FIELD OF THE DISCLOSUREThis disclosure relates generally to portable electronic devices, and, more particularly, to safety systems that use portable electronic devices to monitor the personal safety of a user.
BACKGROUNDIn recent years, the sales of portable electronic devices, such as portable cellular telephones, smart watches, fitness trackers, personal digital assistants, etc., have exploded. The increased sales of such devices are due, in large part, to the ever expanding functionality of the devices. While a decade ago most portable electronic devices were able to do little more than communicate phone calls, today's portable electronic devices perform a multitude of tasks aimed at improving the lives and lifestyles of the user.
BRIEF DESCRIPTION OF THE DRAWINGSFIG. 1 is a diagram of a safety system having a plurality of safety monitors in example portable electronic devices that communicate with a remote safety manager.
FIG. 2 is a block diagram of an example implementation of the example safety monitor of the example portable electronic device ofFIG. 1.
FIG. 3 is a block diagram of an example implementation of the example remote safety manager of the example safety system ofFIG. 1.
FIG. 4 is a flow chart representative of example machine readable instructions which may be executed to implement the example safety monitor ofFIG. 1 andFIG. 2.
FIG. 5 is a flow chart representative of example machine readable instructions which may be executed to implement the example safety monitor and the example remote safety manager ofFIG. 1,FIG. 2, andFIG. 3.
FIG. 6 is a flow chart representative of example machine readable instructions which may be executed to implement the example safety monitor ofFIG. 1 andFIG. 2.
FIG. 7 is a flow chart representative of example machine readable instructions which may be executed to implement the example safety monitor and the example remote safety manager ofFIG. 1,FIG. 2, andFIG. 3.
FIG. 8 is a flow chart representative of example machine readable instructions which may be executed to implement the example safety monitor ofFIG. 1 andFIG. 2.
FIG. 9 is a flow chart representative of example machine readable instructions which may be executed to implement the example safety monitor ofFIG. 1 andFIG. 2.
FIG. 10 is a flow chart representative of example machine readable instructions which may be executed to implement the example remote safety manager ofFIG. 1 andFIG. 3.
FIG. 11 is a flow chart representative of example machine readable instructions which may be executed to implement the example safety monitor ofFIG. 1 andFIG. 2, and the example remote safety manager ofFIG. 1 andFIG. 3.
FIG. 12 is a flow chart representative of example machine readable instructions which may be executed to implement the example safety monitor ofFIG. 1 andFIG. 2, and the example remote safety manager ofFIG. 1 andFIG. 3.
FIG. 13 is a block diagram of an example processor platform capable of executing the instructions ofFIGS. 4-9, 11 and 12 to implement the example safety monitor ofFIG. 1, andFIG. 2.
FIG. 14 is a block diagram of an example processor platform capable of executing the instructions ofFIGS. 5, 7, 10, 11, and 12 to implement the example remote safety manager ofFIGS. 1 and 3.
The figures are not to scale. Wherever possible, the same reference numbers will be used throughout the drawing(s) and accompanying written description to refer to the same or like parts. Further, devices that are referenced using a same number followed by different letters (e.g.,110A versus110B) will have all or at least some of the same components (e.g., the examplesecond safety monitor110B andthird safety monitor110C described below include the same components as the examplefirst safety monitor110A described below).
DETAILED DESCRIPTIONAlthough previously limited to a set of communication-directed technologies (e.g., telephone communication, text communication, Internet access, etc.), portable electronic devices of today are capable of performing an ever-expanding set of tasks directed to improving the lives and lifestyles of the user. For example, modern cell phones and other portable electronic devices can be used to perform a variety of tasks including, count calories and track exercise, map a route to a destination, provide real-time traffic updates, manage a financial budget, access banking institutions, access video and non-video entertainment, etc. As a result of these capabilities, users increasingly carry their portable electronic devices throughout the day.
Many users also carry a portable electronic device when they expect to be in a potentially dangerous situation (in a high crime area, an isolated area, a riotous area, a crowded area susceptible to nefarious activities such as pick pocketing, terrorism, etc.) in the hopes that, if assaulted or faced with trouble, they will be able to use the device to summon assistance from the police department, the fire department, a friend, and/or another entity. Unfortunately, a user being assaulted, threatened or even impaired often lacks the time and/or clarity of mind needed to reach assistance via the portable device. Likewise, users will often rely on portable electronic devices when faced with a medical emergency. However, such users but may be unconscious or otherwise physically unable to use the portable electronic device to summon assistance. As a result, there is a need for safety systems that use portable electronic devices to detect a threat to a user's safety and/or a medical emergency and to respond to the threat and/or emergency in an automated fashion.
An example personal safety monitor disclosed herein is located in a portable electronic device and accesses remote safety managers that can be disposed in the cloud, in communication network devices, in a user's home/work, in one or more other portable electronic devices associated with other users. The personal safety monitor of some such examples determines a threshold alert level that indicates a degree (high, medium, low, etc.) of danger (or risk) to which a user of the portable electronic device is exposed. Based on sensor information collected by one or more sensor(s) disposed on and off the portable electronic device, as well as information received from information resources external to the portable electronic device, the personal safety monitor adjusts the threshold alert level as needed to account for the circumstances surrounding (or otherwise affecting) the user. In some examples, the sensor(s) are carried by the portable electronic device and include an array of biological sensor(s), a microphone, a still image camera, a video camera, a humidity detector, a heat sensor, a liquid sensor, a global positioning system (GPS) sensor, an array of motion sensing detectors (e.g., an accelerometer, a gyroscope, etc.), etc. In some examples, the sensor(s) that are not carried by the portable electronic device can be carried in other devices (e.g., smart watch, fitness monitor, biological monitors, headphones, earbuds) worn or carried by the user of the portable electronic device. In some such examples, the other devices are in communication with the portable electronic device. In some examples, the other devices are not necessarily associated with the physical person of the user of the portable electronic device but are in the surroundings of the user (e.g., surveillance audio recorders, surveillance video cameras, smoke, sensor(s), fire sensor(s), heat sensor(s), liquid sensor(s), carbon dioxide sensor(s), etc.). In some examples the other devices communicate information to the portable electronic device via Bluetooth, RFID, cellular telephony, Wi-Fi, etc.)
In some examples, sensor information collected by the portable electronic device is analyzed by the safety monitor of the portable electronic device using a machine-learning algorithm. The machine-learning algorithm uses information such as one or more of the sensor information, time and date information, location information, portable device usage information, etc., to determine one or more daily, weekly, and/or monthly routines engaged in by the user. The machine-learning algorithm can also use information about which, if any, of the routines corresponds to a higher threshold alert level or a lower threshold alert level, (e.g., based on a degree of danger and/or risk). In some examples, the portable electronic device can be configured to identify deviations from a daily, weekly, or monthly routine and to raise (or lower) a threshold alert level in response to such deviations.
In some examples, the machine learning algorithm of the safety monitor uses the collected sensor information to pre-emptively predict a possible threat to the user or infer a possible threat. In some such examples, the safety monitor can notify the user of the possible threat so that user can device how to proceed in light of the threat. In some such examples, the machine learning algorithm assigns a threshold alert level to the predicted threat and identifies attributes to be monitored and used to identify when (if) the threat becomes a reality.
In some examples, the safety monitor determines that the user is in need of assistance based on a current threshold alert level and based on the detection of one or more sensor indications associated with abnormal activity. Abnormal activities are activities that are detectable by the portable electronic device sensor(s) and that can be associated with a threat, injury and/or assault on the user. Some such abnormal activities can include the portable electronic device being dropped or thrown to the ground, the portable electronic device having an unusual trajectory, the user having an increased heart rate, the user having an increased respiratory rate, the user (or a by-stander) screaming, or saying a “trigger” word designed to trigger a safety/safety alert, etc. Such abnormal activities can be detected by one or more of the motion sensor(s) on or off the portable electronic device, one or more of the biological sensor(s) on or off the portable electronic device, and/or one or more of the audio detectors on or off the portable electronic device, and/or any of the sensor(s) described above. As further described above, in some examples, the sensor(s) disposed off the portable devices are disposed in one or more other portable devices associated (worn, carried, driven) with the user, including, for example, an electronic watch, an electronic pedometer, an electronic heart monitor, headphones, earbuds, jewelry, a water bottle, a bicycle, a steering wheel of an automobile, etc. In some examples, the sensor(s) disposed off the portable devices are disposed in one or more stationary devices including, for example, a surveillance camera, a surveillance microphone, a fire alarm, a heat sensor, a smoke sensor, a motion sensor, etc. In some examples, the safety monitor analyzes information collected at the sensor(s) to determine if an abnormal activity is detected. In some examples, the safety monitor analyzes audio captured at an audio sensor (e.g., a microphone) to determine whether the audio correlates to a cry for help, a keyword used to signal a need for assistance, a voice characteristic corresponding to the user being in distress, etc. In some examples, the safety monitor analyzes motion information captured by one or more sensor(s) (e.g., a gyroscope, an accelerometers, etc.) to determine whether the motion information corresponds to the portable electronic device being dropped, thrown, tossed, being carried while the user is running, being carried while the user is walking, being carried when the user is or has fallen down, to the user making a body gesture/movement associated with distress, etc. The motion information may also indicate that a body part of the user experienced an unusual acceleration due to, for example, being struck by an object (e.g., motion sensors disposed in headphone worn by user indicate user's head accelerated but sensors disposed elsewhere on the body indicate the body generally did not experience the same acceleration). A sensor disposed in the steering wheel of the user's auto may indicate the user suddenly gripped the steering with force that exceeds or reaches a threshold value, thereby indicating the auto may have struck an object or is otherwise out of control.
In some examples, when the safety monitor makes a determination that one or more abnormal activities has been detected and that the one or more abnormal activities satisfy a threshold alert level, a safety alert is actuated. The actuation of the safety alert can result in the performance of any of a variety of tasks, the transmission of a message to a police dispatch center, a fire dispatch center, a medical dispatch center, a set of emergency contacts, the generation of an audible alarm, and/or any other action seeking to obtain assistance. In some examples, the parties to be notified in the event of a safety alert can vary depending on the context in which the phone is being used at the time of the alert, the type of abnormal activities detected, the biological parameters of the user at the time of the alert, etc. Actuation of the safety alert can also result in the automatic initiation of a recording and/or a live-stream transmission of audio being captured at the portable electronic device to one or more of the parties receiving the safety alert. Actuation of the safety alert can additionally or alternatively result in the automatic (e.g., without human approval and/or action) transmission of a message to be published via a social medium platform, a private safety monitoring company, an Internet informational platform, etc. Any of the information to be transmitted by the portable electronic device can be transmitted via cellular telephone service, Wi-Fi service, radio waves, a texting application, a messaging application, an email application, a web browser, etc.
In some examples, the portable electronic device provides a notification to the user before or after the safety alert is actuated. The notification, when generated before the safety alert is actuated, can give the user an opportunity to cancel the safety alert. In some examples, the notification, when generated after the safety alert is actuated, can inform the user that, if the alert was unnecessary, they will need to notify the police, emergency contacts, etc., that the alert was a false alarm. In some examples, the notification, when generated after the safety alert is actuated, can inform the user that, if the alert was unnecessary, the portable electronic device will notify the recipients of the safety alert of the false alarm, and/or take one or more actions to rescind the alert (e.g., delete an alarm message posted to a social media site, cease generating an audible alarm, etc.).
In some examples, when the portable electronic device provides a notification to the user allowing the user to cancel the safety alert, the user can respond by entering and/or speaking a code word that causes the portable electronic device to ostensibly cancel the safety alert (by, for example, emitting/displaying a message that says, “safety alert canceled”) but that does not in fact cancel the safety alert. Such a code word can be used when the user is forced to cancel the safety alert under duress.
In some examples, the type of abnormal activities that will result in the actuation of a safety alert is dependent upon the context in which the device is being used (also referred as a “usage context”). In some examples, when the user is exercising, sensed information indicating the user has accelerated heart rate and/or increased perspiration may not result in actuation of a safety alert. In contrast, the same information detected when the user is walking on a poorly lit street in a high crime area may result in actuation of a safety alert. In some examples, the user of the portable electronic device can actuate a safety alert through the user of an input device.
Example personal safety monitors disclosed herein communicate with an off-device remote safety manager(s). The off-device remote safety manager can be disposed in the cloud (or in the user's home or at the user's place of employment, etc.) and implemented using one or more processors with access to one or more public, private and/or governmental services/databases. In some examples, the remote safety manager includes multiple processors disposed at various locations that collaborate to collect and analyze information supplied by: 1) the one or more services/databases, 2) safety monitors of other portable electronic devices, 3) a plurality of sensor(s) disposed near, on and/or remotely from the portable electronic device.
In some examples, the remote safety manager receives past usage history from the safety monitor as well as real-time usage data. In some such examples, the remote safety managers include machine learning technology to duplicate, supplement, and/or replace the machine-learning algorithms on the portable electronic device. In some examples, the remote safety manager and the safety monitor receive and use information from a plurality of sources including governmental law enforcement and/or fire and rescue agencies, public utility agencies, private security agencies, social media platforms, weather monitoring agencies, other portable electronic devices associated with other users, etc.
Thus, the safety system disclosed herein provides many advantages including, automatic monitoring of a user's safety and well-being, and automatic actuation of a safety alert when the safety of the user is determined to be (or might be) in jeopardy based on detected abnormal activities and/or a usage context. Further, the accuracy of the automatic monitoring and automatic actuation is enhanced through the use of information collected from a variety of sources and the use machine learning technology disposed both on a user portable electronic device and on a remote safety manager.
FIG. 1 is a diagram of anexample safety system100 having example safety monitors (e.g., afirst safety monitor110A, asecond safety monitor110B, athird safety monitor110C, etc.) in respective example portable electronic devices (e.g., a first portableelectronic device120A, a second portableelectronic device120B, a third portableelectronic device120C) that communicate with an exampleremote safety manager130. Theremote safety manager130 can be disposed in the cloud, in a communication network device, and/or disposed at one or more locations associated with a user (e.g., the user's home, the user's automobile, the user's place of employment, etc.). In some such examples, theremote safety manager130 can include multiple remote safety manager sites that operate in a collective fashion and/or in a replicative fashion. Theremote safety manager130 is in communication (via communication network(s)144) with a variety of electronically accessible services and information resources145 (e.g., social medium platforms/services145A, governmental services/databases145B, private/commercial services/databases145C, public services/databases145D, communication network information centers145E, etc.).
Users (e.g., afirst user150A, asecond user150B, a third user150C, etc.) operate the portableelectronic devices120A,120B,120C, respectively. In some examples, the portableelectronic devices120A,120B,120C are implemented using a smart phone having telephone capabilities, texting capabilities, location tracking capabilities, Wi-Fi communication capabilities, Bluetooth communication capabilities, etc. In some examples, the safety monitors110A,110B,110C are configured to track the locations of therespective users150A,150B,150C, and collect user input and sensor information from one or more sensor(s) disposed on (and/or off) the portableelectronic device120A,120B,120C. In some examples, each of the safety monitors110A,110B,110C uses the collected information to generate and store a past usage history corresponding to the usage of the associated portableelectronic device120A,120B,120C. The past usage histories are used to identify various contexts in which thecorresponding user150A,150B,150C uses the respective portableelectronic device120A,120B,120C. In some examples, the safety monitors110A,110B,110C are configured to use information supplied by one or more of the electronically accessible services andinformation resources145A,145B,145C,145D to identify the various contexts. In some examples, the safety monitors110A,110B,110C are configured to use information supplied by each other and by any other portable electronic devices associated with other users to identify the various contexts.
In some examples, the safety monitors (e.g., thefirst safety monitor110A, thesecond safety monitor110B, thethird safety monitor110C, etc.) use a corresponding past usage history to identify a set of daily, weekly, and/or monthly routines of thefirst user150A, thesecond user150B, the third user150C, respectively. The respective safety monitors (e.g., thefirst safety monitor110A, thesecond safety monitor110B, thethird safety monitor110C, etc.) use any of the corresponding past usage history, the routine information, the sensed information, user input(s), time of day information, location information, information obtained from theremote safety manager130, etc., to determine a respective threshold alert level for thefirst user150A, thesecond user150B, and the third user150C, respectively. Each threshold alert level generally corresponds to an amount or likelihood of danger or potential danger to which the respective one of thefirst user150A, thesecond user150B, and the third user150C is currently exposed. In some examples, a high threshold alert level corresponds to a low level of danger because when the corresponding one of the users is exposed to a low level of danger the safety monitor has a higher threshold for abnormal activities before a safety alert will be actuated. Similarly, a low threshold alert level corresponds to a high level of danger because when the user is exposed to a high level of danger, the safety monitor has a lower threshold for abnormal activities before a safety alert will be actuated. The first, second and third safety monitors110A,110B, and110C are also configured to adjust (e.g., raise or lower) the threshold alert level based on changing sensor information, changing routines, a change in the time of day, a change in location, information obtained in real-time from theremote safety manager130, etc. Any number of threshold alert levels may be used to represent a spectrum of danger levels (e.g., a low threshold alert level, a medium threshold alert level, a high threshold alert level, a first threshold alert level, a second threshold alert level, etc.)
