The present disclosure pertains to a wearable personal security device providing multiple different security functions.
Personal security and safety are prevailing concerns in modern society. An awareness of the myriad of potential threats to person or property may cause people to change their behavior, such as by choosing not to frequent high-risk or isolated locations or by avoiding participation in potentially dangerous activities. Unfortunately, merely being aware of such potential threats is not always sufficient. According to the Criminal Justice Information Services Division of the United States Federal Bureau of Investigation, an estimated 1.2 million violent crimes were committed around the United States in 2015 alone. As a result, some individuals will become victims of crime in spite of their best preventative efforts.
To counter the various threats to personal security, individuals may resort to carrying personal protection devices. Such devices may be stowed in pockets, purses, glove compartments, or other locations that may prove difficult to quickly access in an emergency, or relatively cumbersome to carry, weather-dependent, and/or training intensive. Firearms, for instance, come with a high requisite level of training as well as strict limitations on where and how the firearms can be legally carried. Electric taser devices or stun guns can temporarily disable an assailant, but may pose a shock risk to the user in rainy or wet conditions. Pepper spray canisters are able to temporarily blind an assailant and thereby provide a brief window for escape, but as the spray pattern tends to disperse in windy conditions, the effectiveness of such devices may vary. Hence, there is a need for an improved personal security device that is easily accessible, compact, and performs multiple different security functions in all weather conditions.
A wearable, multi-functional personal security device is disclosed herein. The personal security device includes, in an example embodiment, a housing that is configured to be worn by a user, e.g., as a wristwatch, pendant, or clip-on accessory. The housing contains multiple security modules, with each security module configured to separately or cooperatively perform a designated security function. As used herein, the term “security module” refers to one or more specially-programmed processors and associated hardware devices protected by and contained within the housing. The various security modules wirelessly interface with an external cellular device, e.g., a smart phone or cellular-enabled tablet. In terms of functionality, the security modules may perform only those security functions specifically described herein, or the security modules may be integrated into an existing “smart watch”. In either configuration, the security modules are selectively controlled in conjunction with an application (“app”) according to the disclosed method in order to perform the disclosed security functions.
The personal security device includes a position module configured to determine a geo-position of the housing, e.g., as a set of global positioning satellite (GPS)-based coordinates, a communications module that detects proximity of the cellular device with respect to the housing, a programmable “smart” switch, and an alert button connected to or in communication with the smart switch that is moveable with respect to the housing.
Regarding the multiple security modules, each is responsive to a predetermined activation sequence of the smart switch to provide a corresponding security function, with “sequence” possibly including a series of on/off button-pushing pulses or a sustained pulse. A first input signal may activate the smart switch to command a first security function when the communications module detects the cellular device. That is, the first input signal may be effective only when the cellular device is detected in a predetermined range or proximity of the housing, e.g., within 5-30 meters (m) of the using 2.4 GHz BLUETOOTH or WI-FI communications protocols. Second and third input signals, which may be the same or different, may activate or command respective second and third security functions that are different from the first security function. The second and third security functions possibly provide an escalated response in situations in which the first security function alone is inadequate.
The second and third security functions may include the emission of high-intensity light, whether as a constant light beam(s) or a strobe light, and high-intensity/piercing sound, respectively, in which case the second and third security modules respectively include a light-emitting diode (LED) or other suitable light source and audio speakers and/or a siren. The first security function may include transmission a geo-position of the housing to a predetermined set of the user's contacts via communication of the communications module with the cellular device.
The personal security device may optionally include wrist straps connected to the housing and configured to secure the housing to a wrist of the user such that the personal security device has the appearance of a wristwatch. Such a configuration may reduce the probability that an assailant will recognize the personal security device as anything other than a wristwatch, which in turn may increase the chances of a successful alert response.
The communications module may include a GPS receiver in some embodiments. The GPS receiver may be a dedicated antenna used solely for the first security function or a shared antenna performing other locational services, e.g., as part of an optional smart watch embodiment. In this case, the geo-position of the housing includes GPS coordinates corresponding to the position of the housing.
Additionally, in some optional embodiments the personal security device may include a proximity sensor configured to detect proximity of a transmitter device with respect to the housing. A processor may be programmed to activate the second and/or third security modules at a predetermined intensity level in response to the transmitter moving out of a predetermined range of the housing. By way of an illustrative example, such an embodiment may allow a user of the security device to closely monitor a child or other adult in a crowded environment, with the second and/or third security functions alerting the user to the fact that the monitored person has moved outside of the predetermined range. This in turn allows the user to locate the monitored child or adult before the person becomes lost.
The above summary is not intended to represent every embodiment or every aspect of the present disclosure. Rather, the foregoing summary merely provides an exemplification of some of the novel aspects and features set forth herein. The above features and advantages, and other features and advantages of the present disclosure, will be readily apparent from the following detailed description of representative embodiments and representative modes for carrying out the present disclosure when taken in connection with the accompanying drawings and the appended claims. Moreover, this disclosure expressly includes any and all combinations and sub-combinations of the elements and features presented above and below.
The present disclosure is susceptible to various modifications and alternative forms, and some representative embodiments have been shown by way of example in the drawings and will be described in detail herein. It should be understood, however, that the novel aspects of this disclosure are not limited to the particular forms illustrated in the appended drawings. Rather, the disclosure is to cover all modifications, equivalents, combinations, sub-combinations, permutations, groupings, and alternatives falling within the scope and spirit of the disclosure as defined by the appended claims.
Referring to the drawings, wherein like reference numerals are used to identify like or identical components in the various views,
The personal security device 10 of
Additionally, the processor(s) (P) may be remotely or directly programmable by a user of the personal security device 10 so as to provide a customizable set of user-selectable security options, e.g., via an application (“app”) 45 that is accessible via a cell phone or other cellular device 50 as set forth below. The app 45 may be synchronized (“synched”) with the personal security device 10 using BLUETOOTH, WI-FI, or any other suitable short-range wireless protocol, with “short-range” herein referring generally to 30 meters (m) or less.
Also as shown in
The first security module 18A is configured to provide the first security function, and may be embodied as a radio frequency (RF) communication module that, when activated via a predetermined action sequence of the smart switch 20, causes the present geo-position of the personal security device 10 to be transmitted to the user's preferred list of contacts, e.g., via BLUETOOTH or WI-FI communication with and relay of information using the cellular device 50. Recipients and/or 911 “SOS” emergency contacts may also receive a pre-recorded alert message from the user, to which is appended the present geo-coordinates of the personal security device 10, with such recipients typically including parents, close family members, or friends, the police, or other authorities, e.g., as selected by the user beforehand from a contact priority list.
To enable such location services, the personal security device 10 may be equipped with a position module 22, e.g., a global positioning system (GPS) receiver or antenna as noted above that is in radio communication with orbiting GPS satellites (not shown), as is well known in the art. When the first security module 18A is activated and detects the cellular device 50, the processor(s) (P) may automatically request transmission of the present GPS coordinates via the cellular device 50 and the app 45 in response to a predetermined activation sequence of the smart switch 20, either in conjunction with or independently of any activation of the respective second and/or third security modules 18B and 18C.
In some embodiments, as soon as the smart switch 20 is activated the first security module 18A (i.e., the communications module) will communicate with the cellular device 50 and thereby command the cellular device 50 to transmit the present GPS coordinates of the personal security device 10 from the position module to the user's pre-selected list of contacts.
The second security module 18B is configured to provide the second security function, and may be embodied a light source, such as a high-intensity/high-lumen light or strobe light. Light emitted by the second security module 18B is at an intensity level sufficient for temporarily blinding or impairing the vision of an assailant, which in turn may help provide a window of time in which the user can attempt to escape to safety. For instance, the second security module 18B may include a set of light-emitting diodes (LEDs) or other lighting sources outputting at least 80 lumens in some embodiments, or over 100 lumens in other embodiments. The strobe light embodiment can also be used to quickly attract attention to the user when the user is alone in the dark or in an otherwise dangerous situation in which such lighting may be of use in aiding detection by a potential rescuer.
The third security module 18C is configured to provide the third security function disclosed herein, and may be embodied as a high-intensity, high-frequency audible alarm such as a piercing tone or a siren. Volume of the third security module 18C may be aided by use of audio speakers, the openings 11 of which are shown in
The display module 16 of
In a possible embodiment, the monitoring devices 24 may include an alcohol alert module that is programmed to receive a blood alcohol content reading signal (arrow BAC) from an external blood alcohol sensor (BAS) 56, and automatically alert some or all of the user contacts with the user's geo-location when the user's blood alcohol level exceeds the threshold. For instance, the blood alcohol sensor (BAS) 56 may be configured to measure a user's blood alcohol content using conventional breath, blood, and/or skin contact-based measurement techniques. A monitoring device 24 configured in this manner may receive the blood alcohol content reading signal (arrow BAC), compare the blood alcohol levels reported in the received blood alcohol content reading (arrow BAC) to a threshold, e.g., 0.08% or 0.1%, and automatically alert the user's preferred/preselected contacts that the user may be impaired, along with the user's location as determined using the position module 22 of
The personal security device 10 may also optionally include a recording module (REC) 28, e.g., a microphone and/or a still or video camera, operable for recording video and audio information. Such recorded information may be stored in memory of the personal security device 10, in memory of the cellular device 50, and/or remotely/in the cloud to be transmitted to the user's selected emergency contacts when the smart switch 20 is activated using a predetermined sequence, i.e., an easily-remembered, user-selected sequence of activation triggering activation of the disclosed security features. Such a recording module 28 may also be used to facilitate hands-free activation/deactivation of the various features of the personal security device 10, e.g., using voice-recognition software.
