This disclosure relates generally to the field of emergency warning systems, and more specifically a method and a system of handling emergency warning alerts.
Traditionally, emergency alert warning systems used to be considered as dumb terminals as an alarm is generated either manually or based on some input signal in case of an emergency. Recently, technology has evolved over time with respect to emergency warning systems. Consumers are nowadays using smartphones and/or other mobile computing devices to respond to or deal with the emergencies, or to be warned about them The emergency warning systems are making use of internet and smart devices connected to it for generating an alarm or an alert to alert users about impending disasters, so that they can take precautions.
In one conventional approach, there are dedicated emergency warning systems. The dedicated emergency warning systems receive warning/alert messages from external service providers and government agencies and in turn transmit these messages to different smart devices to warn the users. However, the dedicated emergency warning systems may not be transmit the warning messages accurately as users may not always be interacting or be in the proximity of a particular or dedicated smart device, and thus the user may not be properly warned. Further, each dedicated emergency system, works independently, and hence if one receives an emergency alert message from the external agencies, the conventional emergency warning systems may not be able to send the messages to other smart devices, or to alert the user.
In one embodiment, a method of handling emergency warning alerts is disclosed. The method comprises receiving, by a first emergency gateway, at least one emergency alert message. The method further comprises retrieving, by the first emergency gateway, presence information of a user in response to receiving the at least one emergency alert message. The method further comprises identifying by the first emergency gateway, at least one emergency alarm device based on the presence information of the user. The method further comprises transmitting by the first emergency gateway, the at least one emergency alert message to the at least one emergency alarm device.
In another embodiment, a system for handling emergency warning alerts is disclosed. The system includes at least one processor and at least one memory device. The at least one memory device stores instructions that, when executed by the at least one processor, causes the at least one processor to perform operations comprising receiving, at least one emergency alert message. The operation further comprises retrieving, presence information of a user in response to receiving the at least one emergency alert message. The operation further comprises, identifying at least one emergency alarm device based on the presence information of the user. The operation further comprises, transmitting the at least one emergency alert message to the at least one emergency alarm device.
In another embodiment, a non-transitory computer readable medium, including instructions stored thereon is disclosed. These instructions, when processed by at least one processor, causes the at least one processor to perform operations comprising receiving, at least one emergency alert message. The operation further comprises retrieving presence information of a user in response to receiving the at least one emergency alert message. The operation further comprises, identifying at least one emergency alarm device based on the presence information of the user. The operation further comprises, transmitting the at least one emergency alert message to the at least one emergency alarm device.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the Invention, as claimed.
The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate exemplary embodiments and, together with the description, serve to explain the disclosed principles.
Exemplary embodiments are described with reference to the accompanying drawings. Wherever convenient, the same reference numbers are used throughout the drawings to refer to the same or like parts. While examples and features of disclosed principles are described herein, modifications, adaptations, and other implementations are possible without departing from the spirit and scope of the disclosed embodiments. It is intended that the following detailed description be considered as exemplary only, with the true scope and spirit being indicated by the following claims.
As shown in
The service provider module(s) 104 may include one or more modules managed by service providers, who provide utilities, such as broadband, cable TV, security, gas, electricity. In an example, the service providers may be a multi system operator (MSO) service provider 112, a security service provider 114, an electricity service Provider 116, a water service provider 118, and a gas service provider 120. It may be noted that although
As shown in
Further, the emergency gateway modules 106 includes various emergency gateway devices, such as a MSO Gateway 122, a Security Gateway 124, an Electricity Gateway 126, a Water Gateway 128, and a Gas Gateway 130. In an example, the emergency gateway modules 106 receives the emergency alert messages from the service provider modules 104. It may be noted the emergency gateways as shown in
As shown in
The emergency gateway systems are responsible for sending and receiving messages to/from the smart devices in the emergency alert system through the network 110, to send/receive the message. The emergency gateway systems may employ connection protocols including, without limitation, direct connect, Ethernet (e.g., twisted pair 10/100/1000 Base T), transmission control protocol/internet protocol (TCP/IP), token ring, IEEE 802.11a/b/g/n/x, etc. The network 110 may include, without limitation, a direct interconnection, local area network (LAN), wide area network (WAN), wireless network (e.g., using Wireless Application Protocol), the Internet, etc. Using the network 110, the emergency gateway devices may communicate with the smart device. These devices may include, without limitation, personal computer(s), server(s), fax machines, printers, scanners, various mobile devices such as cellular telephones, smartphones (e.g., Apple iPhone, Blackberry, Android-based phones, etc.), tablet computers, eBook readers (Amazon Kindle, Nook, etc.), laptop computers, notebooks, gaming consoles (Microsoft Xbox, Nintendo DS, Sony PlayStation, etc.), or the like. In some embodiments, the emergency gateway devices may itself embody one or more of these devices.
The emergency gateway system for handling emergency alert messages is explained in more detail in conjunction with
The interface(s) 206 may include a variety of software and hardware interfaces, for example, a web interface, a graphical user interface, etc., allowing the system 132 to interact with user devices. Further, the interface(s) 206 may enable the system 132 respectively to communicate with other computing devices. The interface(s) 206 can facilitate multiple communications within a wide variety of networks and protocol types, including wired networks, for example LAN, cable, etc., and wireless networks such as WLAN, cellular, or satellite. The interface(s) 206 may include one or more ports for connecting a number of devices to each other or to another server.
In one example, the system 132 includes modules 208 and data 210. In one embodiment, the modules 208 and the data 210 may be stored within the memory 206. In one example, the modules 208, amongst other things, include routines, programs, objects, components, and data structures, which perform particular tasks or implement particular abstract data types. The modules 208 and may also be implemented as, signal processor(s), state machine(s), logic circuitries, and/or any other device or component that manipulate signals based on operational instructions. Further, the modules 208 can be implemented by one or more hardware components, by computer-readable instructions executed by a processing unit, or by a combination thereof.
In one implementation, the modules 208 further include a rule engine 212, and a transceiver 214. In an example, the modules 208 may also comprise other modules (not shown in
In one example, the data 210 serves, amongst other things, as a repository for storing data fetched, processed, received and generated by one or more of the modules 208. In one implementation, the data 210 may include a proximity matrix 216, a peer device matrix 218, and a distribution list 220. In one embodiment, the data 210 may be stored in the memory 202 in the form of various data structures. Additionally, the aforementioned data 210 can be organized using data models, such as relational or hierarchical data models. In an example, the data 210 may also comprises other data used to store data, including temporary data and temporary files, generated by the modules 208 for performing the various functions of the system 132.
In operations, in case of an emergency to send the emergency alert messages to various devices, the transceiver 214 may receive the emergency alert message from various service providers. The transceiver may be understood as a device that comprises a transmitter circuit and a receiver circuit. However, it will be apparent to a person skilled in the art, that separate transmitters and receivers may also be used in conjunction with the system 132, without deviating from the scope of the Invention.
The emergency alert message may include information related to service categorization, genre and impact mapping. In an example, the service categorization of an emergency alert message, may include sorting of the messages on the basis of category of service provider, like utility service provider in electricity, water, gas, security, media services etc. In an example, the categorizing emergency alert messages on the basis of genre includes, whether the alert is for flood, tsunami, typhoon, riot, fire, theft etc. The sorting and categorization of the emergency alert messages are generally done by the service providers or the alert notification system which may be operated by the government, and the required information is put within the emergency alert message. In an example, the impact mapping information may be calculated based on the extent of damage that can be caused by the emergency. Further, factors, such as the genre and geographic location of the emergency may be taken into account to calculate impact of the emergency. In an example, a first emergency gateway, may receive an emergency alert message from at least one utility service provider responsible for providing services, such as MSO, security, electricity, and water, gas. The emergency alert messages are generally received by the service providers from the alert notification system 102 operated by the government agencies/natural disaster units.
Upon receiving the emergency alert message, the rule engine 212, may then retrieve user presence information from the proximity matrix 216. The proximity matrix 216, maintains a list of the user devices, which are in proximity to a user, or which can detect the presence of user. The proximity information is determined based on the user presence information received by the first emergency gateway, and the plurality of second emergency gateways from the at least one emergency alarm device. The retrieval of the user presence information by the first emergency gateway as per step 304 of
In another example, the rule engine 212 may identify the at least one emergency alarm device on the basis of the user presence information.
The rule engine 212, dynamically generates a distribution list, which comprises of the at least one user device in a particular zone determined by the user presence information sent by the at least one emergency alarm device, and the at least one utility control devices in the network implementation as per
Further, the rule engine 212, with the help of the transceiver 214, transmits the emergency alert message, to the at least one emergency alarm device based on the user presence information and the emergency alarm device being present in the distribution list.
In another example, the rule engine 212, with the help of the transceiver 214, may transmit the emergency alert message to the at least one emergency alarm device associated with a particular zone. On the basis of the received emergency alert message, the at least one user device, associated with a particular zone, will alert the user, and the at least one utility control device will take necessary actions, like tuming off the particular utility, or just setting off an alarm to alert the user, present in the zone. Hence all the emergency alarm devices associated with the particular zone present in the distribution list will receive the emergency alert message.
In yet another example, the rule engine 212, with the help of the transceiver 214, may transmit the at least one emergency alert message, to the at least one emergency alarm device, based on at least one of service categorization, a genre and an impact mapping information as explained before. The at least one emergency alert message contains at least one of service categorization, a genre and an impact mapping information, and the emergency alarm devices associated with each of
Further in an example, the transceiver 214, may transmit the emergency alert message to all the other emergency gateway systems, connected to the network, as described in the network implementation 100 in
In yet another example, the emergency alert message may be transmitted to all the emergency alarm devices in the distribution list, by the rule engine 212, with the help of the transceiver 214.
The method 300 may be described in the general context of computer executable instructions. Generally, computer executable instructions can include routines, programs, objects, components, data structures, procedures, modules, and functions, which perform particular functions or implement particular abstract data types. The method 300 may also be practiced in a distributed computing environment where functions are performed by remote processing devices that are linked through a communication network. In a distributed computing environment, computer executable instructions may be located in both local and remote computer storage media, including memory storage devices.
The order in which the method 300 is described is not intended to be construed as a limitation, and any number of the described method blocks can be combined in any order to implement the method 300 or alternative methods. Additionally, individual blocks may be deleted from the method 300 without departing from the spirit and scope of the subject matter described herein. Furthermore, the method 200 can be implemented in any suitable hardware, software, firmware, or combination thereof.
With reference to
At block 304, presence information of the user is retrieved by the first emergency gateway in response to receiving the at least one emergency alert message. In an example, the first emergency gateway and the plurality of second emergency gateways receives user presence information from the at least one emergency alarm device. Presence information of the user, may be detected, using a video camera, audio (Microphone array), passive infrared sensors (PIR), pressure sensors, radiofrequency tags, fingerprint readers, motion sensors, etc. which are integrated in objects commonly found and configured with the emergency alarm devices, or the network as described in the network implementation 100, in
At block 306, at least one emergency alarm device is identified based on the presence information, as received and stored in the proximity matrix.
The network as described in the network implementation 100, in
At 307, the first emergency gateway, transmits the at least one emergency alert message to the at least one emergency alarm device based on the user presence information. Necessary actions may be taken by the emergency alarm device as per the type of emergency. It may include warning the user of the emergency, as well as controlling the supply of the utility.
In an example, the first emergency gateway and the plurality of second emergency gateways, dynamically generate a distribution list, which comprises of the at least one user device in a particular zone determined by the user presence information sent by the at least one emergency alarm device, and the at least one utility control devices in the network as described in the network implementation 100, in
In another example, the first emergency gateway, may transmit the emergency alert message to the at least one emergency alarm device associated with a particular zone. On the basis of the received emergency alert message, the at least one user device, associated with a particular zone, will alert the user, and the at least one utility control device associated with a particular zone will take necessary actions, like turning off the particular utility, or just setting off an alarm to alert the user, present in the zone.
In yet another example, the first emergency gateway may transmit the at least one emergency alert message, to the at least one emergency alarm device, based on at least one of service categorization, a genre and an impact mapping information. The at least one emergency alert message contains at least one of service categorization, a genre and an impact mapping information
Further in an example, the first emergency gateway, may transmit the emergency alert message to all the other emergency gateways connected to the network as described in the network implementation 100, in
Additional illustrative embodiments are listed below. In one embodiment, the first emergency gateway and the plurality of second emergency alert gateways, may validate the authenticity, duplication and error in the emergency alert message received. The first emergency gateway and the plurality of second emergency alert gateways may check whether the same emergency alert message had been previously received, and whether required action had been taken, and if proper action had been taken, then the emergency alert message is ignored. The first emergency gateway and the plurality of second emergency alert gateways also may check if the emergency alert message was received from a particular emergency alarm device, then it will transmit the message to other emergency alarm devices in the distribution list. Hence the distribution list comprises of all the devices where the emergency alert messages have to be sent on a priority.
In another embodiment, the emergency messages may be changed into some form electrical signal, to activate non-smart alarms, or dumb terminals, connected directly to emergency gateways. Dumb terminals or non-smart alarms are devices, which do not have any processing power, but have input and output capabilities. Hence if there is an electrical signal the non-smart alarms may go off or on.
In another embodiment, when one emergency gateway receives an emergency alert message, then there may be a situation, where it may not be able to send it to all or any of the user devices on the distribution list, because of some network problem. However it can be sent to the plurality of second gateways, who also contain the peer matrix and the proximity matrix, and the receiving gateway can then create a distribution list and transmit the messages to the at least one emergency alarm device present in the distribution list.
In another embodiment, the categorization of the at least one emergency alarm device based on the zones defined as a part of system configuration and initialization, may change, by changing or moving the emergency alarm devices or changing the layout of the network as described in the network implementation 100, in
Other embodiments of the present disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the embodiments disclosed herein. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
Processor 402 may be disposed in communication with one or more input/output (I/O) devices via I/O interface 403. The I/O interface 403 may employ communication protocols/methods such as, without limitation, audio, analog, digital, monoaural, RCA, stereo, IEEE-1394, serial bus, universal serial bus (USB), infrared, PS/2, BNC, coaxial, component, composite, digital visual interface (DVI), high-definition multimedia interface (HDMI), RF antennas, S-Video, VGA, IEEE 802.n /b/g/n/x, Bluetooth, cellular (e.g., code-division multiple access (CDMA), high-speed packet access (HSPA+), global system for mobile communications (GSM), long-term evolution (LTE), WiMax, or the like), etc.
Using the I/O interface 403, the computer system 401 may communicate with one or more I/O devices. For example, the input device 404 may be an antenna, keyboard, mouse, joystick, (infrared) remote control, camera, card reader, fax machine, dongle, biometric reader, microphone, touch screen, touchpad, trackball, sensor (e.g., accelerometer, light sensor, GPS, gyroscope, proximity sensor, or the like), stylus, scanner, storage device, transceiver, video device/source, visors, etc. Output device 405 may be a printer, fax machine, video display (e.g., cathode ray tube (CRT), liquid crystal display (LCD), light-emitting diode (LED), plasma, or the like), audio speaker, etc. In some embodiments, a transceiver 406 may be disposed in connection with the processor 402. The transceiver may facilitate various types of wireless transmission or reception. For example, the transceiver may include an antenna operatively connected to a transceiver chip (e.g., Texas Instruments WiLink WL1283, Broadcom BCM4750IUB8, Infineon Technologies X-Gold 618-PMB9800, or the like), providing IEEE 802.11a/b/g/n, Bluetooth, FM, global positioning system (GPS), 2G/3G HSDPA/HSUPA communications, etc.
In some embodiments, the processor 402 may be disposed in communication with a communication network 408 via a network interface 407. The network interface 407 may communicate with the communication network 408. The network interface may employ connection protocols including, without limitation, direct connect, Ethernet (e.g., twisted pair 10/100/1000 Base T), transmission control protocol/internet protocol (TCP/IP), token ring, IEEE 802.11a/b/g/n/x, etc. The communication network 408 may include, without limitation, a direct interconnection, local area network (LAN), wide area network (WAN), wireless network (e.g., using Wireless Application Protocol), the Internet, etc. Using the network interface 407 and the communication network Error! Reference source not found.08, the computer system 401 may communicate with devices 410, 411, and 412. These devices may include, without limitation, personal computer(s), server(s), fax machines, printers, scanners, various mobile devices such as cellular telephones, smartphones (e.g., Apple iPhone, Blackberry, Android-based phones, etc.), tablet computers, eBook readers (Amazon Kindle, Nook, etc.), laptop computers, notebooks, gaming consoles (Microsoft Xbox, Nintendo DS, Sony PlayStation, etc.), or the like. In some embodiments, the computer system Error! Reference source not found.01 may itself embody one or more of these devices.
In some embodiments, the processor 402 may be disposed in communication with one or more memory devices (e.g., RAM 413, ROM 414, etc.) via a storage interface 412. The storage interface may connect to memory devices including, without limitation, memory drives, removable disc drives, etc., employing connection protocols such as serial advanced technology attachment (SATA), integrated drive electronics (IDE), IEEE-1394, universal serial bus (USB), fiber channel, small computer systems interface (SCSI), etc. The memory drives may further include a drum, magnetic disc drive, magneto-optical drive, optical drive, redundant array of independent discs (RAID), solid-state memory devices, solid-state drives, etc.
The memory devices may store a collection of program or database components, including, without limitation, an operating system 416, user interface application 417, web browser 418, mail server 419, mail client 420, user/application data 421 (e.g., any data variables or data records discussed in this disclosure), etc. The operating system 416 may facilitate resource management and operation of the computer system 401. Examples of operating systems include, without limitation, Apple Macintosh OS X, Unix, Unix-like system distributions (e.g., Berkeley Software Distribution (BSD), FreeBSD, NetBSD, OpenBSD, etc.), Linux distributions (e.g., Red Hat, Ubuntu, Kubuntu, etc.), IBM OS/2, Microsoft Windows (XP, Vista/7/8, etc.), Apple iOS, Google Android, Blackberry OS, or the like. User interface 417 may facilitate display, execution, interaction, manipulation, or operation of program components through textual or graphical facilities. For example, user interfaces may provide computer interaction interface elements on a display system operatively connected to the computer system 401, such as cursors, Icons, check boxes, menus, scrollers, windows, widgets, etc. Graphical user interfaces (GUIs) may be employed, including, without limitation, Apple Macintosh operating systems' Aqua, IBM OS/2, Microsoft Windows (e.g., Aero, Metro, etc.), Unix X-Windows, web interface libraries (e.g., ActiveX, Java, Javascript, AJAX, HTML, Adobe Flash, etc.), or the like.
In some embodiments, the computer system 401 may implement a web browser 418 stored program component. The web browser may be a hypertext viewing application, such as Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Apple Safari, etc. Secure web browsing may be provided using HTTPS (secure hypertext transport protocol), secure sockets layer (SSL), Transport Layer Security (TLS), etc. Web browsers may utilize facilities such as AJAX, DHTML, Adobe Flash, JavaScript, Java, application programming interfaces (APIs), etc. In some embodiments, the computer system 401 may implement a mail server 419 stored program component. The mail server may be an Internet mail server such as Microsoft Exchange, or the like. The mail server may utilize facilities such as ASP, ActiveX, ANSI C++/C#, Microsoft .NET, CGI scripts, Java, JavaScript, PERL, PHP, Python, WebObjects, etc. The mail server may utilize communication protocols such as internet message access protocol (IMAP), messaging application programming interface (MAPI), Microsoft Exchange, post office protocol (POP), simple mail transfer protocol (SMTP), or the like. In some embodiments, the computer system 401 may implement a mail client 420 stored program component. The mail client may be a mail viewing application, such as Apple Mail, Microsoft Entourage, Microsoft Outlook, Mozilla Thunderbird, etc.
In some embodiments, computer system 401 may store user/application data 421, such as the data, variables, records, etc. (e.g., Proximity matrix 216, Peer Device Matrix 218 and 220) as described in this disclosure. Such databases may be implemented as fault-tolerant, relational, scalable, secure databases such as Oracle or Sybase. Alternatively, such databases may be implemented using standardized data structures, such as an array, hash, linked list, struct, structured text file (e.g., XML), table, or as object-oriented databases (e.g., using ObjectStore, Poet, Zope, etc.). Such databases may be consolidated or distributed, sometimes among the various computer systems discussed above in this disclosure. It is to be understood that the structure and operation of the any computer or database component may be combined, consolidated, or distributed in any working combination.
The specification has described system and method for handling emergency warning alerts. The Illustrated steps are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments.
Furthermore, one or more computer-readable storage media may be utilized in implementing embodiments consistent with the present disclosure. A computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored. Thus, a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor(s) to perform steps or stages consistent with the embodiments described herein. The term “computer-readable medium” should be understood to include tangible items and exclude carrier waves and transient signals, i.e., be non-transitory. Examples include random access memory (RAM), read-only memory (ROM), volatile memory, nonvolatile memory, hard drives, CD ROMs, DVDs, flash drives, disks, and any other known physical storage media.
It is intended that the disclosure and examples be considered as exemplary only, with a true scope and spirit of disclosed embodiments being indicated by the following claims.
Number | Date | Country | Kind |
---|---|---|---|
201641003604 | Feb 2016 | IN | national |