System, Method and Schema to provide privacy-compliant & pseudo-encrypted First Aid infos in locked smartphone
Publication Date: 2011-Aug-18
The IP.com Prior Art Database
Disclosed is a system, method and layout to codifies people's ICE info, personal info and medical history using the QR-code coding as pseudo-encryption mechanism, besides to clear surname/name and a passport photo.
Page 01 of 3
System, Method and Schema to provide privacy -compliant & pseudo-encrypted First Aid infos in locked smartphone
One of the difficulties long faced by emergency services personnel is how to obtain other necessary information about a victim who is unconscious, dead, or otherwise unable to respond to questions. Even if the victim is carrying one or more forms of identification which have remained with him (such as a driver's license), those items don't necessarily provide information about where and how relatives or other interested parties can be reached, resulting in delays as officials try to track those people down through ancillary. This issue has been addressed through a variety of means over the years, as many people have taken to carrying lists of emergency contacts (and vital medical details) in their purses and wallets, or wearing items such as bracelets and necklaces with such information engraved on them.
In 2005, East Anglian Ambulance Service have launched a national "In case of Emergency (ICE)" campaign to get people to store "In Case of Emergency" (ICE) information in items that have become ubiquitous in many parts of the world: cell phones.
The idea is that people stores the word " I C E " in his mobile phone address book, and against it enter the number of the person (or multiple person as ICE1, ICE2 and so on...) he would want to be contacted "In Case of Emergency". In an emergency situation ambulance and hospital staff will then be able to quickly find out these info and contact them. The success of ICE method was related that it is so simple that everyone can do it.
ICE method problems
1. ICE method only furnishes info about ice numbers in order to retrieve relatives and get info about the victim: that is a sort of indirect access.
2. The cell phone has to remain with the victim (or otherwise be identifiable as his) in order to be of use. While most wallets and purses will contain some items bearing photographs that can be matched to their owners (such as driver's licenses), a cell phone doesn't necessarily provide any direct means of identifying its owner. And while any form of ID can become separated from the person bearing it, a cell phone is an object frequently carried in hand, greatly increasing the chances of its loss in an accident.
3. Cell phones come in many different brands and varieties, and how to retrieve stored information may not be immediately apparent to someone trying to work with an unfamiliar type of phone.
4. Many 2005's cell phone users are become -today- smartphone users: it is usual or required to secure phones with PINs to prevent unauthorized use, a factor which could conceivably block any attempts by emergency personnel to retrieve information from them.
Status of Art
In response to cited problems, many device manufacturers have provided a mechanism to specify some text to be displayed while the mobile is in the locked state. An evolution of this solution was to customize...