Method and system for mobile duress alarm
First Claim
Patent Images
1. A method for responding to potential security events comprising:
- specifying one or more arming events, expiration actions, and disarming actions for a user;
a mobile application executing on a mobile computing device of the user detecting the specified arming events for the user, starting recording event data including recording audio and video data by the mobile computing device in response to detecting the specified arming events for the user,buffering the recorded event data including the audio and video data recorded by the mobile computing device,executing the specified disarming actions for the user in response to determining that the mobile application was disarmed by the user within a predetermined time period including stopping recording the audio and video data and deleting the recorded audio and video data; and
executing the specified expiration actions for the user in response to determining that the mobile application was not disarmed by the user within the predetermined time period including sending the recorded audio and video data to the monitoring center and streaming recorded audio and video data to the monitoring center.
5 Assignments
0 Petitions
Accused Products
Abstract
During a potential security event, a mobile application enters an alarm state and records audio, video and location event data and forwards the event data to a monitoring center, which stores the event data and takes appropriate action such as notifying local law enforcement. The alarm state is triggered manually, by the use of wireless sensors, or by arming the mobile application and then determining if it has been disarmed within a predetermined period of time.
-
Citations
20 Claims
-
1. A method for responding to potential security events comprising:
-
specifying one or more arming events, expiration actions, and disarming actions for a user; a mobile application executing on a mobile computing device of the user detecting the specified arming events for the user, starting recording event data including recording audio and video data by the mobile computing device in response to detecting the specified arming events for the user, buffering the recorded event data including the audio and video data recorded by the mobile computing device, executing the specified disarming actions for the user in response to determining that the mobile application was disarmed by the user within a predetermined time period including stopping recording the audio and video data and deleting the recorded audio and video data; and executing the specified expiration actions for the user in response to determining that the mobile application was not disarmed by the user within the predetermined time period including sending the recorded audio and video data to the monitoring center and streaming recorded audio and video data to the monitoring center. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A mobile duress alarm system comprising:
-
a mobile computing device of a user executing a mobile application for detecting specified arming events for the user, starting recording event data including recording audio and video by the mobile computing device in response to detecting the specified arming events for the user, the mobile computing device executing specified disarming actions for the user in response to determining that the mobile application was disarmed by the user within a predetermined time period including stopping recording the audio and video data and deleting the recorded audio and video data, the mobile computing device in response to determining that the mobile application was not disarmed by the user within the predetermined time period sending the recorded audio and video data to a monitoring center and streaming recorded audio and video data to the monitoring center; and the monitoring center for receiving the event data including the recorded audio and video data and executing specified expiration actions for the user in response to determining that the mobile application was not disarmed by the user within the predetermined time period. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification