Mobile security technology
First Claim
1. A computer-implemented method for providing personal security features to a user of a mobile computing device, the method comprising:
- receiving, at the mobile computing device, input from the user of the mobile computing device that indicates a safety incident is occurring that poses a potential threat to the user'"'"'s personal safety;
determining, by the mobile computing device, a location of the mobile computing device using one or more data sources;
receiving, at the mobile computing device, information that indicates whether responders are currently available for the user of the mobile computing device;
when it is detected that no responders are currently available, taking an appropriate alternate action;
communicating, by the mobile computing device, with another computing device as part of a two-way audiovisual teleconference over a first network connection, the communicating including transmitting the location of the mobile computing device;
displaying, as part of the two-way audiovisual teleconference, real-time video from the another computing device, wherein the real-time video is output by the mobile computing device in a manner to convey to one or more people involved inthe safety incident that a remote user of the another computing device is observing the incident in real time;
recording video of the safety incident using one or more cameras that are accessible to the mobile computing device; and
transmitting, by the mobile computing device over a second network connection and concurrently while displaying the real-time video, the video of the safety incident to a remote storage system for persistent storage.
0 Assignments
0 Petitions
Accused Products
Abstract
In one implementation, a computer-implemented method includes determining a location of a mobile computing device using one or more of a plurality of data sources; communicating, by the mobile computing device, with another computing device as part of a two-way video chat session over a first network connection, the communicating including transmitting the location of the mobile computing device; displaying, as part of the two-way video chat session, real-time video from the other computing device; recording video using one or more cameras that are accessible to the mobile computing device; and transmitting, over a second network connection, the video to a remote storage system for persistent storage.
-
Citations
53 Claims
-
1. A computer-implemented method for providing personal security features to a user of a mobile computing device, the method comprising:
-
receiving, at the mobile computing device, input from the user of the mobile computing device that indicates a safety incident is occurring that poses a potential threat to the user'"'"'s personal safety; determining, by the mobile computing device, a location of the mobile computing device using one or more data sources; receiving, at the mobile computing device, information that indicates whether responders are currently available for the user of the mobile computing device; when it is detected that no responders are currently available, taking an appropriate alternate action; communicating, by the mobile computing device, with another computing device as part of a two-way audiovisual teleconference over a first network connection, the communicating including transmitting the location of the mobile computing device; displaying, as part of the two-way audiovisual teleconference, real-time video from the another computing device, wherein the real-time video is output by the mobile computing device in a manner to convey to one or more people involved in the safety incident that a remote user of the another computing device is observing the incident in real time; recording video of the safety incident using one or more cameras that are accessible to the mobile computing device; and transmitting, by the mobile computing device over a second network connection and concurrently while displaying the real-time video, the video of the safety incident to a remote storage system for persistent storage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
-
20. A computing device, comprising:
-
a user interface that is programmed to receive input from a user of the computing device that indicates a safety incident that poses a potential threat to personal safety and to receive information that indicates whether responders are currently available for a user of the computing device; one or more cameras that are programmed to record video of the safety incident; a geographic location unit that is programmed to determine a location of a computing device using one or more of a plurality of data sources; a network interface that is programmed to communicate with another computing device as part of a two-way audiovisual teleconference over a first network connection and to cause the video of the safety incident to be concurrently transmitted, over a second network connection, to a remote storage system for persistent storage, the location of the computing device being sent over the first and second network connections, wherein the network interface is further programmed to take appropriate alternate action when it is detected that no responders are currently available; and a display that is programmed to display, as part of the two-way audiovisual teleconference, real-time video from the another computing device, wherein the realtime video is output by the display in a manner to convey to one or more people involved in the safety incident that a remote user of the another computing device is observing the incident in real time. - View Dependent Claims (21, 22)
-
Specification