiment, the directory is configured to categorise service providers based on the location of the user device.
In one embodiment, the directory is configured to categorise service providers based on the gender, age and auto-setting, user selection of the medical profession and/or other criteria.
In one embodiment, the software application is configured to operate in incognito mode, running discreetly in the background without appearing in standard settings of the user device, and wherein all configurations and settings of the software application are contained within the software application itself (e.g., subscribed account of the software application itself) for preventing unauthorised modifications or for preventing drawing undesirable attention.
In some embodiment, the software application is configured to that it is completely concealed from other services (e.g., accounting).
In one embodiment, the software application remains completely concealed from services (e.g. accounting) unless accessed via an associated the storage facility such as cloud storage facility, rather than being stored on the user device.
In one embodiment, the software application comprises an authentication monitoring module that is configured to detect multiple failed login attempts.
In one embodiment, the software application is configured to detect multiple failed authentication attempts and, upon reaching a predefined threshold of failed authentication attempts, initiate a security response that includes transmitting an alert to a designated emergency contact(s) and preferably provide access information to facilitate user verification and assistance.
In one embodiment, the emergency alert comprises one or more of location data, contact details, and a pre-set message, which can be configured to notify the emergency contact(s) (e.g., police).
In one embodiment, wherein the transmission of the art to designated emergency contact(s) can be enabled or disabled by the user.
In one embodiment, the alert includes at least one pin (most preferably at least two pins) to allow access to the user device.
In one embodiment, the user device is a cellular device, the software application is configured to detect the proximity of the user device and a predefined external device that is also a cellular device by monitoring cell tower connections, wherein proximity detection is based on identifying when both devices are connected to the same or nearby cell towers.
In one embodiment wherein upon detecting the predefined external device within a predefined range of the user device, the software application is configured to automatically generate and transmit an alert to the user device.
In one embodiment, wherein if the user device is powered off and subsequently powered back on, the software application is configured to retrieve and analyse historical cell tower connection data to determine whether the predefined external device was within the predefined range during the period the user device was off, and upon such determination, generate and transmit an alert to the user device and/or an emergency contact, and preferably, stored as a back up, e.g., in the data storage facility
In one embodiment, the system further comprises a web-based portal configured to allow authorised personnel to set up accounts for users in service provider environments without requiring installation of the software application on a user device of one or more service providers. The user device of one or more service providers may be data communication device.
In one embodiment, the software application is configured to generate a unique email account for the user, the email being linked to a secure storage system and restricted from standard traceability methods.
In one embodiment, access to stored information requires user authentication through credentials associated with the generated email account.
In one embodiment, the registration includes sending an automated message with login details, the message being configured to be removed from the user device after a predetermined period
In one embodiment, the software application is further configured to analyse verbal and non-verbal emotional indicators within the recorded data using an artificial intelligence (Al) module for detecting patterns of coercion or distress.
In one embodiment, the software application is configured to generate a graphical representation of emotional data over time for review by authorised personnel.
In one embodiment, the software application is configured to categorise and display behavioural patterns based on user-selected emotional indicators, timestamped location data, and recorded interactions on the user device.
In a second aspect, the present invention resides in a computer-implemented method for securely capturing and storing contemporaneous events, the method comprising: executing, on a user device, a software application configured to capture and store recorded data; modifying a visual representation of the software application by displaying a first software application icon on the user device and replacing the first software application icon with a second software application icon that is visually distinct from the first software application icon, thereby disguising presence of the software application on the user device; initiating and controlling a recording function via the software application to capture realtime environmental events as recorded data using at least one data capture module of or associated with the user device; processing the recorded data for secure transmission; establishing a secure communication link between the user device and a remote server (or store in back end until connection is made) transmitting the recorded data from the user device to
the remote server via the secure communication link (preferably, even if software application is not open); receiving, at the remote server, the transmitted recorded data from the user device; relaying, by the remote server, the recorded data to a data storage facility; and storing the recorded data in the data storage facility for subsequent retrieval.
In one embodiment, the step of storing the recorded data in the data storage facility for subsequent retrieval is performed using a remote server.
In a third aspect, the present invention resides in a non-transitory computer-readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising: modifying a visual representation of a software application by displaying a first software application icon and replacing the first software application icon with a second application icon that is visually distinct from the first software application icon to disguise the presence of the software application on the user device; initiating and controlling a recording function to capture real-time environmental events as recorded data by activating at least one data capture module of or associated with the user device; processing the recorded data for secure transmission; establishing a secure communication link with a remote server; transmitting the recorded data to the remote server via the secure communication link; receiving, at the remote server, the transmitted recorded data and relaying the recorded data to a data storage facility; and storing the recorded data in the data storage facility for subsequent retrieval.
In a fourth aspect, the present invention, resides in a system for securely capturing contemporaneous events, the system comprising: at least one user device; a remote server in communication with the user device; and a data storage facility in communication with the remote server, wherein the user device comprises:
a processing unit, preferably, a storage medium, and a a display screen, wherein the processing unit is configured to execute a software application (preferably, stored in the storage medium,) the software application being configured to: modify its visual representation by displaying a first software application icon on the display screen and changing the first software application icon to a second software application icon that is visually distinct from the first software application icon, thereby disguising presence of the software application on the user device, activate a data capture module that is part of or external to but operatively connected to the user device to record environmental events in real-time as a recorded data, and establish a secure communication channel with the remote server for transmitting the recorded data, such that the recorded data is transmitted to and stored by the data storage facility, wherein the remote server is configured to receive the transmitted data from the user device and relay the data to the data storage facility to allow secure storage and accessibility of the recorded data in the data storage facility.
In a fifth aspect, the present invention resides in a method of securely capturing contemporaneous events in the environment of a user, the method comprising the steps of: providing application installation instructions to a user communications device (i.e., a user device) such that the device displays an icon representing the application with a first graphical representation; executing the installation application on the communications device such that the device initiates a user application (i.e., a software application) such that the device displays an icon with a second graphical representation which is different to the first graphical representation; configuring the communications device via actuation of the user application to record events in the environment of the user; automatically uploading or transmitting the recorded events to a remote storage device or a remote server.
In one embodiment, the method further includes the step of configuring the communications device to display only a third icon with a third graphical representation which is different to the first or second graphical representations.
In one embodiment, the icon having the first graphical representation is removed from any display once the installation application is executed.
In one embodiment, the icon having the second graphical representation is removed from any display on the device once the installed application is executed.
In one embodiment, the first, second or third graphical representations are user selectable or adapted from a preselected user icon image.
In one embodiment, the remote storage device is inaccessible by the communication device via the user application.
In one embodiment, the recorded events comprise data acquired by at least one data communication module (e.g., microphone, cameras or inertial sensor) of or associated with the communications device.
In one embodiment, the recorded events comprise data acquired by the communications device including from one or more microphones, cameras or inertial sensors.
In one embodiment, user actuation of the application includes touchscreen entry, rapid tapping of touchscreen, voice command, facial recognition image, and/or communication device orientation.
In one embodiment, the communications device communicates with the remote storage device via a cellular telephone network or the Internet.
In one embodiment, when user actuation is by user touchscreen entry method further includes providing additional user icons each having a respective graphical representation being different to other icon graphical representations.
In one embodiment, actuation of the user application the communication device is configured to display an alternative application user interface.
In one embodiment, the remote data storage is stored in the storage facility (e.g. cloud) whereby the user executed application records data and sends to the remote data storage until a user command is received to discontinue application execution or recorded data upload.
In one embodiment, the user command to discontinue application execution is provided in the form of an alphanumeric password or a user voice command.
In one embodiment, the remotely stored data is encrypted and password protected.
In one embodiment, the remotely stored data is forwarded to one or more third parties in response to the disconnection of the communications device and wherein a user command to disconnect application execution is provided.
In one embodiment, the actuation is adjustable based on user settings to trigger different responses, including actions associated with an identified abuser or victim.
In one embodiment, the method further includes the step of configuring the user application to be actuated in response to one or more predetermined user facial expressions, or proximity of an independent predetermined person.
In one embodiment, the method further includes the step of configuring the user application to be actuated in response to one or more user predetermined voice commands, or in response to a user’s voice stress tone (preferably to activate emergency function and/or act).
In one embodiment, the method further includes the step of user training the application for user facial expressions, images of one or more independent predetermined people, specific voice commands, and/or voice stress tones (preferably for acting, monitoring or assisting).
In one embodiment, the user application is configured to communicate with a remote training database configured to receive user facial expressions, images of one or more independent predetermined people, specific voice commands, and/or voice stress tones such that machine learning or artificial intelligence algorithms of the training database are configured to communicate with the user application to validate or predict the user facial expressions, independent predetermined people, voice commands and/or voice stress tones, and preferably to suggest action(s) to be taken if emergency function is activated.
In one embodiment, the method further includes the step of configuring the communications device to duplicate a device unlock screen, a first unlock screen configured receive a password set by the user application such that causes the communication device to present a second unlock screen being the device’s unlock screen requiring the device’s unlock password.
In one embodiment, the method further includes the step of registering a user’s image at installation such that the user application is configured to be inoperable or not visible absent receiving an image from a device camera sampled at a predetermined rate.
In a sixth aspect, the present invention resides in computer-implemented method of providing assistance to a user in a conflict or crisis situation, including providing, by one or more processors, a software application for download via an application store for installation on at least one user’s device (i.e., at least one user device), the software application appearing as an icon on the user device once downloaded and having a first graphical representation, providing, by one or more processors, a prompt to the user to change the first graphical representation to a second different graphical representation therefore disguising the availability of the software application on the user’s device, providing, by one or more processors, a recording function via the software application that enables user activated recording of video and/or audio using hardware of or associated with the user device, and causing, by one or more processors, any video and/or audio captured using the recording function to be uploaded substantially in real-time to data storage facility (e.g., a cloud storage facility), thereby ensuring that any recorded video and/or audio is recorded and stored as the recording transpires, such that in the event the user device is deactivated or damaged to an extent that the recording function ceases, any previously captured video and/or audio will have been substantially transmitted to, and stored by, the data storage facility.
In one embodiment, the hardware for recording video and/or audio is at least one data capture module in the form of camera and/or microphone.
In one embodiment, the data storage facility is in communication with a remote server that is operatively connected to the user’s device (i.e., a user device).
In one embodiment, the system may further comprise a third component configured to capture and store data upon activation, wherein the third component is located on a separate device.
In one embodiment, the third component is configured to activate features (e.g., recording or an emergency/SOS function), with the captured data being stored in a remote data storage facility or an associated user device.
In one embodiment, the first graphical representation (icon) includes one or more of a title or logo of the software application, hence the first graphical representation that is automatically nominated for the software application will not disguise the software application.
In one embodiment, the second graphical representation selected by the user may include one or more of an icon associated with another software application operating on the user device, a graphical representation that is available for selection from an icon library, a historical photo stored in a photo library of the user device, or a photo or screenshot captured by the user using the device, and preferably scaled/resized automatically to represent original icon.
In this way, the second graphical representation may be selected to disguise the nature of the software application. The person skilled in the art will appreciate that where the user is a potential victim of abuse, the ability to disguise the icon relating to a software application that enables the victim of abuse to record abuse events and seek assistance, makes it more difficult, or impossible, for an abuser to identify the presence of the software application on the victim’s device.
In one embodiment, the method further includes identifying, by one or more processors, whether editing of the selected second graphical representation is required (e.g. re-sizing, etc) to fit the icon previously displayed, and based on determining that such editing is required, performing the required editing.
In one embodiment, the method further includes, based upon acceptance of the second graphical representation by the user, the system replacing the first graphical representation with the second graphical representation. Preferably, the removed/replaced icon is not locatable within the user device.
In one embodiment, the software application further enables the user to define a preferred method for enabling the user to activate the recording function in a discreet manner. For example, the user may select that activation of the recording function may be initiated by the user by touching an icon on the user device touchscreen. Where the user may prefer to have the ability to activate the recording function more surreptitiously, the user may select that activation of the recording function is initiated by the user activating a physical button of the device without the requirement to observe the screen of the device (e.g. a volume button, a short duration press of a power button, etc).
It will be appreciated that by disguising the icon associated with the software application, and further, by allowing the user to discreetly activate a recording function that enables real-time upload of video and/or audio to a data storage facility (in the lead up to, or during, an episode of abuse), relevant evidence regarding the abuse (or potential abuse) will be captured without the abuser’s knowledge. As a result, the abuser is also less likely to be inclined to be provoked into or
escalating their response, damaging or destroying the device before, during or following the abuse (or potential abuse).
