The present invention concerns improvements relating to personal security devices and in particular, though not exclusively, to tracking and locating technology devices worn by users which can be activated to signal an alarm event.
Tracking and locating technology exists both external to and internal to the human body in security devices. However, in the case of an alarm event such as an attacker mugging a person, many of these security devices are visible to the attacker who can then prevent their use. Similarly, if they are not readily accessible, they are difficult to activate during the alarm event as the person may not have time to find the device and activate it.
A further problem with existing security devices is that often they are activated accidentally without the user's knowledge thereby causing problems with the tracking services provided to monitor the device.
Where existing security devices also suffer is that they require a power source of sufficient power to enable transmission of an alert message to a monitoring service. The power source is either provided in the form of replaceable batteries or rechargeable batteries. In either form, the power source needs periodic charging or periodic replacement, which requires some diligence on the part of the user, which in many cases means that the security device is not operational when it is needed.
There exists a secondary problem in that if the security device has a feature which resembles a switch, this may trigger a reaction in an attacker including removal of the device or further violence. This also affects the effectiveness of the security device and also can pose an additional danger to the user in an alarm event.
There have been some solutions of providing inner body chips. However, the problem here is they are not easily, if at all, self-activating in an alarm situation. Also as the internal body chip would have some form of external panic alarm activator, this could be smashed or disabled and so this doesn't solve the educated attacker issue.
It is desired to provide a security device which mitigates at least some of the above described problems.
The present invention is directed to addressing these problems and concurrent other issues.
According to one aspect of the present invention there is provided: a personal security device for use in signaling an alarm event, the device being arranged to be worn on or about the human body in an accessible manner, the device comprising: user-operable activation means for activating a response to an alarm event, the activation means being activatable by a physical change of state caused by user interaction with the activation means and being arranged to indicate activation to the user in a subtle, non-obvious manner, a transmitter responsive to the activation means for transmitting an alarm event signal indicating the occurrence of an alarm event; and an inactive power source integrated into the device, the inactive power source being coupled to the transmitter; wherein the activation means is arranged to interact with the inactive power source to activate the same and thereby electrically power the transmitter and initiate the sending of the alarm event signal.
The present invention provides a device which is readily and constantly accessible, and whose activation is not readily noticeable or visible to an attacker. The provision of a chemically-activated instant power source obviates the need for rechargeable or replaceable batteries. The security device is easily to hand or worn constantly on the body of the user. In this way at least some of the shortcomings of previous security devices are addressed.
The term “user operable” has been used broadly in this specification, such that it refers to direct actions that the user can take on the device, such as squeezing it, as well as activating the device by causing it to separate from the user or another device, for example by throwing it, or dropping it and moving away.
Furthermore the term “subtle, non-obvious manner”, should be understood to mean that the device is arranged to indicate activation to the user in such a way that an attacker would be unlikely to notice the device or become aware that the user is in possession of an alarm of any kind.
Preferably the inactive power source comprises a plurality of chambers, each chamber retaining a different chemical substance which when brought into contact with other chemical substances creates an electrical potential, and wherein the action of the activation means causes the plurality of chemical substances from different chambers to combine.
The chemicals in the power source chambers are preferably held in separation until the activation means is activated by the user. This has the advantage of giving a very long life to the inactive power source.
The activation means are arranged in one embodiment to bring the chemicals into contact with each other through a planned failure mechanism.
The planned failure mechanism may take the form of a weak coupling pin or a ring-pull mechanism. Also the planned failure mechanism may be made from a material that is weaker than the material of the adjacent components of the device.
The power source chambers may, in another embodiment, be arranged to fail under the action of a crushing force, thereby releasing the different chemicals to mix with each other. Preferably in this embodiment a structure of the plurality of power source chambers is honeycomb-like.
The activation means when activated directly by the user may provide a direct crushing force on the power source chambers.
Alternatively, the activation means when activated by the user may provide an indirect crushing force on the power source chambers via an activatable mechanism acting in response to receipt of an electrical activation signal generated by the activating means.
The activation means may be arranged to be activated when the user applies direct pressure to the device. Preferably the direct pressure is applied through pulling, pushing, hitting, kicking or squeezing the activation means.
Alternatively the activation means may be arranged to be activated when the user removes the device from their body. In this case, the activation means may comprise a biometric sensor arranged to detect the proximity of the device to the user's body. Alternatively, the activation means can comprise an electrostatic charge sensor arranged to be charged by the proximity of the device to the user's body.
The activation means may comprise a pair of exposed electrical terminals which are arranged to complete an electrical circuit and activate the device when an electrical conductor or conducting medium is placed between the terminals.
The device may further comprise fine electrical wires positioned between the power source and the transmitter for providing the power generated by the power source to the transmitter, in use. The fine wires may be dimensioned to not be readily visible to the naked eye to prevent an attacker noticing the presence of the security device.
Alternatively the device may further comprise a flexible printed circuit embedded within a rubber membrane positioned between the power source and the transmitter for providing the power generated by the power source to the transmitter, in use.
The transmitter may comprise a SIM card for sending data to a mobile network.
The transmitter may comprise a GPS chip arranged to transmit current location data of the device. Alternatively, the device can be arranged to connect to a separate GPS locator with a SIM card to send an alarm event notification containing current location data of the GPS locator.
The device can also be arranged in another embodiment to connect to a microchip held by the user with its own SIM card to send an alarm event notification containing current location data of the microchip.
The transmitter is preferably arranged to send an alarm event signal directly to a tracking system.
Alternatively the transmitter may be a short-range transmitter and can be arranged to send an alarm event notification signal to a mobile telecommunications device in the vicinity of the transmitter.
Preferably the activation means is arranged to change the colour of the security device to indicate its activation. Also preferably the device comprises at least some transparent electrical components. Both of these features make the detection of the article as a security device less obvious.
The device may be arranged to be retro-fitted to an existing wearable item, such as a watch. Alternatively the device can be integrated into a watch. In some embodiments the device can be realised as a bracelet or an earpiece. In other embodiments the device can be realised as a tape, medical plaster or skin patch to be applied to the user's body.
Preferably the transmitter is arranged to send an alert signal which causes a mobile base station to log all other mobile phones within a given radius of the security device current location and make them available as potential locators and/or microphones. This is a useful way of catching an attacker in an alert situation.
The present invention also extends to a system comprising a device as described above in combination with a mobile telecommunications device, wherein the mobile telecommunications device is arranged to send the alarm event notification on to a tracking system.
The mobile telecommunications device may be configured to send current location data derived either from the mobile device's GPS chip or the security device's GPS chip, in the alarm event notification.
The mobile telecommunications device may be arranged to provide an opportunity for the user to prevent the sending of the alarm event notification once the activation means has been activated. This is important to prevent unnecessary false alarms. In one embodiment the mobile telecommunications device is arranged to prevent the sending of the alarm event notification on receipt of a predetermined input code into the mobile telecommunications device within a given time period.
The security device may monitor the proximity of the mobile telecommunications device. In this case, the activation means may be arranged to be activated if the activation means does not detect the proximity of the mobile telecommunications device.
The mobile telecommunications device may be configured to be used as a live microphone for the tracking system when an alarm event notification has been sent.
The mobile telecommunications device can be configured to emit an audible distress signal once the alarm event notification has been transmitted. This may act as a deterrent to further attack for the victim.
According to another aspect of the present invention there is provided a method of signaling an alarm event using a personal security device, the method comprising: wearing the device on or about the human body in an accessible manner, activating a response to an alarm event by causing by a physical change of state in activation means of the personal security device, the activation being caused by user interaction with the activation means; indicating activation to the user in a subtle, non-obvious manner; transmitting an alarm event signal indicating the occurrence of an alarm event from a transmitter of the personal security device, in response to the activation; coupling an inactive power source integrated into the device to the transmitter; wherein the user interaction interacts with the inactive power source to activate the same and thereby electrically power the transmitter and initiate the sending of the alarm event signal.
In order that the invention may be more readily understood, preferred non-limiting embodiments thereof will now be described with reference to the accompanying drawings, in which:
With reference to
The activation module 10 is arranged to initiate an alarm event in the device. The chemical chamber 12 contains two or more different chemicals which, when allowed to come into contact with each other through the action of the activation module 10, react to generate electricity. This electricity can then be used to power the transmitter 14.
In one embodiment the chemicals are contained within a structure which prevents them from coming into contact with each other until the activation module 10 disrupts the structure and breaks the barriers that separate them. When the chemicals are brought into contact with each other they mix to form an electrolyte solution. Two electrodes, an anode and a cathode, are in contact with the solution such that chemical reactions are initiated at each electrode, generating a voltage. This voltage can be used to power the transmitter. For example, the electrolyte solution could be a mixture of zinc sulphate and copper sulphate, initially held separately from each other, and the anode and cathode would be made from zinc and copper respectively. The person skilled in the art will be aware that this arrangement bears a resemblance to the arrangement that would be found in a common battery.
In another embodiment, one or more of the electrodes are positioned away from the electrolyte solution, such that when the activation module is activated, the electrodes are brought into contact with the solution, thus initiating a reaction which will generate a voltage, which can be used to initiate and power the transmitter. The power generated for location of the device 5 is 36-72 hours only
Each of the three elements of the device 5 will now be described in more detail.
The primary task that the activation module 10 is required to perform is to break the separation between the chemicals in the chemical chamber power source 12, in order to initiate a chemical reaction which will produce a transient power source, thereby to power the transmitter 14, and indicate to the transmitter that an alarm condition exists.
There are two main options for the way in which the chemicals may be contained in the chemical chamber 12 that will determine how the activation module 10 can affect the mixing of these chemicals to start a reaction.
The first option is illustrated in
The second option for containing the chemicals in a way that will allow for an activation module 10 to bring them into contact with each other when required is through the use of a planned failure mechanism. In this case, the barrier that separates the chemicals is designed to fail when the device is pulled. It could be a weak coupling pin or chain link, or alternatively a ring pull action could be implemented. This weakness could be achieved through the use of a material that is easily bendable or crushable or movable by human action, and is weak relative to the rest of the device, for example plastic or rubber. As with a crush zone, the activation means in this scenario could either be a result of direct action from the user, or it could be effected by a small electrical signal.
For both of the above-described arrangements, there is a wide range of potential ways in which the device 5 can be arranged to enable to the user to effect the activation in a direct, physical way, and release the chemicals to activate the alarm in a discrete and subtle manner. For example, the invention could be realised as a bracelet that the user can activate simply by ripping it off, or alternatively it could be a push button actuator placed on a shoe, which can be activated by the user simply kicking the shoe against an object to assert the actuator.
The non-limiting embodiments for an electrical activation module 10 include a biometric sensor (not shown) which is in direct contact with the user and senses biometric signals of the wearer, which are arguably as individual as fingerprints, and is an alternative to an invasive inner body chip Similarly an electrostatic charge sensor (not shown) which is connected to the user can be used. The biometric sensor senses the proximity of the device 5 to the human body. So long as the security device senses that the human body is in close proximity to the device 5 no alarm event signal is generated by the transmitter as no alarm condition is considered to exist. The sensor may give a regular signal to indicate that no alarm condition exists. However, once the sensor senses that the device 5 and the human body are no longer in proximity, an alarm condition exists and an alarm event signal is generated. The biometric sensor is also a user-operable activation module 10 in that the removal of the device 5 from close proximity to the human body represents the physical change of state of the device 5 caused by user interaction with the activation module 10. The electrostatic charge sensor will start to lose its charge if removed from the user. Once the charge drops below a predetermined threshold the sensor will send an activation signal to the transmitter. In a similar way to the biometric sensor, the electrostatic charge sensor could also act as the user-operable activation module 10 through the removal of the device 5.
In an alternative embodiment two exposed electrical terminals are provided and arranged such that an electrical circuit is completed if a conductor is placed across them. The conductor can be water for example, such that the device can be activated if the device is placed underwater or in water.
The final element, the transmitter 14, is used to send an alarm signal. However, there several embodiments for how the alarm signal can be used. In one embodiment of the invention, the transmitter sends a simple alarm signal to a tracking network, highlighting that the user is experiencing some form of difficulty. In another embodiment the device can incorporate an integral GPS chip, so that it is also able to transmit the user's location. In a further embodiment the device can incorporate a SIM card, thus enabling the device to connect to a mobile network in order to notify an alarm event.
As illustrated in
In a further embodiment the transmitter 14 of the security device 5 connects to another transmission device 32 (whether worn internally or externally) such as a GPS locator that contains a SIM card 33 to notify an alarm event. In addition, the SIM card 33 may be placed on or made of a transparent but nonetheless electrically conductive material so as to be provided in a concealed fashion on the transmission device 32 that is otherwise transparent. This accords the security device the same benefits as in the above described embodiment in which a mobile phone is used to send the alarm notification, in that the security device 5 need not have an integral SIM card and GPS chip, along with lower power requirements, and can therefore be smaller. In another embodiment, as an alternative to a GPS locator 32, a microchip which is held by the user could also be used, or in a further non-limiting embodiment the user could be wearing more than one security device, one of which could act as an activator, and the other as a locator.
In a further embodiment of the system, the transmitter 14 is arranged to transmit a signal to cause the mobile base station to log all other mobile phones within a given radius of the security device 5 and make them available as potential locators and/or microphones as these will implicitly belong to the perpetrators of any attack on the victim. For high-value potential victims, the signal may alert overhead satellites to begin tracking the area to identify victims and perpetrators.
An additional feature in the device of the present embodiment comprising the activation module 10, chemical chamber power source 12, and transmitter 14, is that the power generated by the chemical power source 12 together with an activation signal must first be sent to the transmitter. One way in which this can be done is by connecting the two with fine wires, which could be fine enough so as not to be easily visible. The wires could also be concealed within the device.
In another embodiment transferring power and the activation signal from the source to the transmitter is through the provision of flexible printed circuits 34 embedded within a rubber membrane 36, as illustrated in
It is to be appreciated that such transparent transistors are thin-film transistors (TFTs) and are known—typically being used in display technology. The inclusion of them in the present embodiment provides a printed circuit element which can be used as part of a flexible circuit and which is transparent. The transparency can help in the obfuscation of the security device, in the bracelet or watch of
As described above, there are many different forms that the activation module can take. Also, the chemical chamber power source can take a number of forms, and furthermore the alarm signal can be transmitted in several ways. It should be appreciated that, while each of these options can be combined with any of the other options, not all of the resulting possible combinations have been described explicitly in this specification. Some further embodiments are now described. These additional embodiments include several practical implementation features.
A particular embodiment of the invention is shown in
Another embodiment is illustrated by
In a further non-limiting embodiment of the present invention, the device is realised as a security bracelet. If the device is a bracelet worn as a single device or alternatively another similar constructed device attachable to or integral to a watch strap for example (which is a wraparound of part of all the whole of the watch strap or chain of the potential victim), then it will allow for a subtle change of colour if accidentally fired or it can discretely indicate the activation by going from clear to opaque in certain sections. This principle of alerting the user to an accidental activation by means of a change in colour of the device can be applied to many potential realisations of the invention. This feature could also be used in reverse, in that if the device has an integral SIM card, the tracking company could also “call” the device, which could cause it to change colour. In either case, by the use of a countdown timer as has been described above, it is possible for the confirmation to be in the form of no response by the wearer. This would have the beneficial effect of enabling the alarm to be sent when the user/victim does not wish to alert the attacker to the sending of the signal, but yet has the ability to stop false triggering by deactivation of the transmission of the alarm signal.
Further examples of potential ways in which embodiments of the present invention could be realised shall now be described.
The security device could be embodied in a patch or a cover for an ordinary device e.g. a cover for a button or eyeglasses.
The device may be a bracelet containing the areas of planned failure, or allowing for the separation of the bracelet from the wearer or the tearing of the bracelet, all of these causing an alarm event signal to be fired off.
If the SIM card is constructed out of a transparent material, then conceptually it can be part of a tape or medical plaster, or skin patch that will be applied on a daily basis to the body and would appear innocuous to an attacker.
The locator device 32 can also be mounted as a small ear-worn device to appear as a hearing aid.
A variant for children can be a bracelet or other similar item worn directly upon the infant's or toddler's body that has metal or other electrically conductive materials that would be connected in an electrical circuit by exposure to water, such that contact with water would cause an immediate mobile phone alert to notify a parent that the child has fallen in water.
In addition, the child can carry a small SIM card and GPS locator in a band around the wrist which is inert and with a very small signal receptor standing in for the crush technology, so it can initiate sending of an alarm signal if it moves out of the proximity of a second bracelet worn on a carer's. hand. Also a bracelet that would activate the small low charge signal receptor to break open the inner chemical chamber and power the receptor to activate the locator if ordered by another device e.g. a mobile phone.
The inclusion of planned failure, or crush zone technology in an ordinary everyday device allowing for the ingress or egress of chemicals to cause that device to move from being inert to having an electrical charge, would mean that everyday devices could be manufactured which will include SIM cards and could be concealed in buttons or shoelaces or belt buckles or other devices which are part of clothing and/or jewellery but which nonetheless appear innocuous to allow the victim to activate those devices whilst under threat to allow for the charging of locator devices.
If a permanently invasive device is unattractive to the potential victim, the external signalling device could be linked with a daily pill that would be swallowed which contains a single receptor to activate it, or to cause a further movement to allow for battery charge to occur by the ingress or egress of a chemical from one section of the device to another. The pill would have within it the SIM card and GPS location capabilities.
It will be understood that the embodiments described above are given by way of example only and are not intended to limit the invention. It will also be understood that the embodiments described may be used individually or in combination.
Number | Date | Country | Kind |
---|---|---|---|
1111644.9 | Jul 2011 | GB | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/GB2012/000578 | 7/9/2012 | WO | 00 | 5/6/2014 |