InnovationQ will be updated on Sunday, May 20, from 10am - noon ET. You may experience brief service interruptions during that time.
Browse Prior Art Database

Method to Find a Trusted Contact During an Emeregency Leveraging a Social Network

IP.com Disclosure Number: IPCOM000246284D
Publication Date: 2016-May-24
Document File: 2 page(s) / 47K

Publishing Venue

The IP.com Prior Art Database


Today communication between people has evolved into a social network. Phone calls and sms have been overcome by the new technologies and everyone interacts with friends using the many social applications available for smartphones: Facebook, Instagram, Twitter and so on. This article describes a method to find reliable contacts in proximity.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 58% of the total text.

Page 01 of 2

Method to Find a Trusted Contact During an Emeregency Leveraging a Social


Before the advent of smartphones, when we had an emergency we used to call a friend or a member of our family for support. This was possible calling the person by phone, but having previously stored the phone number in our address book. In this case if we were far from home, for instance during a holiday, we were not able to ask for help to someone we trust.

Now the new technologies allow to search for help even when we do not know anyone in the area where we are.

By leveraging the possibilities offered by the new technologies , our aim is to provide a method to locate a potential helper in case of emergency .

In a typical use case a person is in place where he does not know personally anyone and he needs for support. For support we mean any help that requires specific skills: the ability to do something, particular skills such as the practice of a profession (a mechanical rather than a doctor) or a certification such as the attendance to a first aid course.

From now on, for simplicity, we will call:
- the user who requests support the Requesting user;
- the user who can potentially provide support the Serving user.

The Links are Established.

The requester user opens the application on his device, typically a smartphone, and makes a request for support.

The device sends its request to proximity devices. Proximity devices can be found and reached in several ways. For instance leveragi...