In one embodiment, the software application provides additional functionality including one or more of a user diary for incident (e.g. domestic violence) recordal and reporting, a calendar that enables users to store information and make calendar appointments, including providing the ability to view previously attended appointments, a daily planner (operable to provide visual reminders to users), an emergency assistance service provider directory with links to service provider websites to assist users seeking to locate and make contact with an appropriate service provider, and to also assist service providers in promoting/providing their services.
One or more of the abovementioned additional functions may be directly related to the conflict or crisis situation. For example, the user may log (and thereby store) various events and interactions with their abuser, or with service providers assisting the user to deal with the conflict or crisis situation, in the user diary, calendar, daily planner, etc. The logging and storage of such information may provide additional evidence that assists the user to prove the guilt of an alleged abuser.
The directory may function as a medical directory encompassing health and physical wellbeing services, providing access to service providers that are otherwise protected or not publicly listed for safety reasons. Users may also have the ability to request the addition of new medical service providers so that they have broader access to essential support. Additionally, the platform may allow advertising of these protected services and facilitate future service expansion. To increase the chances of connecting victims with the right services, the system may enable direct service requests from any subscriber to professionals based on their specific needs. Users may also log/enter financial, emotional, and medical impacts, so that important information is retained. The main features may function without requiring an internet connection, allowing users to document incidents, interactions, and emotional tracking data in real time. This recorded information may support credibility, document actions that are taken for protection, and can also serve as evidence in legal or other relevant proceedings. In one embodiment, the software application also enables the user to access an SOS facility such that a message is transmitted to pre-defined emergency contacts indicating that the user is in a state of distress as a result of the conflict or crisis situation.
In one embodiment, activation of the recording function automatically causes the SOS facility to be activated.
In one embodiment, the SOS facility may also be used to maintain connections post-abuse, particularly in cases where anxiety disorders or related conditions impact daily life. Activation of
the recording function may automatically trigger the SOS facility, responding to stresses such as separation anxiety. Additionally, a request may allow the system to record the room/surroundings for a specific period of time (e.g., two-minute period) and automatically send the recording, with settings providing the option for the user device to remain open or automatically shut down after the recording is transmitted.
In one embodiment, the SOS facility further enables SOS emergency indications to be transmitted to the pre-defined emergency contacts of the user, including indications regarding one or more of GPS coordinates of the user device at the time the SOS function is activated, updates to any changes to the physical location of the user device by repeated transmission of GPS coordinates as those coordinates change, any associated video and/or audio captured using the recording function, and additional information uploaded by the user using the abovementioned additional functionality of the software application, including the diary, calendar, and/or daily planner.
In one embodiment, if a pre -determined third person’s (e.g., abuser’s) device is a cellular device that is linked via cell towers and detected at the same location as the user device which is also a cellular device. The system may trigger an automatic tracking function for both devices. Upon SOS activation, both devices may be automatically monitored via GPS until the SOS mode is deactivated. Additionally, the system may activate the hardware (e.g., microphone) on the that pre-determined device without requiring prior installation of the application, potentially through integration with partnered technology providers to allow remote activation.
In one embodiment, whenever recorded video and/or audio is transmitted to the data storage facility or to one or more pre -defined emergency contacts of the user, such video and/or audio may be accompanied by GPS location data of the user’s device.
In a seventh aspect, the present invention resides in a system for providing assistance to users in conflict or crisis situations, the system including one or more processors that provides a software application for download via an application store for installation on at least one at least one user device, the software application appearing as an icon on the user device once downloaded and having a first graphical representation, provide a prompt to the user via the software application to change the first graphical representation to a second different graphical representation thereby disguising the availability of the software application on the user’s device, provide a recording function via the software application that enables user activated recording of video and/or audio using hardware associated with the user device, and cause any video and/or audio captured using the recording function to be uploaded substantially in real-time to a data
storage facility (e.g., a cloud storage facility), thereby ensuring that any recorded video and/or audio is recorded and stored as the recording transpires, such that in the event the user device is deactivated or damaged to an extent that the recording function ceases, any previously captured video and/or audio will have been transmitted substantially to, and stored by the data storage facility.
In one embodiment, the one or more processors is configured to provide permission-based access. This may be suitable for law enforcement (e.g., police) in cases where the user and software application are missing, or the user is unable to advocate for themselves. This access may be enabled via an administrative function, requiring a case number to authorise information release to relevant authorities.
In one embodiment, the system provides a recording function that enables user-activated video and/or audio recording, with real-time or near real-time uploading to a secure data storage facility, such as cloud storage facility. Additionally, recorded data may be linked to a chosen email account, allowing secure storage and retrieval. A secondary login option may be available in the storage system, enabling users to grant access to authorities or caseworkers when needed so that critical evidence remains accessible even if the user's device is deactivated or damaged.
In one embodiment, the system further comprises a remote server and the data storage facility is in operative communication with the remote server and the user device.
In an eighth aspect, the present invention resides in a computer-readable medium that when executed on a computer, causes one or more processors of the computer to perform steps including providing a software application for download via an application store for installation on at least one user’s device (i.e., at least one user device), the software application appearing as an icon on the user device once downloaded and having a first graphical representation, providing a prompt to the user via the software application to change the first graphical representation to a second different graphical representation thereby disguising the software application, providing a recording function via the software application that enables user activated recording of video and/or audio using hardware associated with the user device, and causing any video and/or audio captured using the recording function to be uploaded substantially in real-time to a data storage facility (e.g. a cloud storage facility), thereby ensuring that any recorded video and/or audio is recorded and stored as the recording transpires, such that in the event the user device is deactivated or damaged to an extent that the recording function ceases, any previously captured video and/or audio will have been substantially transmitted to and stored by a data storage facility.
In one embodiment, the system or software application include a logging feature for automatically recording time, date, location, and nearby phone numbers at the time of SOS activation. Users may predefine a list of individuals whose proximity causes distress, allowing the system to automatically flag and log their presence when an SOS is triggered. If any of these individuals are detected near the user’s location during activation, the system may highlight their presence within the immediate vicinity.
In one embodiment, the cloud storage facility is in communication with a remote server that is operatively connected to at least one user device).
In any of the above aspects, one or more statements relating to one aspect may equally apply to any other aspect.
As used hereinbefore and hereinafter and unless stated otherwise, the word ‘for’ is to be interpreted to mean only ‘suitable for’ and not for example, specifically ‘adapted’ or ‘configured’ for the purpose that is stated.
As used hereinbefore and hereinafter and unless stated otherwise ‘and/or’ means ‘and’ or ‘or’ or both.
As used hereinbefore and hereinafter and unless stated otherwise, “(s)”, following a noun means the plural and/or singular forms of the noun.
For purposes of the description hereinafter, the terms “upper”, “lower”, “right”, “left”, “vertical”, “horizontal”, “top”, “bottom”, “lateral”, “longitudinal” and derivatives thereof shall relate to the invention as it is oriented in the drawing figures. However, it is to be understood that the invention may assume various alternative variations, except where expressly specified to the contrary. It is also to be understood that the specific devices illustrated in the attached drawings, and described in the following description are simply exemplary embodiments of the invention. Hence, specific dimensions and other physical characteristics related to the embodiments disclosed herein are not to be considered as limiting.
It is acknowledged that the term ‘comprise’, may under varying jurisdictions, be attributed with either an exclusive or an inclusive meaning. For the purpose of this specification, and unless otherwise noted, the term ‘comprise’ shall have an inclusive meaning-i.e., that it will be taken to mean an inclusion of not only the listed components it directly references, but also other non-specified components or elements. This rationale will also be used when the term ‘comprised’, ‘comprises’ or ‘comprising’ is used in relation to one or more steps in a method or process.
All references, including any patent applications cited in this specification are hereby
incorporated by reference. No admission is made that any reference constitutes prior art. The discussion of the references states what their authors assert, and the applicants reserve the right to challenge the accuracy and pertinence of the cited documents. It will be clearly understood that, although a number of prior art publications may be referred to herein; this reference does not constitute an admission that any of these documents form part of the common general knowledge in the art, in Australia or in any other country.
BRIEF DESCRIPTION OF THE DRAWINGS
Preferred embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings in which:
FIG. 1 provides an overview of a system according to an embodiment of the present invention showing, in particular, the interaction of various system components;
FIG. 2 illustrates a diagram associated with an exemplary server component of the system illustrated in FIG. 1 ;
FIG. 3 illustrates an exemplary flow diagram of a process that enables a user to download and install a software application, and subsequently access, or register to use, the software application for interaction with the system illustrated in FIG. 1 ;
FIG. 4 illustrates an exemplary flow diagram of a process that enables the user to change the first graphical representation associated with an app icon to a second different graphical representation therefore disguising the availability of the software application on the user’s device;
FIG. 5 illustrates an exemplary flow diagram of a process that enables the user to activate a recording function that enables recording of video and/or audio in a conflict or crisis situation, the recording uploaded substantially in real-time as the conflict or crisis situation transpires to a data storage facility;
FIG. 6 illustrates a further exemplary interface which provides an SOS facility to be activated, wherein SOS emergency indications are transmitted to pre-defined contacts of the user; and
FIG. 7 illustrates a further exemplary interface for accessing various additional functionality of the software application including a diary, daily planner, calendar, and directories.
DETAILED DESCRIPTION
Referring to the drawings generally, it will be appreciated like reference numerals have been used to denote like components unless designated otherwise. Whilst the preferred embodiment is described with reference to a private domestic environment, it will be appreciated preferred embodiments are applicable in many settings including, but not limited to, public spaces and events, care facilities (e.g. aged care facilities), including group home for teenagers or the disabled, and other group environments such as schools or minimum security or juvenile prisons. Other non-limiting examples where the preferred embodiments are applicable include mental and physical rehabilitation centres, foster care, out of home care settings, substance rehabilitation facilities , trauma support environments, and settings providing assistant with individuals with PTSD. Additionally, the invention may be designed to reduce mental overstimulation. The pre3sent invention may implement visual prompts, providing a more accessible interface for individuals who struggle to navigate conventional systems. Furthermore, it may facilitate emotional tracking for both non-verbal and verbal users. It may be used for assessing psychological impacts, support suicide prevention, identify safe or unsafe spaces etc.
In the drawings there is shown a system and method of providing assistance to a user (30) (also referred to herein as a victim) in a conflict or crisis situation involving an actual or potential abuser (62). The system and method provide a platform that hosts a computer-executable software application (40), wherein the application (40) is accessible by a plurality of users (30) who prefer to have access to safe and private interaction with a software application capable of recording the user’s input, including details relating to incidents experienced by the user (30) and any additional information that may be relevant with respect to a particular conflict or crisis situation experienced by the user (30). In particular, the system utilises a remote server (20) in communication with one or more data communication devices , i.e., one or more user devices (50) associated with user(s) (30). In one example, the system may include an activation component that can trigger the SOS function/emergency function or other automated safety features so that important security or emergency measures can be activated as needed.
The remote server (20) may be a central server or remote central server and it may maintain one or more processors and/or databases for performing functions, including providing the software application (40) for download via an application store for installation on the user’s device (50).
The software application (40) (which may also be referred to as user application (50)) appears as an icon (55) on the user device (50) once downloaded, the icon having a first graphical
representation. The central server (20), via software application (40), provides a prompt to the user (30) to change the appearance of the icon (55) to a second (different) graphical representation (60), therefore disguising the availability of the software application (40) on the user’s device (50). In this way, the user (30) may access the software application (40) in a discrete manner that will prevent or at least reduce the opportunity for others to gain access to the software application (40) and/ information / data / media stored thereon.
Additionally, or alternatively, the icon may be invisible and accessed by tapping an existing home screen icon or similar on the user device (50). The user (30) may also choose to access the software application (40) by selecting one or two existing icons, where one icon opens another software application and the second, when combined with face recognition, triggers SOS activation/activation of emergency feature.
In circumstances where the user (30) may be aware that they are in, or approaching, a conflict or crisis situation involving an abuser or potential abuser (62), the remote server or one or more processors and/or databases associated with the remote server (20) may be utilised to perform additional functions including providing a recording function, also implemented by the software application (40), that enables the user (30) to activate recording of video and/or audio (70) of the situation as it transpires. This may be achieved using hardware/data capture module of or associated with the user device (50), and any video and/or audio (70) captured using the recording function is uploaded in substantially real-time to a data storage facility/remote data storage facility, most preferably a cloud storage facility (75). This ensures that the recorded video and/or audio (70) is stored for safe keeping as the recording transpires, such that in the event the user device (50) is deactivated or damaged to an extent that the recording function ceases, any previously captured video and/or audio will have been substantially transmitted to, and stored by, the cloud storage facility (75) and hence, out of reach to any person seeking to destroy such recorded images and/or audio. The data storage facility may be a company storage facility or a private storage facility. Similarly, data security may be strengthened through access controls, security locks, and measures to prevent unauthorised access to the user device (50), including restrictions on multiple failed login attempt.
It will be appreciated that the platform provides a means by which users (30) (i.e., victims of abuse or potential abuse) may record and store information at an appropriate time in the lead up to, during, or following an episode of abuse. Such information may represent important evidence and may prove extremely useful when seeking to prove the guilt of an abuser (62) in a court of law. The fact that the access to the software application (40), as well as the recordal of audio and/or video (70), may be achieved discretely, the abuser or potential abuser (62) is unlikely to be
aware that the victim’s device, i.e., the user device (50) or software application (40) is being accessed and/or is operational at the relevant time.
Even if the abuser (62) becomes aware of the operation of the device/software application and seeks to deactivate or damage the user device (50), at least previously captured video and/or audio (70) will already have been sent to and stored by the cloud storage facility (75) through the use of the recording function. If the user device (50) is out of range, turned off, or otherwise unable to communicate with the remote server, the recorded data may be stored on the user device (50) or backend of the software application until communication, such as via Wi-Fi, becomes available. Upon re-establishing communication, the stored recorded data may be automatically transmitted to the remote server (20).
It is to be understood that a user (30) may be any victim of abuse or potential abuse, and the present invention is not limited to any one category of abuse. For example, the user (30) may be a victim of domestic violence, sexual abuse, financial abuse, emotional or psychological abuse, physical abuse, coercive abuse or control, bullying etc. In addition, the user (30) is not limited to any one particular age group, and the abuse may involve mature age individuals, youth and families alike.
Referring particularly to FIG. 1, this is divided into segments which are expanded on in respect of subsequent FIGS 2 to 7. Segment 200 of FIG. 1 shows server component, i.e. remote server (20) with which the software application (40) operating on each data communications device, i.e., user device (50) are configured to communicate. It will be apparent to the person skilled in the relevant field of technology that the software application (40) may be a mobile application or a web application and that, similarly, data communication devices, i.e., the user devices (50) utilised by users (30) may be portable devices or fixed location computing devices. Examples of portable devices include smart phones and watches, computer tablets and laptops, and examples of fixed location computing devices include workstations, personal computers and smart televisions. The server component, i.e., the remote server (20) is additionally detailed in FIG. 2.
The remote server (20) may also be configured to interact with items used for remote activation, such as a physical button or a camera-based trigger.
The steps described herein may be executed by the one or more user devices (50), wherein such operations are facilitated by the software application (40) operating on the user device (20) or each user device (20). According to another preferred implementation, the server (20) may be programmed to provide all or most of the processing functions described herein, where they cannot be provided locally on the user device(s) (50) or where it may be commercially or technically
impractical to implement such arrangements. In other words, the steps described herein as performed by a user device (50), or components thereof, may be associated with hardware that is located externally of the device (50) such as the remote server (20) for example (i.e., in a distributed architecture). Different arrangements are possible in this regard, and alternate variations will be apparent to the skilled addressee.
Segment 300 of FIG. 1 shows a user (30) downloading and installing the application (40) and subsequently accessing the application (40) in order to establish an account, as further detailed in FIG. 3. Segment 400 of FIG. 1 illustrates how the user (30) may disguise the graphical representation of a default icon (55) associated with the software application (40) on their device (50) to a disguised icon (60) having a different graphical representation, as further detailed in FIG. 4. Segment 500 of FIG. 1 illustrates how the user (30) approaching a conflict or crisis situation may activate a recording function to ensure that video and/or audio (70) captured during the conflict or crisis situation is recorded and stored in substantially real-time as the recording transpires, as further detailed in FIG. 5.
Segment 600 of FIG. 1 illustrates further functionality of the software application (40) comprising or being in the form of an SOS facility that enables emergency messages or the like to be transmitted to a pre-defined emergency contact list of the user (30), as further detailed in FIG. 6. In some examples, such pre-defined contact list may be set up by the user. Finally, Segment 700 of FIG. 1 illustrates example interfaces according to the embodiment described herein reflecting additional functionality of the software application, including a diary, daily planner, calendar and directory which the user (30) may access and utilise to view and/or store information, including in relation to an abuser or potential abuser (62) and/or a particular conflict or crisis situation encountered by the user (30).
There may be options to log failed login attempts as an additional security feature. Furthermore, the system (40) may support emotional tracking and incident reporting, with a provision of dedicated space to add case numbers for documentation purposes.
As mentioned above, FIG. 2 shows in greater detail Segment 200 of FIG. 1 and, in particular, FIG. 2 shows the remote server (20) which will include infrastructure upon which the platform of the present invention operates. The infrastructure may be local or cloud-based.
The remote server (20) may operate one or more computer processors and maintain one or more databases. The remote server (20) may enable the following functionality and/or storage:
User account register (100) storing user details such as name, age, address, contact details, identifiers such as driver’s license or passport details of the user (30), and any additional data
which may be relevant for the purpose of identifying each user (30). In some examples, adding photo or image may be a mandatory step. Where possible, such details may be verified using identification verification services, and each user (30) may also be required to provide an image of themselves for further identity verification;
Data processing functionality (105) for processing user input commands and other data received through operation of the software application (40) or from elsewhere, and to generate relevant outputs for display. For example, the data processing functionality (105) of the remote server (20) may be responsible for receiving a user command to update the graphical representation of the software application icon (55) on the user device (50) and to cause the icon to update in accordance with the user instructions. The data processing functionality (105) may also manage the transmission of video and/or audio captured using the user device (50) to the cloud storage facility (75), and process and action requests to activate an SOS facility including to transmit the relevant emergency notifications to relevant emergency contacts of the user (30). The data processing functionality (105) may also manage instructions received from authorities (e.g. police and other emergency authorities) in situations where the user (30) is not responsive and/or cannot be located. This may be done through a verification process where authorised personnel submit a valid case number to the system administrator. If the user (30) has previously given consent, the administrator may be able to then grant access to the necessary data to assist with the situation. Access to this data via the administrator may require a case number to be added to the file before the option to share information becomes available. Emergency contacts may have the ability to forward recorded data and location information to a third party so that they receive realtime updates and access to the live feed;
A data structure (110) that identifies the relationship between users (30) or accounts established on behalf of users, and locally and/or remotely stored data associated with the user (30) or user account. For example, there will be a relationship between each user account and information uploaded by the user using, for example, the diary, calendar, and daily planner facilities as well as incident details / history and contacts of the user (30) including emergency. The storage and indexing of such information utilising the data structure (110) facilitates fast and efficient retrieval of such information for various purposes including for the generation of reports relating to individual users (30). The system may include independent reporting with an option to add a case number, allowing for structured documentation of incidents. Additionally, phone recordings and saved messages may be stored, with an option to transmit messages for transcription into a specific file format to allow easier documentation and retrieval of the information;
An app icon library (115) storing default graphical representations may be available for selection by the user (30) when the user (30) is seeking to hide / disguise the software application (40) on their device interface;
A contact directory (120) listing and categorising all relevant contacts of users (30), including family and friends, emergency contacts such as police, ambulance, social workers, hospitals, etc, as well as other contacts including goods/service providers of interest to the user. For example, service providers may seek to promote their goods/services to users (30) of the platform, and the software application (40) may provide a listing of such goods/service providers to users (30) with the ability to add such providers to the user’s contact list; The contact directory (120) may be separate and operate independently from directory (90). The directory (120) may allow ID and contact choices to be selected in settings. Additionally, contacts can be categorised based on factors such as profession, location, level of security, gender, and age; and
A payment gateway functionality (130) which enables all financial transactions that may be required during utilisation of the software application (40) to be managed (e.g. payment of subscription fees, payments made to goods/service providers, etc).
FIG. 2 also depicts that remote server (20) is configured to enable communication (140) with one or more user devices (50) and, in particular, the software application (40) operating on the user device (50) or each user device (50). Such communications may occur via the internet or similar network.
FIG. 3 shows in greater detail Segment 300 of FIG. 1 and, in particular, the steps associated with a user (30) downloading and installing the application (40) which may be achieved by downloading the application (40) from an application store. Each user (30) may create an account using the application (40) and the account information may be stored in the account register (100). As described above, the user account register (100) may capture information sufficient to enable each user (30) to be correctly identified.
The process of installing the software application (40) is indicated by arrow (150), and interface (160) is also shown in FIG. 3, which allows the user (30) to download and install the software application (40) to access the functionality thereof, including to create and maintain a user profile. In other words, once the software application (40) has been accessed by a user (30), the user (30) may be presented with an interface identical or similar to interface (160) to allow the user (30) to create and maintain their account and profile, including providing the user (30) with the ability to add/edit details. Upon uploading sufficient information, each user (30) will be successfully registered such that the user (30) becomes a registered user who may then utilise the
functionality of the software application (40), which may be in accordance with a subscription level of the user (30). During the registration process, a login email and sign-up notifications may be sent via text message to the designated user device (50) if the user device (50) is a cellular device. These messages may be automatically deleted after a predefined time period, such as 10 minutes, to improve security and prevent unauthorised access.
The software application (40) may not link to personal email accounts, and users may be notified that sign-up notifications and login emails will auto-delete after a set period (e.g., 10 minutes) for security purposes.
Upon registering to use the software application (40), the user (30) may also be prompted to answer various questions relating to “user preferences”, including in relation to privacy. For example, the extent to which the user’s information may be shared and/or accessed by emergency authorities, service providers and the like, may be controlled by the user (30) according to their preferences. Users (30) may be encouraged to enable reports relating to any recorded video/audio relating to incidents (encounters with abusers), and any additional related interactions with the software application (40), including information uploaded to the user’s calendar, diary and daily planner, to be generated and made accessible to external parties such as emergency authorities in emergency situations. For example, if the user (30) has recorded experiencing a conflict or crisis situation (e.g. by activating the recording function and/or the SOS facility), and cannot subsequently be reached, this may automatically trigger the generation and transmission of a report to the relevant emergency authorities. The report may optionally include audio and/or video recorded by the user (30).
In one example, if no activity is recorded on the software application for a specific predetermined period of time (e.g. for a week or two weeks), an SOS alert may be automatically sent to emergency contacts as a welfare check.
The sharing and access of user information by emergency authorities or service providers may be approved in settings or during setup.
FIG. 4 shows in greater detail Segment 400 of FIG. 1 and, in particular, the display of a default icon (55) on the user device (50), and a prompting of the user (30) to change the graphical representation associated with the icon such that a disguised icon (60) is displayed. In this regard, the icon may be changed by the user (30) using interface (170), wherein interface (170A) represents the initial device interface in which icon (55) is displayed, and interface (170B) represents the subsequent device interface in which the disguised icon (60) is displayed.
Whilst not shown, the first icon (55) may include one or more of a title or logo of the software application, hence the first icon (55) that is automatically generated for the software application (40) will not disguise the software application (40). The second icon (60) selected by the user (30) will be different to the first icon (55) and may include any graphical representation selected by the user.
For example, the graphical representation could be an icon associated with another software application operating on the user device (50), a graphical representation that is available for selection from the app icon library (115), a historical photo stored in a photo library of the user device, or a photo or a screenshot captured by the user (30) using the device (50) or photo generated using Artificial Intelligence (Al). The chosen photo or graphical representation may be rescaled or adjusted in size to match the original icon’s dimensions of the software application (40). Irrespective of the manner by which the second icon (60) is selected, including a representation of the device home screen GUI, it will be appreciated that it will no longer reflect the standard icon of the application and hence, the nature of the software application (40) which will be appropriately disguised from any potential or actual abuser (62). It will be appreciated that the ability to disguise the icon relating to a software application (40) can enable the victim to record abuse events and seek assistance and make it more difficult for an abuser (62) to identify the presence of the software application (40) on the victim’s device, i.e. user device (50).
All icons (except initial icon) and any payments may not reveal the software application (40). Additionally, any payments may appear under a generic account name (e.g., shopping) to maintain discretion.
In the event any newly selected graphical representation for the disguised icon (60) requires editing prior to replacing the automatically generated graphical representation, the interface (170) may provide editing facilities that enable the user (30) to manually re-size the graphical representation such that it is sized to fit the icon previously displayed. Alternatively, such editing may be performed automatically using appropriate digital techniques. The re-sizing process may be such that it allows the image or photos to fit neatly within the small space of an icon or widget of the software application (40) while preserving detail and avoiding pixelation. The re-sizing process may allow that the image or photo matches the exact quality and dimensions of all other widgets on the device, preserving detail and avoiding pixelation.
FIG. 5 shows in greater detail Segment 500 of FIG. 1 and, in particular, the activation of a recording function provided by the software application (40) when the user (30) considers that a particular conflict or crisis situation is occurring, or is likely to occur. Such a recording function
may be activated in any appropriate manner, and it is to be understood that the present invention is not limited to any one means of activating the recording function.
For example, as shown in FIG. 5, a prompt may be provided in a recording function interface (180) associated with the software application (40) which enables the user (30) to touch the screen (display screen) in order to activate the recording function. Alternative activation method may include tapping a specific portion of the user device (50), e.g., back camera, to trigger recording function. The same may apply for SOS activation. In an alternative embodiment, a button (66) associated with the device (50) (e.g. a power or volume button) may be designated as the means by which the recording function is activated. In this way, the user (30) may select the activation means of the recording function which may be initiated by the user activating the physical button (66) without the requirement to observe the screen of the device (50) (e.g. by pressing or holding down for a short duration one of the buttons (66)). The means by which the recording function is activated may be pre-defined according to a preference of the user, and it is to be understood that such a preference may be selected by the user (30) when first registering to use the software application (40). Such preference may be selected and/or stored using settings of the software application (40) and not the settings of the user device (50)
Additionally, in some preferred examples, the recording function may be voice-activated, allowing the user (30) to initiate recording by speaking a predefined voice command, i.e., predefined key phrase or word, such as "ICE CREAM" or "DUNE." These pre -determined key words or phrases may be chosen to avoid any detection by an abuser so that the activation of the recording function is discreet and does not raise suspicion. Upon detecting the key word or phrase, the user device (50) may automatically start recording, providing a hands-free activation method that improves accessibility and usability, particularly in emergency situations where direct interaction with the user device (50) may not be feasible or possible.
Such voice activation feature may function as a personal assistant, allowing users to trigger recording or send an SOS alert based on their settings choice. Additionally, when using voice activation, the screen may remain locked for privacy and preventing unauthorised access.
It will be appreciated that by disguising the icon associated with the software application (40), and further, by allowing the user (30) to discreetly activate a recording function that enables real-time video and/or audio (70) to be stored in a data storage facility such as the cloud storage facility (75) such as a cloud storage facility (in the lead up to or during an episode of abuse), relevant evidence regarding the abuse (or potential abuse) will be captured without the abuser’s
knowledge. As a result, the abuser is also less inclined to damage or destroy the device (50) before, during or after an episode of abuse.
If requested, the system may forward recorded data to emergency contacts. This can allow the user to proactively gather evidence, increasing their chances of documenting incidents without the abuser’s knowledge.
Whenever recorded video and/or audio (70) is transmitted to the cloud storage facility (75), the video and/or audio (70) may be accompanied by additional data relating to the user (30), including the location (80) of the user (30) (e.g. GPS location data associated with the user device (50)). An option is also preferably available to run the application entirely in device background. The recorded time and date may be stored in the cloud storage facility (75) together with the number of other people (especially those predetermined as dangerous or suspicious) who are identified as being in the same location. Additionally, the software application (40) may include an option to run entirely in the background to that it can operate discreetly.
Also shown in FIG. 5 is an incident details / history interface (190) in which the software application (40) itself records details which have been input by the user (30) in relation to a particular incident or a particular conflict or crisis situation involving an abuser or potential abuser (62). Such data could be stored locally on the user device memory, or in a database associated with the remote server (20). Therefore, in addition to video/audio being automatically uploaded in realtime to the cloud storage facility (75) based on activation of a recording function, the same or similar data may be recorded by the user (30) and such data may be stored by the user device (50) or remote server (20) in associated with the particular user’s account. Such details may include the location and time of the incident, as well as details relating to the type of incident and what occurred (assuming the victim is able to enter such details following the abuse episode). An example of an incident recordal may be “the abuser yelled at me” or “the abuser physically assaulted me”, etc.). It will be appreciated that the recordal and storing of such data and information enables users (30) to establish a log of various events and interactions with their abuser (62). Incident records, including time, date, and event details, may be linked to the system, which may be emotional tracking system. Users may have the option to attach photos or share records within the system for more detailed documentation.
FIG. 6 shows in greater detail Segment 600 of FIG. 1 and, in particular, an SOS facility interface (210) that provides users (30) with the ability to activate an SOS facility and thereby enable messages to be transmitted to pre-defined emergency contacts (85) of the user (30) indicating that the user (30) is in a state of distress as a result of a conflict or crisis situation
involving a particular abuser (62). The SOS facility may be activated independently of the recording function, or in another embodiment, activation of the recording function may automatically cause the SOS facility to be activated, and may be activated by voice command or other desired means. The contacts of the user (30) who are selected as “emergency contacts” may be very close family members, neighbours of the user (30), police, ambulance and other emergency providers. Such emergency contacts may be pre-selected by the user (30). An example of a prerecorded audio or text emergency message that may be transmitted to emergency contacts is “Please help me, I am in trouble and in need of urgent assistance.”
The SOS facility may trigger an ongoing alarm until acknowledged by the recipient. Upon first activation, the user may have the option to record the room/situation/surrounding event before enabling the SOS function. The system may also detect Al-identified tones in the voices of the abuser (62) or victim/user (30) and respond accordingly. Additionally, emergency messages may include the option to forward live location to a third party for continuous tracking. Emergency contacts may include case workers and medical support personnel.
The emergency message may also include a present location (80) of the user (30) and may further provide updates to any changes to the physical location of the user device (50) by repeated transmission of GPS coordinates, as those coordinates change. The software application (40) may also enable additional functionality, including, but not limited to incorporating any captured video and/or audio (70) (based upon activation of the recording function) into the SOS message that is sent to emergency contacts, as well as any additional information uploaded by the user (30) through their various interactions with the software application (40), including interactions with additional facilities provided by the application (40) including those described in further detail below.
So, the emergency message may include the user’s current location and provide real-time GPS updates as the user’s location changes. If additional recording is required, this may be activated through an emergency recording feature. If the SOS function is accessed a second time, a prompt to cancel may appear. When an emergency contact opens the SOS, the main account holder may see their details turn visually distinctive (e.g. red) in the settings, thereby functioning as a silent indicator that the SOS has been viewed by the recipient.
In some examples, the SOS message sent to an emergency contact may include audio and/or video recordings captured by the user (50). The inclusion of such recordings may provide a significant advantage by offering real-time evidence of the situation. The emergency contact may also have the capability to forward the received message via text or email to a third party, such as
law enforcement or other relevant authorities, to provide immediate context. Additionally, this recorded information may serve as evidence in legal proceedings, supporting prosecution or other necessary actions. Also, such information will provide indication to the recipient(s) regarding the level of danger and the type of assistance required.
The SOS feature may be configured to record for a predetermined time before automatically sending the captured data to emergency contacts. Additionally, recording options may include SOS recording, emergency recording, independent reporting, and emotional tracking. This recorded data can serve as evidence in legal or similar proceedings or aid in determining the level of danger and required assistance for the recipient.
In certain examples, an administrative function may be provided within the software application (40) to facilitate access to law enforcement or other relevant authorities (e.g., police). The administrator may have the ability to grant access to an account to such authorities, with a corresponding case number recorded in the system for the purpose of tracking and verification. This case number may be linked to the account, with no option for manual override before accessing or forwarding information. Additionally, user approval in settings may be required before enabling such access.
FIG. 7 shows in greater detail Segment 700 of FIG. 1 and, in particular, various additional example interfaces associated with the software application that provide various additional functionality and assistance to users (30). For example, the additional interfaces (220) may provide a diary for allowing users to record incident details, a calendar that enables users (30) to store information and make calendar appointments including the ability to view previously attended appointments, a daily planner operable to provide visual reminders to users, and a directory (90) which lists all of the user’s contacts, including emergency contacts, as well as goods/service providers of interest to the user (30). The directory (90) may also provide links to goods/service provider websites to assist users seeking to locate and make contact with the goods/service providers. In some examples, the emergency contacts may not be in the directory (90) unless the user (30) adds them to the directory (90). In some examples, the emergency contacts may remain hidden in settings of the software application (40).
The system may be designed to support crisis survival and post-crisis recovery, offering tools such as scheduled reminders, actual image displays, and forwarding options for incident records. The calendar may be configured to display event completion status and associated notes, with an option to link records to emotional tracking via photos or forwarded applications. The software application (40) may provide a tracking feature, allowing users (30) to log details about
completed, missed, rescheduled or new appointments. This feature may be integrated with the calendar to display past appointments with notes, follow-up reminders, or outstanding tasks. Additionally, such data may be linked to emotional tracking. Users may be able to attach photos, notes, or forward relevant information to support services or applications.
The directory (90) may also facilitate access to goods/service providers, including those not publicly listed for security reasons. This can help to increase access to relevant services while ensuring that emergency contacts and service listings align with internal client needs rather than assumed matches. Additionally, referrals may be managed to reduce incorrect recommendations, aiming to minimise financial and mental health impacts, including suicide risks.
The directory (90) of service provider may be structured to maximise recovery by offering comprehensive categorisation and classification of user groups so that the users can efficiently connect with appropriate service providers based on their specific requirement.
It will be appreciated that any information or interactions recorded using the additional interfaces (220) may be directly related to a particular conflict or crisis situation relating to a particular abuser (62). Accordingly, by interacting with the additional functionality of the application (40), the user (30) is effectively creating a log regarding various events and interactions with their abuser (62) and related parties who may be assisting the user (30) deal with the crisis or conflict situation (e.g. doctors, therapists, etc.). In this way, additional evidence that may assist the user (30) to prove the guilt of an alleged abuser (62) is recorded, and the software application (40) will be capable of generating reports in relation to such data that can easily be transmitted to relevant authorities if the need arises.
The system may allow tracking of appointments and outcomes, linking them to emotional tracking data to reduce overwhelm. This can allow users (30) to demonstrate credibility, providing a log of actions taken for self-care and support for loved ones. Additionally, users (30) may be able to gather and transmit relevant data from a single calendar portal that consolidates entries from various sources, for access to such data when needed.
In one example Incident reporting may be configured to be sent based on date, specific groups, or individual recipients.
Incident reporting may include the option to add a case number or heading, along with customisable settings for storage preferences and organisation. This feature can also be utilised for family behaviours or situations, discrimination cases, racial incidents, and other related matters.
In some examples, if no activity is recorded on the software application for a specific predetermined period of time (e.g. for a week or two weeks), an SOS alert may be automatically sent to emergency contacts as a welfare check.
In some examples, the software application (40) may allow users (30) to reactivate a locked account via a cloud system by verifying their identity through ID submission or security questions, for secure access restoration.
In one example, a means of securely capturing contemporaneous events when the user (30) is in a threatening or potentially threatening situation may be provided. As explained above, application installation instructions may be downloaded to a user device (50) e.g., smart phone or other communications device. The software application (40) installation instructions may be displayed on the user device (50) by an icon representing the software application (40) with a first graphical representation.
The first graphical representation of the software application (40) installation instructions may be selected or actuated and this may initiate a user application, i.e., software application (40) (as described in the above). The user device (50) may display an icon for the user application with a second graphical representation which is different to the first graphical representation. Preferably there may be no relationship between the first and second icons.
Actuation of the software application (40) may configure the user device (50) to record events in the immediate environment of the user encompassing the threatening situation. When actuated, the user device (50) may automatically upload the recorded events to a remote storage device or remote server (20).
In some preferred examples, the communications device, i.e., the user device (50) may be configured to display only a third icon with a third graphical representation when the software application (40) is actuated. The third graphical representation may not be the same as either the first or second graphical representations. In use, after execution of the installation of the software application (40), the first graphical representation may be removed from display on the user device. For example, the first representation may be that of the downloaded application provided by a distributor and may thus be searchable by an abuser (62). Similarly, the icon having the second graphical representation may be removed (and may not be retrievable in deleted photos or similar storage locations) from any display on the device once the installed software application (40) is executed.
The first, second or third graphical representations are preferably user selectable such as from a list and ideally would otherwise represent a conventional app icon on the user device
display. Alternatively, or additionally, the graphical representations can be defined by a user created image.
The software application (40) may be launched, i.e., actuated by user touchscreen entry method which further includes providing additional user icons each having a respective graphical representation being different to other icon graphical representations. These additional user icons can preferably be displayed depending on what device input is being recorded, for example, voice or camera video.
Also preferable, when the user (20) actuates the software application (40) to record surrounding events, the communication device, i.e., the user device (50) can be configured to display an alternative application user interface. Such an alternative may be a calculator amongst many other choices.
In preferred embodiments, the device can be configured to receive user input to actuate the application including by touchscreen entry, voice command, user facial recognition image, voice recognition or communication device orientation.