In addition to determining and, as needed, adjusting the threshold alert level, the first, second, and third safety monitors110A,110B, and110C are each configured to automatically actuate a safety alert and/or respond to user input that actuates a safety alert. In some examples, a safety alert, when actuated (or shortly thereafter to give the user an opportunity to counteract), results in the transmission of a message or messages summoning assistance from any or all of a governmental agency enforcement agency, a private security agency, any of a set of user emergency contacts stored in thesmart phone120, a message transmitted to electronic devices determined to be located near (e.g., within a threshold distance of, within a same building as, at a same venue as, etc.) the user, etc. In some examples, a safety alert, when actuated, instead (or also) results in the generation of an audible alarm. A safety alert can also (or instead) result in the capture and live streaming of video and/or audio to a source of assistance. In some examples, a safety alert can also (or instead) result in the capture of a device ID from an assailant's smartphone for usage by police. In some examples, the type(s) of actions to be taken when a safety alert is generated depend on the types and values of attributes that caused the safety alert to be actuated, a location of the user, the surroundings of the user, and/or any other factor. In some examples, the first, second, and third safety monitors110A,110B,110C are configured to actuate safety alerts based on any or all of the sensed information, the past usage history, routines of the user, time, date and location information, user inputs, etc.
FIG. 2 is a block diagram of an example implementation of thefirst safety monitor110A ofFIG. 1. In this example, thesafety monitor110A is implemented on the example first portableelectronic device120A ofFIG. 1. The examplefirst safety monitor110A ofFIG. 2 includes an example thresholdalert level monitor202, an examplesafety alert actuator204, and an exampleusage context generator206. In some examples, all or some of the aspects of thesafety monitor110A can be implemented as a System on a Chip (SoC).
In some examples, the thresholdalert level monitor202 monitors a set of usage attributes of the first portableelectronic device120A. In some examples, the usage attributes include sensor information, time/date information, and/or information about usage of the portableelectronic device120A (e.g., whether, when, how frequently, and/or how long the portableelectronic device120A is used to make a call, text, surf the Internet, take photos, record audio, record video, access social media, watch video, listen to audio, execute software applications, play video games, user viewing habits, user reading habits, user listening habits, etc.). The usage attributes can be generated by one or more of a set of on-device sensor(s)210 (e.g., biological sensor(s)210A, audio sensor(s) (amicrophone210B), video/still-image sensor(s) (camera210C), liquid sensor(s)210D, motion sensor(s)210E, fire sensor(s)210F, grip sensor(s)210G (to detect grip or touch of user), location sensor(s)210H, etc.) and/or off-device sensor(s) (e.g., wearable sensor(s)211A, stationary sensor(s)211B, sensor(s) disposed on other portable electronic devices211C, etc.), aclock device212, any of a set ofuser input devices214, any of a set of output devices216 (e.g., speaker, display, haptic devices, etc.), etc. In some examples, some of the usage attributes are associated with an “abnormal” user activity and some are associated with “normal” user activities. In some examples, whether a usage attribute is associated with an abnormal user activity or a normal user activity is situation-dependent (e.g., context-dependent). For example, usage attributes that indicate that the user is running, sweating, and/or has an accelerated heart rate that are detected during a time of day when the user typically exercises and/or when the user is located in a gym are not associated with an abnormal activity. In contrast, the same usage attributes that are detected at a time immediately after a user was determined to be asleep in bed or while the user is walking or driving on a poorly lit street at night in a high crime area are associated with an abnormal activity. In some examples, the same usage attributes, detected when the user is in the parking lot at the user's place of employment in the evening hours, may be associated with an abnormal activity. As a further example, on the fourth of July, the detection of a concussive sound typically associated with detonation of an explosive device will not generate a safety alert, yet the same sound detected on other days of the year may result in a safety alert. Similarly, the detection of a concussive sound while the user is at an amusement park known to have pyrotechnic shows may not result in a safety alert, whereas the same sound detected while the user is in an airport would generate a safety alert.
When a threshold number of usage attributes that are associated with an abnormal activity have been detected and/or have met a threshold value, the thresholdalert level monitor202 determines that a threshold alert level has been satisfied. In some examples, the threshold alertlevel monitor adjuster202 may be at a low threshold alert level thereby indicating that the user is possibly in jeopardy. When one or more monitored usage attributes indicate that the user is no longer in jeopardy, the thresholdalert level monitor202 may raise the threshold alert level from a low threshold to a medium threshold alert level or a high threshold alert level. In some examples, the thresholdalert level monitor202 may be at a high threshold alert level thereby indicating that the user probably not in jeopardy. When one or more monitored usage attributes indicate that the user's safety status has changed and the user may be in jeopardy, the thresholdalert level monitor202 may lower the threshold alert level from a high threshold to a medium threshold alert level or a low threshold alert level. Although low, medium and high threshold alert levels are described herein, thesafety monitor110A may use any number of thresholds in connection with the usage context profiles.
In some examples, when the threshold alert level has been satisfied, the thresholdalert level monitor202 sends a signal to thesafety alert actuator204. Thesafety alert actuator204 responds to the signal by actuating one or more of the set of output device(s)216 of the portableelectronic device120A and/or wireless communication devices218 (e.g., a Wi-Fi transceiver, an RFID transceiver, a Bluetooth transceiver, a cellular and/or satellite transceiver, etc.). In some examples, one or more of the output device(s) of the portableelectronic device120A are not installed in the portable electronic device but are instead installed in devices associated with (or otherwise in communication with) the portableelectronic device120A. Some such devices can include a smart watch, an electronic device embedded on a piece of jewelry (or clothing) worn by the user, an electronic game, and/or any other type of electronic device. Thesafety alert actuator204 can be configured to actuate any of theoutput devices216 in any desired fashion to notify others of the user's need for assistance. In some examples, the output device(s)216 to be actuated and the manner in which they are actuated can differ with the type(s) of abnormal activity detected, the time of day, the location of the user, etc. In some examples, a threshold alert level is associated with a user input (e.g., the microphone, the camera, a keypad, a touch screen) such that the threshold alert level is satisfied (and a safety alert is actuated) when a designated type of user input (e.g., a user's scream, a user speaking a safety alert actuation code word, a user making a motion in view of the camera, a user selecting an input at a keypad or a touch screen, a user actuating a pressure sensor, etc.) is detected.
The example usagecontext history generator206 ofFIG. 2 includes an examplecurrent usage detector220, an example threshold alert level adjuster221, an example pastusage history analyzer222, an example pastusage history storage224, an example usagecontext profile storage226, an examplethreshold override device228 and an examplefirst interface bus230. In some examples, the examplecurrent usage detector220 receives usage attributes from any of 1) the example sensor(s) (e.g., the biological sensor(s)210A, themicrophone210B, theexample camera210C, the example liquid sensor(s)210D, the example motion sensor(s)210E, the example fire sensor(s)210F, the example grip sensor(s)210G, the example location sensor(s)210H , 2) the example remote safety manager130 (seeFIG. 1), 4) theexample output devices216, 5) theexample input devices214, theexample communication devices218, etc., and causes the usage attributes to be stored in the pastusage history storage224. In this manner, the current information collected at the currentusage context detector206 becomes past usage history. In some examples, thecurrent usage detector220 may generate a user query to be output by one of theoutput devices216. The user query can ask for information regarding an environment, habits of the user, routines of the user, preferences of the user, etc. The result of the query can be treated as, for example usage information.
The example past usage history analyzer222 (also referred to as a usage context analyzer), which can be implemented using any of a neural network, machine learning algorithm(s), artificial intelligence, or programmed logic, etc., is configured to analyze the past usage history stored in the pastusage history storage224 and determine various contexts in which the portable electronic device is used by theuser150A. Based on the analysis, the pastusage history analyzer222 generates usage context profiles and corresponding threshold alert levels. Each usage context profile corresponds to a context in which the portableelectronic device120A is used and includes a set of usage attributes that characterize the usage. In some examples, the pastusage history analyzer222 generates the usage context profiles based on a combination of the past usage history, information received from the electronically accessible services and information resources145 (e.g., social medium platforms/services145A, governmental services/databases145B, private/commercial services/databases145C, public services/databases145D, communication network information centers145E, etc.), information received from theremote safety manager130, and information received from other portable electronic devices (e.g., the second portableelectronic device120B, the thirdelectronic device120C, etc.). In some examples, the pastusage history analyzer222 continues to fine-tune/revise the usage context profiles as additional data is received from the electronically accessible services andinformation resources145, theremote safety manager130, the example sensors210, other electronic devices (e.g., the second portableelectronic device120B, the third portableelectronic device120C, etc.) etc.
In some examples, the pastusage history analyzer222 analyzes the past usage history to identify one or more daily, weekly, and/or monthly routines of the user and assigns usage context profiles based on the routines. In some examples, the pastusage history analyzer222 determines the user has a weekday morning routine associated with a first location (e.g., the user's place of employment), and a first time range (e.g., 9 AM-12 PM) in which usage of the portableelectronic device120A is fairly light. The pastusage history analyzer222 may further determine that threats to the user's safety during this weekday morning routine are low. In some such examples, the pastusage history analyzer222 stores the usage attributes associated with the weekday morning routine (e.g., the location, time range, the level of usage) as a first usage context profile in the usagecontext profile storage226 and further assigns a high threshold alert level to the first usage context profile. The high threshold alert level indicates that the level of risk while operating in the first context profile is low and, thus, thesafety monitor110A has a high threshold for abnormal activity (e.g., will tolerate a greater amount of abnormal activity before actuating a safety alert). In some examples, the pastusage history analyzer222 also determines a set of usage attributes that are associated with abnormal activity (if detected when the portableelectronic device120A is operating in the usage context of the usage context profile). The pastusage history analyzer222 further causes such abnormal activity usage attributes to be stored with the usage context profile in the usagecontext history storage226. In some examples, the pastusage history analyzer222 also identifies individual values (or thresholds) of the abnormal activity usage attributes that are to be met/satisfied in association with the usage context profile before a corresponding safety alert is actuated.
The example pastusage history analyzer222 continues to analyze the past usage history as new usage data is added by thecurrent usage detector220. Thus, the pastusage history analyzer222 continues to fine-tune the usage context profiles and corresponding threshold alert levels as new information is received/collected. Further, as described above, the pastusage history analyzer222 continues to fine-tune the usage context profiles and corresponding threshold alert levels as information is received from the electronically accessible services andinformation resources145, theremote safety manager130, the example sensors210, other electronic devices (e.g., the second portableelectronic device120B, the third portableelectronic device120C, etc.) etc.
In some examples, the examplecurrent usage detector220 determines a context in which the example portableelectronic device120A is currently being used by comparing the current usage attributes to usage attributes associated with the usage context profile(s) stored in the usagecontext profile storage214. In some examples, the current usage attributes indicate that the portableelectronic device120A is located at the user's place of employment during a morning weekday and further indicate that usage of the portableelectronic device120A is fairly light. In some such examples, thecurrent usage detector220 identifies a match between the current usage attributes (e.g., place, date/time, usage activity) and the first usage context profile attributes. As a result, thecurrent usage detector220 determines that the threshold alert level corresponding to the first usage context profile (e.g., a high threshold alert level) is to be supplied to the thresholdalert level monitor202. In addition, thecurrent usage detector220 causes the abnormal activity usage attributes (and any corresponding output values/thresholds) stored with the first usage context profile to be supplied to the thresholdalert level monitor202.
In some examples, in response to receiving the high threshold alert level, and the abnormal activity usage attributes, the thresholdalert level monitor202 begins monitoring the sensor information supplied by the sensor(s)210 that collect the abnormal activity usage attributes. As described above, a high threshold alert level is used when the user is in a safe environment and unlikely to be threatened by danger (e.g., assault) or a health threat. Thus, thesafety monitor110A has a high threshold for sensor indications associated with abnormal activity (e.g., sensor indications that may indicate that an assault is taking place). In some examples, abnormal activities that may indicate a threat (such as an assault) is occurring include the portableelectronic device120A being dropped or thrown to the ground, theuser150A experiencing an accelerated heart rate, the user having an increased respiratory rate, the user screaming (or saying a code word used to signal distress or using a vocal tone that corresponds to the user being in distress), the user experiencing increased perspiration, etc. Some such abnormal activities can be detected by one or more of the sensor(s) including the biological sensor(s)210A, themicrophone210B, thecamera210C, the motion sensor(s),210E, etc. In some examples, detection of any one of the abnormal activities will cause a safety alert to be actuated. In some examples, detection of a threshold number of the abnormal activities will cause a safety alert to be actuated. In some examples, a safety alert will be actuated when one or more (or any combination) of the usage attributes associated with the abnormal activity reaches a threshold value (e.g., the user's pulse reaches or exceeds a threshold pulse rate, the user's voice volume reaches or exceeds a threshold decibel level, etc.). In some examples, the threshold value is a rate of change of a usage attribute (e.g., a rate at which a user's pulse increases or decreases over time, a rate at which a user's perspiration changes, a rate at which a user's voice level changes, etc.).
In some examples, when the threshold alert level has been met/satisfied (e.g., a required number of the abnormal activities and/or associated usage attributes have been detected), the example thresholdalert level monitor202 sends a signal to thesafety alert actuator204 which responds to the signal by actuating any or all of theoutput devices216 and/or any or all of thecommunication devices218. In some examples thesafety alert actuator204 causes one or more of the output devices to transmit a message summoning assistance, to record and/or live stream audio and/or video, to emit a loud sound, to transmit a notification to other portable electronic devices (e.g., the second and/or third portableelectronic device120B,120C) located within a geographical distance of the first portableelectronic device120A, etc. Thesafety alert actuator204 can be configured to actuate any of the output devices in any desired fashion to notify others of the user's need for assistance. In some examples, the pasthistory usage analyzer222 may be notified of the safety alert generated by thesafety alert actuator204. In some such examples, thehistory usage analyzer222 can respond by analyzing the current usage attributes of thecurrent usage detector220 and/or any other information from any other source, and make a determination in real-time as to which of theoutput devices216 and/orcommunication devices218 are to be actuated in response to the safety alert.
In some examples, the types ofoutput devices216 to be actuated by thesafety alert actuator204 vary depending on the current usage context (e.g., the location of the portableelectronic device120, the time of day, the day of the week, etc.) In some examples, the types of theoutput devices216 to be actuated by thesafety alert actuator204 depends on the threshold alert level existing at the time of the safety alert, the severity of the sensor outputs that caused the safety alert, etc. In some examples, the order in which the device outputs216 and/orcommunication devices218 are actuated and a manner in which the device outputs216 and/orcommunication devices218 are actuated can differ based on the threshold alert level existing at the time of the safety alert and/or outputs of the sensor(s)210. In some examples, thesafety alert actuator204 causes one of theoutput devices216 to supply a first message to one of thecommunication devices218. In some such examples, thesafety alert actuator204 causes thecommunication device218 to transmit the message to a governmental law enforcement agency, to a governmental paramedic/fire department, to a list of emergency contacts, etc. In some examples, the message is communicated via phone call, a text message, an email, a social media platform, a streaming video file, a streaming audio file, a voicemail, etc., In some such examples, the first message can identify a current location of the user, the identity of the user and information regarding the type of threat to which the user is exposed (e.g., “John Doe is located at the intersection of State and Main, may have been assaulted, and requires immediate assistance.”). The first message can also transmit any additional information about theuser150A and the portableelectronic device120A.
In some examples, thesafety alert actuator204 may additionally cause a second message (or other indication) to be provided to theuser150A via one of theoutput devices216. The second message can inform theuser150A of the transmission of the first message and can also provide theuser150A with the option to send a safety alert cancellation message to the recipients of the first message. In some examples, the user can select the safety alert cancellation via one of theinput devices214, thereby indicating that a false alarm has been generated. In response to the selection of the cancellation, thefalse alarm evaluator208 notifies thesafety alert actuator204. Thesafety alert actuator204 responds by causing one or more of theoutput devices216 and/orcommunication devices218 to transmit a cancellation message to the recipients of the first message, to cause a speaker to stop generating an audible alarm, to cause the alert to be rescinded, etc.
In some examples, the second message can simply instruct theuser150A to manually contact the recipients of the first message if the safety alert was a false alarm. In other examples, before sending the first message, thesafety alert actuator204 can cause one or more of theoutput devices216 to generate a user alert indicating that a safety alert has been detected and further asking the user to confirm the need to obtain assistance by activating an input device of the portableelectronic device120. When the user confirms the need to obtain assistance, thesafety alert actuator204 can cause one ormore output devices216 and/or thecommunication devices218 to contact one or more of the entities identified above for assistance (e.g., to send the first message).
In some examples, thesafety alert actuator204 can cause one or more theoutput devices216 to inform theuser150A that the safety alert has been detected and further informing theuser150A that, unless theuser150A instructs otherwise (e.g., within a time window such as5 seconds,10 seconds, etc.), a safety alert message will be transmitted to one or more of the entities identified above, an audible alarm will be generated, audio/voice data will be live streamed to other devices, etc. In the absence of a user input indicating that the first message should not be sent to one or more of the third parties who may provide assistance, thesafety alert actuator204 can cause one ormore output devices216 and/or thecommunication devices218 to contact one or more entities with a request for assistance as described above.
In some examples, the input indicating whether a safety alert is legitimate (or a false alarm) is received at thefalse alarm evaluator208. Thefalse alarm evaluator208 notifies thesafety alert actuator204 as to whether the safety alert is legitimate and thesafety alert actuator204 responds, in the manner described above. In addition, thefalse alarm evaluator208 supplies information identifying the legitimacy (or lack thereof) of the safety alert to the past usage history and data analyzer222 for use in improving, fine-tuning and/or updating one or more of the usage context profiles. In some examples, thepast usage analyzer222 may respond to the information supplied by thefalse alarm evaluator208 by modifying (e.g., changing from low to high) the threshold alert level corresponding to the usage context profile in the usage context profile storage. In some such examples, the pastusage history analyzer222 may modify (e.g., increase or decrease) the number of abnormal activity usage attributes to be met/satisfied before a safety alert is to be generated. In some examples, the pastusage history analyzer222 may change one or more of the types of usage attributes to be met/satisfied before a safety alert is to be actuated. In some examples, the pastusage history analyzer222 may modify threshold values associated with usage attributes to be reached or exceeded before the safety alert is to be actuated.
In some examples, the example pastusage history analyzer222 is configured to analyze information indicating whether a false alarm has been detected by the examplesafety alert actuator204 in addition to the past usage history information. In some such examples, the pastusage history analyzer222 may determine that a usage context previously assigned a low threshold alert level has resulted in the generation of one or more false alarms, and, in response, may change the threshold alert level to a high. In contrast, the pastusage history analyzer222 may determine that a usage context previously assigned a high threshold alert level has consistently resulted in the generation of legitimate safety alerts, and, in response, may change the threshold alert level to a low threshold alert level.
Thus, the examplefirst safety monitor110A ofFIG. 1 andFIG. 2 (and likewise the example second and third safety monitors110B,110C) determines a level of threat to which theuser150A of the portableelectronic device120A is exposed. Based on the level of threat, a detection of a combination of abnormal activity usage attributes, and a usage context, thesafety monitor110A generates a safety alert to automatically (e.g., without human assistance or approval) notify authorities, friends, and/or others of the user's need for immediate assistance, to stream audio and/or video to authorities, friends, and/or others, to cause one or more of the output devices216 (e.g., the speaker or a light device) to generate an alarm (e.g., emit a siren-like noise, flash a light), to transmit commands to devices in the vicinity of theuser150A (e.g., to transmit a command to actuate a stationary siren in the vicinity of the user, to transmit a command to actuate a street lamp in the vicinity of the user, to transmit a command (or message) to other portableelectronic devices150B,150C in the vicinity of theuser150A), etc. In some examples, a command transmitted from the first portableelectronic device120A to the second and/or third portableelectronic device120B,120C may cause the second and/or third portableelectronic device120B,120C to contact authorities on behalf of theuser150A.
As described above, the examplefirst safety monitor110A determines a set of usage contexts and corresponding usage context profiles based on current usage data collected by the first portableelectronic device120A, and also based on past usage data collected by the first portableelectronic device120A. In addition, thefirst safety monitor110A uses artificial intelligence, machine learning and/or a neural network to continuously fine-tune the usage contexts, the usage context profiles, the usage context profile attributes, the abnormal usage attributes, the criteria to be met by the abnormal usage attributes before a safety alert is warranted, etc., as additional usage data is collected. In some examples, thefirst safety monitor110A revises/fine-tunes the usage contexts, the usage context profiles, the usage context profile attributes, the abnormal usage attributes, the criteria to be met by the abnormal usage attributes before a safety alert is warranted, etc., based on information received from the electronically accessible services and information resources145 (e.g., the social medium platforms/services145A, the governmental services/databases145B, the private/commercial services/databases145C, the public services/databases145D, the communication network information centers145E, etc.). In some examples, thefirst safety monitor110A can additionally revise and/or fine-tune the usage contexts, the usage context profiles, the usage context profile attributes, the abnormal usage attributes, the criteria to be met by the abnormal usage attributes before a safety alert is warranted, etc., based on information received from the remote safety manager130 (seeFIG. 1 andFIG. 3). In some examples, as described further below, theremote safety manager130 revises and fine-tunes the usage contexts, the usage context profiles, the usage context profile attributes, the abnormal usage attributes, the criteria to be met by the abnormal usage attributes before a safety alert is warranted, etc., and supplies the revised/fine-tuned information to thefirst safety monitor110A for use in operating. In some such examples, the revised/fine-tuned information can be supplied by theremote safety manager130 to the example past usage history and data analyzer222 of thesafety monitor110A. In some such examples, theremote safety manager130 may revise a usage context profile and a corresponding threshold alert level currently in use at thesafety monitor110A. In some such examples, theremote safety manager130 may cause the past usage history and data analyzer222 to supply the revised threshold alert level and any other relevant information directly to the example threshold alert level adjuster221 for delivery to the thresholdalert level monitor202 for immediate use in monitoring the safety of theuser150A. In some examples, changes to the threshold alert level includes changes to the abnormal activity usage attributes to be monitored, changes to the levels associated with the abnormal activity usage attributes, changes to the number of abnormal activity usage attributes that will result in a safety alert actuation, etc. In some examples, the usage contexts, the usage context profiles, the usage context profile attributes, the abnormal usage attributes, the criteria to be met by the abnormal usage attributes before a safety alert is warranted, etc., are revised and/or fine-tuned by either or both of thefirst safety monitor110A and theremote safety manager130. In some examples, the revising/fine-tuning of the usage context profiles (by either of theremote safety manager130 and/or thefirst safety monitor110A) occurs in real-time as additional usage data and/or data is received from electronically accessible services and information resources145 (e.g., the social medium platforms/services145A, the governmental services/databases145B, the private/commercial services/databases145C, the public services/databases145D, the communication network information centers145E, etc.), other portable electronic devices, etc.
In some examples, theexample safety monitor110A includes an examplethreshold override device228. In some such examples, theuser150A can use one of theexample input devices214 of the example portableelectronic device120A to manually activate thethreshold override device228. In some such examples, theuser150A activates thethreshold override device228 in response to feeling threatened in an environment or feeling unwell. In response to actuation of thethreshold override device228, thesafety alert actuator204 disregards the current threshold alert level and the associated abnormal activity usage attributes and instead uses, for example, a first default threshold alert level that corresponds to one or more default abnormal activity usage attributes. When the first default abnormal activity usage attribute is detected, the thresholdalert level monitor202 signals thesafety alert actuator204 which in turn actuates theappropriate output devices216 and/orcommunication devices218 to summon assistance on behalf of theuser150A.
In some examples, when theuser150A has personal safety concerns (e.g., when walking alone on a poorly lit street in a high crime area), theuser150A actuates thethreshold override device228 by pressing an input button, touching a touch screen, speaking a phrase into the microphone, etc. In some examples, in addition to actuating the thresholdalert override device228, theuser150A indicates whether the threshold alert level is to be downgraded or upgraded. In some examples, if the threshold alert level is to be upgraded, thethreshold override device228 causes the thresholdalert level monitor202 to change the current threshold alert level (e.g., high or low) to a critical threshold alert level (also referred to as a first default threshold alert level). When in the critical threshold alert level, the thresholdalert level monitor202 causes the safety alert to be actuated when one or more critical abnormal activity usage attributes are detected. In some examples, the critical abnormal activity usage attribute corresponds to the portableelectronic device120A being dropped or thrown, tossed, etc., by theuser120. In some examples, the critical abnormal activity usage attribute indicating that the portableelectronic device120A has hit the ground may indicate that the falling of the device corresponds to the user falling down, (e.g., when the portableelectronic device120A was stored in an article of clothing worn by the user at the time that the usage attribute was detected). In some such examples, information supplied by the motion detectors (e.g., the accelerometers, the gyroscopes, etc.) is monitored by the thresholdalert level monitor202. When the information supplied by the motion detectors indicates the portableelectronic device120A has been dropped or thrown, the thresholdalert level monitor202 causes thesafety alert actuator204 to actuate one or more of the output devices to automatically summon assistance on behalf of theuser150A. In some such examples, theuser150A need not make any phone call, press any buttons, and/or speak any particular phrase; all actions that can be difficult to do when under attack. Instead, the user need only drop the portable electronic device. Likewise, if the user is attacked and the portableelectronic device110A falls to the ground, the safety alert will automatically be actuated.
In some examples, the critical abnormal activity usage attribute corresponds to the portableelectronic device120A being tightly gripped by theuser150A. In some such examples, information supplied by a pressure sensor is monitored by the thresholdalert level monitor202. When the information supplied by the pressure sensor indicates the portableelectronic device120A has been gripped tightly (e.g., the user's grip tightens), the thresholdalert level monitor202 causes thesafety alert actuator204 to actuate one or more of the output devices to automatically summon assistance on behalf of theuser150A. In some such examples, theuser150A need not make any phone call, press any buttons, and/or speak any particular phrase; all actions that can be difficult to do when under attack. Instead, theuser150A need only squeeze the portableelectronic device120A tightly enough (with more than a threshold amount of force) to actuate a pressure sensor. In some such examples, the pressure sensor may be embedded in the portable electronic device. In some such examples, the pressure sensor may be embedded in a case in which the portable electronic device is held or in a sheet of material wrapped around a water bottle or other similar object carried by the user. In some such examples, the pressure sensor includes Bluetooth communication capabilities and transmits a Bluetooth signal indicating the pressure sensor has been actuated to the Bluetooth transceiver of the portableelectronic device120. In some such examples, the thresholdalert level monitor202 monitors the Bluetooth transceiver for an input signal indicating that the pressure sensor has been actuated and responds to such a signal by causing thesafety alert actuator204 to actuate the set of output devices.
In some examples, theuser150A can manually activate thethreshold override device228 when the threshold alert level indicates the user may be in danger (e.g., the threshold alert level is low) yet theuser150A is in a safe environment. In some such examples, theuser150A indicates that the threshold alert level is to be downgraded. In some examples, if the threshold alert level is to be downgraded, thethreshold override device228 causes the thresholdalert level monitor202 to change the current threshold alert level (e.g., high or low) to the second default threshold alert level. In some such examples, thesafety alert actuator204 disregards the current threshold alert level and the associated abnormal activity usage attributes and instead uses the second default threshold alert level that corresponds to one or more second default abnormal activity usage attributes.
The example sensor(s) can be carried by the example portableelectronic device120A or can be carried by other items/devices associated with theuser150A (e.g., earrings, clothing, watches, jewelry, an automobile, a case holding the portable electronic device, etc.) and/or at locations that the user frequents (e.g., the user's home, the user's place of employment, the user's health club, the user's school, etc.). In some examples, the sensor(s)211 carried by items/devices other than the portableelectronic device120A include a communication mechanism to transmit sensed information to the portableelectronic device120. In some such examples, the communication mechanism can be implemented using any types of wireless communication technology (e.g., Bluetooth, RFID, cellular telephony, satellite telephony, etc.). In some examples, the sensor(s) are coupled to and communicate via an Internet of Things. In some examples, the off-device sensor(s)211 include biological sensor(s) (e.g., pulse sensor, body temperature sensor, etc.), environmental sensor(s) (e.g., temperature sensor, smoke sensor, liquid sensor, audio sensor, video sensor, light sensor, etc.), motion sensor(s) (e.g., gyroscopes, accelerometers, etc.), location sensor(s), etc. The sensor(s)210 may be native to the portableelectronic device110A or may be added (e.g., an after-market product) to the portableelectronic device110A. Likewise, the sensor(s)211 may be native to the other portable devices by which the sensor(s)211 are carried or may be added (e.g., an after-market product).
The example on-device sensor(s)210A-210H, and the off-device sensors218 can include apparatus that both detects information and that converts the information to a form suitable for usage by thesafety monitor110A. For example, the motion sensor(s)210 may detect a movement and may supply information identifying the magnitude, direction, speed, etc., of the movement to thesafety monitor110A. Likewise, the location sensor(s)210H may detect satellite signals and use the satellite signals to determine a location. The location sensor(s)210H transmits the location information to thesafety monitor110A. Similarly, the audio sensor(s)/microphone210B may detect sound and perform language processing on the sound to detect spoken words. The audio sensor(s)/microphone210B transmit the words to thesafety monitor110A. Likewise, any of thesensors210A-210H may process raw data to generate information to be transmitted to thesafety monitor110A. In some examples, the raw data is supplied by the sensor(s)210A-210H to thesafety monitor110A and thesafety monitor110A can convert the raw data to a suitable format.
In some examples, any of the information communicated from/to any of the example thresholdalert level monitor202, the examplesafety alert actuator204, the examplefalse alarm evaluator208, the examplethreshold override device228, the example input sensor(s)210A-210H, theexample input devices214, theexample output devices216, and/or theexample communication transceivers218 is controlled by theexample communication controller219 coupled to the examplefirst interface bus230.
FIG. 3 is a block diagram of an example implementation of the exampleremote safety manager130. In some examples, theremote safety manager130 includes an example pastusage history collector302, an example supplemental pastusage history analyzer304, an example currentusage data collector306, an example currentusage data analyzer308, an example portabledevice query engine310, an example remote threshold alert level adjuster311, an example remote thresholdalert level monitor312, an example remotesafety alert actuator314, an example externalsource data collector316, an example external source data analyzer318, an example real-time event analyzer320, an exampleassistance request manager322, an example communicationnetwork data collector324, and anexample communication controller326, an example usagecontext history collector328, an example supplemental usagecontext history analyzer330, an example usage context profile collector/analyzer332, example storage(s)334, and an examplesecond interface bus336. In some examples, theexample communication controller326 controls communications occurring on thesecond interface bus336.
In some examples, theremote safety manager130 enhances and supplements the safety monitoring functionality of the example first, second, and third safety monitors120A,120B,120C (seeFIG. 2). In some such examples, theremote safety manager130 receives, via a communication network(s)144, information from the safety monitors (e.g., the first, second and third safety monitors120A,120B,120C), and also collects (via the communication network(s)144) information from a variety of external electronically accessible source145 (e.g., the example social medium platforms/services145A, the example governmental services/databases145B, the example private/commercial services/databases145C, the example public services/databases145D, the example communication network information centers145E, etc.). In some examples, the example externalsource data collector316 is responsible for collecting/receiving the external source data via a subscription, an information publishing service, periodic and/or aperiodic queries, etc. In some examples, the externalsource data collector316 is equipped with user login/account information that gives the externalsource data collector316 access to particular ones of theexternal data sources145. Theremote safety manager130 uses the collected/received information to further evaluate the safety/security of the respective portable electronic device users (e.g., thefirst user150A, thesecond user150B, third user150C, etc.) (SeeFIG. 1) and to supplement the functionality of the safety monitors (e.g., the first, second, and third safety monitors120A,120B,120C) in the manner described below. In some examples, one or more other devices associated with theuser150A (e.g., the example wearable sensor(s)211A (a smartwatch), the example stationary sensor(s)211B, sensor(s) disposed on other portable electronic devices211C, etc.,) also transmit information to theremote safety manager130. In some such examples, theremote safety manager130 is capable of communicating directly with such other devices and querying such devices for information.
In some examples, the example remote threshold alert level monitor312 tracks the threshold alert level corresponding to a current context profile in use at theremote monitor110A. In some such examples, the remote thresholdalert level monitor312 may replicate adjustments to the threshold alert level made by the threshold alert level monitor202 (seeFIG. 2) of thesafety monitor110A. In some examples, the example remote threshold alert level adjuster311 may adjust the threshold alert level based on information received from one or more of theexternal data sources145 and/or one or more other portable electronic devices (e.g., the second portableelectronic device120B, the third portableelectronic device120C). In some examples, the remote thresholdalert level monitor312 monitors any of the current usage attributes supplied by thesafety monitor110A, and the external source data to determine when the threshold alert level has been satisfied (and/or is to be adjusted). In some examples, remote thresholdalert level monitor312 monitors the current usage attributes supplied by thesafety monitor110A, the external data supplied by theexternal data sources145, and/or external data supplied by other safety monitors (e.g., thesecond safety monitor110B, thethird safety monitor110C) and notifies the remote threshold alert level adjuster311 when the threshold alert level is to be adjusted based on both types of information. In response, the remote threshold alert level adjuster311 adjusts the threshold alert level. The remote thresholdalert level monitor312 determines when the threshold alert level has been satisfied (based on sensor information and/or external source data) and notifies the remotesafety alert actuator314 that an alert is to be actuated. In some examples, the remote thresholdalert level monitor312 and the remotesafety alert actuator314 notify the threshold alert level monitor202 (seeFIG. 2) and the safety alert actuator204 (seeFIG. 2) of thesafety monitor110A when the threshold alert level is adjusted and/or a safety alert has been actuated. In some examples, the thresholdalert level monitor202 and/or thesafety alert actuator204 incorporate the threshold alert level and safety alert information into the safety monitoring operations performed by thesafety monitor110A.
In some examples, the pastusage history collector302 collects past usage history data from thesafety monitor120A, the currentusage data collector306 collects current usage data from thesafety monitor120A, and the example usage context history collector/analyzer328 collects usage context profile data from theremote safety monitor120A. As described above, the usage context profile data, the past usage history data, and/or the current usage data can include the user's emergency contact information, the user's call history, the user's movement data, the user's location information, the user's browser history, the user's exercise history, the user's medical information, the routines (e.g., daily, weekly, monthly (or aperiodic) routines) the user's calling habits, texting habits, media access habits, web-surfing habits, social media contacts, social media habits, restaurant preferences, all (or some) of the information supplied by the on-device sensor(s)210A-210H, and the off-device sensor(s)211A-211C, and/or any other information the users (e.g., thefirst user150A, thesecond user150B, the third user150C) agree to share. In some examples, the amount of information shared by the users may be identified in service level agreements between the users and the operators of thesafety system100.
In some examples, the example supplemental usagecontext history analyzer330, the example supplemental pastusage history analyzer304, the externaldata source analyzer318, and the example current usage data analyzer308 of the exampleremote safety manager130 analyze the collected information (collectively or individually) and, based on the analyses, generate and/or revise/update usage context profiles and/or generate and/or revise/update threshold alert levels to be associated with any of the usage context profiles. In some examples, the usage context profiles are further generated/revised/updated based on external source data. In some such examples, thecommunication controller326 transmits the revised/updated usage context profiles to thesafety monitor110A for usage by thesafety monitor110A in the manner described above. In some examples, the supplemental pastusage history analyzer304, the supplemental usagecontext history analyzer330, the usage context profile collector/analyzer332, the externaldata source analyzer318, and/or the currentusage data analyzer308, may use machine learning techniques, neural networks, artificial intelligence, programmed logic, etc., to analyze the supplied information. In this manner, theremote safety manager130 uses the on-going collection of information from thesafety monitor110A as feedback in understanding (and even predicting) the habits, routines, preferences, etc., of theuser150A.
In some examples, the currentusage data analyzer308 analyzes the current usage data collected by the currentusage data collector306 and compares the current usage data to the usage context profiles obtained by the example usage context profile collector/analyzer332 to identify a usage context profile having a usage context that corresponds to the current usage data. When a corresponding usage context profile is identified, the current usage data analyzer308 extracts the threshold alert level, corresponding abnormal activity usage attributes to be monitored in connection with the current usage, etc. from the corresponding usage context profile and supplies the extracted information to the remote thresholdalert level monitor312 for monitoring the safety of theuser150A.
In some examples, the exampleremote safety manager130 and/or theexample safety monitor110A (seeFIG. 1) also use information supplied by one or more external data sources145 (e.g., the example social media services/platforms145A, the example government services/databases145B, the example private/commercial services/databases145D, the example communication network/information control centers145E, and/or information supplied by other portable electronic devices (e.g., the second portableelectronic device120B, the third portableelectronic device120C, etc.). In some such examples, thesafety monitor110A and/or theremote safety manager130 accesses theexternal data sources145 to obtain information about, for example, locations occupied by the portableelectronic device120A during the daily routine of theuser150A. In some such examples, one or more of the external data sources145 (e.g., law enforcement agencies, online message boards, real estate websites, real estate agencies, crime watch websites, etc.) provide data identifying locations having a high incidence of violent crimes and/or identifying locations having a low incidence of violent crimes. In some examples, thesafety monitor110A and/or theremote safety manager130 use the crime statistics to adjust the threshold alert levels associated with the usage context profiles associated with the locations and/or to generate any of the information included in the usage context profiles. In some examples, theexternal data sources145 supply information to thesafety monitor110A and/or theremote safety manager130 indicating that other portable electronic device users (e.g., thesecond user150B, the third user150C, etc.) have reported (at an earlier time) a location as being potentially dangerous.
In some examples, theexternal data sources145 and/or the safety monitors110B,110C supply information to thesafety monitor110A and/or theremote safety manager130 indicating that an event happening in real-time is causing a location to be a high risk area (e.g., a riot, a shooting, a car accident, a terrorist event, a fire, a natural disaster, an explosion, a mass transit accident, etc.). In some such examples, the examplesocial media platform145A may determine that numerous users of the platform have posted information concerning such an event in a location currently occupied by theuser150A. In some such examples, thepublic utility145D may notify thesafety monitor110A or theremote safety manager130 that street lamps on a street currently being traversed by theuser150A are inoperable due to an electricity outage (thereby possibly increasing risk to theuser150A). In some examples, theexternal data sources145 may include alaw enforcement agency145B. In some such examples, the law enforcement agency may supply information identifying a crime (e.g., a shooting, a mugging, a riot, etc.) happening in real-time near theuser150A (e.g., within a threshold distance of theuser150A, within a same building as theuser150A, at a same venue as theuser150A, etc.). The real-time events described herein represent only a few of the many types of real-time events that can be detected and reported by an external source to theremote safety manager130.
In some such examples, any or all of the real-time event information supplied by one or more of theexternal data sources145 to theremote safety manager130 is supplied to the example real-time event analyzer320. The real-time event analyzer320 can respond by causing the remotesafety alert actuator314 to generate an alert, or by causing the example remote threshold alert level adjuster311 to adjust the threshold alert level (either up or down depending on the real-time event information). In some examples, theremote safety manager130 analyzes the external data supplied by theexternal data sources145 to evaluate the criticality of external data and, when found to be of a highly critical nature, to immediately transmit the critical information to thesafety monitor110A for use in revising/fine-tuning the threshold alert levels associated with one or more usage context profiles that may be affected by the information. In some examples, the past usage history and data analyzer222 (seeFIG. 2) of theexample safety monitor110A (seeFIG. 2) receives the critical information and uses the information to revise/fine-tune the threshold alert levels associated with one or more of the usage context profiles affected by the information. In some examples, when the external data is not critical, theremote safety manager130 may transmit the information to thesafety monitor110A at a later time. In some examples, theremote safety manager130 filters the external data from theexternal data sources145 and only supplies information relevant to theportable device120A to thesafety monitor110A.
As described above, in some examples, the remotesafety alert actuator314 actuates a safety alert based on information supplied by thesafety monitor110A, information supplied by one or more of theexternal data sources145 and/or information supplied by one or more other safety monitors110B,110C. In some such examples, the remotesafety alert actuator314 notifies theassistance request manager322 which responds by summoning assistance from law enforcement agencies, fire departments, private security firms, nearby portable device users, emergency contacts associated with the electronicportable device120A, a social media site, etc.) In some examples the summons for assistance is transmitted by thecommunication controller326 to the communication network(s)144 for transmission to the intended recipients. The summons for assistance can include the identity of theuser150A, the location of theuser150A, information about the type of danger confronting theuser150A, information about traffic conditions in the vicinity of the user, etc. The information included in the summons can be extracted from the current usage data (or any other data) collected by the example currentusage data collector306 and/or from the communication network information/control centers145E (e.g., the communication network information/control centers can supply the location of the portable electronic device) or any of theexternal data sources145. In some examples, theassistance request manager322 may also (or instead) cause instructions to be transmitted to thesafety monitor110A to actuate one or more of the example output devices216 (seeFIG. 2) of the portableelectronic device120A.
In some examples, the example portabledevice query engine310 sends queries tosafety monitor110A. In some examples, the queries include requests for additional usage data, requests to be presented to theuser150A regarding a current context in which the portableelectronic device120A is being used, inquiries to be presented to theuser150A about the user's current state of safety (e.g., whether the user feels threatened or safe, etc.). Any of the information supplied by thesafety monitor110A is supplied to one or more of the real-time event analyzer320, the supplemental usagecontext history analyzer330, the example supplemental pastusage history analyzer304, the example currentusage data analyzer308, etc., for analysis, and if needed, adjustment of a usage context profile, adjustment of a threshold alert level, actuation of a safety alert, etc.
In some examples, the safety system100 (seeFIG. 1) includes multipleremote safety managers130 disposed at any of a variety of locations ((e.g., in the cloud, at a communication services provider facility, at a network gateway, etc.) and includes some or all of the components ofFIG. 3. In some examples, the multipleremote safety managers130 may be operable at a same time or at different times, or more of the multipleremote safety managers130 may be used in the event that a primary multipleremote safety manager130 fails, and/or the primary multipleremote safety managers130 may operate in a distributed (e.g., different ones of the multipleremote safety managers130 perform different ones of operations described above).
In some examples, theremote safety manager130 supplies information to the one or moreexternal data sources145. In some such examples, theremote safety manager130 may supply usage data received from any of the example safety monitors (e.g., thefirst safety monitor110A, thesecond safety monitor110B, thethird safety monitor110C, etc.) to theexternal data sources145. Example usage data supplied to theexternal data sources145 can include any of the past usage history data and/or current usage data (e.g., sensor-supplied information, information supplied by one or more of the input devices, information about the device usage, etc.). In some examples, theremote safety manager130 evaluates (analyzes, aggregates, tallies, identifies trends, etc.) the usage data, real-time event data, external source data, data received from the other portableelectronic devices120B,120C to identify on-going events or make predictions of future events (e.g., to identify/predict areas of high/low crime, to identify/predict the occurrence of natural disasters, to identify crowds of people, to identify/predict a riot, to identify/predict a mass transit event, to identify/predict an electricity outage, to identify/predict a streetlight outage, etc.). Theremote safety manager130 can generate reports containing the evaluations/predictions and transmit the reports to any of theexternal data sources145 or any other desired entity.
In some examples, the real-time event analyzer320 is configured to receive real-time event data from the externalsource data collector316. When the real-time event analyzer320 determines that theuser150A is threatened or otherwise in jeopardy based on the real-time event data, the real-time event analyzer320 actuates the remotesafety alert actuator314 which responds by summoning assistance (or actuating devices (e.g., sirens, surveillance cameras, etc.) in the vicinity of the portableelectronic device120A) in the manner described above.
In some examples, the exampleremote safety manager130 acts as a back-up resource for thesafety monitor110A when thesafety monitor110A becomes inoperable. In some such examples, thesafety monitor110A may be operating at a low threshold alert level when thecommunications controller326 of theremote safety manager130 determines that connectivity with thesafety monitor110A has been lost. In some such examples, thecommunications controller326 can notify the remote safety alert actuator314 (and/or the remote threshold alert level monitor312) which can respond by actuating a safety alert. In some examples, before actuating a safety alert in response to losing connectively, the remote thresholdalert level monitor312 may evaluate, for example, a battery charge usage attribute received from thesafety monitor110A prior to the loss of connectivity. If the battery charge attribute was very low when connectivity was lost, the remote thresholdalert level monitor312 may, instead of actuating a safety alert, cause the remotesafety alert actuator314 to issue a “possible safety alert.” In response to the “possible safety alert,” the exampleassistance request manager322 can respond by transmitting a message to one or more sources of assistance indicating that theuser150A is possibly in danger and providing any additional information such as, the current location of theuser150A, the circumstances that indicate theuser150A is possibly in danger, etc.). As used herein, sources of assistance include any remote or near-by person, authority, agency (private or public), media, etc., that may be able to render assistance to theuser150A.
In some examples, theexample user150A enters into a service level agreement with an operator of thesafety system100. The service level agreement can identify information about the user's portableelectronic device120A, types of attributes to be monitored, types of information to be shared with external data sources, types of assistance to be obtained in the event of an emergency, etc. The service level agreement can additional identify other devices owned/operated by theuser150A that will provide data to (and/or otherwise be accessible to) theremote safety manager130.
Thesafety system100, theremote safety manager130 and thesafety monitor110A are generally described as being used to monitor the safety of the user of a portable device and to summon assistance on behalf of theuser150A when needed. The safety of the user is not limited to situations in which the user is subject to (or at risk of) an assault by another person or entity, but can also include monitoring for situations in which the safety of the user is in peril due to health related issues (e.g., the biological sensor(s) indicate theuser150A is not breathing, theuser150A is suffering a heart attack or cardiac arrest, theuser150A is having an asthma attack, theuser150A is experiencing anaphylactic shock, theuser150A has been injured in a car accident, the user has fallen from a great height, the user has fallen and has not gotten back up, etc.
In some examples, instead of supplementing and/or replicating the safety monitoring functionality of the example first, second, and third safety monitors120A,120B,120C (seeFIG. 2), the exampleremote safety manager130 performs the bulk of data collection and data analysis whereas the first, second, and third safety monitors120A,120B,120C primarily operate to monitor current usage attributes supplied via the sensors210 to determine whether a threshold alert level has been satisfied. In some such examples, theremote safety manager130 is responsible for collecting data from theexternal data sources145 and for collecting usage data and usage history from the first, second, and third safety monitors120A,120B,120C of the first, second and third portableelectronic devices110A,110B,110C. In some such examples, theremote safety manager130 uses any of machine learning, artificial intelligence, neural networks, programmed logic, etc. to analyze the collected data and to develop a set of usage context profiles for each of the first, second, and third safety monitors120A,120B,120C. Theremote safety manager130 supplies the usage context profiles to the first, second, and third safety monitors120A,120B,120C for usage in monitoring the safety of theuser150A in the manner described above (e.g., depending on the current usage attributes, a corresponding usage context profile and a corresponding threshold alert level are identified, and the usage attributes associated with the threshold alert level are monitored to determine whether the corresponding threshold alert level has been satisfied).
In some examples, the exampleremote safety manager130 can commandeer control of (and/or request information from) sensor(s) disposed off of the first, second, and/or thirdportable devices120A,120B,120C that are located in proximity of theusers150A,150B,150C. Such off-device sensors can include, for example, a surveillance camera, a surveillance microphone, a fire alarm, a heat sensor, a smoke sensor, a motion sensor, etc. In some examples, theremote safety manager130 analyzes information collected from the sensor(s) to determine if an abnormal activity is detected and, if so, actuates a safety alert. In some such examples, theremote safety manager130 can take control of devices in the vicinity of theuser150A when a safety alert is actuated (e.g., to transmit a command to actuate a stationary siren in the vicinity of the user, to transmit a command to actuate a street lamp in the vicinity of the user, to transmit a command (or message) to other portableelectronic devices150B,150C in the vicinity of theuser150A), etc. In some examples, the exampleremote safety manager130 can commandeer control of (and/or request information from) sensor(s) disposed off of the first, second, and/or thirdportable devices120A,120B,120C that are located in proximity of theusers150A,150B,150C in response to any of the first, second, and/or thirdportable devices120A,120B,120C coming within a threshold distance of the such sensors. In some examples, thesafety manager130 requests control of such sensors via theassistance request manager322.
In some examples, the safety monitoring functionality of thesafety system100 is performed in a distributed manner that relies primarily upon the monitoring functionality of the example first, second, and third safety monitors120A,120B,120C (seeFIG. 2). In some such examples, the first, second, and third safety monitors120A,120B,120C perform the data collection, analysis and monitoring operations described with reference toFIG. 2. In some such examples, the first, second, and third safety monitors120A,120B,120C communicate with each other and with theexternal data sources145 to monitor the safety of the users150 and notify authorities (and/or others) when assistance is required.
In some examples, the current usage data includes data collected at the sensors as well as data collected from any of the external data sources. In some examples, the safety manager and/or the safety monitor cause a safety alert to be actuated in response to external source data received from one or more of the external data sources as well as (or instead of) sensor-supplied information.
While an example manner of implementing thesafety system100 ofFIG. 1 is illustrated inFIG. 2, one or more of the elements, processes and/or devices illustrated inFIG. 2 may be combined, divided, re-arranged, omitted, eliminated and/or implemented in any other way. Further, the example thresholdalert level monitor202, the examplesafety alert actuator204, the exampleusage context generator206, the examplefalse alarm evaluator208, the example sensor(s)210A-210H, the example wearable sensor(s)211A, the example stationary sensor(s)211B, the example portable device sensor(s)211C, theexample clock212, the exampleuser input devices214, theexample output devices216, theexample communication devices218, theexample communication controller219, the example threshold alert level adjuster221, the examplecurrent usage detector220, the example pastuser history analyzer222, the example pastusage history storage224, the example usagecontext profile storage226, the examplethreshold override device228, and/or, more generally, the example first, second and third safety monitors110A,110B,110C and the example first, second and third portableelectronic devices120A,120B,120C, may be implemented by hardware, software, firmware and/or any combination of hardware, software and/or firmware. Thus, for example, any of the example threshold alert level monitor202, the example safety alert actuator204, the example usage context generator206, the example false alarm evaluator208, the example sensor(s)210A-210H, the example wearable sensor(s)211A, the example stationary sensor(s)211B, the example portable device sensor(s)211C, the example clock212, the example user input devices214, the example output devices216, the example communication devices218, the example communication controller219, the example threshold alert level adjuster221, the example current usage detector220, the example past user history analyzer222, the example past usage history storage224, the example usage context profile storage226, the example threshold override device228, and/or, more generally, the example first, second and third safety monitors110A,110B,110C and the example first, second and third portable electronic devices120A,120B,120C could be implemented by one or more analog or digital circuit(s), logic circuits, programmable processor(s), application specific integrated circuit(s) (ASIC(s)), programmable logic device(s) (PLD(s)) and/or field programmable logic device(s) (FPLD(s)). When reading any of the apparatus or system claims of this patent to cover a purely software and/or firmware implementation, at least one of the example first, second, and third safety monitors110A,110B,110C, the example first, second, and third portable electronic devices120A,120B,120C, the example threshold alert level monitor202, the example safety alert actuator204, the example usage context generator206, the example false alarm evaluator208, the example sensor(s)210A-210H, the example wearable sensor(s)211A, the example stationary sensor(s)211B, the example portable device sensor(s)211C, the example clock212, the example user input devices214, the example output devices216, the example communication devices218, the example communication controller219, the example threshold alert level adjuster221, the example current usage detector220, the example past user history analyzer222, the example past usage history storage224, the example usage context profile storage226, and/or the example threshold override device228, is/are hereby expressly defined to include a non-transitory computer readable storage device or storage disk such as a memory, a digital versatile disk (DVD), a compact disk (CD), a Blu-ray disk, etc. including the software and/or firmware. Further still, the example first, second, and third safety monitors110A,110B,110C and example first, second and third portableelectronic devices120A,120B,102C ofFIG. 1 may include one or more elements, processes and/or devices in addition to, or instead of, those illustrated inFIG. 2, and/or may include more than one of any or all of the illustrated elements, processes and devices.
While an example manner of implementing thesafety system100 ofFIG. 1 is illustrated inFIG. 3, one or more of the elements, processes and/or devices illustrated inFIG. 3 may be combined, divided, re-arranged, omitted, eliminated and/or implemented in any other way. Further, the example pastusage history collector302, the example supplemental pastusage history analyzer304, the example currentusage data collector306, the example currentusage data analyzer308, the example portabledevice query engine310, the example remote thresholdalert level monitor312, the example remotesafety alert actuator314, the example externalsource data collector316, the example externaldata source analyzer318, the example real-time event analyzer320, the exampleassistance request manager322, the example communicationnetwork data collector324, theexample communication controller326, the example contextusage history collector328, the example supplemental contextusage history analyzer330, the example usage context profile collector/analyzer332, the example storage(s)334, and/or, more generally, the exampleremote safety manager130, may be implemented by hardware, software, firmware and/or any combination of hardware, software and/or firmware. Thus, for example, any of the example pastusage history collector302, the example supplemental pastusage history analyzer304, the example currentusage data collector306, the example currentusage data analyzer308, the example portabledevice query engine310, the example remote thresholdalert level monitor312, the example remotesafety alert actuator314, the example externalsource data collector316, the example externaldata source analyzer318, the example real-time event analyzer320, the exampleassistance request manager322, the example communicationnetwork data collector324, theexample communication controller326, the example contextusage history collector328, the example supplemental contextusage history analyzer330, the example usage context profile collector/analyzer332, the example storage(s)334, and/or, more generally, the exampleremote safety manager130 could be implemented by one or more analog or digital circuit(s), logic circuits, programmable processor(s), application specific integrated circuit(s) (ASIC(s)), programmable logic device(s) (PLD(s)) and/or field programmable logic device(s) (FPLD(s)). When reading any of the apparatus or system claims of this patent to cover a purely software and/or firmware implementation, at least one of theexample safety manager130, the example pastusage history collector302, the example supplemental pastusage history analyzer304, the example currentusage data collector306, the example currentusage data analyzer308, the example portabledevice query engine310, the example remote thresholdalert level monitor312, the example remotesafety alert actuator314, the example externalsource data collector316, the example externaldata source analyzer318, the example real-time event analyzer320, the exampleassistance request manager322, the example communicationnetwork data collector324, theexample communication controller326, the example contextusage history collector328, the example supplemental contextusage history analyzer330, the example usage context profile collector/analyzer332, the example storage(s)334, and/or, more generally, and/or the exampleremote safety manager130, is/are hereby expressly defined to include a non-transitory computer readable storage device or storage disk such as a memory, a digital versatile disk (DVD), a compact disk (CD), a Blu-ray disk, etc. including the software and/or firmware. Further still, theexample safety manager130 ofFIG. 1 may include one or more elements, processes and/or devices in addition to, or instead of, those illustrated inFIG. 3, and/or may include more than one of any or all of the illustrated elements, processes and devices.
Flowcharts representative of example machine readable instructions for implementing the example first, second and third safety monitors110A,110B,110C ofFIG. 1 andFIG. 2 are shown inFIGS. 4-9, 11 and 12. In these examples, the machine readable instructions comprise a program for execution by a processor such as theprocessor1312 shown in theexample processor platform1300 discussed below in connection withFIG. 13. The program may be embodied in software stored on a non-transitory computer readable storage medium such as a CD-ROM, a floppy disk, a hard drive, a digital versatile disk (DVD), a Blu-ray disk, or a memory associated with theprocessor1312, but the entire program and/or parts thereof could alternatively be executed by a device other than theprocessor1312 and/or embodied in firmware or dedicated hardware. Further, although the example program is described with reference to the flowcharts illustrated inFIGS. 4-9, 11 and 12, many other methods of implementing the example first, second and third safety monitors110A,110B,110C may alternatively be used. For example, the order of execution of the blocks may be changed, and/or some of the blocks described may be changed, eliminated, or combined. Additionally, or alternatively, any or all of the blocks may be implemented by one or more hardware circuits (e.g., discrete and/or integrated analog and/or digital circuitry, a Field Programmable Gate Array (FPGA), an Application Specific Integrated circuit (ASIC), a comparator, an operational-amplifier (op-amp), a logic circuit, etc.) structured to perform the corresponding operation without executing software or firmware.
Flowcharts representative of example machine readable instructions for implementing the exampleremote safety manager130 ofFIG. 1 andFIG. 3 are shown inFIGS. 10, 11 and 12. In these examples, the machine readable instructions comprise a program for execution by a processor such as theprocessor1412 shown in theexample processor platform1400 discussed below in connection withFIG. 14. The program may be embodied in software stored on a non-transitory computer readable storage medium such as a CD-ROM, a floppy disk, a hard drive, a digital versatile disk (DVD), a Blu-ray disk, or a memory associated with theprocessor1412, but the entire program and/or parts thereof could alternatively be executed by a device other than theprocessor1412 and/or embodied in firmware or dedicated hardware. Further, although the example program is described with reference to the flowcharts illustrated inFIGS. 10, 11, and 12, many other methods of implementing the exampleremote safety manager130 may alternatively be used. For example, the order of execution of the blocks may be changed, and/or some of the blocks described may be changed, eliminated, or combined. Additionally, or alternatively, any or all of the blocks may be implemented by one or more hardware circuits (e.g., discrete and/or integrated analog and/or digital circuitry, a Field Programmable Gate Array (FPGA), an Application Specific Integrated circuit (ASIC), a comparator, an operational-amplifier (op-amp), a logic circuit, etc.) structured to perform the corresponding operation without executing software or firmware.
As mentioned above, the example processes ofFIGS. 4-12 may be implemented using coded instructions (e.g., computer and/or machine readable instructions) stored on a non-transitory computer and/or machine readable medium such as a hard disk drive, a flash memory, a read-only memory, a compact disk, a digital versatile disk, a cache, a random-access memory and/or any other storage device or storage disk in which information is stored for any duration (e.g., for extended time periods, permanently, for brief instances, for temporarily buffering, and/or for caching of the information). As used herein, the term non-transitory computer readable medium is expressly defined to include any type of computer readable storage device and/or storage disk and to exclude propagating signals and to exclude transmission media. “Including” and “comprising” (and all forms and tenses thereof) are used herein to be open ended terms. Thus, whenever a claim lists anything following any form of “include” or “comprise” (e.g., comprises, includes, comprising, including, etc.), it is to be understood that additional elements, terms, etc. may be present without falling outside the scope of the corresponding claim. As used herein, when the phrase “at least” is used as the transition term in a preamble of a claim, it is open-ended in the same manner as the term “comprising” and “including” are open ended.
Theprogram400 ofFIG. 4 begins atblock402 at which the examplecurrent usage detector220 of the exampleusage context generator206 obtains current usage data from any of the example sensor(s)210A-210H (e.g., location information from theexample location sensor210H, motion information from the example motion sensor(s)210E, etc.) time information from theexample clock212, date information from theclock212, and/or other usage information stored on the portableelectronic device110A (e.g., contacts information, web-usage history, call history, viewing habits, listening habits, etc.). Thecurrent usage detector220 supplies the obtained information to the past usage history storage224 (block404). The pastusage history analyzer222 analyzes the information stored in the pastusage history storage224 to determine (and/or fine tune) contexts in which the portableelectronic device120A is used (usage contexts) and corresponding usage context profile information (block406). In some examples, the corresponding usage context profile information includes a threshold alert level, a usage attribute, and abnormal activity usage attributes. In some examples, the pastusage history analyzer222 additionally uses data obtained from the remote safety manager130 (e.g., external source data from theexternal data sources145, results of analyses performed by any of the externaldata source analyzer318, the supplemental pastusage history analyzer304, the example supplemental usagecontext history analyzer330, the example currentusage data analyzer308, etc.) to determine (and/or fine tune) the usage contexts and to generate the corresponding usage context profiles. The pastusage history analyzer222 stores the usage context profiles in the usage context profile storage226 (block408). Thereafter, the process returns to theblock402 and is repeated until thesafety monitor110A is deactivated.
The process ofFIG. 4 is continuously, semi-continuously, periodically or aperiodically repeated such that the pastusage history analyzer222 continues to adjust/fine tune the usage context profiles based on the continuous or semi-continuous collection of past usage history data, external source data, sensor data, etc. In some examples, a set of default usage context profiles (e.g., a usage context profile corresponding to times when theuser150A is at home, a usage context profile corresponding to times when theuser150A is at work, a usage context profile corresponding to times when theuser150A is at a health club, etc.) can be initially stored in the usagecontext profile storage226 and then revised/fine-tuned as past usage history data is collected. In some examples, thesafety monitor110A can supply a user interface by which theuser150A can initially assign usage threshold alert levels to the usage context profiles.
Theprogram500 ofFIG. 5 begins atblock502 at which the example pastusage history analyzer222 of the usagecontext history generator206 supplies any of the current usage attributes collected by thecurrent usage detector220, the past usage history stored in the pastusage history storage224, and/or the context profiles stored in the usagecontext profile storage226 to theremote safety manager130. Theremote safety manager130 uses the supplied information to generate (and/or fine tune) the usage context profiles (block504). In some examples, theremote safety manager130 additionally uses data collected from any of the public, private, and/or governmental information sources to generate (and/or fine-tune) the usage context profiles. Theremote safety manager130 transmits the newly generated (or fine-tuned) usage context profiles back to theremote safety manager130 and causes the information to be stored in the usage context profile storage226 (block506). The process ofFIG. 5 is continuously, semi-continuously, periodically or aperiodically repeated such that the usagecontext history generator206 continues to adjust/fine tune the usage context profiles based on the continuous or semi-continuous collection of usage history data.
Theprogram600 ofFIG. 6 begins atblock602 at which the examplecurrent usage detector220 obtains current usage attributes from the example sensor(s)224, theclock212, and/or other information stored on the portableelectronic device120A (e.g., contacts information, web-usage history, viewing habits, listening habits, calling habits, texting habits, email usage habits, etc.) and, in some examples, information from theremote safety manager130. In some examples, the information from theremote safety manager130 can include any information from any of the external data sources145 (e.g., governmental, private/commercial, public and/or communication network).
The examplecurrent usage detector220 compares the current usage attributes to the usage attributes associated with one or more of the usage context profiles and identifies a context profile having a threshold number of usage attributes that match the current usage attributes (block604). Thecurrent usage detector220 causes the threshold alert level and the abnormal activity usage attributes associated with the matching usage context profile to be transmitted to the threshold alert level monitor202 (block606).
The example thresholdalert level monitor202 begins monitoring one or more of the abnormal activity usage attributes transmitted by the current usage context detector220 (block608). When a threshold number of the one or more abnormal activity usage attributes are detected, the threshold alert level monitor causes thesafety alert actuator204 to actuate one or more output devices and/or communication devices218 (block610). In some examples, the threshold number (and/or values) of abnormal activity usage attributes to be detected before a safety alert is to be actuated is based on whether the threshold alert level is high or low. In some examples, a high threshold alert level will require the detection of a greater number of the abnormal activity usage attributes than a low threshold alert level alert. In some examples, the values/levels corresponding to abnormal activity usage attributes associated with a high threshold alert level will be different than the values/levels corresponding to such attributes associated with a low threshold alert level. In some examples, when thecurrent usage detector220 transmits the threshold alert level and the abnormal activity usage attributes, thecurrent usage detector220 will also transmit an order in which the abnormal activity usage attributes are to be detected and/or respective threshold values (e.g., user's heartrate, acceleration of the user's heartrate, amount user is perspiring, change in user's perspiration level, etc.), that respective ones of the abnormal activity usage attributes are to achieve before the abnormal activity usage attributes are to be considered “detected.” Thereafter, theprogram600 returns to theblock602.
Theprogram700 ofFIG. 7 begins atblock702 at which the examplecurrent usage detector220 obtains current usage attributes from the example sensor(s)210, theclock212, and/or other information stored on the portableelectronic device110A (e.g., contacts information, web-usage history, viewing habits, listening habits, calling habits, texting habits, email usage habits, etc.). In some examples, the current usage attributes include an image or video clip and location information. Thecurrent usage detector220 supplies the information to theremote safety manager130 using any of theoutput devices216 and/or communication devices218 (block704). Theremote safety manager130 accesses the data collected from the external sources145 (e.g., a social media service/platform, an Internet search engine, any Internet-based information resource, etc. (e.g., Facebook, Google images, Instagram, Snapchat, Google reviews, Yelp, etc. using an account held by theuser150A and compares the image and/video clip obtained from thesafety monitor110A. In some examples, theremote safety manager130 determines that the image and/or video clip matches one or more images and/or video clips posted by other users of the social media service/platform. In some such examples, the matching images and/or video clips are associated with a location at which attendees are at risk of injury due to an on-going situation (e.g., a riot, detonation of an explosive in a public place, discharge of a firearm in a public place, a fire, etc.). In response to detecting the matching images/video clips and determining the user is at risk of injury due to the on-going situation, theremote safety manager130 may transmit one or more messages on behalf of the user (that includes a summons for assistance) to one or more of the user's emergency contacts, to the authorities, etc. In some examples, theremote safety manager130 may additionally or instead cause thesafety monitor110A of the portableelectronic device120A to transmit one or more messages on behalf of theuser150A and summoning assistance to one or more of the user's emergency contacts, to the authorities, etc. In some examples, theremote safety manager130 instead causes the threshold alert level monitor202 of thesafety monitor110A to be set to a low threshold alert level and/or a critical threshold alert level. Thereafter theprogram700 ends.
Theprogram800 ofFIG. 8 begins atblock802 at which the example thresholdalert level monitor202, in response to detecting an abnormal activity usage attribute, causes thesafety alert actuator204 to actuate theexample output devices216. In response, one or more of theoutput devices216 transmits a first message summoning assistance on behalf of theuser150A and/or causes one or more of theoutput devices216 of the portableelectronic device120A to emit an alarm, or take any other actions needed to alert others to the user's need for assistance, in the manner described above (block804). After transmitting the first message, thesafety alert actuator204 causes one of theoutput devices216 having display or audio generation capabilities to output a second message notifying the user that the first message has been transmitted (block806). In some examples, the second message also identifies the parties to whom the first message was transmitted. The second message can further provide the user with an option to identify the safety alert as a false alarm or as a legitimate alert. If theuser150A identifies the safety alert as a false alarm (block808) by, for example, entering an alarm cancellation code, saying an alarm cancellation phrases, etc., thesafety alert actuator204 responds by causing the one or more output devices to generate a false alarm message to the recipients of the first message (block810). In some examples, thesafety alert actuator204 instead (or additionally) responds by causing the display or speaker of the portableelectronic device120A to transmit a cancellation message instructing the user to contact the recipients of the first message to cancel the safety alert (also at block810). If the user indicates that the safety alert is legitimate (block812), the program ends. In some examples, theuser150A can indicate the alarm was legitimate by entering/speaking a “fake” cancellation code (at the block812) that will appear to outsiders as authentic but will in fact indicate that the user is under duress. In the event a “fake” cancellation code is detected, thesafety alert actuator204 does not cancel the safety alert and may also cause one of theoutput devices216 to output a “fake” message indicating the alert has been canceled. In some such examples, when a “fake” cancellation is detected, the authorities notified of the actuation of the safety alert may be further notified that the safety alert is associated with a critically high emergency.
Thefalse alarm evaluator208 also notifies the pastusage history analyzer222 of the actuation of the safety alert and provides information regarding whether the safety alert was legitimate or a false alarm (block814). The pastusage history analyzer222 uses the information to update/fine tune the usage context profiles (also block814). In some examples, if the safety alert is a false alarm and if the usage context profile being used when the false alarm was generated has caused a threshold number of false alarms in the past, the pastusage history analyzer222 may update/fine tune the usage context profile to make the usage context profile less likely to result in a false alarm. In some such examples, the pastusage history analyzer222 may remove one or more of the abnormal activity usage attributes from the usage context profile. As a result of removing the abnormal activity usage attribute from the usage context profile, the abnormal activity usage attribute will instead be treated as a normal usage attribute and, thus, will not result in actuation of a safety alert when detected. In some examples, the pastusage history analyzer222 can instead revise a criteria associated with an abnormal activity usage attribute in a manner that causes the criteria more difficult to meet.
If the safety alert actuation is not a false alarm, the pastusage history analyzer222 records any (and/or all) the information associated with the safety alert and further records that the safety alert was legitimate. In addition, the information regarding the legitimate safety alert is transmitted to the pastusage history analyzer222 for usage in fine-tuning the context profiles, abnormal activity usage attributes, threshold alert levels, etc. (also at block814). Thereafter theprogram800 ends.
Theprogram900 ofFIG. 9 begins atblock902 at which theexample safety monitor110A determines that theuser150A has caused the threshold alert level to be overridden and receives input regarding whether overriding the threshold alert level is to result in a downgrade or an upgrade of the threshold alert level. In some such examples, theuser150A can cause the threshold alert level to be overridden by selecting ormore input devices214 of the portableelectronic device120A and theuser150A can indicate whether the threshold alert level is to be downgraded or upgraded via one or more of theinput devices214. For example, thesafety monitor110A may cause a display and/or a speaker to present an option to override the threshold alert level and/or indicate whether an upgraded or downgrade threshold alert level is to be substituted for the existing threshold alert level. In some examples, the user's input to change the threshold alert level and the upgrade/downgrade information is provided to the examplethreshold override device228. The examplethreshold override device228 responds by causing the example thresholdalert level monitor202 to begin monitoring a set of abnormal activity usage attributes associated with the upgraded or downgraded threshold alert level (block904). In some examples, the thresholdalert level monitor202 identifies the set of abnormal activity usage attributes to be monitored by consulting the usagecontext profile storage226.
Thereafter, the example thresholdalert level monitor202, upon detecting the abnormal activity usage attribute being monitored and/or detecting that the abnormal activity usage attribute has reached a threshold value, the examplesafety alert actuator204 causes one or more of theexample output devices216 and/orexample communication devices218 to summon assistance on behalf of theuser150A in the manner described above (block906). Thereafter theprogram900 ends.
Theprogram1000 ofFIG. 10 begins atblock1002 at which theremote safety manager130 obtains, via the example communication network(s)144, information from theexample safety monitor120A. The obtained information can include current usage attributes detected at the example sensor(s)210, past usage history data, usage context profile information, device usage information (e.g., contacts information, web-usage history, viewing habits, listening habits, calling habits, texting habits, email usage habits, etc.) Theremote safety manager130 also receives information from external data sources145 (e.g., the example social medium platforms/services145A, the example governmental services/databases145B, the example private/commercial services/databases145C, the example public services/databases145D, the example communication network information centers145E, etc.) (block1004). In some examples, the example externalsource data collector316 is responsible for collecting/receiving the external source data via a subscription, an information publishing service, periodic and/or aperiodic queries, etc. In some examples, the example externalsource data collector316 of theremote safety manager130 is equipped with user login/account information that permits the externalsource data collector316 access to particular ones of theexternal data sources145. Any of the currentusage data analyzer308, the supplemental pastusage history analyzer304, the example supplemental usagecontext history analyzer330, the externaldata source analyzer318, the real-time event analyzer320, and/or the usage context profile collector/analyzer332 analyze the obtained information. In some examples, based on the obtained information and/or the analysis of the obtained information, and/or based on a default set of queries, the example portabledevice query engine310 transmits additional queries/requests for additional information that may be stored in the portableelectronic device110A and/or entered by theuser150A (block1008). Based on the analyses and the responses to the queries, the usage context profile updates/fine-tunes the usage context profiles (block1010). In some examples, the updated/fine-tuned usage context profiles are transmitted by theremote safety manager130 to thesafety monitor110A for storage in the example usage context profile storage226 (also block1010).
Referring still toFIG. 10, in some examples, the example remote thresholdalert level monitor312 analyzes the obtained information to identify a current monitoring threshold alert level in use at thesafety monitor110A (block1012). The remote thresholdalert level monitor312 also monitors the current usage attributes to determine whether any abnormal activity is detected (block1014). In some examples, in response to detecting an abnormal activity, the remote thresholdalert level monitor314 adjusts the threshold alert level and/or notifies the remotesafety alert actuator314 that a safety alert is to be actuated, in accordance with the usage context profile currently in use at thesafety monitor110A (block1016). In some examples, the remote thresholdalert level monitor312 detects an abnormal activity and, in response, notifies the example remote threshold alert level adjuster311. In some examples, the remote threshold alert level adjuster311 notifies the past usage history and data analyzer222 that the threshold alert level currently in use at thesafety monitor110A should be should be changed (e.g., upgraded or downgraded) without delay. In some such examples, the past usage history and data analyzer222 causes the threshold alert level adjuster221 to change the threshold alert level (or an aspect of the threshold alert level) currently being used by the thresholdalert level monitor202. Thus, theremote safety manager130 can dynamically adjust the threshold alert level, the threshold alert level values, the abnormal usage attributes to be monitored, the number of abnormal usage attributes required to actuate a safety alert, etc., in use at thesafety monitor110A. After theblocks1010, and1016, theprogram1000 returns to theblock1002 to continue updating the usage context profiles and to continue performing safety monitoring activities.
Theprogram1100 ofFIG. 11 and theprogram1200 ofFIG. 12 are intended to illustrate different ways in which thesafety monitoring system100 can respond to detection of a usage attribute that can be (but is not always) associated with an abnormal condition. Referring toFIG. 11, theprogram1100 begins at ablock1102 at which theexample safety monitor110A (seeFIG. 1 andFIG. 2) detects a concussive sound of a decibel level that is typically associated with detonation of an explosive device. Assuming the usage context is such that a concussive alert is evidence of danger to the user (e.g., the user is not at an amusement park, the concussive sound is not detected on July 4th, etc.), thesafety monitor110A also generates a safety alert (also block1102). In addition, thesafety monitor110A transmits the current usage attributes corresponding to the detection of the concussive sound, location information and information indicating that a corresponding safety alert was generated to the remote safety manager130 (block1104). Thesafety monitor110A may additionally supply any other information to theremote safety manager130. In response to receiving the information from thesafety monitor110A (block1106), theremote safety manager130 identifies other portable electronic devices (e.g., the second portableelectronic device120B, the third portableelectronic device120C) located near the first portableelectronic device110A (block1108). In some examples, other portable electronic devices near the first portable electronic device can include other portable electronic devices at a same location as the first portable electronic device, within a threshold distance of the first portable electronic device, at a same venue as the first portable electronic device, within a same building, etc. If the nearby portable electronic devices (e.g., the second portableelectronic device120B, the third portableelectronic device120C) have not generated a safety alert, theremote safety manager130 may attempt to query the second and third safety monitors110B,110C to determine whether the correspondingusers150B,150C are affected by the explosion and require assistance. If the corresponding first andsecond users150B,150C respond in the affirmative or do not respond at all due to, for example, a loss of connectivity, theremote safety manager130 actuates safety alerts on behalf of the second and third users (block1110), and theprogram1100 ends.
Referring toFIG. 12, theprogram1200 begins at ablock1202 at which theexample safety monitor110A (seeFIG. 1 andFIG. 2) detects a concussive sound of a decibel level that is typically associated with detonation of an explosive device. Assuming the usage context is such that a concussive alert can be (but is not necessarily) evidence of danger to theuser150A (e.g., the user is at an entertainment venue), thesafety monitor110A initially generates a safety alert. In addition, thesafety monitor110A transmits the current usage attributes corresponding to the detection of the concussive sound, location information, and information indicating that a corresponding safety alert was generated to the remote safety manager130 (block1204). Thesafety monitor110A may additionally supply any other information to theremote safety manager130. In response to receiving the information from thesafety monitor110A ((block1206), theremote safety manager130 identifies other portable electronic devices (e.g., the second portableelectronic device120B, the third portableelectronic device120C) located near the first portableelectronic device110A (block1208). In addition, theremote safety manager130 searches theexternal data sources145 for contextual information that might explain the concussive sound (block1210). In some examples, thesafety manager130 determines, when searching, that one or more of the nearby users has posted evidence online (e.g., Facebook, snapchat, Instagram) that they are witnessing a fireworks display. In some examples, theremote safety manager130 determines that a venue at which the users are located is hosting a rock band that uses pyrotechnics. In some such examples, theremote safety manager130 may query the users via the portableelectronic devices120B,120C to confirm that the concussive sound is benign (also block1210). Depending on the type of contextual information received in response to the searching and querying, theremote safety manager130 actuates a safety alert for the second and third safety monitors110B,110C or cancels the safety alert generated by thefirst safety monitor110A (block1212). Thereafter the program ends.
As described above, thesafety system100 ofFIGS. 1-3 monitor can be used to monitor the health and safety of a user. In some examples, thesafety system100 can further be used by a parent to track children and, when the system detects that a child is in distress, outside of a defined boundary and/or otherwise in need of assistance, the either the child or parent may then actuate a safety alert. Further, thesafety system100 may be used in the entertainment industry to gauge the reaction of an audience to a horror movie, for example. The system can track of audience members physical responses to the movie and detected cues that indicate the user if frightened (e.g., the user gripped an arm of a chair, the user jumped, the user screamed, etc.). The system can also be used in a large lecture room to track the response of students during a lecture. If the system determines that an audience member has not engaged/alert, the system can alert the lecturer who can choose to wake them up by sending a notification. Other such example implementations will be apparent to one of ordinary skill in the art.
FIG. 13 is a block diagram of anexample processor platform1300 capable of executing the instructions ofFIGS. 3-9, 11, and 12 to implement any of the example first, second andthird safety monitors110A ofFIGS. 1 and 2. Theprocessor platform1300 can be, for example, a server, a personal computer, a mobile device (e.g., a cell phone, a smart phone, a tablet such as an iPad™), a personal digital assistant (PDA), an Internet appliance, or any other type of computing device.
Theprocessor platform1300 of the illustrated example includes aprocessor1312. Theprocessor1312 of the illustrated example is hardware. For example, theprocessor1312 can be implemented by one or more integrated circuits, logic circuits, microprocessors or controllers from any desired family or manufacturer. The hardware processor may be a semiconductor based (e.g., silicon based) device. In this example, the processor implements the examplecurrent usage detector220, the example threshold alert level adjuster221, the example pasthistory usage analyzer222, the example thresholdalert level monitor202, the examplesafety alert actuator204, the examplefalse alarm evaluator208, the examplethreshold override device228, theexample communication controller219, and the exampleusage context generator206.
Theprocessor1312 of the illustrated example includes a local memory1313 (e.g., a cache). Theprocessor1312 of the illustrated example is in communication with a main memory including avolatile memory1314 and anon-volatile memory1316 via a bus1318. Thevolatile memory1314 may be implemented by Synchronous Dynamic Random Access Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUS Dynamic Random Access Memory (RDRAM) and/or any other type of random access memory device. Thenon-volatile memory1316 may be implemented by flash memory and/or any other desired type of memory device. Access to themain memory1314,1316 is controlled by a memory controller. The examplemain memory1314,1316 implements the example usagecontext profile storage226.
Theprocessor platform1300 of the illustrated example also includes aninterface circuit1320. Theinterface circuit1320 may be implemented by any type of interface standard, such as an Ethernet interface, a universal serial bus (USB), and/or a PCI express interface. In this example, theinterface circuit1320 implements the examplefirst interface bus230.
In the illustrated example, one ormore input devices1322 are connected to theinterface circuit1320. The input device(s)1322 permit(s) a user to enter data and/or commands into theprocessor1312 and further permit data to be sensed. The input device(s) can be implemented by, for example, an audio sensor, a microphone, a camera (still or video), a keyboard, a button, a mouse, a touchscreen, a track-pad, a trackball, isopoint and/or a voice recognition system. The input device(s)1332 implements the exampleuser input devices214 and the example sensor(s)210.
One or more output device(s)1324 are also connected to theinterface circuit1320 of the illustrated example. The output device(s)1324 can be implemented, for example, by display devices (e.g., a light emitting diode (LED), an organic light emitting diode (OLED), a liquid crystal display, a cathode ray tube display (CRT), a touchscreen, a tactile output device, a printer and/or speakers). Theinterface circuit1320 of the illustrated example, thus, typically includes a graphics driver card, a graphics driver chip and/or a graphics driver processor. The output device(s)1324 implement theexample output devices216.
Theinterface circuit1320 of the illustrated example also includes a communication device such as a transmitter, a receiver, a transceiver, a modem and/or network interface card to facilitate exchange of data with external machines (e.g., computing devices of any kind) via a network1326 (e.g., an Ethernet connection, a digital subscriber line (DSL), a telephone line, coaxial cable, a cellular telephone system, etc.). Theinterface circuit1320 implements theexample communication devices218.
Theprocessor platform1300 of the illustrated example also includes one or moremass storage devices1328 for storing software and/or data. Examples of suchmass storage devices1328 include floppy disk drives, hard drive disks, compact disk drives, Blu-ray disk drives, RAID systems, and digital versatile disk (DVD) drives. The mass storage device(s)1328 can implement the usagecontext profile storage226.
The codedinstructions1332 ofFIGS. 3-9, 11 and 12 may be stored in themass storage device1328, in thevolatile memory1314, in thenon-volatile memory1316, and/or on a removable tangible computer readable storage medium such as a CD or DVD.
FIG. 14 is a block diagram of anexample processor platform1400 capable of executing the instructions ofFIGS. 5, 7, 10, 11, and 12 to implement the exampleremote safety manager130 ofFIGS. 1 and 3. Theprocessor platform1400 can be, for example, a server, a personal computer, a mobile device (e.g., a cell phone, a smart phone, a tablet such as an iPad™), a personal digital assistant (PDA), an Internet appliance, or any other type of computing device.
Theprocessor platform1400 of the illustrated example includes aprocessor1412. Theprocessor1412 of the illustrated example is hardware. For example, theprocessor1412 can be implemented by one or more integrated circuits, logic circuits, microprocessors or controllers from any desired family or manufacturer. The hardware processor may be a semiconductor based (e.g., silicon based) device. In this example, the processor implements the example pastusage history collector302, the example supplemental pastusage history analyzer304, the example currentusage data collector306, the example currentusage data analyzer308, the example portabledevice query engine310, the example remote threshold alert level adjuster311, the example remote thresholdalert level monitor312, the example remotesafety alert actuator314, the example externalsource data collector316, the example externaldata source analyzer318, the example real-time event analyzer320, the exampleassistance request manager322, the example communicationnetwork data collector324, theexample communication controller326, the example contextusage history collector328, the example supplemental contextusage history analyzer330, the example usage context profile collector/analyzer332.
Theprocessor1412 of the illustrated example includes a local memory1413 (e.g., a cache). Theprocessor1412 of the illustrated example is in communication with a main memory including avolatile memory1414 and anon-volatile memory1416 via a bus1418. Thevolatile memory1414 may be implemented by Synchronous Dynamic Random Access Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUS Dynamic Random Access Memory (RDRAM) and/or any other type of random access memory device. Thenon-volatile memory1416 may be implemented by flash memory and/or any other desired type of memory device. Access to themain memory1414,1416 is controlled by a memory controller. In this example, themain memory1414,1416 implements the storage(s)334.
Theprocessor platform1400 of the illustrated example also includes aninterface circuit1420. Theinterface circuit1420 may be implemented by any type of interface standard, such as an Ethernet interface, a universal serial bus (USB), and/or a PCI express interface. Theinterface circuit1420 implements the examplesecond interface bus336.
In the illustrated example, one ormore input devices1422 are connected to theinterface circuit1420. The input device(s)1422 permit(s) a user to enter data and/or commands into theprocessor1412. The input device(s) can be implemented by, for example, an audio sensor, a microphone, a camera (still or video), a keyboard, a button, a mouse, a touchscreen, a track-pad, a trackball, isopoint and/or a voice recognition system. In this example, the input device(s)1422 can implement any of a set of input devices that can be added to theremote safety manager130 to permit system configuration, data entry, system maintenance, system control, etc.
One ormore output devices1424 are also connected to theinterface circuit1420 of the illustrated example. Theoutput devices1424 can be implemented, for example, by display devices (e.g., a light emitting diode (LED), an organic light emitting diode (OLED), a liquid crystal display, a cathode ray tube display (CRT), a touchscreen, a tactile output device, a printer and/or speakers). Theinterface circuit1420 of the illustrated example, thus, typically includes a graphics driver card, a graphics driver chip and/or a graphics driver processor.
Theinterface circuit1420 of the illustrated example also includes a communication device such as a transmitter, a receiver, a transceiver, a modem and/or network interface card to facilitate exchange of data with external machines (e.g., computing devices of any kind) via a network1426 (e.g., an Ethernet connection, a digital subscriber line (DSL), a telephone line, coaxial cable, a cellular telephone system, etc.). In this example, theinterface circuit1420 implements theexample communication controller326.
Theprocessor platform1400 of the illustrated example also includes one or moremass storage devices1428 for storing software and/or data. Examples of suchmass storage devices1428 include floppy disk drives, hard drive disks, compact disk drives, Blu-ray disk drives, RAID systems, and digital versatile disk (DVD) drives. In this example, the mass storage device(s)1428 implement the example storage(s)334.
The codedinstructions1432 ofFIGS. 5, 7, 10, 11, and 12 may be stored in themass storage device1428, in thevolatile memory1414, in thenon-volatile memory1416, and/or on a removable tangible computer readable storage medium such as a CD or DVD.
From the foregoing, it will be appreciated that example methods, apparatus and articles of manufacture have been disclosed that automatically summon assistance on behalf of a user when an abnormal activity associated with a threat to the safety and/or health of the user has been detected. Further, the disclosed methods, apparatus and articles of manufacture include machine learning technology that learns one or more routines of theuser150A and uses the learned routine information to better define the activities considered to be abnormal and to limit the detection of false alarms. Thus, the methods, apparatus and articles of manufacture disclosed herein, by eliminating the need for a user of a portable electronic device to take manual action to summon assistance, thereby enhancing the user's ability to obtain assistance when needed.
The following further examples are disclosed herein.
Example 1 is a safety monitor for use in a portable electronic device. The safety monitor of example 1 includes a usage context analyzer to determine a usage context in which the portable electronic device is used, the usage context determined based on a history of past usage information; a current usage detector to determine whether the portable electronic device is being used in the usage context at a current time, and, when the portable electronic device is determined to be used in the usage context at the current time, obtain a threshold alert level corresponding to the usage context, the threshold alert level indicating a degree of danger to which a user of the portable electronic device is exposed; a threshold alert level monitor to determine whether the threshold alert level has been satisfied; and a safety alert actuator to actuate an output device of the portable electronic device when the threshold alert level is determined to be satisfied
Example 2 includes the subject matter of Example 1, wherein the actuation of the output device includes causing the output device to notify a third party that the user requires assistance.
Example 3 includes the subject matter of Example 1, wherein the usage context analyzer is further to identify a daily routine of the user, the usage context analyzer to use the daily routine to determine the usage context.
Example 4 includes the subject matter of Example 1 or example 3, wherein the usage context analyzer is to generate a usage context profile corresponding to the usage context, the usage context profile including the threshold alert level, a set of first usage attributes and a set of second usage attributes.
Example 5 includes the subject matter of Example 4, wherein the current usage detector is to determine the portable electronic device is being used in the usage context by monitoring information associated with the portable electronic device to identify current usage attributes, and determining whether a threshold number of the current usage attributes are included among the first usage attributes.
Example 6 includes the subject matter of Example 4, wherein the second usage attributes, when detected, indicate that the portable electronic device is experiencing abnormal activity, the abnormal activity being associated with potential threat to the user.
Example 7 includes the subject matter of Example 6, wherein the abnormal activity includes the portable electronic device being one of dropped or thrown, and a corresponding one of the second attributes is obtained based on information supplied by a motion detector of the portable electronic device.
Example 8 includes the subject matter of Example 6, wherein the abnormal activity includes being gripped by the user with more than a threshold amount of force, and a corresponding one of the second attributes is obtained based on information supplied by a pressure sensor.
Example 9 includes the subject matter of Example 8, wherein the pressure sensor is carried by a carrying case, the carrying case is in physical contact with the portable electronic device, and the pressure sensor communicates information to the portable electronic device for usage by the threshold alert level monitor.
Example 10 includes the subject matter of Example 1, wherein the usage context is further determined based on data received from a remote safety manager, the data including information regarding a region within which the portable electronic device is currently located.
Example 11 includes the subject matter of Example 1, wherein the usage context is further determined based on data received from a remote safety manager, the data including information regarding environmental factors of a region within which the portable electronic device is currently located.
Example 12 includes the subject matter of any of Examples 1, 10 or 11, wherein the portable electronic device includes a transmitter, the transmitter to transmit past usage history collected at the portable electronic device to a remote processor, the remote processor to analyze the information to revise the usage context based on information obtained from one of a public, private and governmental information service.
Example 13 includes the subject matter of Example 1, wherein the threshold alert is a first threshold alert level and the safety monitor further includes a threshold alert level override, the threshold alert level override to cause the threshold alert level monitor to replace the first threshold alert level with a second threshold alert level based on a user input.
Example 14 includes one or more non-transitory machine-readable storage media including machine-readable instructions that, when executed, cause at least one processor of a portable electronic device to at least: determine a usage context in which the portable electronic device is used, the usage context determined based on a history of past usage information; determine whether the portable electronic device is being used in the usage context at a current time, and, when the portable electronic device is determined to be used in the usage context at the current time, obtain a threshold alert level corresponding to the usage context, the threshold alert level indicating a level of danger to which a user of the portable electronic device is exposed; determine whether the threshold alert level has been satisfied; and actuate an output device when the threshold alert level is determined to be satisfied.
Example 15 includes the subject matter of Example 14, wherein the actuation of the output device includes causing the output device to transmit a message to a third party, the message to request assistance from the third party.
Example 16 includes the subject matter of Example 14, and further includes instructions to cause the at least one processor to identify a daily routine of the user, the usage context analyzer to use the daily routine to determine the usage context.
Example 17 includes the subject matter of Example 14 or example 16, and further includes instructions to cause the at least one processor to generate a usage context profile corresponding to the usage context, the usage context profile including the threshold alert level, a set of first usage attributes, and a set of second usage attributes.
Example 18 includes the subject matter of Example 17, and further includes instructions to cause the at least one processor to determine the portable electronic device is being used in the usage context by monitoring information associated with the portable electronic device to identify current usage attributes, and determining whether a threshold number of the current usage attributes are included among the first usage attributes.
Example 19 includes the subject matter of Example 17, wherein the second usage attributes, when detected, indicate that the portable electronic device is experiencing abnormal activity.
Example 20 includes the subject matter of Example 19, wherein the abnormal activity includes the portable electronic device being one of dropped or thrown, and a corresponding one of the second attributes is obtained based on information supplied by a motion detector of the portable electronic device.
Example 21 includes the subject matter of Example 20, wherein the abnormal activity includes being gripped by the user with more than a threshold amount of force, and a corresponding one of the second attributes is obtained based on information supplied by a pressure sensor.
Example 22 includes the subject matter of Example 21, wherein the pressure sensor is in a carrying case, the carrying case is in physical contact with the portable electronic device, and the pressure sensor communicates information to the at least one processor for usage in monitoring the threshold alert level.
Example 23 includes the subject matter of Example 14, wherein the usage context is further determined based on data received from a remote safety manager, the data including information provided by police regarding a region within which the portable electronic device is currently located.
Example 24 includes the subject matter of Example 14, wherein the usage context is further determined based on data received from a remote safety manager, the data including information regarding environmental factors of a region within which the portable electronic device is currently located.
Example 25 includes the subject matter of any one of Examples 14, 23 or 24, wherein the instructions further cause the at least one processor to cause a transmitter to transmit past usage history to a remote processor, the remote processor to analyze the information to revise the usage context based on information obtained from one of a public, private and governmental information service.
Example 26 includes the subject matter of Example 14, wherein the threshold alert is a first threshold alert level and the instructions further cause the at least one processor to respond to a user input by overriding the threshold alert level and monitoring a second threshold alert level instead of the first threshold alert level.
Example 27 is a method to summon assistance for a user of a portable electronic device. The method of Example 27 includes: determining, by executing an instruction with at least one processor, a usage context in which the portable electronic device is used, the usage context determined based on a history of past usage information; determining, by executing an instruction with at least one processor, whether the portable electronic device is being used in the usage context at a current time, and, when the portable electronic device is determined to be used in the usage context at the current time, obtaining a threshold alert level corresponding to the usage context, the threshold alert level indicating a level of danger to which a user of the portable electronic device is exposed; determining, by executing an instruction with at least one processor, whether the threshold alert level has been satisfied; and when the threshold alert level is determined to be satisfied, actuating an output device to transmit a message to a third party, the message to request the assistance of the third party on behalf of the user.
Example 28 includes the subject matter of Example 27, and further includes identifying a daily routine of the user, and using the daily routine to determine the usage context.
Example 29 includes the subject matter of any of Example 27 and 28, and further includes generating a usage context profile corresponding to the usage context, the usage context profile including the threshold alert level, a set of first usage attributes and a set of second usage attributes.
Example 30 includes the subject matter of Example 29, wherein the determining that the portable electronic device is being used in the usage context includes monitoring information associated with the portable electronic device to identify current usage attributes, and determining whether a threshold number of the current usage attributes are included among the set of first usage attributes.
Example 31 includes the subject matter of Example 29, and further includes detecting the second usage attributes based on information supplied by the portable electronic device, the second usage attributes indicating that the portable electronic device is experiencing abnormal activity, the abnormal activity being associated with potential threat to at least one of the safety and health of the user.
Example 32 includes the subject matter of Example 31, wherein the abnormal activity includes the portable electronic device being one of dropped or thrown, and a corresponding one of the second attributes is obtained based on information supplied by a motion detector of the portable electronic device.
Example 33 includes the subject matter of Example 31, wherein the abnormal activity includes being gripped by the user with more than a threshold amount of force, and a corresponding one of the second attributes is obtained based on information supplied by a pressure sensor.
Example 34 includes the subject matter of Example 33, wherein the pressure sensor is in a carrying case, the carrying case is in physical contact with the portable electronic device, and the pressure sensor communicates information to the portable electronic device for usage by the threshold alert level monitor.
Example 35 is an apparatus including the at least one processor to implement the method of any one of Examples 27 to 34.
Example 36 is a non-transitory machine-readable storage media including machine-readable instructions that, when executed by the at least processor, cause the least one processor to implement the method of any one of Examples 27 to 34.
Example 37 is an apparatus to summon assistance for a user of a portable electronic device. The apparatus of Example 37 includes: means for determining a usage context in which the portable electronic device is used, the usage context determined based on a history of past usage information; means for determining whether the portable electronic device is being used in the usage context at a current time; means for obtaining a threshold alert level corresponding to the usage context when the portable electronic device is determined to be used in the usage context at the current time, the threshold alert level indicating a level of danger to which a user of the portable electronic device is exposed; means for determining whether the threshold alert level has been satisfied; and means for actuating an output device to transmit a message to a third party when the threshold alert level is determined to be satisfied, the message to request the assistance of the third party on behalf of the user.
Example 38 includes the subject matter of Example 37, and further includes means for identifying a daily routine of the user, and using the daily routine to determine the usage context.
Example 39 includes the subject matter of any of Examples 37 and 38, and further includes means for generating a usage context profile corresponding to the usage context, the usage context profile including the threshold alert level, a set of first usage attributes and a set of second usage attributes.
Example 40 includes the subject matter of Example 39, wherein the means for determining whether the portable electronic device is being used in the usage context include means for monitoring information associated with the portable electronic device to identify current usage attributes, and means for determining whether a threshold number of the current usage attributes are included among the set of first usage attributes.
Example 41 includes the subject matter of Example 39, and further includes means for detecting the second usage attributes based on information supplied by the portable electronic device, the second usage attributes indicating that the portable electronic device is experiencing abnormal activity, the abnormal activity being associated with potential threat to at least one of the safety and health of the user.
Example 42 includes the subject matter of Example 41, wherein the abnormal activity includes the portable electronic device being one of dropped or thrown, and a corresponding one of the second attributes is obtained based on information supplied by a motion detector of the portable electronic device.
Example 43 includes the subject matter of Example 41, wherein the abnormal activity includes being gripped by the user with more than a threshold amount of force, and a corresponding one of the second attributes is obtained based on information supplied by a pressure sensor.
Example 44 includes the subject matter of Example 43, wherein the pressure sensor is in a carrying case, the carrying case is in physical contact with the portable electronic device, and the pressure sensor communicates information to the portable electronic device for usage by the threshold alert level monitor.
Example 45 is a safety manager to manage a safety monitor of a remote portable electronic device and includes a usage context analyzer to determine a usage context in which the remote portable electronic device is used. The usage context is determined based on a history of past usage information received from the safety monitor. The safety manager also includes a current usage data analyzer to determine whether the remote portable electronic device is being used in the usage context at a current time, and, when the remote portable electronic device is determined to be used in the usage context at the current time, obtain a threshold alert level corresponding to the usage context. The threshold alert level indicates a degree of danger to which a user of the remote portable electronic device is exposed. The safety manager further includes a threshold alert level monitor to monitor the threshold alert level, and, based on the monitoring of the threshold alert level, determine whether the threshold alert level has been satisfied. Additional, the safety manager includes a safety alert that, when the threshold alert level is determined to be satisfied, actuates a safety alert. The safety alert includes at least one of notifying a third party that the user is in need of assistance and causing the safety monitor to notify the third party that the user is in need of assistance.
Example 46 includes the subject matter of Example 45. In Example 46, the notifying of the third party includes transmitting a location of the remote portable electronic device to the third party.
Example 47 includes the subject matter of Example 45 and further includes a past usage history analyzer to analyze the history of past usage information, and at least one of the past usage history analyzer, the usage context analyzer and the current usage data analyzer generates, based on at least one of the current usage data, the history of past usage information, and external source data, a usage context profile corresponding to the usage context. The usage context profile includes the threshold alert level, and a usage attribute. The usage attribute corresponds to sensor information collected at the remote portable electronic device, and the threshold alert level monitor monitors the threshold alert level by monitoring the sensor information.
Example 48 includes the subject matter of Example 45, wherein the sensor information identifies a sensor threshold value and the threshold alert level is determined to be satisfied when the sensor threshold value is satisfied.
Example 49 includes the subject matter of any of Examples 45-48, wherein the safety manager supplies the threshold alert level to the safety monitor for use in monitoring the sensor information. In Example 49, the at least one of the past usage history analyzer, the usage context analyzer, and the current usage data analyzer generate a revised threshold alert level based on at least one of the current usage data, the history of past usage information, and external source data, and the safety manager supplies the revised threshold alert level to the safety monitor for use in monitoring the sensor information.
Example 50 includes the subject matter of Example 47, wherein the usage attribute is a first usage attribute, the sensor information is first sensor information, and the usage context profile further includes a second usage attribute corresponding to second sensor information collected at the remote portable electronic device. In Example 50, the current usage data analyzer determines whether the remote portable electronic device is being used in the usage context at the current time by monitoring the second sensor information.
Example 51 includes the subject matter of any of Examples 45-46. In Example 51, the current usage data analyzer determines whether the remote portable electronic device is being used in the usage context by monitoring sensor information collected at the remote portable electronic device and by determining, based on the monitoring of the sensor information, whether the sensor information corresponds to a threshold number of current usage attributes associated with the usage context.
