Security proxy service
First Claim
1. A method of creating a proxy for use in searching for a potentially missing person in an emergency situation, the method comprising the steps of:
- a) selecting a personal security agent to be authorized to perform the search;
b) providing contact information associated with the security agent;
c) preparing a database of personal information, to be accessed by the selected personal security agent during an emergency;
d) generating legal documents required to permit access to certain personal information/locations by the personal security agent;
e) creating a listing of frequent personal contacts, including contact information for each individual; and
f) defining a predetermined time period for “
no contact”
to be used in activating the proxy.
0 Assignments
0 Petitions
Accused Products
Abstract
A secure proxy service has been developed to authorize pre-defined individuals (defined as a “Security Agent”) to gain access to otherwise privileged information/premises when an individual has “gone missing”. The individual subscribing to the service defines and retains control of various factors such as: the time period to trigger the proxy service (i.e., missing for several days, missing for several weeks, etc.), the types of information to be accessed (i.e., only email, both premises and email, bank accounts, etc.), and the like. Once activated, the proxy allows the authorized individual(s) to gain access to the person'"'"'s residence, computer accounts, bank accounts, etc. (via previously-executed “power of attorney” documents, when necessary) in an attempt to find clues regarding the missing person'"'"'s location.
-
Citations
7 Claims
-
1. A method of creating a proxy for use in searching for a potentially missing person in an emergency situation, the method comprising the steps of:
-
a) selecting a personal security agent to be authorized to perform the search; b) providing contact information associated with the security agent; c) preparing a database of personal information, to be accessed by the selected personal security agent during an emergency; d) generating legal documents required to permit access to certain personal information/locations by the personal security agent; e) creating a listing of frequent personal contacts, including contact information for each individual; and f) defining a predetermined time period for “
no contact”
to be used in activating the proxy. - View Dependent Claims (2, 3)
-
-
4. A method of using a security proxy service in an attempt to locate a potentially missing person, the method comprising the steps of:
-
creating a proxy service database of personal information by; a) selecting a personal security agent to be authorized to perform the search; b) providing contact information associated with the security agent; c) preparing a database of personal information, to be accessed by the selected personal security agent during an emergency; d) generating legal documents required to permit access to certain personal information/locations by the personal security agent; e) creating a listing of frequent personal contacts, including contact information for each individual; and f) defining a predetermined time period for “
no contact”
to be used in activating the proxy;monitoring contacts between the individual and the listing of frequency personal contacts, inquiring with the listing once during the predetermined time period of step f); and
, if no contact has been madeinitiating the locating service by contacting the personal security agent; transmitting personal information from the database to the personal security agent; and sending the executed legal documents to the personal security agent to be used in performing a search.
-
-
5. A method of creating a proxy for use in searching for a potentially missing individual-subscriber, the method comprising the steps of:
-
a) selecting a personal security agent to be authorized to perform the search; b) providing contact information associated with the personal security agent; c) preparing a database of personal information associated with the individual-subscriber, to be accessed by the selected personal security agent; d) generating legal documents required to permit access to certain personal information/locations by the personal security agent; and e) defining a predetermined time period for “
no contact”
to be used in activating the proxy. - View Dependent Claims (6, 7)
-
Specification