As also described in the above , the communications device, i.e., the user device (50) may communicate with the remote storage device or a remote server (20) via a cellular telephone network or the Internet. However, to prevent an abuser (62) accessing sent data from the user device (50), the remote server (20) may be rendered inaccessible such as by MAC number on a smart phone to be viewed, read or downloaded by the communication device, i.e., the user device (50) via the software application (40). This data may be accessible from the device after some predetermined time, and is preferably accessible by any other user device at any time. In certain examples, if the internet or cellular telephone network is not available, data may be stored on the software application (40) (e.g., in the storage medium of the user device (50)) and sent to the remote server (20) when the internet or cellular telephone network is available. The software application (40) on the user device (50) need not be open to send the data to remote server or to emergency contacts.
When the data is stored on the software application (40) it may only be accessible through the software application (50) and through no other program or settings of the user device (50).
In one example, the software application may generate a unique email address for each user, which may be linked with the system for secure communication and data management. This email may be integrated with cloud storage facility (75) or remote server (20) to improve security, whilst ensuring user privacy and protection from unauthorised access.
To further improve security, the software application (40) may generate unique email accounts to prevent traceability through standard email hacking attempts by potential abusers or third parties. Upon sign-up, the user may receive a login code and a system-generated email address that is linked to the storage system.
In some examples, access to stored information within the software application (40) may be controlled by requiring the user (30) to input the assigned email address and login code, thereby reducing the chances of any traces of the user’s access being left on commonly searched platforms, email accounts, or cloud storage. The system may further provide an optional subscription for additional security functionalities, including expanded storage capabilities.
Additionally, upon registration, the user (30) may be sent a text message containing their login details, with the option to forward the information to another phone number. This message may include a system -generated notification, such as: "Welcome. This message will self-delete in 10 minutes." After this period, the message may be automatically and permanently deleted from the device, making it inaccessible, even from deleted message folder.
It will be noted that the recorded events can be composed of data acquired by many sources associated with or integrated into the user device (50). For example, a user device (50) such as a user smart phone can include data from one or more data capture modules such as but not limited to microphones, cameras, ambient lighting sensors or inertial sensors.
When the remote data storage is in the cloud, the user device (50) may be configured to record and send or stream data from the data capture modules, i.e., device sensors to the remote data storage until a user command is received to discontinue application execution. In the case of recorded data being encrypted and stored on the user device (50) such as when communications network is unavailable, data recorded until the data is uploaded to the remote storage.
The user device (50) can also be configured to forward or transmit the remotely stored data to one or more third parties such a security or law enforcement in response to the disconnection of the communications device, i.e., user device (50) and wherein a user command to disconnect application execution is not provided. This could indicate, for example, the user device (50) being disabled, destroyed or powered down without user consent. It will be appreciated that the user command to discontinue application execution is preferably provided in the form of an alphanumeric password or a user voice command. Alternatively, facial or voice recognition functionality may be used for that purpose.
In some examples, a separate SOS icon be made available, or a dedicated device be used solely to activate the SOS function without accessing the main application on the user device.
In some preferred examples, the device may be configured to actuate the software application (40) in response to one or more predetermined user facial expressions, or other nonverbal gestures or tone, or when in proximity of user device camera/s to an independent predetermined person. Preferably, this is only possible if activated in settings of the software application. Similarly, the software application may be actuated in response to one or more user predetermined voice commands, or in response to a user’s voice stress tone. The latter particularly removing any need for a user (30) to touch their user device (50) near an abuser (62). It may be possible to recognise variations in tone, distinguishing between the tone of an abuser and that of a victim and accordingly take necessary action.
Most advantageously, the user device (50) is configured to allow the user training the software application (40) for user facial expressions that represent distress, images of one or more independent predetermined people (e.g., abuser (62)), specific voice commands, key words, key phrases and/or voice stress tones. In response to the user device sensing one of these predetermined expressions or voice tones, the software application (40) may be actuated and sensed data streamed.
Artificial intelligence may be used to identify a user facial expression or voice stress tone to actuate the user application to send data. The software application (40) may be configured to communicate with a remote training database configured to receive user facial expressions, images of one or more independent predetermined people, specific voice commands, and/or voice stress tones such that machine learning or artificial intelligence algorithms of the training database are configured to communicate with the user application to validate or predict the user facial expressions, independent predetermined people, voice commands and/or voice stress tones.
The facial images representing user distress, for example, can be predictively characterised, for example, using a convolutional neural network and training this with user provided distressed facial expressions. Similarly for voice stress detection to actuate the software application (40) where an artificial neural network can be trained and deployed for natural language processing (including using large language models) and tone recognition. Continual learning can be provided to accommodate user aging, or temporary changes in appearance such as wearing make up or being sun burned.
The user device (50) may be configured to duplicate a standard device lock/unlock screen. Here, the first unlock screen may receive a password set by or associated with the software application (40). Correct entry of the first password may cause the communication device, i.e., the
user device (50) to present a second unlock screen that is the user device’s inbuilt unlock screen requiring the user device’s usual unlock password.
In some preferred examples, the user’s image may be registered at installation of the software application (40) so that the user device (50) is configured to disable the software application (40), and most preferably hide any software application icon on the user device (50), if an image from a device camera sampled at a predetermined rate is not that of or associate with the registered user. Preferably, at such time the software application (40) automatically uploads all recorded event data to the remote storage and the application may be run in background/non- visible memory, i.e., storage medium of the user device (50) presenting no GUI. This way, when the face of the user (30) is not detected the Graphical User Interface (GUI) of the software application (40) becomes invisible.
In some preferred examples, more specifically, the software application (40) may have its own location settings which may be different from the general location settings of the user device (50). The directory (90) may organise services based the location of the device, however it may only function if the software application’s own location settings are enabled. In some preferred examples, when the user (30) logs into or registers with the software application (40), they may be prompted to provide identity information. Non-limiting examples of such identity information include a passport number or driving licence number. Additionally, or alternatively, the user (30) may be prompted to capture an image of an identity document. This identity information may be utilised to retrieve relevant details that enable the software application (40) to filter services, ensuring that the user (30) is presented only with options of goods/services relevant to them.
For example, one such relevant detail may be gender identification, which can be determined from the identity information of the user (30). Based on this determination, the software application (40) may tailor the directory (90) to display only goods or services pertinent to the identified gender. For example, if the user (30) is identified as female, the directory (90) may present links, contact details, or other relevant information related to women's safety organisations and services specifically catering to females. Similarly, if the user (30) is identified as male or transgender, the directory (90) may provide links, contact details, or other information relevant to the specific needs of that gender while filtering out non-relevant goods/services for that specific gender.
The remote server may derive such relevant details either directly from the identity information provided by the user (30) or by communicating with external databases, such as those maintained by the identity-issuing authority (e.g., government databases). If multiple users are to
access the software application (40), each individual may be required to provide their own identity information. In cases where younger users do not possess an official identification document, the software application (40) may prompt them to provide an alternative form of identification, such as a birth certificate number or an image of a birth certificate.
While gender identification is one example of the relevant details that may be extracted from the identity information, additional types of user-specific data may also be utilised. For example, age-related information may be used to filter and present age-appropriate services, such as youth protection services for younger users or senior safety services for elderly users. Furthermore, the user's address information may be employed to provide location-specific details, including the identification of nearby emergency services such as police stations or hospitals. If the software application (40) detects that the user is travelling, e.g., based on application location settings or passport details, it may provide relevant emergency contact information specific to their location, including embassy details, local hospitals, and police contact information within the vicinity or region.
The remote server may obtain such relevant details either directly from the identity information submitted by the user (30) or by communicating with external databases, such as those maintained by the identity-issuing authority (e.g., government databases).
The location settings of the user device (50) may be independent from and may not operate the location settings of the software application (40). The software application (40) may have its own settings for each feature except SOS.
Thus, the software application (40) may be configured to obtain user identity information, determine one or more user attributes (e.g., gender, age, location etc.) from the identity information and filter goods and/or services based on user attributes. The software application (40) may tailor the directory (90) based on the user attributes to generate only information on the user device (50) that is relevant to that user.
In some preferred examples, facial and voice recognition functionality may be used so that only authorised users can access specific services within the directory (90).
The directory (90) may provide a secure platform where service providers, such as women's crisis centres, can be listed while maintaining confidentiality. For example, a service provider such as women’s crisis centre, which would typically refrain from public advertising due to security or concerns or any other reasons, may securely register on the directory (90) so that the information of that service provider is presented only to verified users of the user device (50). The verification process may involve matching the user's ID with their registered user device (50) to confirm
ownership of that user device (50), thereby allowing only legitimate users to access relevant services while preventing unauthorised access from potential abusers.
In some examples, the software application (40) may include a secure identity verification system where during the registration process, the user (30) may be required to provide a live photo and an official identity document, such as a passport or driving licence, which is captured at the time of sign-up and stored in an attached cloud database. This data may remain linked to the account, even in the event of account deletion for traceability and preventing unauthorised identity changes. Additionally, to mitigate or reduce risks associated with fake accounts and identity fraud, any false or duplicate accounts may be linked to a verified photo to avoid unauthorised access to services. The software application (40) further restrict the use of saved or Al-generated photos, so that only live photos taken at the time of registration are used for verification, thereby reducing the possibility of manipulated identities The directory (90) may be configured to filter service options based on verified identity details, such as gender so that users (30) are presented only with relevant and appropriate service providers.
In some examples, the directory (90) may be configured to organise services based on the user’s location, provided the software application’s location settings are enabled. When a user logs in or registers, they may be required to provide identity information, such as a passport number or driving licence number. Additionally, or alternatively, the system may prompt the user to capture a live photo of an identity document, which will be stored in an attached cloud and remain even if the account is deleted.
This identity verification process can prevent identity theft and ensures that only genuine service providers can be accessed. Fake accounts are linked to a photo, which helps to prevent unauthorised access and fraud. The system may not store saved photos but only live photos captured during the registration process.
In some examples, the software application (40) may require strict identity verification to access certain services, particularly those designated as high-security services. During the initial setup, the user (30) may be asked to provide both a valid photo ID and a live photo to complete the registration process. Furthermore, for younger (e.g. teen users), their identity verification may be linked to an approved main account, so that there is a parental or guardian oversight for access to specific services.
In one example, the software application (40) may include automated security checks to flag users with prior criminal activity. If a user has a history of abuse charges, the system may restrict or suspend their account access, particularly for youth protection services or senior safety
services. Additionally, Al-driven detection mechanisms may be implemented to identify and flag suspicious behaviour based on historical data, preventing users with a history of abuse from accessing vulnerable user groups.
In some preferred examples, when the software application is opened or when an emergency feature whether activated manually, via a button (66), or by voice command, is triggered, the user device (50) may automatically dim its display to avoid detection. This can prevent an abuser or unauthorised person from noticing the activation of the app or its emergency feature. Additionally, and/or alternatively, any other audible or visible indicators of the user device (50) may also be suppressed or disabled to maintain discretion. In that way, the user (30) can activate emergency functions, such as recording or SOS features, without raising suspicion, thereby improving their safety in such situations.
In some preferred examples, the software application (40) may operate in incognito mode, running discreetly in the background without appearing in standard settings of the user device (50). While an icon may still be visible in the settings of the user device (50), it may remain nonfunctional, thereby preventing access or modifications from an unauthorised person such as the abuser (62). All configurations or settings of the software application (40) may be contained within the software application (40) itself so that no settings can be adjusted outside of the software application (40). The software application (40) may not be linked to any social media or any third party email account to improve the privacy and security for the user (30)
In some preferred examples, the software application (40) may include a security feature that detects multiple failed login attempts. For example, if multiple number of unsuccessful attempts (e.g., three unsuccessful attempts) occur, the software application (40) may automatically send an SOS alert to a designated emergency contact(s). This alert includes a pin that allows the emergency contact or service provider to access the user’s device (50) if needed. It may also prompt the emergency contact or service provider to check on the user, to allow a quick response in case of unauthorised access or a potential security risk.
In some examples, SOS alert may include audio and/or video messages.
