System and method for security monitoring and response delivery
First Claim
1. A method of security monitoring and response delivery for a user having a user'"'"'s device which at least transmits and may additionally receive information, by a monitoring service whose services include monitoring the user upon request, using a communication system accessible by the user'"'"'s device and the monitoring system, the method comprising the steps of:
- a. maintaining a user profile for each user in a user database that is not resident on the user'"'"'s device;
b. maintaining response provider information in a response provider database in which response providers are predetermined and include providers of at least one of assistance and emergency services which are selected from among public, private, commercial and non-commercial providers;
c. receiving a transmission of a request for monitoring from a user sent via the user'"'"'s device over the communication system; and
d. commencing monitoring of the user via the user'"'"'s device including;
i. capturing at least one of data transmitted and signals generated by the user'"'"'s device to provide captured data and signals,ii. using advanced decision science techniques that utilize logic higher than dual binary logic to make decisions concerning best methods to employ to analyze the captured data and signals,iii. analyzing the captured data and signals employing advanced analysis techniques that utilize more than dual binary logic to provide captured data and signals analysis results,iv. making decisions concerning best methods to use to monitor the user selected from among at least one of human and automated monitoring methods employing advanced decision science techniques that utilize logic higher than dual binary logic, andv. storing in a records database at least one of (A) the data transmitted and signals generated by the user'"'"'s device and (B) the captured data and signals analysis results.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method of security monitoring and response delivery for a user having a user'"'"'s device by a monitoring service whose services include monitoring the user upon request. The method includes maintaining a user profile for each user in a user database, maintaining response provider information in a response provider database in which response providers are predetermined and include providers of at least one of assistance and emergency services which are selected from among public, private, commercial and non-commercial providers; receiving a transmission of a request for monitoring from a user sent via the user'"'"'s device over the communication system; and commencing monitoring of the user via the user'"'"'s device using advanced decision making and analysis tools employing higher logic.
41 Citations
24 Claims
-
1. A method of security monitoring and response delivery for a user having a user'"'"'s device which at least transmits and may additionally receive information, by a monitoring service whose services include monitoring the user upon request, using a communication system accessible by the user'"'"'s device and the monitoring system, the method comprising the steps of:
-
a. maintaining a user profile for each user in a user database that is not resident on the user'"'"'s device; b. maintaining response provider information in a response provider database in which response providers are predetermined and include providers of at least one of assistance and emergency services which are selected from among public, private, commercial and non-commercial providers; c. receiving a transmission of a request for monitoring from a user sent via the user'"'"'s device over the communication system; and d. commencing monitoring of the user via the user'"'"'s device including; i. capturing at least one of data transmitted and signals generated by the user'"'"'s device to provide captured data and signals, ii. using advanced decision science techniques that utilize logic higher than dual binary logic to make decisions concerning best methods to employ to analyze the captured data and signals, iii. analyzing the captured data and signals employing advanced analysis techniques that utilize more than dual binary logic to provide captured data and signals analysis results, iv. making decisions concerning best methods to use to monitor the user selected from among at least one of human and automated monitoring methods employing advanced decision science techniques that utilize logic higher than dual binary logic, and v. storing in a records database at least one of (A) the data transmitted and signals generated by the user'"'"'s device and (B) the captured data and signals analysis results. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of pro bono security monitoring and response delivery for a pro bono user having a user'"'"'s device which at least transmits and may additionally receive information, by a monitoring service whose services include monitoring the user upon request, using a communication system accessible by the user'"'"'s device and the monitoring system, the method comprising the steps of:
-
a. maintaining a user profile for each pro bono user in a pro bono user database that is not resident on the user'"'"'s device; b. maintaining response provider information in a response provider database in which response providers are predetermined and include providers of at least one of assistance and emergency services which are selected from among public providers and private non-commercial volunteer providers; c. receiving a transmission of a request for monitoring from a pro bono user sent via the user'"'"'s device over the communication system or pro bono generating such a request for response by the monitoring system itself with or without receiving a request for response from the user; and d. attempting to commence monitoring utilizing an appropriate volunteer human monitor, and commencing monitoring of the user via the user'"'"'s device if an appropriate volunteer human monitor is available including; i. capturing at least one of data transmitted and signals generated by the user'"'"'s device to provide captured data and signals, ii. using advanced decision science techniques that utilize logic higher than dual binary logic to make decisions concerning best methods to employ to analyze the captured data and signals, iii. analyzing the captured data and signals employing advanced analysis techniques that utilize more than dual binary logic to provide captured data and signals analysis results, iv. storing in a records database at least one of (A) the data transmitted and signals generated by the user'"'"'s device and (B) the captured data and signals analysis results. - View Dependent Claims (20)
-
-
21. A system for security monitoring and response delivery for a user having a user'"'"'s device which at least transmits and may additionally receive information, by a monitoring and response service whose services include monitoring the user upon request, using a communication system accessible by the user'"'"'s device and the monitoring system, the system comprising:
-
a. a user database that is not resident on the user'"'"'s device for maintaining a user profile for each user; b. a response provider database for maintaining response provider information in which response providers are predetermined and include providers of at least one of assistance and emergency services which are selected from among public, private, commercial and non-commercial pro bono volunteer response providers; c. means for transmitting a request for monitoring from a user over the communication system to the monitoring and response service which is the user'"'"'s device; and d. means for monitoring of the user via the user'"'"'s device commenced by the monitoring and response service in response to the request for monitoring, the monitoring and response service including; i. capturing at least one of data transmitted and signals generated by the user'"'"'s device to provide captured data and signals, ii. using advanced decision science techniques that utilize logic higher than dual binary logic to make decisions concerning best methods to employ to analyze the captured data and signals, iii. analyzing the captured data and signals employing advanced analysis techniques that utilize logic higher than dual binary logic to provide captured data and signals analysis results, iv. making decisions concerning best methods to use to monitor the user selected from among at least one of human and automated monitoring methods employing advanced decision science techniques that utilize logic higher than dual binary logic, and v. storing in a records database at least one of (A) the data transmitted and signals generated by the user'"'"'s device and (B) the captured data and signals analysis results. - View Dependent Claims (22, 23, 24)
-
Specification