Machine-to-machine (M2M) emergency communications
First Claim
Patent Images
1. A method comprising:
- receiving, by a processor, detections associated with a first entity, wherein at least one of the detections is indicative of being from a first mobile device carried by the first entity;
determining, by the processor, a pattern of the detections associated with the first entity, wherein the pattern is based on a behavior;
assigning, based on the pattern, a first threat level associated with the first entity;
comparing the first threat level to a first threshold associated with a site in proximity of the first entity, wherein the first threshold is a high likelihood of instigating harmful act;
determining that the first threat level reaches the first threshold;
determining that a second mobile device in proximity of the first entity has an associated second threat level that does not reach the first threshold; and
responsive to the determining that the first threat level reaches the first threshold and the second threat level does not reach the first threshold, providing instructions to send an alert message to the second mobile device in proximity of the first entity, wherein the alert message comprises a request for information about the first entity from the second mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
System, methods, and devices may provide alerts, such as emergency alerts, using machine-to-machine communications. A method may include receiving a state of a mammal associated with a device, receiving a state of an environment that is approximate to the location of the mammal associated with the device, determining a likelihood of a harmful activity based on the aforementioned states, and automatically sending alert message based on the determined likelihood of the harmful activity.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by a processor, detections associated with a first entity, wherein at least one of the detections is indicative of being from a first mobile device carried by the first entity; determining, by the processor, a pattern of the detections associated with the first entity, wherein the pattern is based on a behavior; assigning, based on the pattern, a first threat level associated with the first entity; comparing the first threat level to a first threshold associated with a site in proximity of the first entity, wherein the first threshold is a high likelihood of instigating harmful act; determining that the first threat level reaches the first threshold; determining that a second mobile device in proximity of the first entity has an associated second threat level that does not reach the first threshold; and responsive to the determining that the first threat level reaches the first threshold and the second threat level does not reach the first threshold, providing instructions to send an alert message to the second mobile device in proximity of the first entity, wherein the alert message comprises a request for information about the first entity from the second mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A server comprising:
-
a processor; and a memory coupled to the processor, the memory having stored thereon executable instructions that when executed by the processor cause the processor to effectuate operations comprising; receiving detections associated with a first entity, wherein at least one of the detections is indicative of being from a mobile device associated with the first entity; determining a pattern of the detections associated with the first entity, wherein the pattern is based on a behavior; assigning, based on the pattern, a first threat level associated with the first entity; comparing the first threat level to a first threshold associated with a site in proximity of the first entity; determining that the first threat level reaches the first threshold, wherein the first threshold is a high likelihood of instigating harmful act; determining that a second mobile device in proximity of the first entity has an associated second threat level that does not reach the first threshold; and responsive to the determining that the first threat level reaches the first threshold and the second threat level does not reach the first threshold, providing instructions to send an alert message to the second mobile device in proximity of the first entity, wherein the alert message comprises a request for information about the first entity from the second mobile device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer readable storage medium comprising computer executable instructions that when executed by a computing device cause said computing device to effectuate operations comprising:
-
receiving detections associated with a first entity, wherein at least one of the detections is indicative of being from a mobile device associated with the first entity; determining a pattern of the detections; assigning, based on the pattern, a first threat level associated with the first entity; comparing the first threat level to a first threshold associated with a site in proximity of the first entity, wherein the first threshold is a high likelihood of instigating harmful act; determining that the first threat level reaches the first threshold; determining that a second mobile device in proximity of the first entity has an associated second threat level that does not reach the first threshold; and responsive to the determining that the first threat level reaches the first threshold and the second threat level does not reach the first threshold, providing instructions to send an alert message to the second mobile device in proximity of the first entity, wherein the alert message comprises a request for information about the first entity from the second mobile device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification