The present disclosure generally relates to self-defense devices and, more specifically, to compact self-defense devices and alert systems.
Self-defense devices assist individuals to maintain personal safety when other resources may not be immediately available. One type of self-defense device is commonly known as a pepper spray device. A pepper spray device offers protection at a distance by propelling a liquid (such as made of oleoresin capsicum (OC) spray, capsaicin spray, or capsicum spray), which is an inflammatory agent that can irritate the eye with a burning sensation, pain, and/or temporary blindness. Such devices include a canister for holding the liquid and enable a person to spray the inflammatory agent from the canister in a direction of the eyes of an assailant.
Many pepper spray devices are difficult to use. Additionally, may pepper spray devices are so bulky that users tend to store them in large bags when they are out in public. As a result, a user of such pepper spray devices may be unable to access and operate the device quickly enough to deter an attack from an assailant.
Moreover, a person may remain in a dangerous situation even after successfully using a pepper spray device to deter an attack from an assailant. For instance, a person may be unable to safely flee from the assailant after using the pepper spray device. A person may want to contact someone for assistance. However, if the assailant remains nearby, that person may be unable to quickly and conspicuously call for assistance.
The appended claims define this application. The present document discloses aspects of the embodiments and should not be used to limit the claims. Other implementations are contemplated in accordance with the techniques described herein, as will be apparent to one having ordinary skill in the art upon examination of the following drawings and detailed description, and these implementations are intended to be within the scope of this application.
Example embodiments are shown for compact self-defense devices and alert systems. An example disclosed compact self-defense device includes a housing defining a chamber configured to house a cartridge of an inflammatory agent. The compact self-defense device includes a spray nozzle including a button and at least partially housed in the housing. The spray nozzle is configured to receive the cartridge in the housing. The spray nozzle is configured to spray the inflammatory agent when the button is engaged. The compact self-defense device includes a sensor housed in the chamber and configured to detect when the spray nozzle is spraying the inflammatory agent. The compact self-defense device includes a communication module housed in the chamber and configured to transmit a signal for alerting one or more preselected emergency contacts in response to the sensor detecting that the spray nozzle is spraying the inflammatory agent.
An example disclosed self-defense system includes a self-defense device and a remote server. The self-defense device includes a spray nozzle including a button and configured to receive a cartridge of an inflammatory agent. The spray nozzle is configured to spray the inflammatory agent when the button is engaged. The self-defense device includes a sensor configured to detect when the spray nozzle is spraying the inflammatory agent. The self-defense device includes a communication module configured to transmit a signal to a mobile device in response to the sensor detecting that the spray nozzle is spraying the inflammatory agent. The remote server is configured to receive the signal of the self-defense system via the mobile device and transmit an alert to one or more preselected emergency contacts in response to receiving the signal.
For a better understanding of the invention, reference may be made to embodiments shown in the following drawings. The components in the drawings are not necessarily to scale and related elements may be omitted, or in some instances proportions may have been exaggerated, so as to emphasize and clearly illustrate the novel features described herein. In addition, system components can be variously arranged, as known in the art. Further, in the drawings, like reference numerals designate corresponding parts throughout the several views.
While the invention may be embodied in various forms, there are shown in the drawings, and will hereinafter be described, some exemplary and non-limiting embodiments, with the understanding that the present disclosure is to be considered an exemplification of the invention and is not intended to limit the invention to the specific embodiments illustrated.
Example devices disclosed herein include convenient, non-lethal self-defense device that offers protection at a distance by propelling an inflammatory agent at a distance. Once activated, the device is further capable of transmitting the user's current location and a pre-written message to one or more recipients. In certain embodiments, the transmission occurs via an app installed on the user's mobile phone. The user can modify the app to select contacts of their choosing. In certain embodiments, the device includes a 360-degree rotating clip, which may be utilized to affix the device to the user or to any other suitable material. This clip might also be used a glass breaker. On the inside of the device sits a printed circuit board, which is powered by a battery and sends out a signal to the user's mobile phone via Bluetooth® connectivity. The self-defense device may further include some sort of identification substance such as an ultra-violet dye or glitter. The outside of the device may be formed of carbon fiber, aluminum, and/or other material.
For example, self-defense devices disclosed herein are compact to enable a user to easily carry and quickly access and operate the device when needed. Each self-defense device includes a spray nozzle and a button. The spray nozzle is configured to emit pepper spray and/or another inflammatory agent when the button is pressed. The self-defense device includes a housing for a cartridge of the inflammatory agent. The self-defense device is sized and shaped to house a standard-sized cartridge (e.g., a ¼-ounce cartridge) in a sleek and compact manner.
The self-defense devices disclosed herein also include a communication module (e.g., a Bluetooth® device) and a sensor (e.g., a pressure sensor). When the sensor detects that the button has been engaged, the communication module sends a signal, which results in one or more preselected emergency contacts receiving an alert that the user has activated their device.
In some examples, the self-defense device includes a door (e.g., a hinged door) that provides access to the cartridge housed in the housing of the device. The door enables a user to access and replace an empty cartridge with a full replacement cartridge. In some examples, a self-defense device includes a clip (e.g., a rotatable clip) that enables the user to fasten the device to a surface (e.g., a waistband). Additionally or alternatively, the self-defense device may include a magnet that is configured to facilitate a magnetic coupling to a mobile device (e.g., a mobile phone, a smartwatch, etc.) of the user. In some examples, the self-defense device includes a glass breaker, which is a tool configured to break through tempered glass and/or other surface(s). In some examples, the self-defense device includes one or more lights (e.g., light-emitting diodes (LEDs)) to facilitate identifying a location and/or orientation of the device prior, during, and/or upon use. In some examples, the self-defense device includes one or more rechargeable batteries to operate the electronic components of the device. For example, the self-defense device may include a charging port (e.g., a USB port such as a USB-C port) to recharge the one or more batteries.
Alert systems disclosed herein enable the self-defense device to communicate, directly and/or indirectly, with (1) another device of the user and/or (2) device(s) of preselected emergency contact(s) of the user (e.g., friends, family, partner, security company, etc.). For example, when the user uses the spray nozzle of the self-defense device, its communication module sends a signal.
In some examples, the self-defense device sends a signal to a mobile device of the user, for example, via a wireless personal area network (WPAN) connection, such as Bluetooth®. For example, the self-defense device is paired with the mobile device of the user. Upon receiving the signal from the self-defense device, the mobile device sends a signal to directly to the preselected emergency contact(s) and/or to a remote server, for example, via a cellular communication. The remote server may then transmit an alert to the preselected emergency contact(s). In some examples, the signal is sent directly from the self-defense device to the emergency contacts and/or the remote server.
In some examples, the remote server collects other information from the self-defense device and/or the mobile device. For example, the remote server may collect a geolocation of the user when the self-defense device has been activated. The remote server may also collect a description or incident report provided by the user via the mobile device. In some such examples, an artificial intelligence (AI) language model may be implemented to facilitate the user in quickly generating the incident report. The remote server may use the geolocation and description data to identify trends in reported incidences.
Turning to the figures,
The housing 110 is formed from one or more shell bodies. As shown in
As shown in
Additionally, the device 100 includes a spray nozzle 130 that is at least partially housed in the chamber 122 adjacent the upper end 112 of the housing 110. The spray nozzle 130 includes a body 132, a button 134 (also referred to as a “trigger”), and an outlet 136. The outlet 136 of the spray nozzle 130 is positioned adjacent to and aligns with a hole 124 defined by the housing 110. The body 132 of the spray nozzle 130 is configured to securely receive and connect to the cartridge 140 containing the pepper spray. The spray nozzle 130 and the cartridge 140 are arranged such that actuation of the button 134 causes the spray nozzle 130 to spray pepper spray out through outlet 136 and the hole 124 of the housing 110. For example, when a user presses the button 134, the spray nozzle 130 draws pepper spray from cartridge 140 (e.g., via a tube) and emits the pepper spray from the outlet 136 and through the hole 124. In some examples, the device 100 includes a cap (e.g., a cap 228 of
The cartridge 140 may be a standard-sized cartridge for pepper spray and/or other inflammatory agents. For example, the cartridge 140 shown in
As illustrated in
As shown in
Returning to
Turning to
The processor(s) 164 may be any suitable processing device or set of processing devices such as, but not limited to, a microprocessor, an integrated circuit, etc. The memory 166 may include volatile memory, non-volatile memory, unalterable memory, read-only memory, high-capacity storage devices, etc. The memory 166 is computer readable media on which one or more sets of instructions, such as the software for operating the methods of the present disclosure, can be embedded. The instructions may embody one or more of the methods or logic as described herein. For example, the instructions reside completely, or at least partially, within any one or more of the memory 166, the computer readable medium, and/or within the processor(s) 164 during execution of the instructions.
The terms “non-transitory computer-readable medium” and “computer-readable medium” include a single medium or multiple media, such as a centralized or distributed database, and/or associated caches and servers that store one or more sets of instructions. Further, the terms “non-transitory computer-readable medium” and “computer-readable medium” include any tangible medium that is capable of storing, encoding or carrying a set of instructions for execution by a processor or that cause a system to perform any one or more of the methods or operations disclosed herein. As used herein, the term “computer readable medium” is expressly defined to include any type of computer readable storage device and/or storage disk and to exclude propagating signals.
The communication module 168 is configured to enable wired or wireless communication with network(s) and/or other computer device(s) (e.g., mobile devices). As used herein, the term “module” refers to hardware with circuitry configured to perform one or more functions. A “module” may also include firmware that executes on the circuitry to enable the one or more functions to be performed. The network may be a public network, such as the Internet; a private network, such as an intranet; or combinations thereof. The network may utilize a variety of networking protocols. The communication module 168 includes wired or wireless network interfaces to enable communication with the network(s) and/or other computing device(s). The communication module 168 also includes hardware (e.g., processors, memory, storage, antenna, etc.) and software to control the wired or wireless network interfaces. For example, the communication module 168 includes hardware, software, and network interfaces for communication via wireless personal area network (WPANs), such as Bluetooth®; etc. In such examples, the communication module 168 enables the self-defense device (e.g., the device 100, the device 200, the device 300, etc.) to be paired with another nearby computing device of the user, such as a mobile device (e.g., a mobile phone, a smartwatch, etc.). Additionally or alternatively, the communication module 168 includes hardware, software, and network interfaces for communication via cellular network(s), such as Long-Term Evolution (LTE); wireless local area networks (WLANs), such as Wi-Fi®; etc.
In some examples, each of the one or more batteries 170 are coin-sized batteries to reduce their footprint within the chamber 122, thereby enabling the self-defense device (e.g., the device 100, the device 200, the device 300, etc.) to be compact. The one or more batteries 170 are rechargeable and electrically connected to the charging port 172 (e.g., a USB-C connection). The LED(s) 174 may be configured to emit light prior, during, and/or upon use of the self-defense device to facilitate the user in locating and/or correctly orienting the self-defense device. In some examples, the LED(s) 174 are configured to emit light of different colors and/or in different patterns for different respective statuses of the self-defense device. For example, the LED(s) 174 may emit a first color and/or pattern to indicate that the communication module 168 is pairing with a computer device, a second color and/or pattern to indicate that the spray nozzle 130 is spraying the inflammatory agent, and/or a third color and/or pattern to indicate that the batteries 170 have a low charge level.
In operation, as disclosed below in greater detail with respect to
The mobile device receives the signal from the self-defense device and relays the signal to a remote server. In turn, the remote server is configured to transit an alert to one or more preselected emergency contacts (e.g., friends, family, partner, security company, etc.) of the user. For example, the remote server is configured to transmit the alert via a text message (e.g., SMS text messaging), an email, a phone call, a pop-up in an app, etc.
The mobile device may also collect other information, in real-time, associated with the occurrence. For example, the mobile device may identify its geolocation, via a global positioning system (GPS) receiver, and relay its geolocation to the remote server. The mobile device may also collect a description or an incident report from the user via an app on their mobile device (e.g., a mobile app). In some examples, the remote server uses the geolocation, incident report, and/or other data to identify trends in reported incidences.
As illustrated in
In the illustrated example, the self-defense device 300 (also referred to as “the device”) is a pepper spray device that is configured to emit pepper spray and/or other inflammatory agents. As shown in
The housing 310 is formed from one or more shell bodies. As shown in
As shown in
The one or more batteries 170 (
The device 300 also includes a spray nozzle 330 that is at least partially housed in the chamber 322 adjacent the upper end 312 of the housing 310. As shown in
In the illustrated example, the spray nozzle 330 is securely coupled to a frame 390 of the device 300. As shown in
The spray nozzle 330 and the cartridge 140 are arranged relative to the frame 390 such that actuation of the button 334 (also referred to as a “trigger”) causes the spray nozzle 330 to spray pepper spray through the nozzle insert 333 and out through the outlet 336. For example, when a user presses the button 334, the spray nozzle 330 draws pepper spray from cartridge 140 (e.g., via a tube) and emits the pepper spray from the outlet 336 and through the hole 324. In the illustrated example, the safety clip 331 is configured to prevent the spray nozzle 130 from being unintentionally activated. For example, the safety clip 331 is positioned between the button 334 of the spray nozzle 330 and the frame 390. As shown in
Additionally, the device 300 includes a glass breaker 392. In the illustrated example, the glass breaker 392 is coupled to the second end (e.g., the lower end) of the frame 390. The glass breaker 392 is configured to break through tempered glass and/or other surface(s). The glass breaker 392 is made of hard material (e.g., steel, an aluminum alloy, and/or other hard metal) to enable it to break the glass and/or other surface. As shown in
The frame 390 is made of relatively rigid material (e.g., steel, an aluminum alloy, and/or other metal(s)) to provide structural rigidity to the device 300. For example, the frame 390 is shaped and composed of relatively rigid material to enable the frame 390 and, in turn, the device 300 to withstand hard impact(s) of the glass breaker 392 hitting tempered glass and/or other hard surface(s). In the illustrated example, the frame 390 also defines holes that are configured to receive the fasteners that couple the housing 310 together. That is, the housing 310 is coupled together by securely fastening the shell bodies 318, 319, 320 of the housing 310 to the frame 390. In turn, the frame 390 is configured to improve the structural rigidity of the housing 310 of the device 300.
Further, as illustrated in
The device 300 of the illustrated example includes a clip 350. The clip 350 is attached to the housing 310. In the illustrated example, the clip 350 is attached to the shell body 320. Additionally or alternatively, the clip 350 is attached to the shell body 318 and/or the shell body 319. The clip 350 enables the device 300 to be securely fasten the device 300 to a surface, such as a waistband, a pocket, a liner, a mobile device, etc. In some examples, the clip 350 is configured to rotate to facilitate the user in fastening the device 300 to a surface. For example, the clip 350 may be configured to rotate in a full circle (e.g., 360 degrees) and/or in a partial circle. The clip 350 may include magnetic material to further facilitate the user in fastening the device 300 to a magnetic surface (e.g., such as a magnetic surface of a mobile device or cover). In other examples, magnetic material may be located along one or more of the side wall(s) 316 of the housing 310.
The device 300 also includes a keychain 395 that is attached to the housing 310 and configured to securely fasten the device 300 to another object of the user. In the illustrated example, the keychain 395 includes an anchor 396, a magnet 397, a ring 398, and a carabiner 399. The magnet 397 is securely housed in the anchor 396, the anchor 396 is coupled to the ring 398, and the ring 398 is coupled to the carabiner 399. Further, the keychain 395 is magnetically coupled to the housing 310. For example, a magnet 394 is fixedly coupled to the housing 310. The magnet 397 of the keychain 395 is configured to magnetically couple to the magnet 394 of the housing 310 to couple the keychain 395 to the housing 310.
The mobile device 50 (e.g., a mobile phone, a smart watch, etc.) of the illustrated example includes processor(s) and memory. The processor(s) may be any suitable processing device or set of processing devices. The memory may include volatile memory, non-volatile memory, unalterable memory, read-only memory, high-capacity storage devices, etc. The memory is computer readable media on which one or more sets of instructions, such as the software for operating the methods of the present disclosure, can be embedded. The instructions may embody one or more of the methods or logic as described herein. For example, the instructions reside completely, or at least partially, within any one or more of the memory, the computer readable medium, and/or within the processor(s) during execution of the instructions.
The mobile device 50 also includes a touchscreen, a GPS receiver, and/or a clock. The touchscreen is configured to present one or more interfaces of a mobile app (e.g., interfaces 1010, 1020, 1030, 1040 of
In the illustrated example, the self-defense device 40 is communicatively connected to the mobile device 50, and the mobile device 50 is communicatively connected to the remote server 60. For example, the self-defense device 40 is communicatively connected to the mobile device 50 via a wireless personal area network (WPAN) connection, such as Bluetooth®. The mobile device 50 is communicatively connected to the remote server 60, for example, via cellular network(s), such as Long-Term Evolution (LTE). With the mobile device 50 serving as a communicative relay, the self-defense device 40 is able to communicate with the remote server 60 without needing to incorporate relatively expensive hardware for cellular communication. Additionally, the remote server 60 is able to collect information originating from the self-defense device 40 and/or originating from the mobile device 50. In other examples, the self-defense device 40 may be configured to communicate directly with the remote server 60.
In operation, the alert system 10 is configured to alert, in real-time, one or more emergency contacts 70, 90 preselected by the user 20 in response to the user 20 spraying the inflammatory agent from the self-defense device 40. For example, when the user presses a button of a spray nozzle of the self-defense device 40 (e.g., the button 134 of the spray nozzle 130) to spray inflammatory agent toward an assailant 30, a sensor of the self-defense device 40 (e.g., the sensor 162) detects that the self-defense device 40 is spraying the inflammatory agent. In response, a processor of the self-defense device 40 (e.g., the processor 164) instructs a communication module of the self-defense device 40 (e.g., the communication module 168) to send a signal, via WPAN communication, indicating that the user 20 has used the self-defense device 40.
The mobile device 50 receives the signal from the self-defense device 40 and relays the signal to the remote server 60. In turn, the remote server 60 is configured to transit an alert to one or more of the emergency contacts 70, 90 of the user 20. For example, the remote server 60 is configured to transmit the alert via a text message (e.g., SMS text messaging), an email, a phone call, a pop-up in an app, etc. In the illustrated example, the emergency contact 70 is a person (e.g., a family member, a friend, a spouse, etc.) of the user 20. In other examples, the self-defense device 40 and/or the mobile device 50 may be configured to send the alert directly to the emergency contacts 70, 90. Further, in the illustrated example, the remote server 60 is configured to transmit the alert to a computing device 80, such as a mobile device, of the emergency contact 90. The emergency contact 90 of the illustrated example is an organization, such as a security company, which may be able to further facilitate the user 20 in fleeing from the assailant 30.
The mobile device 50 also is configured to collect other information, in real-time, associated with use of the self-defense device 40. For example, the mobile device 50 is configured to identify its geolocation, via the GPS receiver, and relay its geolocation to the remote server 60. The mobile device 50 also is configured to collect a timestamp when it receives a signal from the self-defense device 40 and relay the timestamp to the remote server 60. Additionally or alternatively, the mobile device 50 is configured to collect a description of the incident and/or the assailant 30 from the user 20 via a mobile app installed on the mobile device 50. The alert sent by the remote server 60 to the emergency contacts 70, 90 may include the geolocation, the timestamp, and/or other information to enable the emergency contacts 70, 90 to facilitate the user 20 in fleeing from the assailant 30.
The processor(s) 62 may be any suitable processing device or set of processing devices. The memory 64 may include volatile memory, non-volatile memory, unalterable memory, read-only memory, high-capacity storage devices, etc. The memory 64 is computer readable media on which one or more sets of instructions, such as the software for operating the methods of the present disclosure, can be embedded. The instructions may embody one or more of the methods or logic as described herein. For example, the instructions reside completely, or at least partially, within any one or more of the memory 64, the computer readable medium, and/or within the processor(s) 62 during execution of the instructions.
The contacts database 67 is configured to store information of the emergency contacts 70, 90 preselected by the user 20. For example, the contacts database 67 is configured to store a name, a phone number, an email address, etc. of each of the emergency contacts 70, 90 preselected by the user 20. The processor(s) 62 of the remote server 60 are configured to retrieve the contact information of the emergency contacts 70, 90 upon receiving a signal via the communication module 66 that the user 20 has used the self-defense device 40. The processor(s) 62 used the retrieved contact information to subsequently send an alert to the emergency contacts 70, 90 of the user 20.
The events database 68 is configured to store information associated with the event for which the user 20 used the self-defense device 40. For example, the events database 68 is configured to store a description of the event, a description of the assailant, a time stamp of the event, the number of sprays, a location of the event, and/or other information associated with the event that the remote server 60 has received from the mobile device 50 of the user 20. The processor(s) 62 of the remote server 60 are configured to retrieve the information stored in the events database 68 to facilitate analysis of the particular event and/or to identification of trends in reported incidences.
In the illustrated example, the contacts database 67 and the events database 68 are separate databases. In other examples, the remote server 60 may include more or fewer database(s). For example, remote server 60 may include a single database may include the contacts database 67 and the events database 68.
The communication module 66 is configured to enable wired or wireless communication with network(s) and/or other computer device(s), such as the mobile device 50 and/or the self-defense device 40. The network may be a public network, such as the Internet; a private network, such as an intranet; or combinations thereof. The network may utilize a variety of networking protocols. The communication module 66 includes wired or wireless network interfaces to enable communication with the network(s) and/or other computing device(s). The communication module 66 also includes hardware (e.g., processors, memory, storage, antenna, etc.) and software to control the wired or wireless network interfaces. For example, the communication module 66 includes hardware, software, and network interfaces for communication via cellular network(s), such as Long-Term Evolution (LTE); wireless local area networks (WLANs), such as Wi-Fi®; wireless personal area network (WPANs), such as Bluetooth®; etc.
Initially, at block 2010, the mobile device 50 determines whether the mobile device is paired to the self-defense device 40. In response to the mobile device 50 determining that it is not paired to the self-defense device 40, the method 2000 proceeds to block 2020 at which the mobile device 50 is paired with the self-defense device 40. For example, the mobile device 55 is paired to the self-defense device 40 via a WPAN connection, such as Bluetooth®. In some examples, the user 20 uses the interface 1010 of a mobile app to pair the mobile device 50 to the self-defense device. The method 2000 proceeds to block 2030 (1) in response to the mobile device 50 determining at block 2010 that it is paired to the self-defense device 40 or (2) upon completion of block 2020.
At block 2030, the remote server 60 and/or the mobile device 50 determine whether the user 20 has selected emergency contacts. In response to the remote server 60 and/or the mobile device 50 determining that no emergency contacts have been selected, the method 2000 proceeds to block 2040 at which the mobile device 50 and/or the remote server 60 obtains a selection of one or more emergency contacts from the user 20. For example, the user 20 may use the interface 1020 of a mobile app to select the emergency contact(s). The selected emergency contacts may be stored in memory of the mobile device 50 and/or in the contacts database 67 of the remote server 60. The method 2000 proceeds to block 2050 (1) in response to the remote server 60 and/or the mobile device 50 determining at block 2030 that emergency contacts have been selected or (2) upon completion of block 2040.
At block 2050, the self-defense device 40, the mobile device 50, and/or the remote server 60 determines whether the self-defense device 40 has been activated. For example, the self-defense device 40 is activated when the user causes its spray nozzle (e.g., the spray nozzle) to spray the inflammatory agent. In response to the self-defense device 40, the mobile device 50, and/or the remote server 60 determining that the self-defense device 40 has not been activated, the method 2000 returns to block 2010. Otherwise, in response to the self-defense device 40, the mobile device 50, and/or the remote server 60 determining that the self-defense device 40 has been activated, the method 2000 proceeds to block 2060.
At block 2060, the mobile device 50 collects information associated with the activation event of the self-defense device 40. For example, the self-defense device 40 sends information to the mobile device 50 that is indicative of how many sprays occurred during the activation event. Upon receiving a signal from the self-defense device 40, the mobile device 50 records a timestamp (via a clock of the mobile device 50) and/or geolocation (via a GPS receiver of the mobile device 50) associated with the activation event. Additionally or alternatively, the mobile device 50 enables the user 20 to provide a description of the event and/or the assailant via the interface 1040 of a mobile app. Further, the mobile device 50 sends a signal to the remote server 60. The signal sent by the mobile device 50 may include the collected information. In other examples, at least some of the collected information (e.g., the user-provided description of the event and/or assailant) is sent by the mobile device 50 after the initial signal is sent to the remote server 60.
At block 2070, the mobile device 50 and/or the remote server 60 sends emergency alerts to the preselected emergency contacts. For example, upon receiving a signal from the mobile device 50 that indicates the user 20 was involved with an activation event, the remote server 60 retrieves the contact information of the emergency contact(s) of the user 20 from the contacts database 67. The remote server 60 then sends emergency alert(s) to those emergency contact(s) (e.g., via a text message, an email, a phone call, an app pop-up, etc.). At block 2080, the remote server 60 stores the collected information associated with the activation event in the events database 68 for subsequent review. Upon completion of block 2080, the method 2000 ends.
The above-described embodiments, and particularly any “preferred” embodiments, are possible examples of implementations and merely set forth for a clear understanding of the principles of the invention. Many variations and modifications may be made to the above-described embodiment(s) without substantially departing from the spirit and principles of the techniques described herein. All modifications are intended to be included herein within the scope of this disclosure and protected by the following claims.
This application claims the benefit of U.S. Provisional Patent Application Ser. No. 63/437,349, filed on Jan. 5, 2023, and U.S. Provisional Patent Application Ser. No. 63/470,636, filed on Jun. 2, 2023; both of which are incorporated by reference in their entirety.
Number | Date | Country | |
---|---|---|---|
63470636 | Jun 2023 | US | |
63437349 | Jan 2023 | US |