Interactive personal surveillance and security (IPSS) system
DCFirst Claim
1. An interactive personal security and surveillance system comprising:
- at least one computing device; and
at least one application executable in the at least one computing device, the application comprising;
logic that determines a user activity and/or user surroundings by matching sensor data to at least one algorithm with at least one user-defined parameter;
logic that determines a surveillance mode that corresponds to the user activity and/or the user surroundings;
logic that facilitates a user-defined response to the user activity and/or the user surroundings;
logic that assigns a risk level associated with the user activity and/or the user surroundings;
logic that accesses a remote security database to determine the user surroundings;
logic that composes a dynamic contact list based on the user activity and/or the user surroundings;
logic that transmits surveillance information to a publicly searchable database;
logic that communicates the surveillance information to at least one remotely located computer device; and
logic that remotely stores the surveillance information.
3 Assignments
Litigations
0 Petitions
Accused Products
Abstract
An interactive personal surveillance and security (IPSS) system for users carrying wireless communication devices. The system utilizes portable communication devices that are also capable of capturing and/or sending surveillance information. The system allows users carrying these devices to automatically capture surveillance information, have the information sent to one or more automated and remotely located surveillance (RLS) systems, and establish interactivity for the verification of determining secure or dangerous environments, encounters, logging events, or other encounters or observations. The RLS systems receive information from user communication devices and can follow user-definable parameters that establish the level or type of interactivity and determining when alarms or messages to third parties are needed. An IPSS system is user-definable and may become tailored and may respond to one or more users differently, based on each user'"'"'s set-up and changes to the system. The interactive personal surveillance system may also react differently based on users'"'"' location, the users'"'"' potential safety or risk, when the users react differently to an event, others around them, etc.
45 Citations
20 Claims
-
1. An interactive personal security and surveillance system comprising:
-
at least one computing device; and at least one application executable in the at least one computing device, the application comprising; logic that determines a user activity and/or user surroundings by matching sensor data to at least one algorithm with at least one user-defined parameter; logic that determines a surveillance mode that corresponds to the user activity and/or the user surroundings; logic that facilitates a user-defined response to the user activity and/or the user surroundings; logic that assigns a risk level associated with the user activity and/or the user surroundings; logic that accesses a remote security database to determine the user surroundings; logic that composes a dynamic contact list based on the user activity and/or the user surroundings; logic that transmits surveillance information to a publicly searchable database; logic that communicates the surveillance information to at least one remotely located computer device; and logic that remotely stores the surveillance information. - View Dependent Claims (2, 3, 4)
-
-
5. A system comprising:
-
at least one computing device; and at least one application executable in the at least one computing device, the application comprising; logic that determines a user activity and/or user surroundings; logic that determines a surveillance mode that corresponds to the user activity and/or the user surroundings; logic that facilitates a user-defined response to the user activity and/or the user surroundings; and logic that communicates surveillance information to at least one remotely located computer device. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method comprising the steps of:
-
determining, by a computing device, a user activity and/or user surroundings; determining, by the computing device, a surveillance mode that corresponds to the user activity and/or the user surroundings; facilitating, by the computing device, a user-defined response to the user activity and/or the user surroundings; and communicating, by the computing device, surveillance information to at least one remotely located computer device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification