Browse Prior Art Database

Cell phone as an emergency dispatcher

IP.com Disclosure Number: IPCOM000022083D
Original Publication Date: 2004-Feb-23
Included in the Prior Art Database: 2004-Feb-23
Document File: 1 page(s) / 25K

Publishing Venue

IBM

Abstract

This article describes how the police, or any other agency that protects the safety of society can receive emergency information of an individual that is being attacked. For example the user can automatically get a hold of a security guard at a shopping mall bypassing the 911 call.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

Cell phone as an emergency dispatcher

A user with a cell phone will program the emergency button to send location, still pictures or movie clips to a local police officer or guard patrolling the area.

The police officer, guard or 911 will receive the information and will be able to immediately go to the area and check on the person.

The advantage is the person does not need to talk to an operator and describe the events (protection agency can see the pictures) and the cell phone will be capable of locating the nearest police officer or guard in the area to get rapid service.

The security alert system consists of one or more servers connected to the cellular network. Security officers will sign on the network using a program in the officer's cell phone. The server (may use GPS) will periodically monitor the locations of each active duty officer. After or during the crime the victimized person activates the cell phone program button and the cell phone will broadcast out the alert message. The alert message may include a voice message and/or pictures. The message including the current location of the victim is captured by the security alert server. The server will match the victim's location with nearby security officers to alert them of the emergency. The security officers will receive the location of the victim along with the additional information sent by the victim. The pictures and information will be stored in a database for later investigation and auditing.

1...