This invention relates generally to providing private civil security benefits.
Many citizens of the world have long passed the point when a ready availability of the basic necessities of life is satisfactory in and of itself. Today's consumer-oriented citizens demand, and often receive, an incredibly diverse and seemingly ever-growing cornucopia of consuming and experiential options. Such riches are typically based, in turn, upon a highly interdependent series of foundational infrastructure elements. Examples of the latter include, but are certainly not limited to:
transportation infrastructure such as roads, bridges, railways, and so forth that facilitate the inexpensive and rapid movement of sometimes perishable goods from source to consumer;
communications infrastructure such as telephones, television, radio, and the Internet that facilitate the inexpensive and rapid sharing of news, advice, information, and entertainment; and
the totality of civil services such as police services, fire fighting services, medical services, and so forth that facilitate a sufficient degree of order and predictability to, in turn, permit the complex series of inter-related interactions that modern society requires in order to operate.
As powerful as the machinery of modern life appears, however, modern citizens are today perhaps more at risk of experiencing a serious disruption in their ability to prosper or even to survive en mass than is generally perceived. Providing the necessities of life in general requires a lot of things to all operate, more or less, correctly. To put it another way, a serious disruption to any significant element of civilized infrastructure can produce catastrophic results for a broad swatch of a given civil community. Any number of natural and/or non-naturally-caused events can sufficiently disrupt society's infrastructure and ability to provide one or more life-sustaining resources such as hydration, nutrition, shelter, and the like.
Many people believe and trust that their government (local, regional, and/or national) will provide for them in the event of such a civilly-catastrophic event. And, indeed, in the long view such is clearly a legitimate responsibility owed by any government to its citizens. That such is a consummation devoutly to be wished, however, does not necessarily make it so. Hurricane Katrina provided some insight into just how unprepared a series of tiered modern governmental entities may actually be to respond to even basic survival needs when a civilly-catastrophic event occurs.
Such insights, of course, are not particularly new. Civil preparedness shortcomings occasionally attract public attention and niche marketing opportunities exist with respect to provisioning the needs of so-called survivalists. Indeed, there are those who spend a considerable amount of their time and monetary resources attempting to ready themselves to personally survive a civilly-catastrophic event. Therein, however, lies something of a conundrum.
On the one hand, modern governments typically do little to proactively ensure the bulk survival (let alone the comfort) of their citizens in the face of most civilly-catastrophic events. On the other hand, attempting to take responsible actions to reasonably ensure one's own safety and security can become, in and of itself, nearly a full-time avocation and leave little time to actually enjoy the conveniences and opportunities of modern life. Such individual actions may even be frowned upon by the greater part of society which has grown accustomed and falsely secure with existing efficient just-in-time delivery systems that provide the illusion of plenty while undercutting the perception of risk.
As a result, many (if not most) individuals and their families are largely bereft of access to survival resources that they will need should a civilly-catastrophic event befall them. This shortcoming tends to be relatively comprehensive; most people have ready access to neither a sufficient selection of survival supplies nor a sufficient quantity. For people who do have a store of supplies set aside against such an eventuality, it can be a considerable burden to maintain and ensure the freshness, vitality, and usability of those supplies. At the same time, the same civilly-catastrophic event that occasions their need for supplies will also likely disrupt relevant supply chains enough to cause a partial or complete shortage of supplies at their local merchants. The unfortunate net result is a relatively near term severe need for a variety of survival supplies that will often go unmet for lengthy periods of time.
Such persons are also largely without many options when faced with civilly-catastrophic conditions that create a concurrent need for shelter, evacuation, and/or rescue. For example, in many cases, the only available shelter comprises a public facility such as a school, auditorium, or sports venue on the one hand or ad hoc accommodations obtained at a hotel or via a charity or one's own social network. In some cases, such options may be adequate. In many other cases, however, such options quickly prove inadequate or even dangerous in and of themselves. Even in cases where public civil security resources in the aggregate may be adequate, significant problems can arise with respect to properly deploying such resources to ensure that needed resources are provided to those in need while simultaneously avoiding waste, confusion, or unnecessary loss.
The above needs are at least partially met through provision of the method and apparatus to facilitate deployment of one or more private civil security resources described in the following detailed description, particularly when studied in conjunction with the drawings, wherein:
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions and/or relative positioning of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of various embodiments of the present invention. Also, common but well-understood elements that are useful or necessary in a commercially feasible embodiment are often not depicted in order to facilitate a less obstructed view of these various embodiments of the present invention. It will further be appreciated that certain actions and/or steps may be described or depicted in a particular order of occurrence while those skilled in the art will understand that such specificity with respect to sequence is not actually required. It will also be understood that the terms and expressions used herein have the ordinary meaning as is accorded to such terms and expressions with respect to their corresponding respective areas of inquiry and study except where specific meanings have otherwise been set forth herein.
Generally speaking, pursuant to these various embodiments and prior to an occurrence of an applicable civilly-catastrophic event, one provides a memory having information stored therein regarding authorized beneficiaries of consideration-based private civil security subscriptions that provide civilly-catastrophic event-based access to at least one private civil security resource. One then also provides a processor that is operably coupled to this memory and that is configured and arranged to use this information to facilitate deployment of the private civil security resource on behalf of at least one of the authorized beneficiaries in response to circumstances as correspond to a civilly-catastrophic event. A processor interface can then be provided that operably couples to this processor to further assist with such facilitation.
By one approach, a plurality of such processor interfaces can be so provided. Such processor interfaces can comprise, by one approach, a user interface to thereby facilitate the provision of information and/or queries to the processor and/or the provision of information (such as deployment recommendations or instructions) from the processor to a corresponding user. So configured, a relatively large number of private civil security personnel can be coordinated and instructed with respect to their respective actions or inaction. Such processor interfaces can also comprise, if desired, an automaton interface to thereby facilitate automated responses to the deployment strategies of the processor.
If desired, such a processor can further base its private civil security deployment processing upon additional information. Examples in this regard include, but are not limited to, information regarding a given civilly-catastrophic event (including, for example, classification information regarding this particular event) as well as a variety of information regarding various factors that can relate to the ease, or lack of ease, by which such deployment actions can be successfully carried out.
So configured, the deployment of various private civil security resources (including, for example, any of private civil security provisions, private civil security facilities, and/or private civil security services) can be rationally and quickly effected under the most trying of circumstances. This, in turn, can aid with avoiding delays, confusion, and/or errors that might otherwise arise due to human cognitive overloading during a civilly-catastrophic event-based time of need. As a result, the authorized beneficiaries of such benefits are more concretely assured of a timely, effective, and tangible delivery of necessary and expected private civil service benefits notwithstanding trying circumstances that might otherwise materially disrupt such a concrete result.
These and other benefits may become clearer upon making a thorough review and study of the following detailed description. Referring now to the drawings, and in particular to
As used herein, “private” will be understood to refer to the opposite of public ownership or control (as exemplified by governmental or ecclesiastical ownership or control) but can include such things as ownership or control via publicly traded ownership (via, for example, publicly traded stock or the like), ownership or control via a not-for-profit entity, or the like. By one approach, these subscriptions may be accepted by, for example, a for-profit business. By another approach a not-for-profit business (such as a membership-based-entity) may be the appropriate entity to offer and accept such subscriptions.
As used herein, the term “subscription” shall be understood to refer to and encompass a variety of legal mechanisms. Some relevant examples include, but these teachings are not limited to, subscription mechanisms such as:
time-limited rights of access (as where a subscription provides access rights for a specific period of time, such as one year, in exchange for a corresponding series of payments);
event-limited rights of access (as where a subscription provides access rights during the life of a given subscriber based upon an up-front payment in full and where those access rights terminate upon the death of the subscriber or where, for example, a company purchases a subscription for a key employee and those corresponding rights of access terminate when and if that key employee leaves the employment of that company);
inheritable rights of access (as may occur when the subscription, by its own terms and conditions, provides a right of access that extend past the death of a named subscription beneficiary and further provides for testate and/or intestate transfer to an heir);
rights of access predicated upon a series of periodic payments (as where a subscription provides access rights during, for example, predetermined periods of time on a periodic basis as where a subscriber offers month-by-month payments to gain corresponding month-by-month access rights);
rights of access predicated upon a one-time payment (as may occur when a subscriber makes a single payment to obtain a time-based or event-based duration of access rights or, if desired, when a single payment serves to acquire a one-time-only right of access or a perpetual right of access that may be retained, transferred, inherited, or the like);
ownership-based rights of access (as may occur when the subscription provides for ownership rights with respect to the civil security resources, when the subscription is based upon shareholder-based ownership of the provider of such civil security resources, or the like);
non-transferable rights of access (as may occur when the subscription, by its terms and conditions, prohibits transfer of the right of access to the civil security resources from a first named beneficiary to another);
transferable rights of access (as may occur when the subscription, by its terms and conditions, permits conditional or unconditional transfer of the right of access from a first named beneficiary to another);
membership-based rights of access (as may occur when the subscription, by its terms and conditions, establishes a membership interest with respect to the accorded right of access such as, for example, a club-based membership); fractionally-based rights of access (as may occur when the subscription, by its terms and conditions, establishes a divided interest by and between multiple subscription beneficiaries with respect to a right to access the civil security resources);
non-ownership based rights of access (as may occur when the subscription, by its terms and conditions, establishes the aforementioned right of access via, for example, a lease, a rental, or borrowing construct);
option-based rights of access (as may occur when the subscription, by its terms and conditions, establishes a right for an authorized beneficiary to later obtain access to some or all such civil security resources upon, for example, paying an additional supplemental amount at that time);
credit-based rights of access (as may occur when a given individual predicates their right to access the civil security resources upon a representation, promise, or other credit-based transaction); and
group-based rights of access (as may occur when a given subscription requires that the authorized beneficiary belong to a particular group such as, for example, a particular club or organization, the employees of a particular enterprise, or the residents of a particular area (such as a metropolitan area, a county, a state, a country, or the like);
to note but a few examples in this regard.
As used herein, “civilly-catastrophic event” will be understood to refer to an event that substantially and materially disrupts a society's local, regional, and/or national infrastructure and ability to provide in ordinary course for at least one life-sustaining resource. Such a civilly-catastrophic event can include both a precipitating event (which may occur over a relatively compressed period of time or which may draw out over an extended period of time) as well as the resultant aftermath of consequences wherein the precipitating event and/or the resultant aftermath include both the cause of the infrastructure interruption as well as the continuation (or worsening) of that interruption.
A civilly-catastrophic event can be occasioned by any of a wide variety of natural and/or non-naturally-caused disasters. Examples of natural disasters that are potentially capable of initiating a civilly-catastrophic event include, but are not limited to, extreme weather-related events (such as hurricanes, tsunamis, extreme droughts, widespread or unfortunately-targeted tornadoes, extreme hail or rain, and the like, flooding, and so forth), extreme geological events (such as earthquakes, volcanic activity, and so forth), extreme space-based events (such as collisions with comets, large asteroids, and so forth, extreme solar flares, and the like), extreme environmental events (such as widespread uncontrolled fire or the like), and global or regional pandemics, to note but a few.
Examples of non-naturally-caused disasters capable of initiating a civilly-catastrophic event include both unintended events as well as intentional acts of aggression such as war, terrorism, madness, or the like. Examples of non-naturally-caused disasters capable of such potential scale include, but are not limited to, nuclear-related events (including uncontrolled fission or fusion releases, radiation exposure, and so forth), acts of war, the release of deadly or otherwise disruptive biological or chemical agents or creations, exposure to a harmful mutagenic influence, and so forth.
By one approach, such access can be provided at the whim and convenience of the authorized beneficiaries. If desired, however, such access can be further conditioned in appropriate ways. For example, for many purposes and certainly as pertains to many of the civil security resources it may by appropriate to ordinarily limit such access to situations where such access is triggered, at least in part, by a civilly-catastrophic event having occurred or being likely imminent. Such access may be predicated, if desired, upon a requirement that the civilly-catastrophic event be one that persists in substantial form for more than a predetermined period of time (such as one hour, one day, one week, and so forth) or that causes at least a predetermined amount or degree of infrastructure impairment or other measurable impact of choice (such as a particular level or degree of harm, interference, or negative impact upon a given minimum number of people). In addition, or in lieu thereof, such access may be predicated, if desired, upon a requirement of a particular level of objectivity or subjectively ascertained likelihood that a particular category or kind of civilly-catastrophic event will occur within a particular period of time.
If desired, information regarding the authorized beneficiaries of a plurality of differentiated subscription opportunities may be included in this regard. This plurality of differentiated subscription opportunities can correspond, for example, to providing access to differing selections and/or quantities of the civil security resources. As but one very simple illustration in this regard, such subscription opportunities can differ from one another at least with respect to cost. This, in turn, provides subscriber choice with respect to selecting a particular subscription that best meets their specific needs and/or budget limitations.
As will be shown below, information regarding how a given authorized beneficiary may likely behave during a variety of civil security challenges may be available in some cases. In such a case, it would also be possible to vary the amount of consideration required to provide such a subscription to such an authorized beneficiary and/or to vary the type of civil security benefits/resources that are offered to such an authorized beneficiary. Generally speaking, relatively reduced amounts of consideration may be required for (or a relatively wider range of civil security resources offered to) authorized beneficiaries who appear to comprise relatively trouble-free (or even helpful) participants in a civil security activity while relatively higher amounts of consideration may be required for (or certain civil security resources denied to) authorized beneficiaries who appear to represent a greater challenge in these regards.
These teachings also readily encompass the notion of a given subscriber providing such a subscription for an authorized beneficiary other than themselves. Such might occur, for example, when one family member procures such a subscription for one or more other family members. Another example would be for a company to subscribe on behalf of named key employees, family members of such key employees, and so forth. Other examples no doubt exist.
The stored information can comprise any of a wide variety of content as pertains to the authorized beneficiaries. A non-exhaustive listing of possibly relevant examples might include (but not be limited to) information regarding one or more of:
Such information regarding the authorized beneficiary can be obtained in a single data-gathering activity/event or over time and pursuant to any number of data collection opportunities. This can also include updating such information from time to time and/or as appropriate to reflect changing circumstances, preferences, and new, additional information.
Such information may be secured and protected as desired to limit access to and/or the use of such information to thereby protect the privacy and identity of the authorized beneficiaries. This can comprise, for example, storing such information in a physically protected facility that employs physical and procedural barriers, storing such information in one or more backup or redundant storage platforms/facilities to assure the persistence and availability of such information, the use of controlled and/or auditable access techniques and protocols, data isolation platforms and procedures (including but not limited to read and write access controls), encryption, and so forth. By one approach, such information can be effectively retained in a manner that largely (or completely) precludes access or viewing by any persons. By another approach, such information, at least in part, can be rendered available to at least a limited class of personnel who have a mission-related need-to-know during a civilly-catastrophic event-based time of need.
This process 100 then provides for providing 102 a processor interface. This processor interface can assume any of a wide variety of interfaces, including both human and automaton interfaces. Further discussion regarding such a processor interface appears below where relevant.
This process 100 then provides 103 a processor that is operably coupled to both the memory and the processor interface. This processor is configured and arranged to facilitate deployment of the aforementioned private civil security resource on behalf of at least one of the authorized beneficiaries in response to circumstances as correspond to a civilly-catastrophic event. Further elaboration in this regard will also be presented further below.
Upon detecting 104 an occurrence of a civilly-catastrophic event (which may comprise detecting the event itself by direct or indirect indicia or may comprise determining the existence of a clear and present imminent likelihood that the event will so occur), this process 100 then provides for using 105 the information from the memory regarding the authorized beneficiaries to facilitate deployment of the private civil security resource on behalf of the authorized beneficiaries in response to circumstances as correspond to the civilly-catastrophic event. Such facilitation can assume any of a number of substantive and/or procedural forms.
As one example in this regard, such facilitation can comprise, at least in part, selecting a particular authorized beneficiary contact protocol (from a plurality of candidate authorized beneficiary contact protocols) to employ with respect to deploying the private civil security resource. To illustrate, the private civil security resource may comprise private civil security provisions that are to be delivered to the particular authorized beneficiary during a civilly-catastrophic event-based time of need. One candidate protocol might provide, for example, for such a delivery to occur within a particular time frame regardless of whether the provider of civil security benefits has established any contact with this authorized beneficiary to determine whether such a delivery should, in fact, proceed. Another candidate protocol might provide, instead, for such a delivery to only proceed following receipt of specific instructions from the authorized beneficiary that the civil security provisions are to be delivered.
As another illustrative example in this regard, when the aforementioned information regarding the authorized beneficiary comprises information regarding a right, via a given one of the consideration-based private civil security subscriptions, to optionally acquire emergency supplies (such as, but not limited to, building materials, barrier creation materials, and/or additional civil security provisions of one sort or another) in the event of a given recognized civilly-catastrophic event having occurred or, optionally, being imminently likely, such facilitation can comprise, at least in part, facilitating an interactive order-taking process, preparing a staging area from which such emergency supplies can be delivered, sending project specialists to the field to assist such authorized beneficiaries with estimating the emergency supplies that they should or could be acquiring, and so forth, This can further comprise, if desired, providing for optional access to temporarily renting, leasing, or otherwise having and using construction tools and equipment (such as hand tools, power tools, scaffolding, ladders, hoists, earthmovers, and the like).
By one approach, the use of such information can be further supplemented with other information 106. In particular, the aforementioned facilitation of civil security resource deployment can be further conducted, at least in part, as a function of information regarding at least one of:
Such other information can be provided from any of a wide variety of sources. These sources can be public or private and can even derive, if desired, from sensors and other monitors as are carried by or installed with the permission and acquiescence of one or more of the authorized beneficiaries. Such sensors/monitors can comprise real-time or near-real time data accumulators, if desired, and can provide their content on a real-time and/or occasional batched basis. The information captured and reflected in this way can vary with the technology employed. Examples in this regard can include, but are not limited to:
By one approach, then, and referring now to
As one illustrative example in this regard, the stored specific information regarding a given authorized beneficiary might, in a given instance, reveal that this particular authorized beneficiary has a shelter in their home basement. This information can further comprise specific information that characterizes the nature of the shelter with respect to its structural integrity, its size, its appropriateness for various kinds and categories of civilly-catastrophic events, and so forth (for example, such information might reveal that the shelter has a relatively high degree of structural integrity but lacks an ability to protect an inhabitant from airborne threats such as dangerous gases). When the other information, such as information regarding the nature of a given civilly-catastrophic event, reveals that the inability of this shelter to protect its inhabitants from airborne threats represents an immediate danger to the authorized beneficiary, such deployment facilitation can comprise immediately effecting deployment of a rescue effort to extract the authorized beneficiary from exposure to the civilly-catastrophic event-based threat. Similarly, when the information regarding the nature of the civilly-catastrophic event reveals that the authorized beneficiary's shelter is sufficient to protect the authorized beneficiary, an unnecessary rescue deployment can be avoided.
Those skilled in the art will understand and appreciate that these teachings are readily applied in conjunction with the deployment of a wide variety of civil security resources. With reference to
Generally speaking, both the civil security provisions 302 and the civil security facilities 303 are physical components rather than virtual or products of the intellect. For example, the civil security provisions 302 will typically comprise physical support and/or protection of one kind or another. Similarly, the civil security facilities 303 will also typically comprise physical assets such as, but not limited to, physical civil security shelters that provide real, substantive physical protection from physical threats to human life. The civil security services 304, however, can comprise either physical, real world services or virtual services.
The private civil security provisions 302 can comprise, for example, a plurality of life-sustaining resources as pertain to a plurality of differing categories of life's necessities. Examples in this regard include, but are not limited to, such elemental staples as water (which can comprise water in a pure or impure state and/or other water-based palatable fluids), food (which can comprise a wide variety of raw to highly processed food, nutritional supplements, and so forth), and protective clothing (where “protective” will be understood to refer to protection against one or more potentially hazardous environmental influences such as temperature extremes, precipitation, high velocity winds, and the like but not to matters of fashion, social comment, or the like). These civil security provisions 302 can further optionally include such components as breathable air (which may comprise, for example, a fresh air supply, an oxygen supply that can serve as a source of oxygen to mix with other atmospheric components, and/or personal or area air filters that serve to remove harmful airborne contaminants from the air prior to being inhaled by an authorized beneficiary), deployable shelters (where “deployable” will be understood as referring to portable shelters such as tents, canopies, inflatable structures, and the like), and other items as may be appropriate to meet the needs of a given application setting.
By one approach, these civil security provisions 302 can be provided in a pre-deployment aggregated form. Such might be the case, for example, when accumulating such material at a warehouse or the like. These teachings will also accommodate, however, forming such civil security provisions 302 into corresponding units of civil security provisions. To illustrate, one such unit of civil security provisions as intended, for example, for a single authorized beneficiary might comprise, at least in part, consumable fluids, food, medical supplies, personal hygiene supplies, and environmental threat abatement supplies (such as, for example, breathing masks, so-called haz-mat garb, and the like). Such a unit of civil security provisions might comprise, for example, a short term unit that comprises a quantity and variety of civil security supplies that are adequate to sustain life for that one authorized beneficiary for, say, at least three days and no more than, say, about fifteen days. As another illustrative example, such a unit of civil security provisions might comprise a longer term unit that comprises a quantity and variety of civil security supplies that are adequate to sustain life for that authorized beneficiary for, say, at least about thirty days but no more than, say, about one year.
Those skilled in the art will recognize and understand that there are various ways by which such adequacy can be determined, measured, and/or established. For example, by one approach, the adequacy of any food contents can be determined as a function of a particular target caloric intake per person on a per day basis. Similarly, the adequacy of any consumable fluid contents could be determined as a function of a particular target quantity intake per person on a per day basis.
The particular time frames suggested in the above examples are intended only to serve an illustrative purpose and are not to be construed as limitations with respect to the practice of these teachings. Those skilled in the art will also appreciate and understand that such a unit of civil security provisions can comprise a quantity of supplies that are intended to support more than one authorized beneficiary for the given period(s) of time. For example, such a unit might comprise a family unit that contains sufficient contents to adequately sustain life for a family of four authorized beneficiaries.
These teachings will also accommodate providing civil security provisions 302 that differ from one another in ways other than by category or kind. For example, both branded and generic versions (or other differentiators with respect to quality) of a same kind of item can be provided if desired. It is also possible for non-survival related items, such as various luxury items, to also be included for provision to certain authorized beneficiaries.
The civil security facilities 303 can comprise various facilities as have application with respect to protecting such authorized beneficiaries from the effects (including the aftermath, if any) of a civilly-catastrophic event. These civil security facilities 303 will typically comprise physical assets that tend, categorically, to comprise part of a private civil security infrastructure. Such civil security facilities 303 can therefore comprise, for example:
These teachings will readily accommodate a wide variety of civil security shelters. For example, such civil security facilities 303 can comprise both temporary civil security shelters and long term civil security shelters. A temporary civil security shelter will be understood to comprise a shelter that is configured and arranged to adequately shelter and sustain human life for a relatively short period of time. For example, such a temporary shelter might prove sufficient in this regard for, say, no more than about ten inhabitants for no more than about one week, ten days, 15 days, and the like. Generally speaking, a temporary shelter such as this is designed and intended to only serve as a temporary refuge from the effects of a civilly-catastrophic event. Should longer term accommodations be necessary in a given instance, the inhabitants of such a temporary shelter will often be better served to move to a long term civil security shelter.
A long term civil security shelter will be understood to comprise a shelter that is configured and arranged to adequately shelter and sustain human life for a relatively longer period of time. For example, such a temporary shelter might provide sufficient in this regard for, say, no more than about 100 inhabitants for up to about three months, six months, one year, or the like.
These teachings will also readily accommodate the provision of a longer term civil security shelter up to and including an indeterminate term civil security shelter that is configured and arranged to adequately shelter and sustain human life for an indeterminately long period of time. A shelter of this type will typically be characterized not only by an ability to protect its inhabitants against the rigors of the local environment and to contain a relatively large and varied supply of provisions, but by an ability to exist and operate in a fully or at least substantially independent manner. This can relate in particular to an ability to create and/or otherwise replace its consumable provisions (by, for example, growing food, creating power, and so forth).
It is also possible for such shelters to differ from one another in other ways. For example, such shelters may differ with respect to the non-survival related amenities that are provided. These differences can relate to categories of amenities (such as educational facilities, workshop facilities, food preparation facilities, communications facilities, entertainment and/or recreational facilities, or the like) and/or to a relative level or perception of quality, comfort, convenience, or the like. These teachings will also accommodate application settings that employ fractionally possessed shelters where a given civil security shelter, such as a substantially underground facility, is fractionally possessed, at least in part, by a plurality of different authorized beneficiaries.
The aforementioned civil security services 304 can comprise any of a relatively wide variety of offerings. Some examples include, but are certainly not limited to:
By one approach, these teachings will readily accommodate providing such civil security provisions 302, civil security facilities 303, and civil security services 304 by a single provider. Such a provider can be integrally involved with designing, providing, maintaining, and offering such civil security resources 301 or can comprise an aggregator of such resources, in whole or in part, from other sources. If desired, however, these teachings can be flexibly applied in other ways. For example, the civil security provisions 302 can be provided by a first provider, the civil security facilities 303 can be provided by a second provider, and the civil security services 304 can be provided by a third provider wherein the first, second, and third providers comprise separate entities (as when, for example, these providers comprise separate legal entities having no co-ownership or common points of control). In such a case, these separate providers can meet the needs of this step by acting in an aggregated manner (directly or indirectly) with one another.
Yet other arrangements are possible. For example, a single provider can provide the civil security facilities 303 and the civil security services 304 while the civil security provisions 302 are provided by a plurality of civil security provisions providers represented here by a first civil security provisions provider through an Nth civil security provisions provider (where “N” will be understood to comprise an integer greater than one). Persons skilled in these arts will understand and appreciate that numerous permutations and combinations of these elements as well as other possibilities are available. Such alternatives are well within the scope of these teachings and are rightly considered to comprise a part of this invention.
As noted earlier, these teachings will also optionally provide for the provision of non-civil security resources. Such non-civil security resources comprise supplies and items that are not, strictly speaking, necessary to ensure human survival and hence may be viewed as luxuries. Such items can quite literally span the full gamut of available offerings and can include both unique (such as original works of art) and generally available offerings (such as jewelry, pleasure reading materials, audio playback devices, and so forth). Again, differentiations can exist with respect to actual or perceived levels of quality as pertain to such items if desired.
It should be clear that a comprehensive civil security program having a substantial number of the above-described components inherently presents a high number of permutations and combinations regarding deployment opportunities. In some cases, certain resources might be pre-deployed well prior to any particular civilly-catastrophic event. Temporary civil security shelters and a short term supply of civil security provisions, for example, can be distributed and/or provided to at least some authorized beneficiaries prior to a civilly-catastrophic event. Such pre-distribution of resources, however, cannot always address the complete challenge of deployment.
For example, not all of the civil security resources noted are necessarily suitable or even useful for meeting the needs and challenges of every civilly-catastrophic event. Specific civilly-catastrophic events, by their very nature, their unique intensity, and/or the relevant characterizing frailties and/or resiliency as correspond to a given event setting can engender very different needs on the part of such authorized beneficiaries. Different kinds of shelter and/or different kinds of provisions, for example, may be appropriate depending upon the nature of the civilly-catastrophic event. In some cases, local shelters may be sufficient and/or a deployment of survival-related provisions to the home of an authorized beneficiary will be adequate, sufficient, and even preferable from the viewpoint of all parties concerned. In other cases, evacuation may be necessary and re-location of the authorized beneficiary (either temporarily or even permanently) may be advisable or necessary. This, in turn, would render deployment of significant civil security provisions to the present location of the authorized beneficiary a waste of effort and materials.
By taking into account the kinds of information noted above, including, in particular, specific personal information regarding the authorized beneficiaries themselves provides a basis for the processor to identify appropriate deployment suggestions and/or mandatory instructions. This can relate generally to one or more of:
When to deploy a given civil security resource (for example, prior to an imminently expected civilly-catastrophic event or subsequent thereto, prior to having established any contact with an intended recipient authorized beneficiary or only after establishing such contact, and so forth);
Where to deploy a given civil security resource (for example, whether to deliver civil security provisions to a given authorized beneficiary at a first location, such as a home, or a secondary location such as a contingency delivery site, whether to preposition civil security transport vehicles proximal to a particular urban area that is expected to imminently experience a civilly-catastrophic event or within that urban area, and so forth);
How to deploy a given civil security resource (for example, whether to retain a given civil security resource in storage pending a clear and present need for that particular resource or to increase the deployment readiness of that resource to facilitate more rapid deployment should such become necessary, whether to provide particular civil security suggestions, recommendations, and/or instructions via a civil security-based television and/or radio broadcast that is generally receivable by all members of the public or via a private channel of communication intended substantially only for authorized beneficiaries, and so forth);
To whom to deploy given civil security resources (to thereby facilitate, for example, providing different civil security provisions, facilities, or services to different authorized beneficiaries to account for their differing needs and preferences notwithstanding their both having experienced a same kind of civilly-catastrophic event, and so forth);
to note but a few examples in this regard.
As noted above, these teachings are highly flexible and scalable and will accommodate a wide variety of application settings and needs. As an illustrative example in this regard, and referring now to
Other forms of installation diversity could also be employed if desired. For example, one such processor could comprise a fixed location installation while the redundant processor could comprise a mobile platform that could be moved from time to time. As another example, one such processor could be installed below the ground while another such processor is installed beneath a body of water.
Such a processor 201 could couple, via a corresponding memory interface 402 (and possibly through an intervening network 403 such as, but not limited to, an intranet or an extranet such as the Internet) to a memory 404 that serves to store the aforementioned information regarding the authorized beneficiaries of consideration-based private civil security subscriptions that provide civilly-catastrophic event-based access to one or more private civil security resources. As with the processor 201, one or more redundant memories 405 can be provided if desired to again provide an improved ability to persist such information notwithstanding a civilly-catastrophic event that might damage, destroy, or otherwise render unavailable such a memory 404.
This particular illustrative example of a civil security system 400 also provides a processor interface 406 that operably couples to the processor 201 (via, for example, the aforementioned network 403 when present). Such a processor interface 406 can be configured and arranged to provide access to the processor 201 to thereby facilitate deployment of the aforementioned civil security resources on behalf of the authorized beneficiaries in response to circumstances as correspond to a civilly-catastrophic event.
This processor interface 406 can comprise, for example, a user input and/or user output platform. A user input might comprise, for example, a text entry mechanism (such as a keyboard, a cursor control device, a speech recognition platform, and so forth). Such a user input could serve to permit the provision of information to the processor 201 to further inform the deployment calculations thereof or to provide, for example, a query to the processor 201 regarding needed instructions or information. It will also be understood that the processor interface 406 can comprise a World Wide Web-based interface (such as a browser-based platform) or any other client or application-based platform as may be desired.
A user output platform might comprise, for example, a display of choice (including any of a wide variety of monochrome and color displays, solid state and vacuum tube-based displays, and so forth), an audio transducer (including, for example, a text-to-speech synthesizer), and so forth. Such a display could be configured and arranged, for example, to display information as is provided by the processor 201 regarding suggested, optional, and/or mandatory recommendations or orders regarding deployment of the private civil security resources when responding to needs stemming from a given civilly-catastrophic event. As noted above, this can comprise the provision of such information with respect to actions to take with respect to one or more of the aforementioned civil security provisions, civil security facilities, and civil security services with respect to one or more of the authorized beneficiaries.
These teachings would readily accommodate the provision of more than one such processor interface 406 as is represented generally in
It would also be possible to configure such a processor interface as a portable and/or wearable platform. So configured, private civil security provider field operatives (such as, but not limited to, transport and delivery vehicle personnel, rescue personnel, and so forth) would have similar access to the processor 201 and corresponding deployment advice and instructions. Such a portable and/or wearable platform could also be provided to one or more of the authorized beneficiaries for much the same reason.
As noted above, these teachings will further accommodate maintaining such civil security resources. This can comprise, for example, maintaining the freshness and usability of civil security provisions (by replacing outdated or soon-to-be outdated supplies), replacing an existing resource with a better substitute, maintaining present and/or imminent usability of a civil security shelter or transport vehicle, updating civil security-related information to reflect current data and intelligence, vetting and re-vetting predetermined evacuation and/or transportation routes, educating and training corresponding personnel, and so forth. If desired, the aforementioned processor 201 and corresponding civil security system 200 can be further configured and arranged to facilitate such maintenance. As one simple example in this regard, the processor 201 can be configured and arranged to provide scheduled maintenance information via the processor interface 406.
Such maintenance can again be at least partially carried out as a function, at least in part, of the stored information regarding the authorized beneficiaries. As one simple example in this regard, one civil security subscription may differ from another with respect to the minimal freshness of the civil security provisions as correspond to that subscription. In such a case, information in this regard as is available from the aforementioned memory 404 can serve to inform the maintenance process to facilitate ensuring that the civil security provisions as are stored in readiness for such authorized beneficiaries is rotated and otherwise maintained in a suitably fresh state.