As a skilled person will appreciate, cell phones connect to nearby cell towers to stay connected to the network, which is called "pinging." In the case where the user device (50) is a cell phone device the software application may uses this process of pinging to detect when certain phone numbers are near. This could be the phone number of the user’s device (50), which helps track their location or movements. It could also detect the phone number of a specific person, like a pre-determined abuser, when their cell phone connects to the same or a nearby tower. By
recognising when these two phones are in the same area, the software application may alert the user (50) or take other protective actions. For example, if the cell phone device of the abuser (62) is detected within a predefined range, e.g., 5 km, the software application (40) may send an alert to the user (30) to allow the user (30) to take necessary protective actions. Additionally, if the cell phone device of the abuser (62) is turned off while within this range, the user (30) may receive a notification, followed by another alert if the cell phone device of the abuser (62) is powered back on within that same radius. More specifically, if the user device is powered off and subsequently powered back on, the software application (40) may be configured to retrieve and analyse historical cell tower connection data to determine whether the predefined external device (predefined data communication device such as a cellular device) of the abuser (62) was within the predefined range during the period the user device (50) was off, and upon such determination, generate and transmit an alert to the user device (50). Upon determining that the predefined external device was within the predefined range during the period the user device was off, the software application (40) may be further configured to transmit the alert to an emergency contact, either separately or in addition to the user device (50). If the SOS function is activated before or after a ping detecting the abuser’s phone, tracking may remain active until SOS is deactivated to ensure continuous monitoring for user safety.
In some examples, the system may include location and time data, along with any phone numbers listed as unsafe/dangerous that were present at the location during the recorded time.
In some examples, a separate SOS icon may be made available, or a dedicated device be used solely to activate the SOS function without accessing the main software application on the user device.
In some preferred examples, the software application (40) may be configured to remain undetectable within the settings of the user device (50) to improve security. For example, the software application (40) may be excluded from the list of installed applications or may be disguised under an alternative name and icon to prevent suspicion. In some examples, the software application (40) may not appear in the settings of user device (50) at all and may run discreetly in the background without a visible interface, so that it can still operate while minimising the risk of detection by unauthorised parties. The software application (40) may be configured to be disguised under an alias name to prevent suspicion.
In certain examples, the system of the present invention may provide a web-based portal for secure documentation and interaction, enabling authorised personnel to set up accounts for users in various service provider environments such as schools, detention facilities, rehabilitation centres
etc. These accounts may be accessible with or without subscription. This eliminates the need for a dedicated software application on user devices of such service providers while ensuring access to legally credible records for legal, medical, or reporting purposes, including cases of bullying and other incidents. Request to have remote access to the user device (50) may be sent from the webbased portal.
In some examples, if the internet or cellular telephone network is not available, data may be stored on the software application (40) (e.g., in the storage medium of the user device (50)) and sent to the remote server (20) or to emergency contact when the internet or cellular telephone network is available. The software application on the user device (50) need not be open to send the data to remote server or to emergency contacts. Even if the user device is locked, once it is back in service it may transmit the stored information to the remote server or emergency contacts. A backup storage may be provided.
In one embodiment, the system may comprise multiple components to facilitate secure and structured interactions between users, staff, and service providers. Specifically, the system may include a first application for general user access to allow individuals to interact with the core functionalities. A second application designed for staff, allowing authorised personnel to manage user interactions and oversee system operations. Additionally, an administrative portal may be provided for service providers, enabling them to configure, manage, and oversee the system’s functions and allow compliance with security protocols and user needs. Furthermore, a web-based platform may be provided to facilitate interaction between staff and clients, providing a secure interface for communication, service requests, and remote access authorisations.
The system may provide many other suitable service provider portals. When authorised personnel accesses a service provider portal, a unique authentication code may be generated, utilising facial recognition or other suitable authentication methods. All data recorded on the user device (50) may be automatically uploaded to the service provider's system, including timestamps, dates, and location data. Once uploaded, the data may be protected against alteration, deletion, or tampering through the implementation of various security technologies, i.e., data may be presented in a read only manner. Many suitable tamper-proof data protection mechanisms may be used by the system forthat purpose.
Data uploads may only be permitted if explicit permission is granted. Within a single subscription, access differentiation may exist between users. For enabling remote access, the software application (40) may allow for permission request to be sent to authorised personnel and that authorised personnel may need to approve the request.
It is noted that for known abusers or potential abusers, one or more predetermined images or voice tones can be added to the software application (40). When an abuser (62) enters a camera field or their voice is detected, the application may automatically commence recording and uploading to the remote server (20) without input from the user.
It may be appreciated that emergency recording function and the SOS function may serve distinct purposes. The emergency recording function may allow the user device to capture and store events occurring in the immediate environment, e.g., during a potentially threatening situation. This recorded data may then be automatically uploaded to a remote storage device or server. On the other hand, the SOS function may allow for the transmission of distress signals to predefined emergency contacts, alerting them to the user’s situation. Emergency recording may automatically include time, date, and location data. Emergency recording may only be linked to the SOS feature if the SOS was activated before the emergency recording was used.
In one example, the system may include emotional tracking for both verbal and non-verbal communication, including trauma care and medical care. In one example, incident reporting may feature an option to add an authority case number. In one example, visual alarm prompts may be included to prevent confusion and provide motivation. In one example, the calendar function may be used help reduce stress by categorising tasks as upcoming, completed, or incomplete, addressing challenges such as disorganised thinking in overstimulated and underactive minds. In one example, the events module include information on breathing cycles Appointments or related information may be emailed, printed, or incorporated into other Al-driven programs. In one example, the SOS function may include location tracking and recording options, with the capability for an SOS receiver to forward alerts to another recipient.
In one embodiment, the system of the present invention may be designed to be used as emotional tracking system for logging both verbal and non-verbal communication, using Al to generate evidence that can be saved as is a specific format, e.g., pdf file (for example, for use by a Court or for other evidence purposes). The system may be used to capturing photos, voice recordings, images, colours, time, date, and location data, as well as recognising people who may be a concern or a source of support. The system may also take screenshots of other application pages and add them to an emotional tracking section. Suitable images and colours may be used so that it may be used in trauma management and non-verbal communication type scenarios, helping to identify positive and negative environments, which are then charted for analysis.
The system may also be used to track emotional outbursts and may be used as an emotional tracking system. This may be advantageous as it can allow users to express emotions without
worrying about disturbing others. For example, it may be used for logging patterns overtime, helping to make sense of situations, particularly where coercive control, mental manipulation, or physical violence may be involved. Al-powered recognition may be used to detect voice and facial expressions, picking up tone whether the software application (40) is open or not.
All recordings and automatic storage may be Al-categorised, working separately from manual inputs so that date, location, and time details are logged and processed automatically. The system may also flag safe and unsafe interactions, thereby by tracking emotional responses and interactions which may help to reduce suicide risks and improve mental well-being.
The system when used as an emotional tracking system may include both verbal and nonverbal emotional tracking or recognition to identify and analyse patterns of possible abuse, such as coercive control. This can be particularly useful for individuals experiencing domestic violence or those with disabilities who may struggle to express their experiences. By integrating with Al, the system may help users recognise safe and unsafe environments, providing a valuable tool for emotional regulation and mental recovery.
Users such as user (50) may be able to record their emotions using emojis and selections of colour, which may be tracked together with time, date, and location data. The Al may be able to improve this by recognising voices, facial expressions, and other relevant information to detect patterns of coercion, intimidation, or distress. The system may continuously monitor interactions, even when the user device (50) is on standby, assessing conversational tones and behavioural cues. Such information may then be categorised and displayed in a dedicated Al section of the software application (40), allowing users and authorised individuals to review patterns over time.
In this context, one important feature of the system can be its graphical representation of emotional data. This graph can be accessed by remote carers, service providers, or support staff to allow appropriate care for users, particularly those with disabilities. Additionally, it provides valuable information for individuals who may not fully understand coercive control or emotional manipulation, enabling them to make informed decisions about their environment and relationships.
Beyond monitoring personal interactions, the Al may also analyse other inputs such as documents, reports, and professional guidance entered into the application. This information may be automatically reviewed and categorised to generate additional behavioural information. This feature allows that individual, especially those recovering from domestic violence, receive factual, Al-supported assessments to aid decision-making. As those emerging from abusive situations may
struggle with clarity and stability, the system can offer a structured way to process and validate information, reducing the risk of manipulation and supporting overall mental well-being.
Thus, the software application (40) may be further configured to analyse verbal and nonverbal emotional indicators within the recorded data using an artificial intelligence (Al) module for detecting patterns of coercion or distress. The software application may be further configured to generate a graphical representation of emotional data overtime for review by authorised personnel. The software application may be further configured to categorise and display behavioural patterns based on user-selected emotional indicators, timestamped location data, and recorded interactions on the user device (50), i.e., display screen of the display device (50).
In one embodiment, the system may include a training function that allows training the software by playing recordings. Over time, the software can autonomously identify and categorise types of abuse or praise (e.g., based on tone). The system may generate charts which may be used for personal or professional purposes and shared at the subscriber’s discretion.
In one embodiment, the identity information provided during registration or login may determine the services available to the user. Additional questions may be included to refine the matching process. Overtime, identity credentials could be linked to medical history for service provision. Users may also manually input other services and categorise them as intrusive if needed.
Therefore, in one aspect, the present invention relates to a system or method for securely capturing contemporaneous events. The system or method comprises or uses at least one user device (50) that may be a data communication device configured to execute a software application. The system or method further includes or uses a remote server (20) in communication (i.e., operative communication) with the user device and a data storage facility (i.e., remote data storage facility orre data storage facility located remotely from the user device (50)) such as a cloud storage facility (75) in communication (i.e., operative communication) with the remote server. The software application (40) is configured to modify its visual representation by displaying a first software application icon and replacing the first software application icon with a second software application icon that is visually distinct, thereby disguising the presence of the software application on the user device. The software application (40) is further configured to initiate and control a recording function that captures real-time environmental events as recorded data by or using the user device, most preferably by activating one or more data capture modules of or associated with the user device (50). Additionally, the software application (40) processes the recorded data for secure transmission and establishes a secure communication link with the remote server (20) to transmit the recorded data. The remote server (20) is configured to receive the transmitted data
from the user device and relay the data to the data storage facility such as a cloud storage facility (75) for storage and subsequent retrieval.
The system or method of the present invention may use more than one user device (50).
The user device (75) may comprise a display screen (which may be a touchscreen display), and the software application (40) is configured to modify its visual representation by displaying the first software application icon on the display screen and replacing the first software application icon with the second software application icon. The user device (75) may include a processing unit, and the software application (40) may be executed by the processing unit. The user device (75) may include a storage medium (memory), and the software application is stored in the storage medium. The user device may (50) may be a cellular phone such as a smart phone. However, it many other suitable devices such as a personal computer, smart television, tablet, wearable user device etc.
The secure communication link between the user device (50) and the remote server (20) may use end-to-end encryption to protect the recorded data during transmission. Alternatively, many other suitable technologies may be used for that purpose.
The remote server (20) may be configured to restrict access to the stored data based on at least one predefined authentication protocol. In another embodiment, the software application (40) may be downloadable from an application store and, upon installation on the user device (20) may be represented by the first software application icon displayed on the display screen. The software application may provide a prompt to the user to replace the first software application icon with the second software application icon. For the sake of privacy and security, the software application icon may be configured such that such that the name of the first software application icon appears under a generic or disguised name, such as “General Store,” including in the billing statements. This can help prevent undesirable disclosure. The second software application icon may be selectable by the user from one or more of: an icon associated with another software application operating on the user device (50) ; an icon available from a predefined icon library; a historical image stored in a photo library of the user device (50); or an image or screenshot captured by the user (30) or generated by using the user device (50); or an Al generated image.
The software application (40) may be configured to automatically determine whether the second software application icon requires modification, including resizing or reformatting, and may apply any required modifications before changing the first software application icon to the second software application icon. The software application may also enable the user to activate the data capture module in a discreet manner by using at least one of: selecting an icon on the display
screen that is a touchscreen of the user device (50); a physical button of the user device; a voice command; detection of the orientation of the user device (50); or facial recognition or many other suitable methods. Rapid tapping of the touch screen on the user device may also activate the recording function and/or initiate other emergency function(s).
The recorded data may comprise (i.e., may be in a form of) at least one of video and/or audio and may be transmitted in real time or substantially in real-time to the remote server (20). If the user device (50) is out of range, turned off, or otherwise unable to communicate with the remote server, the recorded data may be stored on the user device (50) until communication, such as via Wi-Fi, becomes available. Upon re-establishing communication, the stored recorded data may be automatically transmitted to the remote server (20). The software application (20) may further comprise at least one of: a user diary for recording and reporting events related to a conflict or crisis situation; (b) a calendar (95) for scheduling and tracking events, including past appointments; (c) a daily planner for providing visual reminders to the user; or (d) a directory (90) that is an emergency assistance service provider directory with links to websites or other contact information of at least one service provider. The user diary, calendar, and daily planner may be configured to allow the user to log and store interactions with an abuser (62) or with the service provider.
