TECHNIQUES FOR PERSONAL SECURITY VIA MOBILE DEVICES
First Claim
1. A machine-implemented method to execute on a processor, the method comprising:
- detecting, on a portable communication device, a request for a panic mode of operation for the portable communication device to transition to;
establishing an Internet connection in response to the request for the panic mode of operation;
activating multimedia devices on the portable communication device to record multimedia data for an environment that the portable communication device is in;
acquiring a physical position for the portable communication device; and
streaming the recorded multimedia data and the physical position from the portable communication device over the Internet to a secure remote storage location.
16 Assignments
0 Petitions
Accused Products
Abstract
Techniques for achieving personal security via mobile devices are presented. A portable mobile communication device, such as a phone or a personal digital assistant (PDA), is equipped with geographic positioning capabilities and is equipped with audio and visual devices. A panic mode of operation can be automatically detected in which real time audio and video for an environment surrounding the portable communication device are captured along with a geographic location for the portable communication device. This information is streamed over the Internet to a secure site where it can be viewed in real time and/or later inspected.
22 Citations
20 Claims
-
1. A machine-implemented method to execute on a processor, the method comprising:
-
detecting, on a portable communication device, a request for a panic mode of operation for the portable communication device to transition to; establishing an Internet connection in response to the request for the panic mode of operation; activating multimedia devices on the portable communication device to record multimedia data for an environment that the portable communication device is in; acquiring a physical position for the portable communication device; and streaming the recorded multimedia data and the physical position from the portable communication device over the Internet to a secure remote storage location. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A machine-implemented method to execute on a processor, the method comprising:
-
detecting receipt of a special message on a portable communication device; prompting an operator of the portable communication device for an access code in response to the receipt of the special message; and verifying the access code entered by the operator on the portable communication device and when verified asking the operator to set security permissions for a sender of the special message relative to that sender being able to receive from the portable communication device a physical location of the portable communication device, real time audio and/or real time video being captured by the portable communication device within its physical environment. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A portable communication device, comprising:
-
a panic service implemented in a computer-readable medium and to execute on one or more processors of the portable communication device; and an agent implemented in a computer-readable medium and to execute within the one or more processors of the portable communication device; wherein panic service is acquire the physical position of the portable communication device and is to activate an audio device and a video device of the portable communication device to capture real time physical positions, real time audio, and real time video from the portable communication device when the portable communication device is processing in a panic mode of operation, the agent is to activate the panic mode of operation based on detected and evaluated events and/or messages occurring and received on the portable communication device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification