A paging network or cellular text messaging may be used to relay simple alerts or text messages. Some network operators allow a group to be set up that includes a number of subscriber devices to be contacted via a single activation by a sender. However, these groups are maintained at the switch and require deconstruction at the switch or head-end into individually addressed, serial messages. Attempts to scale this technique to hundreds or more users in a conventional system may result in overwhelming the network equipment, imposing long delays between the first and last message delivery, or both.
Cellular-based network messaging, such as SMS or even voice call connection may become slow or unresponsive in an emergency situation traffic can overwhelm both the base station receivers and their associated switches as a result of the spike in volume.
A communication network, such as a paging network, may use customized subscriber devices that each have a shared device identifier (e.g., a CAP code). An authorized user may activate the network to send a message to each subscriber device virtually simultaneously because each subscriber device will process a single incoming message as being directed specifically to itself.
Because the subscriber device is intended for infrequent, as opposed to daily use (business applications, for example) a subscriber device's receiver may use a messaging protocol structured for very long battery life. To simplify operation, a user interface on the subscriber device may be limited to a text display and an audible alarm, with no buttons or entry devices, including no power switch to help ensure the device is always on and ready to receive messages. A small configuration may encourage use as a key fob or other easily carried accessory.
One application for the communication network may include use as a campus-wide alert system for use during an extreme emergency, such as the tragic events at Virginia Tech and Northern Illinois University. Other applications may include high rise buildings, seaports, airports, military bases, etc., where fast distribution of emergency messages may be critical for the public safety. Because a user's wireless device is compact and maintenance-free over a long period, it may be freely distributed not only to students, but also to employees that would not normally have two-way radios, such as professors on a college campus or cleaning crews at an airport.
To assist in identifying the subscriber device, individual units may use school-specific colors or logos.
Although the following text sets forth a detailed description of numerous different embodiments, it should be understood that the legal scope of the description is defined by the words of the claims set forth at the end of this disclosure. The detailed description is to be construed as exemplary only and does not describe every possible embodiment since describing every possible embodiment would be impractical, if not impossible. Numerous alternative embodiments could be implemented, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims.
It should also be understood that, unless a term is expressly defined in this patent using the sentence “As used herein, the term ‘______’ is hereby defined to mean . . . ” or a similar sentence, there is no intent to limit the meaning of that term, either expressly or by implication, beyond its plain or ordinary meaning, and such term should not be interpreted to be limited in scope based on any statement made in any section of this patent (other than the language of the claims). To the extent that any term recited in the claims at the end of this patent is referred to in this patent in a manner consistent with a single meaning, that is done for sake of clarity only so as to not confuse the reader, and it is not intended that such claim term by limited, by implication or otherwise, to that single meaning. Finally, unless a claim element is defined by reciting the word “means” and a function without the recital of any structure, it is not intended that the scope of any claim element be interpreted based on the application of 35 U.S.C. §112, sixth paragraph.
Much of the inventive functionality and many of the inventive principles are best implemented with or in software programs or instructions and integrated circuits (ICs) such as application specific ICs. It is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation. Therefore, in the interest of brevity and minimization of any risk of obscuring the principles and concepts in accordance to the present invention, further discussion of such software and ICs, if any, will be limited to the essentials with respect to the principles and concepts of the preferred embodiments.
Because the key fob-sized device is a convenient size that allows for easy placement in a pocket or purse, the mass messaging wireless device may be carried on one's person at all times. In one embodiment, the keyfob may be permanently attached to a university-issued room key or access card (not depicted), so that a student will necessarily have the device with him or her at all times.
With reference to
In an alternate embodiment, the wireless device 108 may be implemented in custom or semi-custom circuitry, allowing a small, thin profile suitable for attachment to a cellular telephone or iPod™, even though the two devices may operate independently. In another embodiment, the wireless device 108 may transmit a low-power output signal on an FM radio channel to a user's cellular telephone or personal music device (e.g. iPod™).
In yet another embodiment, the wireless device 108 may be constructed without an on/off switch so that a device may not be inadvertently switched off. Similarly, a battery compartment (not depicted) may be sealed so that the battery is not removable or, in some cases, is not rechargeable by users.
The computer 102 may be a standard personal computer with software for coupling to the messaging terminal 104. The interface may be proprietary or may be offered as a web service by the messaging terminal 104. To encourage carrying the wireless device 108, it may follow a campus-specific color scheme or come in a variety of colors.
In operation, when a decision maker determines to send an emergency alert message, he or she may present credentials via the computer 102 to access a messaging application. The credentials may be a simple username/password, or may include a token such as a smartcard or even biometrics. In most cases, particularly in a campus environment, activation of the communication network 100 may be in response to a serious circumstance and only those with sufficient authority and access to accurate information may be allowed access to the communication system 100.
The messaging terminal 104 may be a standard paging terminal/transmitter, supporting, for example, industry standard POCSAG/FLEX™/ReFLEX™ protocols. The system depicted in
Remote access may be supported via a second computer 216, such as a laptop computer, cellular telephone, etc., over a network 218, such as the Internet. Depending on configuration, the remote access may supported directly with the communications controller 204 or through the computer 202. In either case, credentials may be more closely scrutinized to prevent hacking.
Another method for accessing the messaging terminal 204 may be via dial up from a standard telephone 220 via a plain old telephone (POTS), or similar telephone network 222. Presentation of a login sequence of digits may then allow an authorized party to either input a numeric message to be sent, or to select from a menu of predefined text messages. Such predefined text messages may include a variety of safety advice messages such as, “stay in your dorm or classroom,” or “all-clear.”
In the configuration of
The systems of both
A memory 314 may be used should the controller 306 need additional volatile or non-volatile memory. The memory 314 may include program memory, message storage, or both. In one embodiment, a first device identifier 316 may be used as by the controller 306 to select signals intended for itself. In one embodiment, a single device identifier 316 may be used for each wireless device 300 in a system, so that a single broadcast message will be interpreted by each wireless device 300 as intended for itself, and accepted.
In another embodiment, an additional, unique, device identifier 318 may be included so that the wireless device 300 may be sent an individually-targeted message.
The battery 322 may be non-removably mounted in the wireless device 300. In one embodiment, an inductive charger 324 may be incorporated to allow charging, if necessary. In an exemplary deployment on a college campus, the battery and paging system collapse code may be selected to last 9-10 months on a single charge, allowing uninterrupted use for a school year. The collapse code is a system setting that determines how often the wireless device 300 will “wake up” and check for messages. Since even the longest delay is typically a matter of seconds, there would not be a significant delay in getting an emergency message to the wireless device 300.
In one embodiment, the receiver 304 may be hard coded with a device identifier 320 (or CAP code). In this embodiment, the receiver 304 may be programmed at an early manufacturing cycle, e.g. with fusible links, so that the receiver 304 detects the over-the-air signal address before the controller 306 is involved in message processing. Because the wireless device 300 has a long operation life on a single battery, up to a year, screening messages at the receiver 304 may be more power efficient than using the controller 306 to screen incoming messages.
In another embodiment, the additional CAP code 318, or more, as needed, may be used for messages sent in another language, when a target population is sufficiently diverse that more than one language would be helpful in spreading an emergency alert.
A general memory 412 may include both volatile and non-volatile memory structures. The general memory 412 may store operational programs, such as an output routine 414, paging protocol code 416, and public keys 418 that do not require protection from discovery.
The network interface 402 may support both incoming traffic from a user and outbound traffic to a broadcast system 420. In another embodiment, to further secure the system, a private connection may be used to connection to a broadcast system 422.
In operation, the messaging terminal 400 may allow direct access for authenticating a user and sending a message to one or more individual wireless devices, e.g. wireless device 300, or all wireless devices in a communication network, e.g. communication network 200. Alternatively, a user may access the messaging terminal 400 via a telephone set (not depicted) or a local-area or wide-area network, such as a campus Intranet or the Internet, respectively.
If the credentials are not accepted, the “no” branch from block 504 may be taken to block 506 and access may be denied. In some cases, no error message may be returned upon a login failure to deter hacker attempts. In some embodiments, the login process may use known techniques to limit denial of service (DOS) attacks.
If, at block 504, the credentials are accepted, execution may follow the “yes” branch to block 508. If, at block 508 a text message is to be relayed, the body of the message may be received.
At block 510, the message may be sent via a broadcast system, for example, simulcast paging transmitters 206, 208, 210.
A standard paging network allows virtually any user to connect to the paging network and send a message to a single, identified user, or in some cases a limited group of users over a period of time.
In contrast to a standard paging network, the method and equipment described above allow a limited, select group of personnel to send a message to a large community of users at virtually the same instant. The described system allows members of a community to have on their person, in the form of a key fob or pendent, a wireless device that can provide them with almost instant, consistent, and informed news and instructions when a crisis situation occurs. Similarly, security personnel and administrators for that community are provided a tool for quickly disseminating information to the members of the community to prevent rumor and panic from exacerbating a developing situation. Even non-members of the community, such as parents and other loved-ones, can gain assurance from the knowledge that such an alert system is in place to disseminate accurate information in a crisis.
Although the foregoing text sets forth a detailed description of numerous different embodiments of the invention, it should be understood that the scope of the invention is defined by the words of the claims set forth at the end of this patent. The detailed description is to be construed as exemplary only and does not describe every possibly embodiment of the invention because describing every possible embodiment would be impractical, if not impossible. Numerous alternative embodiments could be implemented, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims defining the invention.
Thus, many modifications and variations may be made in the techniques and structures described and illustrated herein without departing from the spirit and scope of the present invention. Accordingly, it should be understood that the methods and apparatus described herein are illustrative only and are not limiting upon the scope of the invention.
This application claims priority to U.S. Provisional Application 61/058,302, filed Jun. 3, 2008, and is incorporated by reference for all purposes.
Number | Date | Country | |
---|---|---|---|
61058302 | Jun 2008 | US |