Classroom safety has hit an all-time low. As of this writing, the number one cause of death for children is gun shot wounds. There have been many examples of an active shooter entering schools (elementary schools, middle schools, high schools, colleges) and shooting multiple children, staff, educators, police officers, etc.
Today, many students have cellular phones, and some have been used to report such shootings, but in the chaos of being shot at, it is often difficult for the students and faculty to make an emergency call as they are often huddled for cover, staying quiet in a safe place, or running. Activating a smartphone will generate light that might be seen by the active shooter and the person activating their smartphone may be the next target. Therefore, due to haste or fear, it often takes time before one or more students make emergency calls and then, the calls are often made to a parent, which further delays dispatching of the necessary authorities.
Further, false alarms are an issue with present systems, even with E911. When a person/student alone issues an alert, the person/student may be wrong as per the severity of the alert or may be mischievous. For example, after watching too much cable news last night, the person/student hears a backfire and thinks they hear a gun shot, immediately generating an alert either by calling 911 or any other alerting system. This call or alert results in maybe 100 police officers arriving at the location (e.g., school) with guns drawn, K-9 dogs, swat teams, etc. In all the confusion that results, it is possible that a person/student or police officer might get hurt. Even if nobody gets physically hurt, the traumatic stress of this happening will often affect many students, instilling fear of what might have happened. Further, with all these police officers at the location of the alert, the safety and well-being of others that may need those police officers at a different location is in jeopardy.
What is needed is a system, method, and apparatus that will quickly summon help while keeping false alarms to a minimum.
The system method, and apparatus for alerting (quickly summoning help) includes a personal device (e.g., body worn device or carried device) that, when activated by a switch, signal that the holder of such device (e.g., a student) believes there is a situation (e.g., an active shooter). The device is battery powered and communicates wirelessly to a local receiver (e.g., a classroom device). When the local receiver receives a signal from one or more of the personal devices, an algorithm is used to process the signal to determine a response which can be anything from dispatching an administrator or local security officer to signaling the local police force. To reduce false alarms, one or two features are provided. A first false-alarm-reducing feature is to require several repeated activations of the switch on the personal device within a certain time period. For example, the user/student must press a button on the personal device three times within 8 seconds to activate their assigned personal device. This will reduce the number of false alarms due to the person/student accidentally pressing the button or the button getting bumped. A second false-alarm-reducing feature is to require several of the personal devices to be activated (e.g., issue an alert) within another time period, for example, if three users/students issue an alert within 40 seconds, then an escalation to local law enforcement is made.
In one embodiment, a system for alerting is disclosed including several personal devices. Each personal device has logic, an activation switch, and a wireless transmitter. The logic causes the wireless transmitter to send a wireless transmission responsive to operation of the activation switch. There are one or more classroom devices (e.g., for locating throughout a building). Each of the classroom devices has a processor, non-transitory memory, a transceiver, means for communicating with a central server computer, and software running on the processor from the non-transitory memory. Responsive to receiving the wireless transmission from the personal device, the classroom device forwards the alert to the central server computer. When server software that runs on a processor of the central server computer receives the alert from one of the classroom devices, the server software counts total alerts and if the total alerts exceed a total alert threshold within a requisite amount of time, the server software signaling an alarm.
The invention can be best understood by those having ordinary skill in the art by reference to the following detailed description when considered in conjunction with the accompanying drawings in which:
Reference will now be made in detail to the presently preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings. Throughout the following detailed description, the same reference numerals refer to the same elements in all figures.
In general, the system for alerting provides capabilities to determine with reasonable certainty that an emergency exists (e.g., an active shooter) and notifies authorities of such, while minimizing false alarms.
Referring to
The data network 107 is any wired or wireless network or combinations of networks that provide data communications between the classroom devices, the central server computer 102, the remote system(s) 108, optional signaling device(s) 109, and any other computing systems. The server has storage 574 for storing data such as history of alert signals, user/student data, programs, etc.
Referring to
In this exemplary computer system, a processor 570 executes or runs programs in a random-access memory 575. The programs are generally stored within a persistent memory 574 and loaded into the random-access memory 575 when needed. The processor 570 is any processor, typically a processor designed for computer systems with any number of core processing elements, etc. The random-access memory 575 is connected to the processor by, for example, a memory bus 572. The random-access memory 575 is any memory suitable for connection and operation with the selected processor 570, such as SRAM, DRAM, SDRAM, RDRAM, DDR, DDR-2, etc. The persistent memory 574 is any type, configuration, capacity of memory suitable for persistently storing data, for example, magnetic storage, flash memory, read only memory, battery-backed memory, magnetic memory, etc. The persistent memory 574 is typically interfaced to the processor 570 through a system bus 582, or any other interface as known in the industry.
Also shown connected to the processor 570 through a system bus 582 is a network interface 580 (e.g., for connecting to a data network 107) that is wired, wireless, or both, and an optional graphics adapter 584 and a keyboard interface 592 (e.g., Universal Serial Bus—USB). The network interface 580 communicates wired or wirelessly using any known or future radio frequency band(s) and protocols including, but not limited to Wi-Fi, Ethernet, TDMA, CDMA, 5G, and LTE. The graphics adapter 584 receives commands from the processor 570 and controls what is depicted on a display image on the display 586. The keyboard interface 592 provides navigation, data entry, and selection features.
In general, some portion of the persistent memory 574 is used to store programs, executable code, and other data, etc.
The peripherals are examples and other devices are known in the industry such as speakers, microphones, USB interfaces, Bluetooth transceivers, Wi-Fi transceivers, image sensors, temperature measuring devices, etc., the details of which are not shown for brevity and clarity reasons.
Referring to
Also connected to the processor 70 is a system bus 82 for connecting to peripheral subsystems such as a network interface 94 and an activation button 91. In some embodiments, the activation button 91 is directly connected to an input port of the processor 70. Likewise, in some embodiments, the network interface 94 is connected to input/output ports of the processor 70.
The network interface 94 connects the processor-based personal device 300A to the classroom device 105 through any wireless band and protocol such as Bluetooth, Wi-Fi, or a proprietary transmission band/protocol. There is no limitation on the type of wireless connection used and the wireless connection is anticipated to be either one-way, transmit-only in which the network interface 94 is a transmitter or bi-directional in which the network interface 94 is a transceiver. The cellular network interface 80 provides voice call, data, and messaging services through the cellular network.
Note that all personal devices 300 are enclosed in an enclosure that includes a power source such as a primary battery, rechargeable battery, capacitor, and mechanism to replace and/or recharge the battery/capacitor or other power storage device.
Referring to
The transmitter 676 connects the logic 670 of the logic-based personal device 300B to the classroom device 105 through any wireless band and protocol such as Bluetooth, Wi-Fi, or a proprietary transmission band/protocol. There is no limitation on the type of wireless connection used and the wireless connection is anticipated to be either one-way, transmit-only in which the transmitter 676 is transmit-only or bi-directional in which the transmitter 676 is a two-way transceiver.
Referring to
Different architectures are known that accomplish similar results in a similar fashion and the present invention is not limited in any way to any micro-controller-based personal device 300C system architecture or implementation. In this exemplary micro-controller-based personal device 300C, a micro-controller 680 executes or runs programs in an internal random-access memory 675. The programs are generally stored within a persistent memory that is either internal or external flash memory 674 and loaded into the internal random-access memory 675 when needed or executed directly from the internal or external flash memory 674. The micro-controller 680 is any micro-controller, typically a micro-controller designed for low-power systems.
The activation button 91 is directly connected to an input port of the micro-controller 680.
The transmitter 676 connects the logic-based personal device 300B to the classroom device 105 through any wireless band and protocol such as Bluetooth, Wi-Fi, or a proprietary transmission band/protocol. There is no limitation on the type of wireless connection used and the wireless connection is anticipated to be either one-way, transmit-only in which the transmitter 676 is transmit-only or bi-directional in which the transmitter 676 is a two-way transceiver. In some embodiments, the transmitter 676 is a simple, AM or FM radio transmitter operating at any band, in particular, an unlicensed band.
In the embodiment shown, a power source 690 is included (e.g., a battery, chargeable battery, capacitor, super-capacitor) and, if rechargeable, a charge circuit 692 and charge connector 694. The power source 690 provides power to the transmitter 676 and micro-controller 680.
In some embodiments, the personal device 300, in this example, micro-controller-based personal device 300C, includes an identification 677 having a unique value across the enterprise (e.g., school, university) that uniquely identifies the source of the alert signal. In such, when the activation switch 91 is operated and an alert signal is transmitted from the transmitter 676 (through the antenna 676A), the value of the identification 677 is included in the transmission such that, when received at the classroom device 105 and forwarded to the central server computer 102, the central server computer 102 is able to identify the person/student responsible for signaling the alert.
Referring to
The receiver 776 and antenna 776A connects the classroom device 105 to one or more personal device 300 through any wireless band and protocol such as Bluetooth, Wi-Fi, or a proprietary transmission band/protocol. There is no limitation on the type of wireless connection used and the wireless connection is anticipated to be either one-way, receive-only in which the receiver 776 is receive-only or bi-directional in which the receiver 776 is a two-way transceiver. In some embodiments, the receiver 776 is a simple, AM or FM radio receiver operating at any band, in particular, an unlicensed band.
In the embodiment shown, an optional power source 720 is included (e.g., a battery, chargeable battery, capacitor, super-capacitor) for operation when power is lost and, if rechargeable, a charge circuit 722 and power connector 724. Power is provided through the power connector 724 (e.g., connected to a power brick) or through the wired network connector 725 (e.g., using power-over-ethernet). The power source 720 provides power to the receiver 776 and micro-controller 780.
For communications between the classroom device 105 and the central server computer 102, one or more network interfaces 777/778 are provided. In some embodiments, a wireless data interface 777 is provided. In some embodiments, a wired data interface 778 is provided, connecting to a wired network through the wired network connector 725. In some embodiments, both the wireless data interface 777 and wired data interface 778 are provided. The network interface(s) 777/778 communicate wired or wirelessly using any known or future radio frequency band(s) and protocols including, but not limited to Wi-Fi, Ethernet, TDMA, CDMA, 5G, and LTE.
Referring to
Demographic information 401 is gathered from the person/student, for example, the name of the person/student and a student identification of the person/student.
Next the identification 677 of the personal device 300 that is to be assigned/given to the person/student is entered 402. By correlating the person/student to the identification 677 of the personal device 300, any false activations will be traceable back to that person/student.
Once the information for the person/student is complete, the “Done” function 406 is invoked and the information is saved and/or forwarded to the central server computer 102 for remote storage.
Referring to
As it is anticipated that two or more classroom devices 105 will receive the alert from a single personal device 300, it is fully anticipated that the central server computer 102 will sort receptions of alerts by time received and/or by the identification 677 of the personal device 300 that sent the alert and dismiss duplicate alerts. For example, if a personal device 300 having the identification 677 of 12345 transmits an alert at 9:01:05AM and the alert is received at two classroom devices 105, each will forward the alert to the central server computer 102 and the server will filter these alerts to indicate that only one alert was received based upon two alerts from the same personal device 300 (e.g., two alerts from the personal device 300 having identification 677 of 12345) or two alerts received at exactly the same time.
Referring to
Referring to
Referring to
Now an inner loop begins waiting for the activation switch 91 to revert back, or in this example, open 916. Once it is detected that the activation switch is open 916, the press count is incremented 920, indicating that a press (or operation) of the activation switch 91 has occurred. Now, if the press count is greater than a count threshold 922 (e.g., greater than 3 in the example above), the alert is transmitted 902 to the classroom device 105. In this example, the alert that goes to the classroom device 105 indicates that the requisite number of presses have been made (e.g., three presses) within the requisite time period. After the alert is transmitted 902, the above process starts over again.
If the press count is not greater that a count threshold (e.g., greater than 3 in the example above), the timer is compared to a timer threshold 924 (e.g., has 5 seconds elapsed since the first operation of the activation switch?) and if the timer has exceeded the timer threshold 924, the above process starts over, looking for the requisite number of operations of the activation switch 91 in the requisite time period.
If the timer has not exceeded the timer threshold 924, the personal device waits for the activation switch 91 to close again 926 and the inner loop continues.
Referring to
Once it is detected that the received signal to abates 956, the press count is incremented 960, indicating that a press (or operation) of the activation switch 91 on the personal device 300 has abated. Now, if the press count is greater than a count threshold (e.g., greater than 3 in the example above) 962, flow proceeds at 1DEV (see
If the device count is not greater than a device count threshold 972, the timer is compared to the time threshold 964 (e.g., has 5 seconds elapsed since the first alert signal was received) and if the timer exceeds the time threshold 964 the above process resets and starts over.
If the timer has not exceeded the time threshold 976, the inner loop C1 continues. In some embodiments, the identification 677 of the personal device 300 and/or time of transmission are used to differentiate between personal devices 300 to make sure that operation of just one personal device 300 does not signal the alarm 974. Likewise, it is also anticipated that the above process be cloned for each personal device 300, looking for the requisite number of operations of the activation switch 91 within the requisite time period and such for the requisite number of personal devices 300.
Referring to
Now a loop begins waiting to receive a packet 986 such as an alert from one of the personal devices 300. When a packet is received 986 (meaning that the activation switch 91 of one specific personal device 300 was pressed the requisite number of times within the requisite amount of time), the device count is incremented 988. If the device count exceeds the requisite device count threshold 990, the alarm is initiated 992. If the device count does not exceed the requisite device count threshold 990, then the timer is checked and if the timer exceeds the time threshold 994, the process is restarted at the beginning (RC2) as the number of requisite personal devices 300 have not signaled activation within the requisite time period. When the timer is checked and the timer does not exceed the time threshold 994, the inner loop (C2) continues looking for reception of another packet 986 from another personal device 300.
In some embodiment, before the device count is incremented 988, it is determined if the identification 677 of the originator of the received packet 986 previously sent a prior received packet 986 and, if so, the device count is not incremented 988 so that multiple unique personal devices 300 must be activated in order to signal the alarm 992.
Note that it is anticipated that the press count, the time threshold and the device count threshold are preset and are changeable by way of administrative functions. It is also anticipated that the central server computer 102 has intelligence (e.g., fuzzy logic, artificial intelligence) and receives feedback from administrative personnel when each alarm is extinguished indicating whether the alarm was valid or a false alarm and the intelligence within the central server computer 102 automatically modifies the press count, the time threshold and the device count threshold to reduce false alarms while maintaining valid alarms.
Equivalent elements can be substituted for the ones set forth above such that they perform in substantially the same manner in substantially the same way for achieving substantially the same result.
It is believed that the system and method as described and many of its attendant advantages will be understood by the foregoing description. It is also believed that it will be apparent that various changes may be made in the form, construction, and arrangement of the components thereof without departing from the scope and spirit of the invention or without sacrificing all of its material advantages. The form herein before described being merely exemplary and explanatory embodiment thereof. It is the intention of the following claims to encompass and include such changes.