The software application (40) may also comprise an SOS facility (SOS feature or SOS feature or emergency feature) configured to transmit a message to at least one predefined emergency contact upon activation. Activation of the recording function may automatically trigger the SOS facility. The SOS facility may be configured to transmit emergency notifications to the predefined emergency contact(s), the notifications comprising at least one of: the GPS coordinates of the user device (50) at the time of SOS activation; real-time updates on the physical location of the user device via repeated transmission of updated GPS coordinates; video and/or audio recorded using the data capture module; and additional user-submitted information, including diary entries, calendar events, and/or daily planner notes. If the location tracking is enabled on the user device (50), live tracking may continue even if the user device (50) device is turned off. The SOS facility may include an option for user (30) to enable automatic recording and transmission of audio and/or video upon SOS activation. Upon the SOS activation or any emergency feature, the display of the user device may be configured to automatically dim to reduce visibility and minimise the risk of drawing attention.
Any recorded data transmitted to the remote server or to the predefined emergency contact(s) may be accompanied by GPS location data of the user device at the time of recording.
The software application (40) may be further configured to modify its visual representation by displaying a third software application icon. The third software application icon may be visually distinct from both the first and second software application icons. The first software application icon may be removed from the display upon execution of the software application installation process. Similarly, the second software application icon may be removed from the display upon execution of the installed software application. The first, second, and/or third software application icons may be user-selectable or adapted from a preselected user icon image stored in the user device.
The software application (40) may be configured to allow the user (30) to change its visual representation by selecting from existing icons displayed on the user device (50) (e.g., the home of the display screen of the user device ( 0)) so that the presence of the presence of the software application (40) is concealed under a user-selected alternative icon. Upon selection of the alternative icon, the original icon for the software application may be removed so that no dedicated icon for the software application (40) is displayed on the user device (50).
The remote server (20) may be configured to store the transmitted recorded data in a data storage facility, wherein the stored data is inaccessible from the user device via the software application. The software application may be configured to default storing recorded data in a data storage facility, such as a cloud storage facility (75), unless the user adjusts the settings to store the data on the user device (50). The data capture module may comprise at least one of: (a) a microphone for capturing audio data; (b) a camera for capturing video data; or (c) an inertial sensor for detecting motion or orientation of the user device. The user device may be configured to communicate with the remote server via at least one of: (a) a cellular network or (b) an Internet connection.
The software application may be configured to be actuated using at least one of the following: (a) selecting an icon on a touchscreen of the user device; (b) a physical button of the user device; (c) a voice command; (d) detection of the orientation of the user device; or (e) facial recognition. The system may further provide additional user icons, each having a graphical representation different from the graphical representations of other icons displayed on the user device. Actuation of the software application may cause the user device to display an alternative user interface that is visually distinct from the standard user interface of the device.
In one example, the recorded data may be transmitted to the remote server, and preferably stored in the data storage facility such as a cloud storage facility (75). The data upload continues until a user command is received to discontinue transmission. The user command to discontinue
data transmission may be provided in the form of at least one of: an alphanumeric password or a user voice command. The recorded data stored in the remote server may be encrypted and password protected.
The remotely stored recorded data may be automatically forwarded to at least one third party in response to disconnection of the user device, wherein disconnection may include at least one of: loss of network connectivity; power-off of the user device; or removal of the software application from the user device , preferably while staying on back up stored somewhere.
Upon SOS activation, the software application (40) may be configured to enable automatic room recording and require user authentication (e.g., log in) for SOS deactivation. The software application (4) may further comprise an option to disable automatic locking of the user device (50) when emergency settings are activated, while allowing its display to automatically dim.
The software application (40) may be configured to be actuated in response to: one or more predetermined user facial expressions; proximity detection of an independent predetermined person; proximity detection of an independent predetermined user device; one or more predetermined voice commands; or a detected change in the user’s voice stress tone. The software application may further comprise a training function to allow the user to train the software application to recognise: specific facial expressions; images of one or more independent predetermined people; specific voice commands; and/or specific voice stress tones.
The software application (40) may be configured to communicate with a remote training database configured to receive user facial expressions, images of one or more independent predetermined people, specific voice commands, and/or voice stress tones, wherein a machine learning or artificial intelligence algorithm may process the received data to validate or predict user actuation triggers.
The software application (40) may also be configured to duplicate a device unlock screen. A first unlock screen may be displayed upon activation of the user device (50) and may require entry of a password set within the software application (40). Upon successful entry of the first password, the software application (40) may present a second unlock screen requiring entry of the user device’s standard unlock password. Software application (40) may be configured to use face recognition and/or voice recognition to detect a predefined individual, i.e., abuser (62). Upon detecting an abuser or hostile behaviour, the software application may be configured to hide the application, dim the display screen and/or and initiate recording.
The software application (40) may require registration of the image of the user (30) during installation and may remain inoperable or hidden unless the software application (40) receives a
matching user image captured by the data capture module (that is in a form of a camera or a camera and microphone) at a predetermined sampling rate. In other words, during installation, the software (40) may require the user (60) to register image (e.g., their photo). After that, the software application (40) may remain hidden or unusable unless the camera regularly captures an image that matches the registered user so that only the authorised user can access the application.
Upon activating the data capture module, actuating the software application (40), or triggering any other emergency feature of or associated with the software application (40), the user device (50) may be configured to suppress or disable any audible or visible indicators. Additionally, the user device (50) may be configured to automatically dim the display to prevent detection upon activation of the data capture module, actuation of the software application, or triggering of any emergency feature.
Software application (40) may be further configured to transmit a message to an emergency contact. The message may include data captured by the data capture module of the user device (50). The software application (40) may also comprise its own location settings independent of the location settings of the user device (50). When the software application’s location settings are enabled, the software application (40) may determine the location of the user device (50) and automatically identify and/or communicate with at least one service provider near the determined location. Thus, the location of the software application (40) may still be available even if the location of the user device (50) is off.
Software application (40) may be configured to prompt the user to provide identity information during registration or login. The identity information may comprise at least one of a passport number, driving licence number, birth certificate number, or an image of an identity document or many other suitable types of identification. A photo (user’s photo) and identification may be required for identity verification. Software application (40) may be configured to automatically scan the identify information against the photo (e.g., for identity matching).
The software application (40) may be further configured to determine at least one user attribute from the provided identity information Some non-limiting examples of user attribute include gender, age, and/or address information.
Software application (40) may be configured to filter and display goods and/or services within the directory (90) based on at least one user attribute so that the user is presented only with relevant goods and/or services. Upon determining the current location of the user, the software application (40) may be further configured to display emergency contact details relevant to the user’s location.
The directory (90) may be configured to establish a secure, access-controlled platform for service providers to register and be listed while restricting the visibility of their information from unauthorised users. The directory (90) may further be configured to display service provider information only to verified users of the user device. The directory (90) may be configured to categorise service providers based on the gender, age and auto-setting, user selection of the medical profession and/or other criteria.
This verification may comprise matching the user's identity information with their registered user device. Many other suitable types of verification method or technology may be implemented. The directory (90) may categorise service providers based on the location of the user device (50). Preferably, this is not limited to any distance.
The software application (40) may be configured to operate in incognito mode, running discreetly in the background without appearing in the standard settings of the user device (50). All configurations and settings of the software application may be contained within the software application itself. This can prevent unauthorised modifications or can prevent drawing undesirable attention (e.g., attention of the abuser (62)). In some examples, the software application (40) may be configured to that it is completely concealed from other services such as accounting. In some examples, the software application (40) remains completely concealed from accounting services unless accessed via an associated the storage facility such as cloud storage facility (75), rather than being stored on the user device (50).
The software application (40) may further comprise authentication monitoring module or means configured to detect multiple failed login attempts. In one example, software application (40) may be configured to detect multiple failed authentication attempts and, upon reaching a predefined threshold of failed authentication attempts, initiate a security response that includes transmitting an alert to a designated emergency contact and preferably providing access information to facilitate user verification and assistance. The emergency alert may comprise one or more of location data, contact details, and a pre-set message, which may be configurable to notify the emergency contact(s) (e.g., police). The transmission of the alert to designated emergency contact(s) may be enabled or disabled by the user.
The alert may also include at least one pin (most preferably at least two pins) to allow access to the user device.
If the user device (50) is a cellular device, the software application may be configured to detect the proximity of the user device (50) and a predefined external device (e.g., cellular device of the abuser (62)) by monitoring cell tower connections, wherein proximity detection is based on
identifying when both devices are connected to the same or nearby cell towers. Upon detecting the predefined external device within a predefined range of the user device, the software application may be configured to automatically generate and transmit an alert to the user device (50) and/or an emergency contact.
If the user device (50) is powered off and subsequently powered back on, the software application (40) may be configured to retrieve and analyse historical cell tower connection data to determine whether the predefined external device was within the predefined range during the period the user device was off. Upon making such a determination, the software application (40) may generate and transmit an alert to the user device (50). This information bay be stored (e.g., in the cloud storage facility (75) as a back of up information in case needed in future.
In one embodiment, the system may further comprise a web-based portal. This portal may be configured to allow authorised personnel to set up accounts for users in service provider environments without requiring installation of the software application on the user devices of such service providers. Request to have remote access to the user device (50) may be sent from the webbased portal.
The software application (40) may be configured to analyse verbal and non-verbal emotional indicators within the recorded data using an artificial intelligence (Al) or Al module to detect patterns of coercion or distress. The software application (40) may be configured to generate a graphical representation of emotional data over time for review by authorised personnel. The software application may categorise and display behavioural patterns based on user-selected emotional indicators, timestamped location data, and recorded interactions.
The diagrams of embodiments herein illustrate one or more control or processing units. It is to be understood that the processing or control units may represent circuits, circuitry, or portions thereof that may be implemented as hardware with associated instructions (e.g., software stored on a tangible and non-transitory computer readable storage medium, such as a computer hard drive, ROM, RAM, or the like) that perform the operations described herein. The hardware may include state machine circuitry hardwired to perform the functions described herein. Optionally, the hardware may include electronic circuits that include and/or are connected to one or more logicbased devices, such as microprocessors, processors, controllers, or the like.
Optionally, the one or more processors may represent processing circuitry such as one or more of a field programmable gate array (FPGA), application specific integrated circuit (ASIC), microprocessor(s), and/or the like. The circuits in various embodiments may be configured to execute one or more algorithms to perform functions described herein. The one or more algorithms
may include aspects of embodiments disclosed herein, whether or not expressly identified in the figures or a described method.
As used herein, the term “server”, “system”, “computer”, “computing system” or the like may include any processor-based or microprocessor-based system including systems using microcontrollers, reduced instruction set computers (RISC), application specific integrated circuits (ASICs), logic circuits, and any other circuit or processor including hardware, software, or a combination thereof capable of executing the functions described herein. Such are exemplary only, and are thus not intended to limit in any way the definition and/or meaning of such terms.
One or more processors as described herein are configured to execute a set of instructions that are stored in one or more data storage units or elements (such as one or more memories), in order to process data. For example, the one or more processors may include or be coupled to one or more memories. The data storage units may also store data or other information as desired or needed. The data storage units may be in the form of an information source or a physical memory element within a processing machine.
The set of instructions may include various commands that instruct the one or more processors to perform specific operations such as the methods and processes of the various embodiments of the subject matter described herein. The set of instructions may be in the form of a software program. The software may be in various forms such as system software or application software. Further, the software may be in the form of a collection of separate programs, a program subset within a larger program or a portion of a program. The software may also include modular programming in the form of object-oriented programming. The processing of input data by the processing machine may be in response to user commands, or in response to results of previous processing, or in response to a request made by another processing machine.
Claims
1. A system for securely capturing contemporaneous events, the system comprising: at least one user device, wherein the user device is a data communication device and is configured to execute a software application; a remote server in communication with the user device; and a data storage facility in communication with the remote server, wherein the software application is configured to: modify its visual representation by displaying a first software application icon and replacing the first software application icon with a second software application icon that is visually distinct from the first software application icon, thereby disguising presence of the software application on the user device, activate and control a recording function that captures real-time environmental events as recorded data by activating one or more data capture modules of or associated with the user device, process the recorded data for secure transmission, and establish a secure communication link with the remote server to transmit the recorded data, wherein the remote server is configured to receive the transmitted data from the user device and relay the data to the data storage facility for storage and subsequent retrieval.
2. A system as claimed in claim 1, wherein the remote server is configured to restrict access to the stored data based on at least one predefined authentication protocol.
3. A system as claimed in any one of claims 1 or 2, wherein the software application is downloadable from an application store and, upon installation on the user device, is represented by the first software application icon displayed on the display screen.
4. A system as claimed in any one of the preceding claims, wherein the software application provides a prompt to the user to replace the first software application icon with the second software application icon.
5. A system as claimed in any one of claims 1 to 4, wherein the second software application icon is selectable by the user from one or more of:
an icon associated with another software application operating on the user device; an icon available from a pre-defined icon library; a historical image stored in a photo library of the user device; an image or screenshot captured by the user using the user device; and an artificial intelligence (Al) generated image.
6. A system as claimed in any one of the preceding claims, wherein the software application is configured to automatically determine whether the second software application icon requires modification, including resizing or reformatting, and apply the any required modifications before changing the first software application icon to the second software application icon.
7. A system as claimed in any one of the preceding claims, wherein the data capture module comprises at least one of: a microphone for capturing audio data, a camera for capturing video data, or an inertial sensor for detecting motion or orientation of the user device.
8. A system as claimed in any one of the preceding claims, wherein the user device is configured to communicate with the remote server via at least one of: a cellular network, or an Internet connection.
9. A system as claimed in any one of the preceding claims, wherein the software application comprises an emergency feature configured to transmit a message to at least one predefined emergency contact upon activation of the emergency feature.
10. A system as claimed in claim 9, wherein the SOS facility is configured to transmit emergency notifications to the pre-defined emergency contact(s), the notifications comprising at least one of:
GPS coordinates of the user device at the time of activation of the emergency feature; real-time updates on a physical location of the user device via repeated transmission of updated GPS coordinates; video and/or audio recorded using the data capture module; or additional user-submitted information, including diary entries, calendar events, and/or daily planner notes.
11. The system as claimed in any one of the preceding claims, wherein the software application is further configured to modify its visual representation by displaying a third software application icon, the third software application icon being visually distinct from both the first and second software application icons.
12. The system as claimed in any one of the preceding claims, wherein the software application is configured to be actuated and/or the software application is configured to enable the user to activate the data capture module using least one of the following: selecting an icon on a touchscreen of the user device; at least one physical button of the user device; at least one voice command; detection of the orientation of the user device, facial recognition, one or more predetermined user facial expressions, proximity detection of an independent predetermined person, proximity detection of an independent predetermined user device, or a detected change in the user’s voice stress tone.
13. The system as claimed in any one of the preceding claims, wherein the software application is configured to communicate with a remote training database that is configured to receive user facial expressions, images of one or more independent predetermined people, specific voice commands, and/or voice stress tones, wherein a machine learning or artificial
intelligence algorithm processes the received data to validate or predict user actuation triggers.
14. The system as claimed in any one of the preceding claims, wherein the software application is configured to duplicate a device unlock screen, wherein: a first unlock screen is displayed upon user device activation and requires entry of a password set within the software application, and upon successful entry of the first password, the software application presents a second unlock screen requiring entry of the device’s standard unlock password.
15. The system as claimed in any one of the preceding claims, wherein upon activating the data capture module or actuating the software application, or triggering any other emergency feature of or associated with the software application, the user device is configured to suppress or disable any audible or visible indicators.
16. The system as claimed in any one of claims 1 to 14 wherein, upon activating the data capture module or actuating the software application, or triggering any other emergency feature of or associated with the software application, the user device is configured to automatically dim its display.
17. The system as claimed in any one of the preceding claims, wherein the software application is further configured to transmit a message to an emergency contact, the message including data captured by the data capture module.
18. The system as claimed in any one of the preceding claims, wherein the software application comprises its own location settings independent of the location settings of the user device, and wherein, when the software application’s location settings are enabled, the software application is configured to determine the location of the user device and automatically identify and/or communicate with at least one service provider near the determined location.
19. A system as claimed in any one of the preceding claims, wherein the software application is configured to prompt the user to provide identity information during registration or login.
20. A system as claimed in claim 19 wherein, the identity information comprises at least one of a passport number, driving licence number, birth certificate number, or an image of an identity document.
21. A system as claimed in claim 19 or 20, wherein the software application is further configured to determine at least one user attribute from the provided identity information, wherein the user attribute comprises at least one of gender, age, or address information.
22. A system as claimed in claim 21, wherein the software application is configured to filter and display goods and/or services within a directory based on the user attribute, such that the user is presented only with relevant goods and/or services to user of that user attribute.
23. A system as claimed in claim 22, wherein the directory is configured to establish a secure, access-controlled platform for the service provider to register and be listed while restricting visibility of their information from unauthorised users.
24. A system as claimed in claim 22 or 23, wherein the directory is configured to display service provider information only to verified users of the user device, wherein verification comprises matching the user's identity information with their registered user device.
25. A system as claimed in any one of the preceding claims, wherein upon determining that a current location of the user, the software application is further configured to display emergency contact details relevant to the user’s current location.
26. A system as claimed in any one of the preceding claims, wherein the software application is configured to operate in incognito mode, running discreetly in the background without appearing in standard settings of the user device, and wherein all configurations and settings of the software application are contained within the software application itself for preventing unauthorised modifications or for preventing drawing undesirable attention.
27. A system as claimed in any one of preceding claims, wherein the software application is configured to detect multiple failed authentication attempts and, upon reaching a predefined threshold of failed authentication attempts, initiate a security response that includes transmitting an alert to a designated emergency contact and preferably provide access information to facilitate user verification and assistance.
28. A system as claimed as claimed in claim 27, wherein the alert includes a pin to allow access to the user device.
29. A system as claimed in any one of the preceding claims, wherein the user device is a cellular device, the software application is configured to detect the proximity of the user device and a predefined external device that is also a cellular device, by monitoring cell tower connections, wherein proximity detection is based on identifying when both devices are connected to the same or nearby cell towers.
30. A system as claimed in claim 29, wherein upon detecting the predefined external device within a predefined range of the user device, the software application is configured to automatically generate and transmit an alert to the user device.
31. A system as claimed in claim 30 or 31, wherein if the user device is powered off and subsequently powered back on, the software application is configured to retrieve and analyse historical cell tower connection data to determine whether the predefined external device was within the predefined range during the period the user device was off, and upon such determination, generate and transmit an alert to the user device and/or to an emergency contact.
32. A system as claimed in any one of preceding claims, wherein the system further comprises a web-based portal configured to allow authorised personnel to set up accounts for users in service provider environments without requiring installation of the software application on a user device of one or more service providers.
33. The system of any one of preceding claims, wherein the software application is configured to analyse verbal and non-verbal emotional indicators within the recorded data using an artificial intelligence (Al) module for detecting patterns of coercion or distress.
34. The system of claim 33, wherein the software application is configured to generate a graphical representation of emotional data over time for review by authorised personnel.
35. The system of claim 34, wherein the software application is configured to categorise and display behavioural patterns based on user-selected emotional indicators, timestamped location data, and recorded interactions on the user device.
36. A computer-implemented method for securely capturing and storing contemporaneous events, the method comprising: executing, on a user device, a software application configured to capture and store recorded data; modifying a visual representation of the software application by displaying a first software application icon on the user device and replacing the first software application icon with a second software application icon that is visually distinct from the first software application icon, thereby disguising presence of the software application on the user device; initiating and controlling a recording function via the software application to capture real-time environmental events as recorded data using at least one data capture module of or associated with the user device; processing the recorded data for secure transmission; establishing a secure communication link between the user device and a remote server; transmitting the recorded data from the user device to the remote server via the secure communication link; receiving, at the remote server, the transmitted recorded data from the user device; relaying, by the remote server, the recorded data to a data storage facility; and storing the recorded data in the data storage facility for subsequent retrieval.
37. A non-transitory computer-readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising: modifying a visual representation of a software application by displaying a first software application icon and replacing the first software application icon with a second visually distinct application icon to disguise the presence of the software application on the user device; initiating and controlling a recording function to capture real-time environmental events as recorded data by activating at least one data capture module of or associated with the user device; processing the recorded data for secure transmission; establishing a secure communication link with a remote server;
transmitting the recorded data to the remote server via the secure communication link; receiving, at the remote server, the transmitted recorded data and relaying the recorded data to a data storage facility; and storing the recorded data in the data storage facility for subsequent retrieval.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2024900272A AU2024900272A0 (en) | 2024-02-06 | Method & system securely capturing contemporaneous events | |
| AU2024900272 | 2024-02-06 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025166412A1 true WO2025166412A1 (en) | 2025-08-14 |
Family
ID=96698706
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/AU2025/050084 Pending WO2025166412A1 (en) | 2024-02-06 | 2025-02-05 | System and method for securely capturing contemporaneous events |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2025166412A1 (en) |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130040600A1 (en) * | 2010-06-25 | 2013-02-14 | EmergenSee, LLC | Notification and Tracking System for Mobile Devices |
| US20140057590A1 (en) * | 2011-11-14 | 2014-02-27 | Optivon, Inc. | Method and system for communicating information associated with an incident and/or emergency situation |
| US8862092B2 (en) * | 2010-06-25 | 2014-10-14 | Emergensee, Inc. | Emergency notification system for mobile devices |
| US20140329491A1 (en) * | 2013-04-27 | 2014-11-06 | Deann Elma Scott | ProtectEM (Domestic Abuse and Emergency App) |
| US20150288797A1 (en) * | 2014-04-03 | 2015-10-08 | Melissa Vincent | Computerized method and system for global health, personal safety and emergency response |
| US20160071399A1 (en) * | 2014-09-08 | 2016-03-10 | On Guard LLC | Personal security system |
| US20230035593A1 (en) * | 2021-08-02 | 2023-02-02 | Juan Gilberto Cano | Emergency notification system and method |
-
2025
- 2025-02-05 WO PCT/AU2025/050084 patent/WO2025166412A1/en active Pending
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130040600A1 (en) * | 2010-06-25 | 2013-02-14 | EmergenSee, LLC | Notification and Tracking System for Mobile Devices |
| US8862092B2 (en) * | 2010-06-25 | 2014-10-14 | Emergensee, Inc. | Emergency notification system for mobile devices |
| US20140057590A1 (en) * | 2011-11-14 | 2014-02-27 | Optivon, Inc. | Method and system for communicating information associated with an incident and/or emergency situation |
| US20140329491A1 (en) * | 2013-04-27 | 2014-11-06 | Deann Elma Scott | ProtectEM (Domestic Abuse and Emergency App) |
| US20150288797A1 (en) * | 2014-04-03 | 2015-10-08 | Melissa Vincent | Computerized method and system for global health, personal safety and emergency response |
| US20160071399A1 (en) * | 2014-09-08 | 2016-03-10 | On Guard LLC | Personal security system |
| US20230035593A1 (en) * | 2021-08-02 | 2023-02-02 | Juan Gilberto Cano | Emergency notification system and method |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8559914B2 (en) | Interactive personal surveillance and security (IPSS) system | |
| US10936760B1 (en) | System and method for concealing sensitive data on a computing device | |
| US8977230B2 (en) | Interactive personal surveillance and security (IPSS) systems and methods | |
| US9485206B2 (en) | Devices and methods for improving web safety and deterrence of cyberbullying | |
| US10438692B2 (en) | Privacy protection based on device presence | |
| McClellan | Facial recognition technology: balancing the benefits and concerns | |
| KR101981900B1 (en) | Security management system using face recognition and method thereof | |
| US11348367B2 (en) | System and method of biometric identification and storing and retrieving suspect information | |
| US10964199B2 (en) | AI-based monitoring system for reducing a false alarm notification to a call center | |
| WO2015095597A1 (en) | Devices and methods for improving web safety and deterrence of cyberbullying | |
| US20160267770A1 (en) | Systems and Methods for Loose Monitoring of Targets | |
| US20190294807A1 (en) | Information management apparatus | |
| US20140120872A1 (en) | Systems and methods for altering the properties of a mobile device in response to a make ready signal | |
| US10181253B2 (en) | System and method for emergency situation broadcasting and location detection | |
| US12107994B2 (en) | Method and device for prompting a user to report a public-safety incident | |
| US10785628B2 (en) | Distress transmission | |
| US11405498B2 (en) | Audiovisual safety system | |
| WO2025166412A1 (en) | System and method for securely capturing contemporaneous events | |
| US20230035593A1 (en) | Emergency notification system and method | |
| EP3729851A1 (en) | Method for detecting the possible taking of screenshots | |
| US20240373116A1 (en) | Device and method for alerting a user for capturing digital evidence that is not in compliance with evidentiary policies | |
| JP2020135047A (en) | Monitoring system | |
| US20210280047A1 (en) | Personal Security App | |
| CN116416709A (en) | A smart lock security control method, device, storage medium and system | |
| WO2024100369A1 (en) | Comprehensive personal safety and therapeutic mobile application |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 25750956 Country of ref document: EP Kind code of ref document: A1 |