USING LOCATION CAPABILITIES OF A MOBILE DEVICE TO PERMIT USERS TO AVOID POTENTIALLY HARMFUL INTERACTIONS
First Claim
1. A method for utilizing location abilities of a mobile device comprising:
- identifying a location of a mobile device;
mathematically combining a plurality of threat factors relating to a potential danger proximate to the identified location;
comparing the combined threat factors against a predetermined threat threshold; and
when the combined threat factors exceed the threat threshold, performing at least one threat avoidance action, wherein said at least one threat avoidance action comprises automatically presenting a warning upon the mobile device about the potential proximate danger.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention automatically increases situational awareness relating to potential sexual predators, criminals, and/or stalkers located near a mobile device user. A location of the mobile device can be determined by device location electronics, such as a Global Positioning System (GPS). The location can be compared against at least one zone believed to be associated with a sexual predator, a criminal, and/or a stalker. Zones can be static or dynamic. A threat level associated with a zone can be computed from multiple factors, which are compared against one or more thresholds. When the threat level exceeds a thresholds, an associated threat avoidance action can be automatically initiated. One threat avoidance action is to present a warning upon a user'"'"'s mobile device along with contextual information about a proximate danger.
191 Citations
20 Claims
-
1. A method for utilizing location abilities of a mobile device comprising:
-
identifying a location of a mobile device; mathematically combining a plurality of threat factors relating to a potential danger proximate to the identified location; comparing the combined threat factors against a predetermined threat threshold; and when the combined threat factors exceed the threat threshold, performing at least one threat avoidance action, wherein said at least one threat avoidance action comprises automatically presenting a warning upon the mobile device about the potential proximate danger. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for preventing harm to a mobile device user that automatically increases situational awareness of potential dangers proximate to the user relating to at least one of sexual predators, criminals, and stalkers, said method comprising:
-
identifying a location of a mobile device; comparing the identified location against at least one zone known to be associated with at least one of a sexual predator, a criminal, and a stalker, wherein geographical boundaries for the zone are based upon automatically obtained information from a Web based source; and when proximate to one of the zones, the mobile device automatically initiating at least one threat avoidance action that includes contextual information about a potential danger associated with the zone, wherein said contextual information is automatically obtained at least in part from the Web based source, wherein the at least one threat avoidance action is selected from a group of actions consisting of an action that automatically presents a warning upon the mobile device about the potential danger, an action that alerts a remotely located guardian of the potential danger via an electronic message, and an action that notifies an individual associated with the zone that possesses a communication device that the individual has been identified as a potential threat to another and is currently being monitored. - View Dependent Claims (18)
-
-
19. A system for warning a mobile device user of potential dangers comprising:
-
at least one mobile device having location identification capabilities; a threat assessment system configured to calculate a situational threat value for a zone of danger when the mobile device is proximate to the zone based upon at least one factor, to compare this situational threat value against at least one threshold, and to initiate at least one threat avoidance action when the situational threat value exceeds the at least one threshold; and at least one Web based source from which at least one zone of danger and contextual information for that zone of danger are automatically obtained. - View Dependent Claims (20)
-
Specification