Individual Security Through Mobile Device Notifications
First Claim
Patent Images
1. A method, implemented at a mobile computing device that includes at least one processor, for providing individual security, the method comprising:
- associating with a personal beacon and maintaining communications with the personal beacon;
detecting that the personal beacon in no longer within range of the mobile computing device, or has left a defined perimeter from the mobile computing device; and
notifying one or more other mobile computing devices that are geographically proximate to the mobile computer device that a person associated with the personal beacon may be in duress.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for providing individual security is disclosed. The method can be implemented at a mobile computing device that includes at least one processor. The method can include determining that a user at the mobile computing device may be under duress. The method can also include notifying one or more other mobile computing devices that are geographically proximate to the mobile computer device that the user at the mobile computing device may be under duress.
45 Citations
5 Claims
-
1. A method, implemented at a mobile computing device that includes at least one processor, for providing individual security, the method comprising:
-
associating with a personal beacon and maintaining communications with the personal beacon; detecting that the personal beacon in no longer within range of the mobile computing device, or has left a defined perimeter from the mobile computing device; and notifying one or more other mobile computing devices that are geographically proximate to the mobile computer device that a person associated with the personal beacon may be in duress.
-
-
2. A method, implemented at a mobile computing device that includes at least one processor, for providing individual security, the method comprising:
-
determining that a user at the mobile computing device may be under duress; and notifying one or more other mobile computing devices that are geographically proximate to the mobile computer device that the user at the mobile computing device may be under duress.
-
-
3. A method, implemented at a mobile computing device that includes at least one processor, for providing individual security, the method comprising:
-
monitoring geographical movement of the mobile computing device; developing a geographical movement profile representing normal geographical locations for the mobile computing device; determining that the mobile computing device has deviated from the normal geographical locations; and sending one or more notifications to a pre-defined contact list informing each contact that the mobile computing device has deviated from the normal geographical locations.
-
-
4. A computer-implemented method for providing crowd-sourced crime information, the method comprising:
-
receiving a plurality of notifications from a plurality of mobile computing devices, each notification indicating that a crime has occurred at a particular geographical location corresponding to a geographical location of one of the plurality of mobile computing devices; aggregating the plurality of notifications into a crime map, including annotating the crime map with information indicating where each crime has occurred for each of the plurality of notifications; and providing at least a portion of the crime map to at least one mobile computing device.
-
-
5. A computer-implemented method for providing crowd-sourced crime information, the method comprising:
-
processing a crime map, the crime map containing information about a plurality of crimes that have been reported, for each crime the information including a particular geographical location where the crime was reported to have occurred and a particular time at which the crime was reported; processing the crime map to compute a probability of a crime happening at least one geographical location and at a particular time, including processing a number and frequency of past crimes that have been reported at the at least one geographical location; and sending the computed probability of a crime happening at the least one geographical location and at the particular time to at least one mobile computing device.
-
Specification