Example 52 includes the subject matter of any of Examples 45-48. Example 52 further includes an external source data collector to collect external source data from a plurality of external data sources. The external data sources are remote from the safety manager and include at least one of a social media service, a telecommunication network control center, a governmental law enforcement entity, a private security entity, and a commercial enterprise. Example 52 also includes an external data source analyzer to analyze the external source data and revise the threshold alert level based on the external source data.
Example 53 includes the subject matter of any of Examples 45-48. In Example 53, the threshold alert level is a first threshold alert level, and the safety manager further includes a threshold alert level adjuster. The threshold alert level adjuster replaces the first threshold alert level with a second threshold alert level in response to at least one of sensed information collected at the remote portable electronic device, and external source data from an external data source.
Example 54 includes the subject matter of Example 53. In Example 54, the second threshold alert level is associated with a higher degree of danger than the first threshold alert level, and the second threshold alert level is associated with a lower threshold that the first threshold alert level.
Example 55 includes the subject matter of any of Examples 45-48. In Example 55, the current usage data analyzer causes the threshold alert level to be stored at the remote safety monitor, and the safety manager further includes a threshold alert level adjuster that revises the threshold alert level stored at the remote safety monitor in response to at least one of sensed information collected at the remote portable electronic device, and external source data from an external data source.
Example 56 includes the subject matter of any of Examples 45-48, wherein the safety alert actuator is further to actuate an output device of the remote portable electronic device when the threshold alert level is determined to be satisfied.
Example 57 includes the subject matter of Example 56. In Example 57, the remote portable electronic device is a first remote portable electronic device, the output device is a first output device, and the safety alert actuator actuates a second output device of a second remote portable electronic device located within a threshold distance of the first remote portable electronic device when the threshold alert level is determined to be satisfied.
Example 58 includes the subject matter of any of Examples 45-48. In Example 58, the safety manager further includes an assistance request manager to request control of a remote surveillance device when the remote portable electronic device comes within a threshold distance of the remote surveillance device.
Example 59 includes the subject matter of any of Examples 45-48. In Example 59, the safety alert actuator controls a remote surveillance device located within a threshold distance of the remote portable electronic device when the threshold alert level is determined to be satisfied.
Example 60 includes the subject matter of any of Examples 45-48, wherein the safety alert actuator is further to actuate an audio emitting device located within a threshold distance of the remote portable electronic device when the threshold alert level is determined to be satisfied.
Example 61 includes one or more non-transitory machine-readable storage media having machine-readable instructions that, when executed, cause at least one processor to at least identify a threshold alert level corresponding to a context in which a remote portable electronic device is being used. The threshold alert level indicates a degree of danger to which a user of the remote portable electronic device is exposed and the remote portable electronic device is remote from the at least one processor. The instructions further cause the at least one processor to determine whether the threshold alert level is satisfied, and, based on whether the threshold alert level is satisfied, notify a third party that the user of the remote portable electronic device is in need of assistance.
Example 62 includes the subject matter of Example 61. In Example 62, the instructions further cause the at least one processor to analyze at least one of usage data collected at the remote portable electronic device, and external source data to generate a usage context profile corresponding to the context in which the remote portable electronic device is being used. The usage context profile includes the threshold alert level, and sensor information corresponding to the threshold alert level.
Example 63 includes the subject matter of Example 61. In Example 63, the sensor information includes a sensor threshold value and the threshold alert level is determined to be satisfied when the sensor threshold value is satisfied.
Example 64 includes the subject matter of Example 61. In Example 64, the instructions further cause the at least one processor to supply the threshold alert level to a safety monitor of the remote portable electronic device for use in determining when the sensor threshold value is satisfied.
Example 65 includes the subject matter of any of Examples 61-64. In Example 65, the instructions further cause the at least one processor to generate the threshold alert level based on an analysis of usage data associated with usage of the remote portable electronic device.
Example 66 includes the subject matter of any of Examples 61-64. In Example 66, the instructions further cause the at least one processor to generate an upgraded threshold alert level based on external source data corresponding to an event occurring within a threshold distance of the remote portable electronic device.
Example 67 includes the subject matter of Example 66. In Example 67, the remote portable electronic device is a first remote portable electronic device, and the external source data is supplied by a second remote portable electronic device located within a threshold distance of the first remote portable electronic device.
Example 68 includes the subject matter of any of Examples 61-64. In Example 68, the instructions further cause the at least one processor to analyze external source data collected from a plurality of external data sources, the external data sources including at least one of a social media service, a telecommunication network control center, a governmental law enforcement entity, and a private security entity, and adjust the threshold alert level based on the external source data.
Example 69 includes the subject matter of any of Examples 61-64. In Example 69, the instructions further cause the at least one processor to identify the threshold alert level corresponding to the context by accessing a usage context profile. The usage context profile includes the threshold alert level and a set of usage attributes. The usage attributes, when detected, indicate the remote portable electronic device is being used in the context.
Example 70 includes the subject matter of Example 69. In Example 69, the instructions further cause the at least one processor to determine the context in which the remote portable electronic device is being used by monitoring a set of sensors associated with the usage attributes.
Example 71 includes the subject matter of any of Examples 61-64. In Example 71, the instructions further cause the at least one processor to adjust the threshold alert level in response to at least one of sensed information collected at the remote portable electronic device, and external source data from an external data source. At least one of the sensed information and the external source data indicate the degree of danger to which the user is exposed has changed.
Example 72 includes the subject matter of Example 71. In Example 71, the adjusting of the threshold alert level includes lowering the threshold alert level when the degree of danger has increased and raising the threshold alert level when the degree of danged has decreased.
Example 73 includes the subject matter of any of Examples 61-64. In Example 73, the instructions further cause the at least one processor to actuate an output device of the remote portable electronic device when the threshold alert level is determined to be satisfied.
Example 74 includes the subject matter of Example 73. In Example 74, the remote portable electronic device is a first remote portable electronic device, the output device is a first output device, and the instructions further cause the at least one processor to actuate a second output device of a second remote portable electronic device. The second remote portable electronic device is located within a threshold distance of the first remote portable electronic device when the threshold alert level is determined to be satisfied.
Example 75 includes the subject matter of any of Examples 61-64. In Example 75, the instructions further cause the at least one processor to request control of a remote surveillance device when the remote portable electronic device comes within a threshold distance of the remote surveillance device.
Example 76 includes the subject matter of any of Examples 61-64. In Example 76, the instructions further cause the at least one processor to control a remote surveillance device located within a threshold distance of the remote portable electronic device when the threshold alert level is determined to be satisfied.
Example 77 includes the subject matter of Example 61-64. In Example 77, the instructions further cause the at least one processor to actuate an audio emitting device located within a threshold distance of the remote portable electronic device when the threshold alert level is determined to be satisfied.
Example 78 is a method to monitor the safety of a user of a remote portable electronic device. The method of Example 78 includes identifying a threshold alert level corresponding to a context in which a remote portable electronic device is being used. The threshold alert level indicates a degree of danger to which a user of the remote portable electronic device is exposed. The method also includes determining whether the threshold alert level is satisfied, and, based on whether the threshold alert level is satisfied, notifying a third party that the user of the remote portable electronic device is in need of assistance.
Example 79 includes the subject matter of Example 78. The method of Example 79 further includes generating a usage context profile based on an analysis of at least one of usage data collected at the remote portable electronic device, and external source data. The usage context profile corresponds to the context in which the remote portable electronic device is being used, and includes the threshold alert level, and sensor information corresponding to the threshold alert level.
Example 80 includes the subject matter of Example 79. In Example 80, the sensor information includes a sensor threshold value and the threshold alert level is determined to be satisfied when the sensor threshold value is satisfied.
Example 81 includes the subject matter of Example 80. The method of Example 81 includes supplying the threshold alert level to the remote portable electronic device for use in monitoring a sensor to determine when the sensor threshold value is satisfied.
Example 82 includes the subject matter of any of Examples 78-81. The method of Example 82 includes generating the threshold alert level based on an analysis of usage data associated with usage of the remote portable electronic device.
Example 83 includes the subject matter of any of Examples 78-81. The method of Example 83 includes generating an upgraded threshold alert level based on external source data corresponding to an event occurring within a threshold distance of the remote portable electronic device.
Example 84 includes the subject matter of Example 83. In the method of Example 84, the remote portable electronic device is a first remote portable electronic device, and the external source data is supplied by a second remote portable electronic device located within a threshold distance of the first remote portable electronic device.
Example 85 includes the subject matter of any of Examples 78-81. The method of Example 85 further includes analyzing external source data collected from a plurality of external data sources, the external data sources including at least one of a social media service, a telecommunication network control center, a governmental law enforcement entity, a private security entity, and a commercial enterprise, and also includes adjusting the threshold alert level based on the external source data.
Example 86 includes the subject matter of any of Examples 78-81. The method of Example 86 also includes identifying the threshold alert level corresponding to the context by accessing a usage context profile. The usage context profile includes a set of usage attributes that, when detected, indicate the remote portable electronic device is being used in the context.
Example 87 includes the subject matter of Example 86. The method of Example 86 further includes determining the context in which the remote portable electronic device is being used by monitoring a set of sensors associated with the usage attributes.
Example 88 includes the subject matter of Example 85. In the method of Example 88, the adjusting of the threshold alert level occurs in response to sensed information collected at the remote portable electronic device, and the external source data from the external data source. At least one of the sensed information and the external source data indicates that the degree of danger to which the user is exposed has changed.
Example 89 includes the subject matter of any of Examples 85 and 88. In the method of Example 89, the adjusting of the threshold alert level includes lowering the threshold alert level when the degree of danger has increased and raising the threshold alert level when the degree of danged has decreased.
Example 90 includes the subject matter of any of Examples 78-81. The method of Example 90 further includes, when the threshold alert level is determined to be satisfied, actuating an output device of the remote portable electronic device.
Example 91 includes the subject matter of Examples 90. In the method of Example 91, the remote portable electronic device is a first remote portable electronic device, the output device is a first output device, and the method further includes, when the threshold alert level is determined to be satisfied, actuating a second output device of a second remote portable electronic device. The second remote portable electronic device is located within a threshold distance of the first remote portable electronic device when the threshold alert level is determined to be satisfied.
Example 92 includes the subject matter of any of Examples 78-81. The method of Example 92 further includes requesting control of a remote surveillance device when the remote portable electronic device comes within a threshold distance of the remote surveillance device.
Example 93 includes the subject matter of any of Examples 78-81. The method of Example 93 further includes, when the threshold alert level is determined to be satisfied, controlling a remote surveillance device. The remote surveillance device is located within a threshold distance of the remote portable electronic device when the threshold alert level is determined to be satisfied.
Example 94 includes the subject matter of any of Examples 78-81. The method of Example 94 further includes, when the threshold alert level is determined to be satisfied, actuating an audio emitting device. The audio emitting device is located within a threshold distance of the remote portable electronic device when the threshold alert level is determined to be satisfied.
Example 95 is a machine readable medium including code, when executed to cause a machine to perform the method of any one of Examples 78-94.
Example 96 is an apparatus comprising means to perform the method of any of Examples 78-94.
Example 97 is a machine readable storage including machine readable instructions. The instructions, when executed, implement the method of any of Examples 78-94 or realize the apparatus of any of Examples 45-60.
Example 98 is a safety monitor to monitor the safety of a user of a remote portable electronic device. The safety monitor of Example 98 includes means to determine a usage context in which the remote portable electronic device is used. The usage context is determined based on a history of past usage information received from the remote portable electronic device. The safety monitor also includes means to determine whether the remote portable electronic device is being used in the usage context at a current time, and, when the remote portable electronic device is determined to be used in the usage context at the current time, obtain a threshold alert level corresponding to the usage context. The threshold alert level indicates a degree of danger to which a user of the remote portable electronic device is exposed. The safety monitor further includes means to monitor the threshold alert level, and, based on the monitoring of the threshold alert level, determine whether the threshold alert level has been satisfied. The safety monitor also includes means to notify a third party that the user is in need of assistance when the threshold alert level is determined to be satisfied.
Example 99 includes the subject matter of Example 98. In Example 99, the means to notify cause a location of the remote portable electronic device to be transmitted to the third party.
Example 100 includes the subject matter of Example 98. In Example 100, the safety monitor further includes means to analyze the history of past usage information, current usage information, and external source data to generate a usage context profile corresponding to the usage context. The usage context profile includes the threshold alert level, and a usage attribute corresponding to sensor information collected at the remote portable electronic device. The means to monitor the threshold alert level monitors the threshold alert level by monitoring the sensor information.
Example 101 includes the subject matter of Example 100. In Example 101, the sensor information identifies a sensor threshold value and the threshold alert level is determined to be satisfied when the sensor threshold value is satisfied.
Example 102 includes the subject matter of Example 98. The safety monitor of Example 102 further includes means to transmit the usage context profile to the remote portable electronic device for use in monitoring the sensor information. The means to analyze generates a revised threshold alert level and revised sensor information based on at least one of the current usage information, the history of past usage information and the external source data. The means to transmit transmits the revised threshold alert level and revised sensor information to the remote portable electronic device for use in monitoring the revised threshold alert level.
Example 103 includes the subject matter of Example 102. In Example 103, the external source data include real-time event data, and the means to analyze is to generate the revised threshold alert level based on the real-time event data.
Example 104 includes the subject matter of Example 103. In Example 104, the remote portable electronic device is a first remote portable electronic device, the external source data is supplied by a second remote portable electronic device, and the real-time event data corresponds to a real-time event occurring within a threshold distance of the first remote portable electronic device and the second remote portable electronic device.
Example 105 includes the subject matter of any of Examples 100 and 101. In Example 105, the usage attribute is a first usage attribute, the sensor information is first sensor information, the usage context profile further includes a second usage attribute corresponding to second sensor information collected at the remote portable electronic device. In Example 105, the means to analyze is to determine whether the remote portable electronic device is being used in the usage context at the current time by monitoring the second sensor information.
Example 106 includes the subject matter of any of Examples 98 and 99. In Example 106, the safety monitor further includes means to collect external source data from a plurality of external data sources. The external data sources are remote from the remote portable electronic device and the safety monitor and the external data sources include at least one of a social media service, a telecommunication network control center, a governmental law enforcement entity, a private security entity, and a commercial enterprise. In Example 106, the safety monitor further includes means to analyze the external source data. The means to analyze the external source data also revises the threshold alert level based on the external source data.
Example 107 includes the subject matter of Example 98. The safety monitor of Example 107 further includes means to monitor sensor information collected at the remote portable electronic device, and, means to determine whether the sensor information corresponds to a threshold number of current usage attributes associated with the usage context.
Example 108 includes the subject matter of any of Examples 106. In Example 108, the threshold alert level is a first threshold alert level. The safety monitor of Example 108 further includes means to adjust the threshold alert level. The means to adjust the threshold alert level replace the first threshold alert level with a second threshold alert level in response to at least one of the sensor information, and the external source data from the external data source.
Example 109 includes the subject matter of Example 108. In Example 108, the second threshold alert level is associated with a higher degree of danger than the first threshold alert level, and the second threshold alert level is associated with a lower threshold that the first threshold alert level.
Example 110 includes the subject matter of any of Examples 108 and 109. In Example 110, the threshold alert level is stored at the safety monitor and at the remote portable electronic device, and the means to adjust the threshold alert level is to adjust the threshold alert level stored at the safety monitor and stored at the remote portable electronic device.
Example 111 includes the subject matter of any of Examples 98-104. In Example 111, the safety monitor further includes means to actuate an output device of the remote portable electronic device when the threshold alert level is determined to be satisfied.
Example 112 includes the subject matter Example 111. In Example 112, the remote portable electronic device is a first remote portable electronic device, the output device is a first output device, and the means to actuate is further to actuate, when the threshold alert level is determined to be satisfied, a second output device of a second remote portable electronic device. The second remote portable electronic device is located within a threshold distance of the first remote portable electronic device when the threshold alert level is determined to be satisfied.
Example 113 includes the subject matter of any of Examples 98-104. In Example 113, the safety monitor further includes means to request control of a remote surveillance device when the remote portable electronic device comes within a threshold distance of the remote surveillance device.
Example 114 includes the subject matter of any of Examples 98-104. In Example 114, the safety monitor further includes means to control a remote surveillance device located within a threshold distance of the remote portable electronic device when the threshold alert level is determined to be satisfied.
Example 115 includes the subject matter of any of Examples 98-104. In Example 115, the safety monitor further includes means to actuate an audio emitting device located within a threshold distance of the remote portable electronic device when the threshold alert level is determined to be satisfied.
Although certain example methods, apparatus and articles of manufacture have been disclosed herein, the scope of coverage of this patent is not limited thereto. On the contrary, this patent covers all methods, apparatus and articles of manufacture fairly falling within the scope of the claims of this patent.