Activation of the smart switch 20 according to a corresponding, predetermined activation sequence, and possibly using a predetermined voice command in some embodiments, may connect the second and third security modules 18B and 18C to the battery 14 to directly energize the security modules 18B and 18C, and provide standby power to the first security module 18A. The smart switch 20 may be programmed with predetermined logic states in which a predetermined sequence of depressions or pulses of a button 20B (see
Optionally, transmission of the GPS location may be concurrent with transmission of an SMS text message or voice message identifying whether the second and third security modules 18B or 18C are also activated, thereby communicating a relative alarm level to the list of contacts. That is, a user may activate the first security function to let the user's preferred contacts know that the user is in a particular location, which may or may not signify an emergency situation. The user may simply be lost or stranded. Or, the user may be in a threatening situation or an active crime target, in which case the user may activate the second and third security modules 18B and 18C, and in which case knowledge of the escalated alert level may be beneficial to the contacts. Likewise, the particular contacts may differ based on the level of the alert in some embodiments, e.g., with the police alerted only when the second and third security modules 18B and 18C are activated.
As noted above, the monitoring devices 24 may include an optional proximity sensor. In such an embodiment, an external user may wear or carry a transmitter device 55, e.g., a BLUETOOTH transmitter, an RF transmitter, or other local positioning system that broadcasts its relative location to the personal security device 10. The user of the personal security device 10, via the application (“app”) 45, may program a calibrated range into memory (M). When the user of the transmitter device 55 moves outside of the predetermined range or proximity, this detected action may trigger activation of a particular responses, e.g., activation of a strobe via the security module 18A and/or a predetermined audio alarm message (“child out of range”, a repeating chirp, or other suitable alarm at a level that is audible to the user of the personal security device 10). Such an embodiment may quickly alert a parent or guardian wearing the personal security device 10 that a child or other monitored person has wandered outside of the calibrated range, which may be useful in crowded environments where becoming lost or abducted may be more likely to occur.
As shown in the example embodiment of
Adjustable straps 13 with holes 13H and a latch 13L may be connected to the housing 12 to enable the personal security device 10 to be worn as a watch on a wrist of a user. In this manner, the personal security device 10 may be used during all times of day and under all weather conditions in the manner of a conventional watch, with the specialized security features securely hidden within the housing 12 and not otherwise detectable by an assailant or even a casual observer. Similarly, the personal security device 10 may be comfortably used by outdoor enthusiasts such as mountain bikers, skiers, runners, hikers, etc., in the manner of a typical watch, with the hidden security features of the personal security device 10 readily available should the user happen to become lost or get separated from their group.
In the particular wristwatch embodiment depicted in
A distinct advantage of the personal security device 10 is its compact design and inconspicuous appearance. Thus, the ability to blend in as a conventional low-profile wristwatch may desirable, and may in emergency circumstances preserve the element of surprise, due to the likelihood that an assailant would not recognize the personal security device 10 as anything other than an ordinary wristwatch. To this end, the button 20B triggering overall security operation of the smart switch 20 of
The second security module 18B may be arranged alongside or adjacent to the display face 19. For example, with the housing 12 having top, bottom, and side surfaces 33T, 33B, and 32, respectively, as viewed by the user, the second security module 18B may be arranged proximate the top surface 33T as shown, with “top” referring to the normal viewing perspective of the display face 19 by a user wearing the device 10. Other configurations are possible, such as an embodiment in which LEDs surround a perimeter of the display face 19 or are mounted to other locations not depicted in
Also shown in
Also shown in
Referring briefly to
Different operating modes of the personal security device 10 may be used in different threat situations. In an embodiment, operating modes may include a “Panic Mode”, “Silent Panic Mode”, “Countdown Mode”, and “Tracking Mode”. The Panic Mode and Silent Panic Mode are operated through the app 45 and the cellular device 50, while the Countdown Mode and Tracking Mode operated through the app 45. A possible appearance of the displayed information in the Silent Panic Mode is shown in
In Panic Mode, a possible scenario includes a user in imminent danger and requiring immediate assistance. For instance, the user may be in the process of being robbed or assaulted, or may believe that such actions are imminent. The user may respond by quickly pressing the button 20B of
In Silent Panic Mode, a possible scenario includes the user hiding from a possible attacker while in imminent danger. A home invasion may be in process with the user present and undetected, or the user may have been kidnapped, is being followed, or otherwise does not wish to draw the attacker's attention. The user may press and hold the button 20B for a pre-selected duration, e.g., 3 or more seconds, to silently active the security functions noted above. The SMS text messages may be transmitted with location details, as such actions can take place discreetly without alerting the attacker. A corresponding message may be discreetly displayed on the screen of the cellular device 50 and the personal security device 10, e.g., “SILENT ALARM ACTIVATED!”.
In some embodiments, if a silent alert is not cancelled after a preset duration, e.g., 1 minute, the personal security device 10 may default to Panic Mode. In an embodiment, the Panic and Silent Panic Modes activated via the personal security device 10 may only be cancelled via the app 45. In a serious emergency, there might be a scenario in which an assailant attempts to cancel the alert. In such cases, the mode may be cancelled only by the user accessing the app 45, such as by entering a multi-digit password. Such a password may be the same password used to unlock the cellular device 50, or some other easily-recalled sequence, so as to aid recall of the password under duress. In the case of accidental activation of the Panic or Silent Panic modes, the app 45 may be configured to allow a fixed window of time, e.g., 10 seconds, for the user to cancel the alert. During this window, tactile feedback such as vibration of the cellular device 50 may be used to alert the user to the impending onset of the selected mode.
The Countdown Mode provides the user with an option for proactively setting an alert in anticipation of potential danger. The user can select a countdown duration until the user expects to arrive in a safe location. If the countdown duration expires or elapses, this automatically results in execution of one of the above-described Panic or Silent Panic operating modes. Scenarios for the Countdown Mode may include the user riding alone in a taxi with a driver behaving in a manner that causes the user to become apprehensive, or when walking or traveling alone in an unfamiliar location. The user may select the Countdown Mode from the cellular device 50, such as shown in
Tracking Mode, with a corresponding graphical depiction shown in
In
Referring to
At step S62, the processor(s) P determine whether the state requested at step S61 corresponds to a sequence of activations or depressions of the button 20B indicative of a first level of response (R1). For instance, the first level of response (R1), i.e., a first security response, may be requested when a predetermined number of depressions of the button 20B are detected in a short interval, e.g., three or more depressions within 1-2 seconds of each other, or a particular spoken word or phrase is detected as a first input signal. The method proceeds to step S65 if such an action sequence is detected. Otherwise, the method 60 proceeds to step S63.
Step S63 includes determining if the requested state at step S60 corresponds to a predetermined sequence of activations or depressions of button 20B indicative of a second level of response (R2), e.g., three depressions of the button 20B or another particular spoken word or phrase. If so, the method 60 proceeds to step S64, otherwise the method 60 returns to step S61.
At step S64, the processor (P) activates the security module 18B-C, e.g., automatically energizes the security modules 18B-C, such as by closing a circuit with the battery 14. The method 60 then proceeds to step S65.
At step S65, the method 60 includes detecting whether the cellular device 50 is within proximity of the personal security device 10. As part of step S65, the security module 18A (the communications module) may communicate with the linked portable device 50 via BLUETOOTH, Wi-Fi, or other wireless communications standard or protocol. The method 60 thereafter proceeds to step S66.
Step S66 entails establishing a communications link with the cellular device 50 and extracting, from memory (M) or from the cloud, a predetermined list of emergency contacts for receipt of the GPS position information. The method 60 then proceeds to step S67.
Step S67 includes reading the present GPS coordinates of the personal security device 10 from the position module 22 of
In all embodiments described above, in case of accidentally activating an alert, the app 45 may be configured to allow the user to cancel the alert. During this time, the cellular device 50 may be vibrating continuously and displaying a suitable notification, e.g., “caution mode active/tap to cancel.” The alert may be cancelled at any time during this duration by pressing the cancel icon on the cellular device 50, e.g., using a multi-digit passcode known only to the user. This feature may help prevent an assailant from canceling the alert.
By using the personal security device 10 described above, a user may enjoy the advantage of the precious additional seconds that the element of tactical surprise may afford. Such seconds may be the difference between the user safely escaping a dangerous situation and the same user becoming a crime victim. While most users will hopefully never require access to the various security features of the personal security device 10, the user may enjoy peace of mind knowing that such features remain available as an escalating response to a perceived threat under all weather conditions. When security features are not required, additional useful features such as time and fitness tracking, proximity monitoring of children, elderly, or special needs persons, and other helpful features remain available.
While the best modes for carrying out the disclosure have been described in detail, those familiar with the art to which this disclosure relates will recognize various alternative designs and embodiments for practicing the disclosure within the scope of the appended claims. It is intended that all matter contained in the above description or shown in the accompanying drawings shall be interpreted as illustrative only and not as limiting.
This application is a United States National Stage application of, and therefore claims the benefit of, International Application No. PCT/US2017/064638 filed Dec. 5, 2017, which claims the benefit of U.S. Provisional Application No. 62/434,699, filed Dec. 15, 2016, both of which are hereby incorporated by reference in their respective entireties.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US17/64638 | 12/5/2017 | WO | 00 |
Number | Date | Country | |
---|---|---|---|
62434699 | Dec 2016 | US |