Personal security system

Inactive Publication Date: 2013-09-05
CLANDESTINE DEV
View PDF4 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0045]An advantage of the personal security system is to provide an easy to use personal security system.
[0046]Another advantage of the personal security system is a simplified alarm triggering mechanism.
[0047]A further advantage of the personal security system is an efficient

Problems solved by technology

While these applications may be useful and helpful, the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal security system
  • Personal security system
  • Personal security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058]FIG. 1 illustrates an example of a personal security system 10. As shown in FIG. 1, the personal security system 10 may include a mobile device 12 in communication with a system server 14. Further, the system server 14 may be in communication with one or more emergency responders 16 and one or more lifelines 18 (as used herein, lifelines are user defined contacts that are contacted in case of an emergency event). As shown, the system server 14 may be associated with a response verification call center 20 through which one or more operators / representatives may interact with the system 10.

[0059]In some examples, the mobile device 12 may be in one-way communication with the system server 14 (e.g., syncing setup information and communicating alarm conditions). Of course, in other embodiments, the mobile device 12 may be in two-way communication with the system server 14 (e.g., syncing setup information and communicating alarm conditions, as well as, confirming receipt of informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A personal security system includes: a mobile electronic device including a processor and a user input mechanism, wherein the processor is adapted to provide an alarm trigger, wherein the processor is further adapted to: receive a command from a user to provide an armed alarm condition; initiate the armed alarm condition by receiving a continuous user command through the user input mechanism, wherein the continuous user command requires an active physical touch from the user; and when the user ceases to provide the active physical touch required to maintain the continuous user command, trigger an alarm condition. In some embodiments, in response to triggering the alarm condition, the processor communicates geo-location information to a remote server, wherein the geo-location information identifies the geo-location of the mobile electronic device at the time the alarm condition is triggered.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS [0001]This application claims the benefit of U.S. Provisional Application No. 61 / 606,328 filed on Mar. 2, 2012, the entirety of which is incorporated herein by reference.BACKGROUND OF THE INVENTION[0002]The present subject matter relates generally to a personal security system. More specifically, the present invention relates to a personal security system embodied in a mobile application. The primary embodiments described herein relate to a personal security system embodied in a mobile application in which a user may arm the system by making contact with a touch screen of a mobile device and the system may be triggered by breaking contact with the touch screen. However, additional embodiments are provided in which the personal security system embodied in a mobile application that is activated by a timer mode. In each of the embodiments, a verified alarm condition triggers communication to emergency first responders and additional predefined co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/22H04W4/90
CPCH04W4/22G08B25/016G06F3/0488G08B25/008H04W4/90
Inventor CAHILL, PETER
Owner CLANDESTINE DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products