As noted earlier, such a processor 201 can also base its deployment output upon information regarding the relevant civilly-catastrophic event(s) itself As an illustrative example in this regard, and with reference now to
This incoming data can vary greatly with the needs and/or opportunities of a given application setting. Some useful examples, however, would likely include information regarding a likelihood of at least one of:
a given civilly-catastrophic event occurring;
a given civilly-catastrophic event persisting for at least a predetermined amount of time;
a given civilly-catastrophic event occurring with respect to a particular geographic locale; and/or
a given civilly-catastrophic event exhibiting at least a particular level of impact with respect to corresponding civil infrastructure;
to note but a few examples in this regard.
The civilly-catastrophic event classification platform 501, in turn, can be configured and arranged to use such data to form, for example, one or more classifications of the corresponding civilly-catastrophic event. This might comprise a classification regarding, for example, a given category of civilly-catastrophic event (such as, for example, an event that only poses a mortal threat to exposed humans over a relatively long period of time, an event tending to present an immediate mortal threat to exposed humans, and so forth). As another example, this might comprise a classification regarding, for example, a given kind of civilly-catastrophic event (such as, for example, a natural or non-natural event, a weather-related event, as slowly-developing event, a politically-motivated event, and so forth). As yet another example in this regard, this might comprise a classification regarding, for example, a given magnitude of a civilly-catastrophic event (where such magnitude can be expressed using a metric of characterization of choice and can relate, for example, to peak intensity, average or median intensity, root mean squared-represented intensity, historical comparisons, duration, a logarithmic representation, and so forth).
By one approach, if desired, this classification can comprise classification of a given civilly-catastrophic event with respect to a classification system that uses a discrete number of classification levels. To illustrate and without intending any particular limitations in this regard, this could comprise a four or five level classification system. Such a classification system could comprise a public classification system such as that employed to rank hurricanes and tornados. Such a classification system could also comprise, in whole or in part, a private classification system that is at least substantially maintained by the provider of the private civil security resources.
These classifications may be provided on an event-by-event basis or may, if desired, constitute a dynamic classification that can vary throughout a single given civilly-catastrophic event. It would also be possible to use such a classification approach to classify the aftermath portion of a given civilly-catastrophic event. In such a case, the classifications could serve to represent the ease or difficulty by which one may expect to:
Communicate with authorized beneficiaries within an afflicted area;
Deliver civil security provisions to authorized beneficiaries within an afflicted area;
Locate authorized beneficiaries within an afflicted area;
Rescue authorized beneficiaries within an afflicted area;
Transport authorized beneficiaries within, through, and/or from an afflicted area;
Maintain civil security viability within a shelter in the afflicted area;
Maintain operational viability and effectiveness of private civil security facilities located within the afflicted area;
Attend to the medical requirements of authorized beneficiaries within an afflicted area;
and so forth, to note but a few relevant examples in this regard.
Such a civilly-catastrophic event classification platform 501 can provide such classification information to the aforementioned processor 201 by any means including, for example, via a processor interface 406 and intervening network 403 as has been described earlier. As noted earlier, this processor 201 can be configured and arranged to use such classification information to further inform its deployment determinations. Consider, for example, an illustrative example in this regard (where again the details of this example are intended only for the purposes of illustration and are not intended to suggest any particular limitations in this regard) where a four level classification system serves to rank civilly-catastrophic events with respect to their likely impact upon a given authorized beneficiary.
In this illustrative example, when the civilly-catastrophic event classification platform 501 classifies a given civilly-catastrophic event as a first level civilly-catastrophic event (meaning, in this example, that the civilly-catastrophic event constitutes a relatively mild event) the processor 201 might determine to wait for authorized beneficiaries to proactively signal a need for civil security resources access before facilitating such access and even before taking significant preparatory private civil security resources deployment actions. This, of course, may also depend upon the specific terms and conditions of a given private civil security subscription and/or the preferences or requirements as pertain to individual authorized beneficiaries. It would be possible, for example, for a given authorized beneficiary to require an immediate automatic provisioning of their private civil security provisions upon the occurrence of a first level civilly-catastrophic event notwithstanding that the private civil security provider's actions will otherwise tend towards the more reactive posture described above. Such individual requirements, of course, would be available to the processor 201 via the above-described memory.
To continue this illustrative example, when the civilly-catastrophic classification platform 501 classifies a given civilly-catastrophic event as a second level civilly-catastrophic event (meaning, in this example, that the civilly-catastrophic event constitutes a relatively more harsh event), the processor 201 might determine now to continue waiting for particular authorized beneficiaries to proactively signal their need for private civil security resources access but to also proactively take one or more significant preparatory private civil security resources deployment actions. This might comprise, for example, ensuring that transport vehicles are fully fueled, that delivery personnel are available, that aggregated provisions appropriate for corresponding targeted authorized beneficiaries are formed from dis-aggregated mass stocks, that potential evacuation routes are vetted by on-site inspections, that civil security provisions en mass are pre-positioned near or in the afflicted area to permit a more rapid distribution of such provisions should the need arise, that medium-term civil security shelters may be prepared for possible habitation, that medical supplies (such as respirators or the like) may be moved from other locations to be rendered more available in the event of their need, and so forth. Again, the ordinary response to a level two civilly-catastrophic event can be modified for individual authorized beneficiaries as a function of the contents of their personal stored information.
To continue further with this illustrative example, when the civilly-catastrophic classification platform 501 classifies a given civilly-catastrophic event as a third level civilly-catastrophic event (meaning, in this example, that the civilly-catastrophic event constitutes a considerably more harsh event), the processor 201 might determine now to initiate an attempt to contact the authorized beneficiaries to determine whether access to the private civil security resources should be effected. Such attempts at contact could be conducted using any of a variety of approaches. By one approach, for example, operators for the provider of private civil security resources could attempt making such contact using telephones (either wireless or wired), short wave radio, email, instant messaging, satellite transceivers, or the like. It would also be possible to use an automaton for such purposes. For example, an automated dialing system could use synthesized and/or pre-recorded speech content to provide selected messages and queries to the contacted authorized beneficiaries and voice recognition, key pad entries, or the like to ascertain the authorized beneficiary's responses to such content.
When such attempts fail in individual instances, the processor 201 might then further determine to automatically take steps to proactively provide the particular authorized beneficiaries with access to their corresponding private civil security resources. This could comprise, for example, automatically delivering private civil security provisions to a predetermined location as pertains to each authorized beneficiary (as revealed by the stored information as corresponds to the authorized beneficiaries), automatically dispatching rescue personnel to locate and extract the authorized beneficiary (possibly relying upon, for example, the aforementioned schedule information for the authorized beneficiary to determine a likely present location of that authorized beneficiary), and so forth.
To conclude this illustrative example, when the civilly-catastrophic classification platform 501 classifies a given civilly-catastrophic event as a fourth level civilly-catastrophic event (meaning, in this example, that the civilly-catastrophic event constitutes a most extreme event), the processor 201 might determine now to automatically take steps to proactively provide the authorized beneficiaries with access to their corresponding private civil security resources even in the absence of a proactive signal from the authorized beneficiaries of a need for such access and even in the absence of initiating an attempt to contact such authorized beneficiaries to determine whether such access should be facilitated. In such a case, the processor 201 may determine that an immediate deployment of civil security provisions, facilities, and/or services is the appropriate response. Once again, of course, such actions may be altered (and perhaps considerably) for specific authorized beneficiaries to take into account the stored information for each such authorized beneficiary.
Again, these examples are intended only for the purposes of illustration. Other scenarios are possible and even likely. For example, in the case of a fourth level civilly-catastrophic event, the processor 201 may further take into account other information regarding the nature of the civilly-catastrophic event itself. In a case where the opportunities for authorized beneficiaries within the afflicted zone to function well if provided with suitable civil security provisions are poor (as when, for example, the afflicted zone is, and will remain for some extended period of time, exposed to a dangerous environmentally-borne life-threatening hazard), the processor 201 may conclude to dispense with deploying civil security provisions (beyond, perhaps, sufficient provisions to meet relatively immediate needs) and to prompt, instead, deployment of evacuation transport vehicles to effect a relatively immediate removal of authorized beneficiaries from within the afflicted zone.
So configured, authorized beneficiaries will have concrete, predictable, meaningful, and effective access to various categories of privately supplied civil security resources in the event of a civilly-catastrophic event. These steps are readily facilitated without dependency upon (and perhaps even in spite of) governmental oversight, participation, or control. The logistic difficulties of deploying a wide variety of available civil security provisions, facilities, and services are greatly tempered through application and use of these teachings. As noted above, these teachings are highly flexible and are readily scaled to accommodate a wide variety of operational settings and contingencies. Importantly, via these teachings individuals can benefit from a greatly increased opportunity to bring a considerably improved measure of security into their lives, knowing that, should a civilly-catastrophic event indeed be visited upon them, they will have appropriate and reliable access to civil security resources.
A number of general examples have been provided above. A number of more specific examples will now be provided. Again, these examples are not to be construed as comprising an exhaustive listing of all possibilities in this regard; instead, these examples are intended as illustrative of the many ways by which these teachings can be applied to accommodate the needs and/or opportunities as characterize a given application setting or instance.
In this example, a given authorized beneficiary's information stipulates that this authorized beneficiary has subscribed to a rescue service. Accordingly, this authorized beneficiary has been supplied with a rescue beacon that includes a radio frequency transmitter that can transmit a location beacon signal, a radio frequency receiver that can receive a remote control command, and a strobe light. In this case, however, this authorized beneficiary's information also reveals that she has not yet completed her recommended rescue protocols training as is offered by the provider of civil security benefits. Such training would provide, for example, training with respect to when, and how, to initiate a high power transmission of the aforementioned radio frequency location beacon signal that can be used to facilitate quickly locating the authorized beneficiary during a rescue exercise. Accordingly, when automatically facilitating the deployment of a rescue effort to rescue this authorized beneficiary in response to the occurrence of a given civilly-catastrophic event, these teachings can be employed to effect the automatic transmission of a remote control signal to this authorized beneficiary's particular rescue beacon to cause automated activation of the transmission function. This action can be taken automatically and without any human supervision if desired. Such an action can greatly serve to facilitate the likely success of a deployed rescue mission for such an individual.
Some civilly-catastrophic events can cause ordinary transportation to become difficult or even relatively impossible for authorized beneficiaries employing standard automobiles or the like. To meet such a need, the provider of civil security resources can provide a civil security service comprising transport facilities that will travel a specific route during a given time of need to pick up authorized beneficiaries of such a service using vehicles and trained crews suitable to meet the challenges of such a route and task. Such a service, of course, need not be applied during less trying times. Accordingly, the above-described teachings can be applied to facilitate (by indirect or direct control of) the deployment of such a civil security transport route.
This can comprise, for example, establishing, prior to, during, and/or following the occurrence of a given civilly-catastrophic event, one or more routes that take into account criteria such as authorized beneficiary locations, throughway integrity and challenges, the need for speed when effecting the evacuation of the authorized beneficiary's, the frailties and/or capabilities of given authorized beneficiaries along a given projected route (to take into account, for example, such things as configuring a route to first pick up an authorized beneficiary who is well-trained in civil security responses and to then pick up an authorized beneficiary who is both relatively untrained and who faces mobility challenges such that the former can provide assistance with respect to evacuating the latter), and so forth. Again, such routing can be partially or fully automated and conducted, in whole or in part, through use of the above-described civil security resources deployment facilitation teachings as desired.
By one approach, the aforementioned consideration-based private civil security subscriptions may be differentiated, at least in part, by a relative amount of flexibility the corresponding authorized beneficiary has with respect to selecting, for example, a given civil security shelter during a time of need. This could comprise, for example, restricting one category of authorized beneficiary to use of only a single civil security shelter (which might be located, for example, in their home town) while permitting another category of authorized beneficiary to use any civil security shelter that is operated by the provider of civil security benefits. In such a case, admission of such an authorized beneficiary into a given civil security shelter could be entered as information regarding that authorized beneficiary and then used to inform the subsequent deployment of corresponding civil security resources. To illustrate, such an authorized beneficiary might have certain needs or preferences that are reflected in their choice of civil security provisions. Such information could be used to automatically facilitate the forwarding of specific items to this particular shelter to ensure the availability of such items for this particular authorized beneficiary. Such items might be forwarded, for example, from a central storage facility or from a designated home shelter for this particular authorized beneficiary as appropriate.
In some cases the provider of civil security benefits may have mobile civil security shelters available for deployment. This could comprise, for example, trailer or motorhome-styled mobile shelters, rail-borne mobile shelters, air-borne mobile shelters, and/or water-borne shelters (including both self-powered vessels as well as towed or pushed vessels such as barges or the like). Such shelters are likely sufficient to meet the needs of several kinds and categories of civilly-catastrophic events. Optimum deployment of such civil security resources can comprise a daunting task, however.
Being mobile, deployment decisions can take into account the timing of such deployments, the routing of such deployments, the provisioning and crewing of such platforms, the target destinations of such deployments, the matching of shelter capacities and capabilities to projected needs (both generally speaking as well as that which pertains to the individual needs and/or preferences of individual authorized beneficiaries), and so forth. The teachings described above are well suited to facilitate the appropriate deployment of such mobile civil security shelters as such factors already comprise, or can readily comprise, the availability and use of information and data that can readily support the consideration of such factors and the making of corresponding deployment decisions in a partially and/or fully automated manner.
As noted earlier, civil security provisions as provided to the authorized beneficiaries can vary in a wide variety of ways. In some cases the particular civil security provisions will vary as a function, at least in part, of the nature of the instigating civilly-catastrophic event. When the event is associated, for example, with a particular air borne threat, such civil security provisions can specifically include supplies and equipment to provide protection against this particular threat.
It is also possible, however, that the specific civil security provisions as are provided for a given authorized beneficiary will vary as a function, at least in part, of the needs and/or preferences of the authorized beneficiary themselves. In such a case the specific provisions can vary with respect to kind, brand, quantity, cost, quality, or other qualifier of choice as selected and/or specified by the authorized beneficiary as per the terms and conditions, for example, of their corresponding subscription. The teachings set forth herein will readily accommodate holding information regarding such selections and choices as part of the information that is stored for each authorized beneficiary. This, in turn, will render such information available to facilitate the maintenance, readiness, staging, acquisition, packing, selecting, and provisioning of such supplies on behalf of and to the corresponding authorized beneficiaries.
In some cases, the provider of civil security benefits may have pre-placed in various locations a variety of civil security provisions. These provisions might be presented in a relatively bulk manner or may, if desired, be formed into ready-to-go carriable containers (such as a backpack, briefcase, duffel bag, or the like) that each contain, for example, a sufficient variety and quantity of various categories of life sustaining supplies to support an average authorized beneficiary for, say, one day, three days, one week, or the like. The location and content of such caches can comprise information that is available to the above-described deployment facilitation infrastructure.
Accordingly, corresponding information regarding such caches can play a part in the deployment recommendations of such a system. For example, by one approach, automated transmissions can be provided during a time of need to alert specific authorized beneficiaries regarding the locations and/or access requirements of such caches as are nearest (or likely to be nearest) to them. As another example, information regarding the use of such supplies can be monitored (either generally or specifically as regards, for example, the specific supplies removed and/or the identity of the authorized beneficiary who removed them) to thereby further inform subsequent civil security resource deployment decisions. To illustrate, when it is known that a given authorized beneficiary now has a backpack that contains a particular civil security provision that is relevant to the needs presented by a given civilly-catastrophic event, an automated transmission can be sent to that authorized beneficiary to instruct them with respect to the proper use of that particular civil security provision.
In anticipation of financial systems confusion, tumult, and/or breakdown as may occur as a result of a civilly-catastrophic event, the aforementioned consideration-based private civil security subscriptions may also provide for civilly-catastrophic event-based access to cash and/or readily bartered materials (such as precious metals, gemstones, or the like) via private civil security automated teller machines. In such a case, the location and contents of such machines can comprise information provided to the aforementioned processor and, in turn, the stocking and/or enablement of such machines can be placed under the control thereof.
So configured, for example, the processor can identify particular machines in particular locations to be stocked with particular kinds of currency (such as local currency, currency of a neighboring country, and so forth) and/or non-cash barterable materials of choice prior to the occurrence of a forecasted imminent civilly-catastrophic event to ensure the availability of suitable purchasing power for the authorized beneficiaries who are likely to be impacted by that civilly-catastrophic event. The processor can also control the enablement of such machines as a function of the information described herein. In particular, the ability of a person to receive cash/barterable materials from such a machine can be conditioned upon the machine receiving a particular enabling signal that originates, directly or indirectly, from the processor in response to determining a need to facilitate the functional deployment of such a resource.
In some cases, a given provider of private civil security benefits may chose to pre-position civil security provisions near, or within, a given area that is likely to be (or is in fact) impacted by a given civilly-catastrophic event. This, of course, carries a risk that some or all of these pre-positioned provisions will be destroyed by a civilly-catastrophic event or otherwise rendered partially or fully unavailable for use. Notwithstanding such a risk, however, it may still be desirable to provide for the pre-placement of a certain quantity of civil security provisions in order to increase a likelihood of being able to effect a timely deliver of such provisions to authorized beneficiaries.
To mitigate, at least to some extent, the risk of loss, it may be useful to place partially or fully redundant stores in this regard in a variety of discrete geographic locations. These locations, along with the quantity and types of provisions stored at each such location can comprise information provided to the aforementioned processor to further inform its deployment recommendations. For example, deployment instructions can be provided that represent an efficient use of undamaged supplies that are closest to authorized beneficiaries in need while also ensuring that additional supplies as may be needed (immediately or in the foreseeable future) are transferred from other locations to replace the presently distributed provisions.
If desired, the provider of civil security provisions can permit a given authorized beneficiary to themselves provide one or more items to be held on behalf of the authorized beneficiary and to be rendered available to that authorized beneficiary during a civilly-catastrophic event-based time of need. Such items might comprise, for example, prescription medications, alcoholic beverages, personal weapons and/or ammunition, a family heirloom, a work of art, and so forth. By one approach, for example, such items can be placed in a secured container that is then stored on behalf of the authorized beneficiary. Such storage can arrange for segregation of such a container from other provisions or can, if desired, comprise inclusion of that container with other civil security provisions as have been packed together as a discrete unit to be tendered to the authorized beneficiary during a corresponding time of need. Again, corresponding information regarding such items and their container(s) can comprise authorized beneficiary information as is stored for use by the aforementioned processor.
Accordingly, the storage, staging, transport, and/or delivery of that container/item can be controlled by the processor to aid in facilitating the proper deployment of this particular resource during a civilly-catastrophic event. This might comprise, for example, combining information regarding a present location of a given authorized beneficiary with information regarding an imminent civilly-catastrophic event to, in turn, yield an automated instruction to move the container/item from a first storage venue to a staging location proximal to the present location of the authorized beneficiary to thereby reduce the amount of time that would be required to provide that authorized beneficiary with access to that particular resource during a civilly-catastrophic event-based time of need.
In some cases, the provider of civil security benefits may have ruggedized containers that can serve to safely store civil security provisions notwithstanding harsh local conditions (such as, but not limited to, likely flooding, high winds, intense precipitation, airborne projectiles, heat, concussive forces, lawless unpoliced persons, and so forth). The decision to use such containers in preparation for, or when responding to, a given civilly-catastrophic event can again comprise a deployment decision to be informed by the aforementioned processor based upon the authorized beneficiary information and other information as may be available thereto.
In some cases, for example, a given authorized beneficiary may have contracted for such a level of service. In such a case, the processor can serve as an automated means for observing the civil security benefits provider's contractual obligations in this regard. In other cases, the use of such containers may be fully discretionary on the part of the civil security benefits provider and the deployment decision based upon such things as the nature of the civilly-catastrophic event itself, the local terrain and likely functional availability of roadways or other ordinary means of delivering goods, the urgency by which the civil security provisions may themselves be needed, and so forth.
In some cases, the aforementioned consideration-based private civil security subscriptions may be offered to potential authorized beneficiaries through third party agents. In some cases, these third party agents may work directly on behalf of the provider of civil security benefits or may work instead on behalf of an underwriter that, in turn, works in conjunction with the provider of civil security benefits.
In such cases, these third party agents may be remunerated in any of a variety of ways. For example, such an agent may receive a flat payment for each referred and/or successfully subscribed authorized beneficiary. By another approach, such an agent may receive, instead, a percentage interest in the (partial or whole) value of the subscription. By yet another approach, such an agent may receive a higher level of compensation for a first period of time (such as a first year) as pertains to a given subscription with subsequent follow-on periods of time (representing, for example, renewals of such subscriptions by the authorized beneficiaries) providing a reduced level of compensation. There can also be varying levels of relevant compensation that are tied to the constituent elements of particular civil security benefits packages (where, for example, compensation to the agent may be relatively higher for a subscription that includes a particular category of civil security resource as versus one that does not).
In such cases, the stored information that is available to the processor regarding the authorized beneficiaries can also serve to inform the efficient, timely, and accurate compensation of such third party agents. Accordingly, by one approach, such a processor can be further configured and arranged to track such third party agent remuneration programs to facilitate the remuneration of such agents as per their relative performance.
In some cases, at least some civil security provisions may be pre-aggregated into corresponding sub-units that can be combined with one another to form a unit of civil security provisions suitable to meet the needs and preferences of a given authorized beneficiary. By one approach, for example, such pre-aggregated sub-units might each constitute provisions that are, generally speaking, suitable for addressing a particular category or kind of survival need. To illustrate, such sub-units could variously have contents that primarily are each directed to one of:
nutritional items;
hydrating items;
protective clothing (to provide protection against the elements and/or the environmental effects of a given civilly-catastrophic event);
breathable air items (such as filters, air movers, oxygen sources, carbon dioxide absorbers, and so forth);
food preparation items;
tools;
power sources and/or implements;
communications devices;
medical supplies;
shelter materials and/or amenities;
and so forth, to note but a few examples.
By one approach, such sub-units can be stored in corresponding containers that are designed to interlock with one another. Such an interlocking design can facilitate forming these provisions into an easily transported unit. For example, by interlocking such sub-units together in this manner, the aggregated whole can be readily lifted and moved by forklift, pallet, crane, hoist, rope, or otherwise. Such interlocking containers may also be useful to the recipient authorized beneficiary who can potentially interlock such containers together in various ways to form shelter walls, roofs, or other structures of interest and purpose.
By one approach, there may be a variety of different such containers. Such containers may differ with respect to their relative size, their relative interlocking features, the availability of external manipulation surfaces, and so forth. Such information can comprise information that is rendered available to the aforementioned processor and hence can be also taken into account when facilitating the deployment of such containers when distributing civil security provisions. As but one example in this regard, the processor can determine to use a particular selection of such containers in order to assure optimum use of available transport facilities. This can comprise, for example, selecting a variety of such containers as will yield an aggregated whole having a resultant form factor that will fit within available transport dimensions while also tending to ensure substantially complete use of the available transport space. By this approach, relatively optimized movement of civil security provisions can be assured, thereby tending to ensure that needed provisions are provided as efficiently and quickly as possible given available resources in this regard.
It would also be possible for such units and sub-units to be differentiated from one another with respect to whether such units/sub-units contained sources of electrical power (such as stored energy sources or electrical generators of various kinds, to note but two general examples in this regard). Similarly, the containers by which such units/sub-units could be moved and/or delivered or otherwise provided could include some containers that integrally contained such a resource. When the inventory of available containers and/or civil security provisions in this regard is rendered available to the aforementioned processor, such information can be taken into account when facilitating the deployment of such resources.
To illustrate, the processor may elect to instruct the use of civil security provisions containers that include an integral power source when facilitating the deployment of civil security provisions to an area of need when other information available to the processor indicates that this constitutes an appropriate deployment of resources (as may be the case, for example, when the nature of the instigating civilly-catastrophic event is one that ordinarily results in a longer term lack of electricity or when the subscription terms and conditions for a given authorized beneficiary requires the provision of such a resource/container when otherwise deploying civil security provisions on behalf of this particular authorized beneficiary).
As noted above, a given provider of civil security benefits may provide a variety of different civil security shelter options. This can include civil security shelters that differ from one another with respect to category, kind, location, and/or capacity. Some such shelters, for example, may be intended (and hence correspondingly configured and arranged) to only support a relatively small number of authorized beneficiaries for a relatively short period of time while other such shelters may be intended for longer term usage for a similar, or larger, number of authorized beneficiaries. There can even be civil security shelters that are designed and provisioned in a manner to essentially constitute indeterminate length facilities in that they have an ability to re-provision themselves with a variety of survival requirements.
Even shelters that are otherwise effectively the same with respect to design, function, provisioning, and intended use can be differentiated with respect to their location; some such shelters can be located, for example, within or near to an urban area while others are located in remote areas. As another example, some such shelters may be located within a same sovereign territory as is native to the authorized beneficiary while other such shelters may be located in other sovereignties or even in a sovereign-free location (such as a privately-owned island, boat, or stationary platform in international waters).
Information regarding such civil security shelters can comprise part of the information that is rendered available to the aforementioned processor for the purposes of these teachings. Such information can comprise, by way of example and not by way of limitation, information such as:
location;
external threat abatement capabilities (such as, for example, capabilities to withstand various external threats to survival such as flooding, concussive events, heat, cold, ionizing radiation, dangerous air borne chemical agents, dangerous air borne biological agents, lawless individuals and groups, and so forth);
ease or difficulty of access (due to distance, lack or existence of roadways, railways, waterways, landing strips or pads, and the like);
capacities (for authorized beneficiaries, provisions, personnel, and so forth);
accommodations and facilities (such as, but not limited to, sleeping quarters, food preparation facilities, dining facilities, personal hygiene facilities,
medical care facilities, equipment, personnel, power generation facilities, fuel reserves, business services facilities, and so forth); and/or
amenities (such as, but not limited to, entertainment facilities, spectator and/or participatory sporting facilities, education and training facilities, materials, and personnel, commissary facilities, and so forth);
to again note but a few examples in this regard.
Such shelter information can then be employed in accordance with these teachings to facilitate the deployment of shelter resources. This can comprise, for example, ensuring that authorized beneficiaries who have contracted to receive access to a particular kind of shelter during a time of need will be so accommodated. This can lead, for instance, to the aforementioned processor automatically instructing the bringing-on-line of a suitable shelter during a time of need (by assigning personnel, enabling access protocols, breaking out provisions, and otherwise generally bringing shelter facilities and capabilities from a dormant quiescent mode to a ready-to-receive-inhabitants state. This could also lead, as another illustrative instance, to arranging for a first transport vehicle to pick up only authorized beneficiaries who are to be transported to a first shelter and for arranging for a second transport vehicle to pick up only authorized beneficiaries who are to be transported to a different, second shelter. Numerous other possibilities in this regard are of course possible.
Such information can also be used to inform subsequent shuttling of authorized beneficiaries between such shelters. For example, as a given civilly-catastrophic event plays out, it may be useful or even necessary to move authorized beneficiaries from one shelter to another (to thereby further remove such authorized beneficiaries further away from a civilly-catastrophic event-based threat (or threats), to better aggregate such authorized beneficiaries to thereby better serve their needs, and so forth). The information available to the aforementioned processor can be employed in this regard to facilitate appropriate movements of such authorized beneficiaries from one shelter to another. Again, this can include directing such deployments in a way that leverages the information that is stored for such authorized beneficiaries regarding their needs, preferences, requirements, and so forth. Such information could eventually be used, for example, to facilitate co-sheltering authorized beneficiaries who share a particular preferential affinity such as a shared religion, political conviction, culture, dietary regimen, and so forth.
As noted above, in some cases, a provider of civil security benefits may wish to pre-position civil security provisions to better ensure the rapid availability of such provisions during a time of need within an area afflicted by a civilly-catastrophic event. By one approach, this can include the use of hidden caches of civil security provisions. Such hidden caches may be buried or otherwise hidden behind walls, within buildings (including even personal storage facilities), on barges or boats, within cars or trucks, inside of dumpsters or other containers of choice, and so forth. In such a case the location and contents of such caches (as well as information regarding their present contents, condition, and/or accessibility) can comprise information that is rendered available to the aforementioned processor. This information can then be utilized and leveraged by the processor when facilitating the deployment of these and other civil security resources.
For example, when available information reflects that other civil security provisions as might have otherwise been available to a given authorized beneficiary are, at this time, unavailable, the processor can automatically instigate the transmission of information to this particular authorized beneficiary regarding the existence, location, contents, and/or access protocol that the authorized beneficiary can employ to gain access to the contents of a particular such hidden cache.
As a related example, the processor can, in the larger scheme of things, be providing information to the authorized beneficiary and/or other personnel to eventually lead the authorized beneficiary to a given civil security facility where the authorized beneficiary can receive, for example, shelter, provisions, and so forth. In such a case, and with this larger goal and plan in mind, the processor can select a particular hidden cache that is most consistent with the authorized beneficiary' planned and/or likely route in order to ensure both that the authorized beneficiary receives needed provisions and that the authorized beneficiary's progress with respect to the overall plan is not unduly upset or delayed.
In the examples above, the general presumption is that the authorized beneficiary comprises a particular individual who is known, specifically, to the provider of civil security benefits. In some cases, however, this may not be the case. It is possible, for example, for a given government or governmental agency to contract with such a provider of private civil security benefits to provide in some specified manner for certain civil security benefits for members of the public as well. As but one example of many in this regard, a given city might arrange for such civil security benefits to be provided to the citizens of that city during a time of need. This might comprise the provision of individual benefits (such as provisions to be delivered to specific individuals) or might comprise the provision of group benefits (by, for example, stocking and operating a provisions distribution center that members of the public can visit to obtain their allotment of civil security provisions or the like).
In such a case, the information stored for use in accordance with these teachings might comprise, in addition to (or in lieu of) specific information regarding particular authorized beneficiaries, information regarding the number of people residing at particular service areas, the number of schools within that area along with the operating days and hours of such schools, the location and staffing of various government offices within the service area, protocols to be employed when providing access to civil security resources during a time of need to ensure that ineligible persons are not inappropriately serviced, information regarding wireless public safety communications protocols (such as utilized frequency bands and channel spacing, modulation, encryption keys, and the like), and so forth.
Such information can again then be utilized by the aforementioned processor when facilitating the deployment of civil security resources on behalf of a public base of authorized beneficiaries. This can comprise, for example, ensuring that particular civil security provisions are delivered to the care of only certain specified government representatives during a time of need, automatically dispatching rescue services to extract key government representatives during a time of need, providing a mobile operations center for the use of government authorities during a time of need that is pre-configured to operate compatibly with that government's public safety communications network(s), and so forth).
In a related example, the provision of such civil security benefits may be underwritten and/or sponsored, in whole or in part, as a charitable gesture on the part of one or more philanthropists. In such a case, again, the identity of the specific authorized beneficiaries may not be known to (or even precisely knowable by) the provider of civil security benefits prior to the occurrence of a civilly-catastrophic event that triggers the need to provide access to the corresponding civil security resources. Information regarding the metes and bounds of the scope of such generosity can be employed by the processor when determining when, where, how, and/or to whom to provide access to such civil security resources during a corresponding time of need.
In some cases, the provider of civil security benefits may be willing to accept a bearer instrument (such as a bearer certificate, token, or the like) as being sufficient to grant access during a time of need to one or more corresponding civil security resources. In effect, a given party can purchase such a bearer instrument that provides civilly-catastrophic event-based access to particular civil security resources (such as, for example, a given civil security shelter, a given quantity and/or type of civil security provisions, a given civil security service (such as transport away from an area experiencing considerable civil unrest due to a civilly-catastrophic event), and so forth) and then hold that bearer instrument for their own benefit or present that bearer instrument to another (such as a family member, an employee or key associate, a guest, a lottery winner, and so forth). The holder of that bearer certificate would then have civilly-catastrophic event-based access to the corresponding civil security resources.
In such a case, corresponding information regarding such bearer instruments could comprise some of the information that is rendered available for use as per these teachings. By one approach, the aforementioned processor could be informed of the presentation of such bearer instruments when and as they are presented for redemption during a time of need. This, in turn, could be used to facilitate the automatic deployment of additional civil security provisions to replenish supplies that were provided to meet the needs of a given bearer instrument, to ready and/or actively open additional civil security shelters to accommodate both known authorized beneficiaries and the redeemers of such bearer instruments, and so forth. The active use of such information in this manner could greatly relieve the need to otherwise hold essentially all such facilities open and available during a time of need, to greatly overstock provisions at various locations, and so forth in order to meet the needs of servicing such bearer instruments when and as they are presented for redemption.
In a somewhat related example, the provider of civil security benefits may be willing, at least under some circumstances, to process instant subscriptions during a time of need (at least, for example, so long as sufficient civil security resources remain available to accommodate such late participants). These teachings can be readily employed and leveraged to facilitate the vetting of the provider's deployed and/or deployable resources to determine whether such an instant subscription can be appropriately extended in a given instance by determining whether such resources are in fact sufficient to reasonably support this extra individual. Similarly, the aforementioned processor can employ incoming information regarding incoming instant subscribers to track and monitor the sufficiency of already deployed resources and to advise or instruct the deployment (or preparedness to deploy) additional resources as may be necessitated through the acceptance of such additional authorized beneficiaries.
The aforementioned information regarding authorized beneficiaries, civilly-catastrophic events, and other related information of interest can comprise both currently relevant and active information as well as historical information. Such information can therefore be utilized further to inform the pricing of given civil security benefits for particular authorized beneficiaries within particular areas as a function, at least in part, of an analysis and sense of the corresponding risk that such individuals will, in fact, likely need to act upon their right to access such benefits in response to a given civilly-catastrophic event. With this in mind, the aforementioned processor can further be configured and arranged to contribute to, or even to dictate, the pricing and other relevant terms and conditions regarding the provision of certain civil security benefits to particular authorized beneficiaries. This can naturally (and appropriately) lead to assessing authorized beneficiaries in higher risk areas a relatively higher amount of consideration for a same level of benefits than authorized beneficiaries in areas that constitute lower risk areas.
Such information could also be used to generally facilitate the offering of appropriate civil security benefits to particular individuals. For example, the aforementioned processor can be configured and arranged to note potential problems with respect to a given authorized beneficiary's (or a potential authorized beneficiary's) personal information and the civil security resources being offered. To illustrate, the processor could be configured and arranged to flag (or to otherwise prohibit) the offering of civil security transport to an authorized beneficiary who lacks personal mobility to such an extent that they would unlikely be able to transport themselves to a pick-up point to avail themselves of such a benefit. In such a case, instead, the processor could be configured and arranged to only accept, or to suggest as an alternative, civil security rescue services to provide for the movement of such a person. This kind of comparison and control could be implemented in real-time and/or during an application approval process, for example, as desired.
If desired, the offering and/or support of such consideration-based private civil security subscriptions can further accommodate the use of a loyalty rewards program. For example, authorized beneficiaries might gain loyalty rewards program points by one or more of:
renewing their subscription for another term;
upgrading an existing subscription to a higher tier of benefits;
referring a new authorized beneficiary to the provider of civil security benefits;
purchasing commodities from a third party who, in turn, provides consideration to the provider of civil security benefits in exchange for providing the purchaser of such commodities with such loyalty rewards program points;
and so forth, to note but a few illustrative examples in this regard.
In such a case, information regarding such a loyalty rewards program, including the loyalty rewards program points as have been accumulated and/or redeemed by various ones of the authorized beneficiaries, can comprise information that is provided to the aforementioned processor. This, in turn, will facilitate use of such information by the processor when administering such a program and/or when facilitating the deployment of civil security resources as per these teachings. As one illustrative example in this regard, such points may be automatically redeemable for an upgraded unit of civil security provisions during a time of need. In such a case, the processor can automatically arrange for ensuring that the provisions destined for a given authorized beneficiary are suitably upgraded to reflect this obligation and to also, if desired, arranged for the loyalty rewards program account of that authorized beneficiary to be appropriately debited.
The civil security services supported by a given provider of civil security benefits may include a live operator or civil security concierge that the authorized beneficiary may contact using, for example, their (wired or wireless) telephone, an OnStar-like interface in their vehicles, a shortwave radio, a satellite radio, or the like. Such a service could provide live instructions and information to the authorized beneficiary regarding unfolding civilly-catastrophic events, evacuation recommendations and routing, the locations of available civil security provisions, the fashioning of a make-shift civil security shelter using materials and facilities at hand, the use of civil security provisions as may be presently available to the authorized beneficiary, and so forth.
In such a case, the aforementioned processor can be readily configured and arranged to facilitate such interactions via, for example, the aforementioned processor interface. Via that processor interface, for example, a given such operator/concierge can learn, for a given calling authorized beneficiary, what relevant training or skills the caller may have, what civil security provisions are likely immediately available to that particular caller, what civil security facilities are presently near to that caller, which civil security facility this particular authorized beneficiary is supposed to be heading for at the present time, likely civilly-catastrophic event-based impediments, obstacles, and/or dangers that may be in the present area of the caller, and so forth. So configured and arranged, the deployment and use of such a civil security operator/concierge can be greatly leveraged and supported to the benefit of all parties concerned.
By one approach the civil security services offered by a given provider of civil security benefits can include the offering of a civil security tip-of-the-day. Such a tip-of-the-day can be general in nature or can be specific to a given authorized beneficiary. For example, the tips offered to a particular authorized beneficiary can be specific to the particular civil security resources to which the authorized beneficiary has subscribed access. To illustrate, this might comprise tips regarding the proper usage of the particular civil security provisions that will be available to the authorized beneficiary during a time of need, tips regarding expectations management and training as pertains to the particular civil security transportation to which the authorized beneficiary will have access during a time of need, and so forth.
To facilitate the appropriate targeting of such tip content for individual authorized beneficiaries, the aforementioned processor can again be configured and arranged to inform the selection of a particular tip from amongst a plurality of available tips as a function, at least in part, of the particulars of a given authorized beneficiary's subscription package, the authorized beneficiary's existing level of training and/or experience, and so forth through judicious use of the information regarding the authorized beneficiaries.
As noted above, the information for at least some of the authorized beneficiaries can comprise information regarding their medical history, their present health, and their pharmaceutical needs. The processor can employ such information to facilitate the deployment of corresponding resources during a time of need. This can comprise, of course, stocking and maintaining the freshness of the medications that the authorized beneficiary will require when unable to access ordinary channels to acquire their medications during a civilly-catastrophic event. This can also comprise, however, using such information to facilitate the deployment and availability of potentially related resources. To illustrate, a given authorized beneficiary's medical condition information and/or pharmaceutical requirements may strongly suggest a chronic respiratory condition. This, in turn, may be used by the aforementioned processor to also provide for the deployment of, say, respirators to ensure the availability of such a resource when supporting the needs of such an authorized beneficiary. As another example, the medical information for a given authorized beneficiary may suggest an immune system deficiency. In such a case, the processor can be configured and arranged to suggest or to otherwise provide for the deployment of various medical aids in this regard (such as antivirals, antibiotics, specific vitamins, and so forth) in conjunction with this particular authorized beneficiary in order to anticipate the likely needs of such a person during a time of need.
As noted above, the information available to the processor to facilitate the deployment of civil security resources can comprise various kinds of contact information for the authorized beneficiaries. This can include both two-way and one-way forms of communication and can further include, if desired, primary, secondary, and contingency mechanisms by which communications can occur. The processor can employ this information to not only determine how to contact a given authorized beneficiary in a given scenario, but also whether to effect other deployment options as a function, at least in part, of the availability of information regarding the integrity of such communication mechanisms. As one example in this regard, upon determining that cellular telephone service for a given area that services a given authorized beneficiary is impaired, the processor can provide for automatically facilitating the immediate (or at least urgent) delivery of civil security provisions to that authorized beneficiary which can include, in whole or in part, a communications device (such as a wireless satellite telephone, a two-way ham radio, a shortwave radio, or the like) that the authorized beneficiary can use when subsequently communicating with the provider of civil security benefits.
As noted above, the information available to the processor can include information regarding the actual and/or projected behavior of persons within an area of projected, actual, or potential operation by personnel of the provider of civil security benefits. The processor can employ such information when making routing decisions regarding the delivery of civil security provisions, civil security services, and/or civil security facilities (such as a mobile civil security shelter) within or through such an area. By one approach the processor can be configured and arranged to identify paths of likely least resistance when suggesting or mandating such a route.
By another approach, if desired, such information can be employed to inform the deployment of particular kinds of vehicles, personnel, and/or equipment in a given instance as well as particular rules of engagement that are to be observed. For example, when determining that a particular civil security provisions delivery mission is likely to encounter large groups of lawless individuals who may be prone to attacking such a delivery vehicle, the processor can facilitate the use of delivery vehicles that are able to meet and surmount such a challenge (such as heavier, armored vehicles, escort security vehicles, and so forth), the use of at least some personnel who are trained and equipped with respect to crowd control and/or dispersement, the allocation of non-lethal and/or lethal weaponry, and so forth. Similarly, upon determining that a given delivery mission is not likely to encounter interaction with significant numbers of effective lawless individuals, the processor can arrange instead for the deployment of less formidable vehicles, personnel, and equipment. Again, such deployment decisions can greatly serve to make the optimum use of the provider's resources when seeking to meet the immediate and near term needs of a given population of authorized beneficiaries.
The information available to the processor can also serve as a basis for facilitating an occasional or substantially on-going wargaming background or foreground task. Such wargaming processing can occur on a fully or partially automated basis or can be fully or partially informed and/or directed by one or more persons. By one approach, such wargaming can be based upon present information where particular threats are then posed and an ability of the provider of civil security benefits to respond in a satisfactory manner then extrapolated and estimated. The results of such wargaming activities can in turn be used strategically and/or tactically to better inform the short and long term preparations of the provider to meet the obligations of the aforementioned subscriptions.
The information available to the processor may include content that suggests, either as a possibility or definitively, other persons with whom a given authorized beneficiary might presently (or later) be with or near. In such a case, such information could also be employed when making the above-described decisions regarding deployment of civil security resources. As one illustrative example in this regard, when a given authorized beneficiary has a subscription that provides for co-rescue of up to four other persons who might happen to be with that given authorized beneficiary at a time of rescue, and when information available to the processor suggests strongly that the authorized beneficiary is highly likely to be in the presence of only two other persons at the time of likely being rescued, the processor could specify that only rescue resources sufficient to rescue up to three persons be deployed in this particular regard notwithstanding that the authorized beneficiary's subscription provides for a greater number of rescuees. This, in turn, would free up other rescue resources for other necessary duties.
As noted above, the information provided to the processor can vary over time. It is possible for such variations to occur with little or no advance notice and possibly in relatively large numbers. For example, by one approach access to one or more civil security resources may be permitted upon presentation by an authorized beneficiary of a corresponding bearer certificate (such as, but not limited to, a civil security benefits gift card or the like). This can occur when the provider of civil security benefits agrees, through whatever means one might wish to employ, to honor the presentation of such a bearer certificate with access to one or more general and/or specific civil security resources.
In many cases it may be difficult to predict with high accuracy where and when such bearer certificates will be presented for redemption. By providing the processor with redemption information, however, considerable improvement can be expected at least with respect to scheduling the re-provision of certain claim provisions or the like. It would also be possible to utilize such information to better predict particular locations where certain provisions, facilities, and/or services are likely to be needed. Such a determination could be based, for example, upon noting that a particular shelter was receiving bearer certificate-bearing authorized beneficiaries at twice the rate of other shelters within a given area in need. This, in turn, could be used to facilitate the automatic deployment of civil security mass transit (such as a bus, train, or the like) to move some of these authorized beneficiaries to other shelter locations where their needs can be properly met.
Those skilled in the art will recognize that a wide variety of modifications, alterations, and combinations can be made with respect to the above described embodiments without departing from the spirit and scope of the invention, and that such modifications, alterations, and combinations are to be viewed as being within the ambit of the inventive concept.
This application claims the benefit of the filing date of U.S. provisional application Nos. 60/820,628 filed on Jul. 28, 2006, 60/823,806 filed on Aug. 29, 2006, 60/825,524 filed on Sep. 13, 2006, 60/825,976 filed on Sep. 18, 2006, 60/826,491 filed on Sep. 29, 2006, 60/827,591 filed on Sep. 29, 2006, 60/827,820 filed on Oct. 2, 2006, 60/827,828 filed on Oct. 2, 2006, 60/828,341 filed on Oct. 5, 2006, 60/828,342 filed on Oct. 5, 2006, 60/829,447 filed on Oct. 13, 2006, 60/829,779 filed on Oct. 17, 2006, 60/862,398 filed on Oct. 20, 2006, 60/862,718 filed on Oct. 24, 2006, 60/863,469 filed on Oct. 30, 2006, 60/863,481 filed on Oct. 30, 2006, 60/864,302 filed on Nov. 3, 2006, which are hereby incorporated in their entirety herein. This comprises a continuation-in-part of each of: SUBSCRIPTION-BASED PRIVATE CIVIL SECURITY FACILITATION METHOD as filed on Mar. 17, 2006 and having application Ser. No. 11/384,037; SUBSCRIPTION-BASED CATASTROPHE-TRIGGERED MEDICAL SERVICES FACILITATION METHOD as filed on Mar. 30, 2006 and having application Ser. No. 11/394,350; PERSONAL PROFILE-BASED PRIVATE CIVIL SECURITY SUBSCRIPTION METHOD as filed on Apr. 11, 2006 and having application Ser. No. 11/279,333; RADIATION SHELTER KIT APPARATUS AND METHOD as filed on Apr. 24, 2006 and having application Ser. No. 11/379,929; FRACTIONALLY-POSSESSED UNDERGROUND SHELTER METHOD AND APPARATUS as filed on May 2, 2006 and having application Ser. No. 11/381,247; SUBSCRIPTION-BASED CATASTROPHE-TRIGGERED TRANSPORT SERVICES FACILITATION METHOD AND APPARATUS as filed on May 2, 2006 and having application Ser. No. 11/381,257; SUBSCRIPTION-BASED MULTI-PERSON EMERGENCY SHELTER METHOD as filed on May 2, 2006 and having application Ser. No. 11/381,265; SUBSCRIPTION-BASED CATASTROPHE-TRIGGERED RESCUE SERVICES FACILITATION METHOD AND APPARATUS as filed on May 2, 2006 and having application Ser. No. 11/381,277; DOCUMENT-BASED CIVILLY-CATASTROPHIC EVENT PERSONAL ACTION GUIDE FACILITATION METHOD as filed on May 12, 2006 and having application Ser. No. 11/383,022; RESCUE CONTAINER METHOD AND APPARATUS as filed on May 26, 2006 and having application Ser. No. 11/420,594; PURCHASE OPTION-BASED EMERGENCY SUPPLIES PROVISIONING METHOD as filed on Jun. 1, 2006 and having application Ser. No. 11/421,694; SUBSCRIPTION-BASED PRE-PROVISIONED TOWABLE UNIT FACILITATION METHOD as filed on Jun. 12, 2006 and having application Ser. No. 11/423,594; RADIATION-BLOCKING BLADDER APPARATUS AND METHOD as filed on Jun. 19, 2006 and having application Ser. No. 11/425,043; PRIVATE CIVIL DEFENSE-THEMED TELEVISION BROADCASTING METHOD as filed on Jun. 23, 2006 and having application Ser. No. 11/426,231; EMERGENCY SUPPLIES PRE-POSITIONING AND ACCESS CONTROL METHOD as filed on Jul. 10, 2006 and having application Ser. No. 11/456,472; PRIVATE CIVIL DEFENSE-THEMED BROADCASTING METHOD as filed on Aug. 1, 2006 and having application Ser. No. 11/461,605; METHOD OF PROVIDING VARIABLE SUBSCRIPTION-BASED ACCESS TO AN EMERGENCY SHELTER as filed on Aug. 1, 2006 and having application Ser. No. 11/461,624; SUBSCRIPTION-BASED INTERMEDIATE SHORT-TERM EMERGENCY SHELTER METHOD as filed on Aug. 7, 2006 and having application Ser. No. 11/462,795; SUBSCRIPTION-BASED CATASTROPHE-TRIGGERED RESCUE SERVICES FACILITATION METHOD USING WIRELESS LOCATION INFORMATION as filed on Aug. 7, 2006 and having application Ser. No. 11/462,845; PRIVATELY PROVISIONED SURVIVAL SUPPLIES DELIVERY METHOD as filed on Aug. 15, 2006 and having application Ser. No. 11/464,751; PRIVATELY PROVISIONED SURVIVAL SUPPLIES SUB-UNIT-BASED DELIVERY METHOD as filed on Aug. 15, 2006 and having application Ser. No. 11/464,764; PRIVATELY PROVISIONED SURVIVAL SUPPLIES ACQUISITION METHOD as filed on Aug. 15, 2006 and having application Ser. No. 11/464,775; PRIVATELY PROVISIONED SURVIVAL SUPPLIES CONTENT ACQUISITION METHOD as filed on Aug. 15, 2006 and having application Ser. No. 11/464,788; METHOD TO PRIVATELY PROVISION SURVIVAL SUPPLIES THAT INCLUDE THIRD PARTY ITEMS as filed on Aug. 15, 2006 and having application Ser. No. 11/464,799; WASTE DISPOSAL DEVICE as filed on Aug. 16, 2006 and having application Ser. No. 11/465,063; SUBSCRIPTION-BASED PRIVATE CIVIL SECURITY RESOURCE CUSTOMIZATION METHOD as filed on Aug. 23, 2006 and having application Ser. No. 11/466,727; PREMIUM-BASED PRIVATE CIVIL SECURITY POLICY METHODS as filed on Aug. 24, 2006 and having application Ser. No. 11/466,953; SUBSCRIPTION-BASED MOBILE SHELTER METHOD as filed on Sep. 5, 2006 and having application Ser. No. 11/470,156; METHOD OF PROVIDING A FLOATING LIFE-SUSTAINING FACILITY as filed on Sep. 13, 2006 and having application Ser. No. 11/531,651; PRIVATELY PROVISIONED SUB-UNIT-BASED SURVIVAL SUPPLIES PROVISIONING METHOD as filed on Sep. 15, 2006 and having application Ser. No. 11/532,461; PRIVATELY PROVISIONED INTERLOCKING SUB-UNIT-BASED SURVIVAL SUPPLIES PROVISIONING METHOD as filed on Sep. 25, 2006 and having application Ser. No. 11/535,021; RESOURCE CONTAINER AND POSITIONING METHOD AND APPARATUS as filed on Sep. 26, 2006 and having application Ser. No. 11/535,282; PUBLICLY-FUNDED PRIVATELY FACILITATED ACCESS TO SURVIVAL RESOURCES METHOD as filed on Sep. 29, 2006 and having application Ser. No. 11/537,469; ELECTRICITY PROVIDING PRIVATELY PROVISIONED SUBSCRIPTION-BASED SURVIVAL SUPPLY UNIT METHOD AND APPARATUS as filed on Oct. 9, 2006 and having application Ser. No. 11/539,798; PREMIUM-BASED CIVILLY-CATASTROPHIC EVENT THREAT ASSESSMENT as filed on Oct. 9, 2006 and having application Ser. No. 11/539,861; PRIVATELY MANAGED ENTERTAINMENT AND RECREATION SUPPLIES PROVISIONING METHOD as filed on Oct. 10, 2006 and having application Ser. No. 11/548,191; METHOD TO FACILITATE PROVIDING ACCESS TO A PLURALITY OF PRIVATE CIVIL SECURITY RESOURCE as filed on Oct. 16, 2006 and having application Ser. No. 11/549,874; METHOD OF PROVIDING BEARER CERTIFICATES FOR PRIVATE CIVIL SECURITY BENEFITS as filed on Oct. 18, 2006 and having application Ser. No. 11/550,594; METHOD FOR CIVILLY-CATASTROPHIC EVENT-BASED TRANSPORT SERVICE AND VEHICLES THEREFOR as filed on Oct. 19, 2006 and having application Ser. No. 11/551,083; METHOD FOR PROVIDING PRIVATE CIVIL SECURITY SERVICES BUNDLED WITH SECOND PARTY PRODUCTS as filed on Oct. 30, 2006 and having application Ser. No. 11/554,452; SYSTEM AND METHOD FOR A PRIVATE CIVIL SECURITY LOYALTY REWARD PROGRAM as filed on Nov. 1, 2006 and having application Ser. No. 11/555,589; SUBSCRIPTION BASED SHUTTLE METHOD as filed on Nov. 2, 2006 and having application Ser. No. 11/555,896; METHOD AND SECURITY MODULES FOR AN INCIDENT DEPLOYMENT AND RESPONSE SYSTEM FOR FACILITATING ACCESS TO PRIVATE CIVIL SECURITY RESOURCES as filed on Nov. 3, 2006 and having application Ser. No. 11/556,520; and METHOD OF PROVIDING SURVIVAL SUPPLIES CONTAINER WITH AN ILLUMINATION APPARATUS as filed on Nov. 13, 2006 and having application Ser. NO. 11/559,278; the contents of each of which are fully incorporated herein by this reference.
Number | Date | Country | |
---|---|---|---|
60820628 | Jul 2006 | US | |
60823806 | Aug 2006 | US | |
60825524 | Sep 2006 | US | |
60825976 | Sep 2006 | US | |
60826491 | Sep 2006 | US | |
60827591 | Sep 2006 | US | |
60827820 | Oct 2006 | US | |
60827828 | Oct 2006 | US | |
60828341 | Oct 2006 | US | |
60828342 | Oct 2006 | US | |
60829447 | Oct 2006 | US | |
60829779 | Oct 2006 | US | |
60862398 | Oct 2006 | US | |
60862718 | Oct 2006 | US | |
60863469 | Oct 2006 | US | |
60863481 | Oct 2006 | US | |
60864302 | Nov 2006 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11384037 | Mar 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11394350 | Mar 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11279333 | Apr 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11379929 | Apr 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11381247 | May 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11381257 | May 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11381265 | May 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11381277 | May 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11383022 | May 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11420594 | May 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11421694 | Jun 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11423594 | Jun 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11425043 | Jun 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11426231 | Jun 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11456472 | Jul 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11461605 | Aug 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11461624 | Aug 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11462795 | Aug 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11462845 | Aug 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11464751 | Aug 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11464764 | Aug 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11464775 | Aug 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11464788 | Aug 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11464799 | Aug 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11465063 | Aug 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11466727 | Aug 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11466953 | Aug 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11470156 | Sep 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11531651 | Sep 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11532461 | Sep 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11535021 | Sep 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11535282 | Sep 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11537469 | Sep 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11539798 | Oct 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11539861 | Oct 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11548191 | Oct 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11549874 | Oct 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11550594 | Oct 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11551083 | Oct 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11554452 | Oct 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11555589 | Nov 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11555896 | Nov 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11556520 | Nov 2006 | US |
Child | 11566455 | Dec 2006 | US |
Parent | 11559278 | Nov 2006 | US |
Child | 11566455 | Dec 2006 | US |