Secure emergency response technology
First Claim
1. A computer-implemented method, performed by one or more processors, for emergency response, the method comprising:
- receiving encrypted location data from a client device at long intervals;
sending a notification to a client device to activate the device remotely to execute pre-defined processes;
receiving an encrypted confirmation from the client device, confirming the receipt of the notification;
sending an encrypted emergency signal to the client device, wherein the signal is configured to cause the client device to enter an emergency mode;
after sending the encrypted emergency signal;
receiving encrypted location data from the client device at short intervals; and
causing a location of the client device to be displayed;
receiving an indication that the emergency situation has ended; and
based on receiving indication that the emergency situation has ended, removing the display of the location of the client device.
4 Assignments
0 Petitions
Accused Products
Abstract
Technology for securely processing emergency response. An emergency response server receives intermittent location data from a client device during non-emergency responses. Upon determining an emergency situation is occurring, the emergency response server sends an unencrypted notification to a client device to activate the client device remotely. Once the emergency response server receives an encrypted message from the client device, the emergency response server sends an encrypted emergency client device, causing the client device to enter an emergency mode. The emergency response server then receives encrypted location information at more frequent intervals from the client device in the emergency mode and displays the location of the client device. Once the emergency situation has ended, the location of the client device is no longer displayed, and a signal is sent to cause the client device to exit the emergency mode.
-
Citations
20 Claims
-
1. A computer-implemented method, performed by one or more processors, for emergency response, the method comprising:
-
receiving encrypted location data from a client device at long intervals; sending a notification to a client device to activate the device remotely to execute pre-defined processes; receiving an encrypted confirmation from the client device, confirming the receipt of the notification; sending an encrypted emergency signal to the client device, wherein the signal is configured to cause the client device to enter an emergency mode; after sending the encrypted emergency signal; receiving encrypted location data from the client device at short intervals; and causing a location of the client device to be displayed; receiving an indication that the emergency situation has ended; and based on receiving indication that the emergency situation has ended, removing the display of the location of the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method, performed by one or more processors, for emergency response, the method comprising:
-
sending location information to an emergency response server at long intervals, wherein the location information indicates the location of a client device; receiving a notification to activate the device remotely to execute pre-defined processes; sending an encrypted confirmation to the emergency response server confirming receipt of the notification; receiving an encrypted emergency signal indicating an emergency situation is occurring; based on the emergency signal, entering an emergency mode and sending location information to the emergency response server at short intervals; receiving an end emergency signal from an emergency response server; and based on the end emergency signal, end the emergency mode and resume sending location information to the emergency response server at long intervals.
-
-
11. A computer-implemented method, performed by one or more processors, for emergency response, the method comprising:
-
defining a danger zone boundary; receive location information from a client device at long intervals; based on the location of the client device, determining whether the client device is within the danger zone boundary; if the client device is within the danger zone boundary, performing the following actions; sending a notification to the client device, wherein the notification is configured to activate the client device; receive location information from the client device at short intervals; display the location of the client device; performing a second determination to determine whether the client device is still within the danger zone boundary; if the client device is no longer within the danger zone boundary, removing the displayed location of the client device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification