Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
PERSONAL EMERGENCY RESPONSE SYSTEM AND METHOD OF OPERATION
Document Type and Number:
WIPO Patent Application WO/2016/071006
Kind Code:
A1
Abstract:
An operation method for personal emergency response systems combining a mobile device, e.g. a smartphone and a personal device that is easy to carry for the user, e.g. a bracelet or pendant worn by the user on the body with genuine text, phone and mobile internet capability, both when and when no sensors are wirelessly connected to these devices and method to improve and automate personal emergency response systems by consistently supervising the users in case of an emergency by using mainly mobile Internet communication means and devices with immediate display of first responders and a possibility to coordinate ambulance and other official emergency response means, thus omitting the need for geo-fencing in total and call centers unless desired by the users and method to facilitate the rescue of a person via PERS by displaying a line of two or more previous and potentially later GPS coordinates and to conserve energy while intermittently receiving GPS coordinates for rescue purposes.

Inventors:
KING RUDOLF (DE)
Application Number:
PCT/EP2015/060331
Publication Date:
May 12, 2016
Filing Date:
May 11, 2015
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
KING RUDOLF (DE)
International Classes:
G08B25/00; G08B25/01; H04W4/02; H04W4/029
Domestic Patent References:
WO2011060388A12011-05-19
WO2012176344A12012-12-27
Foreign References:
US8866606B12014-10-21
US20140106677A12014-04-17
EP2127964A22009-12-02
US20100267361A12010-10-21
Other References:
WIKIPEDIA: "Voice over IP", 10 August 2015 (2015-08-10), XP002743287, Retrieved from the Internet [retrieved on 20150812]
T. FRIEDMAN, R. CACERES, A. CLARK: "RTP Control Protocol Extended Reports (RTCP XR)", 30 November 2003 (2003-11-30), XP002743288, Retrieved from the Internet [retrieved on 20150812]
Attorney, Agent or Firm:
KURIG, Thomas (Bavariastrasse 7, München, DE)
Download PDF:
Claims:
CLAIMS

1 . Operation method for a personal emergency response system, PERS. comprising:

constantly monitoring a user having a PERS, comprising a remote server ( 100) and a mobile device (200), by measuring and storing positioning data of mobile device (200); and

transmitting the monitored data to the remote server ( 100) in predetermined intervals where the data are stored; wherein

if an alarm is triggered, the method further comprises:

transferring a personal code of the user to the remote server (100);

establishing a voice over IP connection between mobile device (200) of the user and the remote server ( 100);

checking who of first responders predefined by the user is currently in close proximity to the user by using current or stored positioning data of all predefined first responders and who of said tirst responders is currently available:

establishing a voice over IP connection between the server and all proximate and available first responders predefined by the user thus establishing a telephone conference between the user and available first responders,

2. Method according to claim 1 , wherein

data regarding the strength of the mobile internet connection, and data regarding the strength of the cell phone signal of mobile device (200) is measured and stored, and if an alarm is triggered data regarding the strength of the mobile internet connection and the strength of the cell phone signal is transferred to the remote server ( 100).

3. Method according to one of the previous claims, wherein if mobile device (200) cannot establish a VoIP connection, the method further comprises:

using a phone number prestored in or transferred by text message or MIME from the remote server (100) to mobile device (200) to call the remote server ( 100) or

using an external transferral communication device to connect the device to the remote server ( 100) to allow communication functionality with first responders.

4. Method according to one of the previous claims, wherein if one first responder's device

1 cannot establish a VoIP connection, the method further comprises:

using a phone number prestored in or transferred by text message or MIME from the remote server (100) to the first responder's device to call the remote server (100) or

using an external transferral communication device to connect the device to the remote server (100) to allow communication functionality with other first responders and mobile device (200).

5. Method according to one of the previous claims, wherein, if none of the predefined first responders can be reached, the method comprises informing a call center of the alarm event and establishes a conference call among mobile device (200), the call center and all available first responders' mobile devices (200).

6. Method according to one of the previous claims, wherein, if none of the predefined first responders can be reached, the method comprises informing other non-predefined available first responders of the alarm event and potentially establishing a conference call among all available first responders' mobile devices (200).

7. Method according to one of the previous claims, wherein a signal of loud noise output by mobile device (200) triggered through a random code forwarded to the first responders or automatically by the remote server (100) recognizing the approximation of the first responder to mobile device (200), if one of the first responders comes close to the last location of mobile device (200).

8. Method according to one of the previous claims, wherein a signal of loud noise output by mobile device (200) triggered through a random code forwarded to the first responders, if one of the first responders comes close to the last location of mobile device (200).

9. Method according to one of the previous claims, wherein, if none of the predefined first responders can be reached, the method further comprises:

searching and contacting other non-predefined first responders in proximity to the emergency, if the user allowed to do so in his devices ' preferences.

2

10. Method of a PERS system comprising a personal device (300) that is easy to carry for the use, preferably a personal device (300) or a pendant, wherein said personal device (300) and said mobile device (200) are each capable of:

acquiring a current location via an GPS chip;

acquiring current GPRS cell information via a GPRS cell sensor (400);

establishing mobile communication via a GSM module;

establishing a Bluetooth communication;

offering the possibility of triggering alarm manually by the user; and

collecting, evaluating, and storing data through RAM and ROM;

wherein the method further comprises:

establishing a connection between said personal device (300) and mobile device (200), deactivating the GPS chip, the GPRS cell sensor (400), and the GSM module of said personal device (300) as long as the connection with mobile device (200) is active; and

transmitting the positioning data, the data regarding the strength of the mobile internet connection, and the data regarding the strength of the cell phone signal from mobile device (200) to said personal device (300),

wherein, if an alarm is triggered on said personal device (300), a notification of the alarm is transmitted to mobile device (200) and the positioning data are transmitted to the remote server

(100) by mobile device (200),

1 1. Method according to claim 10, wherein, if an alarm is triggered on said personal device (300), data regarding the strength of the mobile internet connection, and data regarding the strength of the cell phone signal are transmitted to the remote server (100) by mobile device (200).

12. Method according to claim 11 , wherein, if the connection between said personal device (300) and mobile device (200) is lost, the method further comprises:

re-activating the GPS chip, the GPRS cell sensor (400), and the GSM module of said personal device (300);

if an alarm is triggered on said personal device (300) while the connection between mobile device (200) and said personal device (300) is lost, transmitting the positioning data, the data regarding the strength of the mobile internet connection, and the data regarding the strength of the cell phone signal, to the remote server (100) by said personal device (300); and

3 returning to the step of establishing a connection between said personal device (300) and mobile device (200) if the connection between said personal device (300) and mobile device (200) can be re-established.

13. Method according to one of the previous claims, wherein the PERS further comprises a sensor (400) monitoring a state of the user and the method further comprises:

connecting sensor (400) to said personal device (300) and said mobile device (200);

transmitting data acquired by sensor (400) to mobile device (200) only;

transmitting said sensor (400) data from mobile device (200) to said personal device (300); and

triggering an alarm immediately if said sensor (400) data reach or pass a predefined threshold or after a time interval if another threshold is kept for a certain, predefined time interval.

14. Method according to claim 13, wherein, if the connection between personal device (300) and mobile device (200) is lost but the connection between personal device (300) and sensor (400) and the connection between mobile device (200) and sensor (400), respectively, is active, the method further comprises:

transmitting sensor (400) data, positioning data, the data regarding the strength of the mobile internet connection, and the data regarding the strength of the cell phone signal from mobile device (200) to personal device (300) via sensor (400).

15. Method according to claim 13 or 14, wherein, if the connection between mobile device (200) and sensor (400) is lost but the connection between personal device (300) and sensor (400) and the connection between mobile device (200) and personal device (300), respectively, is active, the method further comprises:

transmitting sensor data from sensor (400) to personal device (300); and

transmitting sensor data from personal device (300) to mobile device (200).

16. Method according to claim 15, wherein, if, in addition, the connection between mobile device (200) and personal device (300) is lost, the steps to be taken if an alarm is triggered are conducted by personal device (300).

4

17. Method according to claim 10, wherein, if the connection between mobile device (200) and sensor (400), the connection between personal device (300) and sensor (400), and the connection between mobile device (200) and personal device (300) are lost, respectively, the method further comprises:

if mobile device (200) is first connected with personal device (300) and then personal device (300) is connected with sensor (400), transmitting received sensor (400) data from personal device (300) to mobile device (200); and

once mobile device (200) connects with sensor (400), transmitting received sensor (400) data from mobile device (200) to personal device (300) while the direct transmission from sensor (400) to personal device (300) is discontinued.

18. Method according to one of the preceding claims, wherein the step of transferring data regarding the strength of the mobile internet connection and the strength of the cell phone signal to the remote server (100) further comprises transferring data of GPRS cell coordinates to the remote server (100).

19. Method according to one of the preceding claims, further comprising:

using a number n of last positions acquired through mobile device (200) or, if referring back to one of claims 1 1 -16, personal device (300) in predefined time intervals to provide a line of said last positions to allow an estimation of the user's last known moving direction.

20. Method according to claim 19, wherein n is at least 5.

21. Method according to claim 19 or 20, wherein the predefined time intervals are 10 to 90 seconds.

22. Method according to one of the preceding claims, wherein the step of constantly monitoring the user further comprises:

searching for new positioning coordinates for a timeframe of initially preferably 5-10 seconds;

if within said timeframe no positioning signal is received, setting the chip to a silent mode and retriggering after the next interval time;

5 if within said timeframe at least one positioning signal is received, continuing to locate more positioning signals in order to find a position, however only for a second time frame of preferably 20 seconds; and

continuing the initial search for new positioning coordinates for a timeframe of preferably 5-

10 seconds if

a position with very little perimeter can be established;

if within 20 seconds no position can be acquired; or

only a very unclear position, i.e. one with a large perimeter can be found.

23. Personal emergency response system (PERS) for performing the method of any of the preceding claims, the system comprising:

a remote server (100) having a central processing unit;

a mobile device (200) of a user, comprising a GPS chip, a GPRS cell sensor (400), a GSM module having loudspeaker and microphone and a Bluetooth communication module:

a personal device (300); and

at least one mobile device (200) of at least one first responder predetermined by the user, mobile device (200) comprising a GPS chip, a GPRS cell sensor (400), a GSM module having loudspeaker and microphone and a Bluetooth communication module;

wherein the mobile device (200) and personal device (300) each are adapted to perform the steps of:

if an alarm is triggered, transferring a personal code of the user to the remote server (100); and

transferring data regarding the strength of the mobile internet connection and the strength of the cell phone signal to the remote server (100); wherein the remote server (100) is adapted to: establish a voice over IP connection between mobile device (200) or personal device (300) and the remote server (100);

check which of mobile devices (200) of potential first responders is currently in close proximity to the user by using current or stored positioning data of all predefined first responders and which of said first responders in currently available as defined in a setting of the first responder's mobile devices (200);

establish a voice over IP connection between the server (100) and all proximate and available first responders predefined by the user,

6 wherein, if none of the predefined first responders can be reached, the server 100 is adapted to alert a call center of the alarm event; and

establish a telephone conference between mobile device (200) and the available first responders' mobile devices (200);

wherein, when the first responders come close to the last location of the personal device (300), mobile device (200) or personal device (300) are adapted to send out a signal of loud noise triggered by a random code forwarded to the first responders through the server.

24. The system of claim 23, wherein the remote server (100) is further adapted to forward mobile device (200) last known position to the available, allowed and proximate first responders' devices.

25. The system of anyone of claims 23 or 24, wherein mobile device (200) comprises one to three switches adapted to provide the selection functions.

26. System of anyone of claims 23-25, wherein the mobile device (200), personal device (300), and the at least one first responder's mobile device (200) each comprise means for carrying out the steps defined in claims 2-20.

27. Operation method for a personal emergency response system, PERS, comprising:

constantly monitoring a user having a PERS, comprising a remote server (100) and a mobile device (200), by measuring and storing GPS data, data regarding the strength of the mobile internet connection, and data regarding the strength of the cell phone signal of the user in mobile device (200); and

transmitting the monitored data to the remote server (100) in predetermined intervals where the data are stored; wherein

if an alarm is triggered, the method further comprises:

transferring a personal code of the user to the remote server (100);

transferring data regarding the strength of the mobile internet connection and the strength of the cell phone signal to the remote server (100);

establishing a voice over IP connection between mobile device (200) of the user and the remote server (100);

7 checking who of first responders predefined or allowed by the user is currently in close proximity to the user by using current or stored GPS data of all predefined first responders and who of said first responders is currently available;

establishing a voice over IP connection between the server and all proximate and available first responders predefined by the user,

wherein, i none of the predefined first responders can be reached, the method comprises informing a call center of the alarm event;

establishing a telephone conference between the user and the available first responders; and triggering a signal of loud noise output by mobile device (200) through a random code forwarded to the first responders, if one of the first responders comes close to the last location of the user.

8

Description:
PERSONAL EMERGENCY RESPONSE SYSTEM

AND METHOD OF OPERATION

CROSS-REFERENCE TO RELATED APPLICATIONS

[0001 ] The present application claims priority of German Utility Model DE 20 2014 008 763.6 filed on November 6 lh , 2014 which is incorporated herein by reference.

BACKGROUND

[0002] The use of smart phones in personal emergency response systems (PERS) has been first described in 2005 in patent LP 1679672 and has become a widely accepted method. With the development of better sensor technologies, in particular sensors that are very easy to carry and light and can be connected wirelessly, in particular through Wi-Fi and Bluetooth technology and lately low-energy Bluetooth, to the device, which can use the data transmitted either for deciding if to trigger the alarm or as a data collection point for health information to be transmitted or both, and the coming of so-called„smart bracelets" or„smart watches", which are devices worn constantly by the user, new potential for PER systems has evolved.

[0003] The development of battery power has not been in sync with these new developments. While it can be expected that within the next 5 to 9 years new and better resources with extended capability will be found, developed and commercially viable, in particular through lower production costs per mAh, there is a current discrepancy between the abilities of sensors, smart bracelets and smart phones on the one hand and the ability and power of batteries that are still light enough to be worn comfortably by the user.

[0004] Personal emergency response systems (PERS) are currently based on the implementation of a call center; some are sending out text messages using standard communication means like cell phones, particularly with global positioning data (GPS, global positioning system) and information about the victim. While these systems have been very helpful in the past, however, first aid efforts among more than one first responders are hardly coordinated and the call centers need to check the availability of first responders first before deciding on each action plan; as this work is time consuming and time is of the essence, not only because of monetary restraints but also due to health issues directly connected to the passing of time after an emergency, they usually resort to calling only the closest family member and then the ambulance as they do not know immediately the whereabouts of other potential first responders even though one or more of them might be only meters away from the victim.

[0005] Geo-fencing systems, on the other hand, which are being used to a very large extent in particular in senior residents PERS carry the disadvantage that an alarm call is triggered whenever the user leaves from, or enters into a certain area or place. This is surveillance which is understandably not liked in particular by very self-relying persons, the elderly and young alike, and takes the sense of freedom from the user. In the long run geo fencing acts like a virtual prison which the person will not want to leave; this might potentially be fine with people suffering from severe kinds of dementia, but to the normal person it is a restriction which is unacceptable. Thus, statistics show that once the user understands the limits this imposes on him or her he or she usually gets rid of the system, which counters the efforts desired by PERS.

[0006] The following invention is used only in an emergency and thus in stark contrast to geo- fencing systems.

[0007] In GPS based PERS, in particular those embedded on apps and widgets on smart phones, it is common to either send or display to the rescue team or person a GPS coordinate found after an alarm is triggered, or beteer still one that was found previous to the alarm triggered (see EP 1679672).

[0008] In the latter case, the coordinate is stored in the device. To save on battery power, the ( iPS chip inside the device is then set to a silent mode, until a certain, predefined time interval has passed and a new tracking sequence is started.

[0009] The problem of the first method is, that inside a building there is no way to detect GPS coordinates. We consider this method to be completely unreliable. If GPS coordinates are searched constantly in preset intervals, the accuracy becomes much better, but still can be improved.

SUMMARY OF INVENTION

[0010] An operation method for personal emergency response systems is provided combining a mobile device , e.g. a smartphone, and a personal device that is easy to carry for the user, e.g. a bracelet or pendant worn by the user on the body with genuine text, phone and mobile internet capability, both when and when no sensors are wirelessly connected to these devices, and methods to improve and automate personal emergency response systems by consistently supervising the users in case of an emergency by using mainly mobile Internet communication means and devices with immediate display of first responders and a possibility to coordinate ambulance and other official emergency response means omitting the need for geo-fencing in total and call centers is omitted unless desired by the users; method to facilitate the rescue of a person via PERS by displaying a line of two or more previous and potentially later GPS coordinates and to conserve energy while intermittently receiving GPS coordinates for rescue purposes.

[001 1 ] Our research has shown, that a problem ensues once GPS coordinates are searched in areas with high building structures and while standing under a sunroof or similar roofs, such as the roofs typically found on petrol stations. As GPS positioning is based on the triangulation of at least three satellites and using the time passed from emission of the wave sent from one satellite until received by the GPS chip, a so-called bounce back occurs mainly in said two scenarios, when the emitted radio wave first hits a large structure and then continues further to the GPS chip; in this case the time passed is slightly longer than in a straight line. Therefore, standard GPS chips in particular in smart phones describe GPS coordinates in the following manner;

- first a coordinate center is given in Latitude and Longitude;

- then a perimeter as a measure of uncertainty; in this it is estimated that the real location of the person and device be. [0012] This happens in particular if more than three waves - sometimes up to 25 can be found - have been received, but still no definite coordinate and/or central point can be calculated, but a mesh of coordinates is within reasonable likelihood within certain area; this area is then shown as perimeter around the point calculated as most probable.

OBJECTIVE OF THE INVENTION

[0013] While using smartphones enables a low-cost entry level for PERS to be more widely used by a evermore ageing population, these devices are usually placed away by the user upon entering his home; once leaving home they can easily be forgotten. In both cases a sudden emergency leaves the user without a possibility to trigger an alarm. It is therefore preferable to wear an additional personal device , e.g. a pendant or bracelet, to trigger the alarm. In the best version, the bracelet or pendant can send out the distress signal on its own, even if the smartphone is out of reach in order to ensure the longest possible time frame in which the user is protected, taking care even for forgetfulness. In order to offer the user a large degree of comfort, this body-worn device may not be heavy; thus smaller batteries are to be used than potentially in a smartphone.

[0014] An operation method (or energy conservation method) needed to be developed in order to use to the most degree the battery power of the smart phone unit involved, where possible, and only to a lesser degree the power of the bracelet, as for wearing comfort the unit worn constantly by the user on his body needs to be small and light. It is not possible to say conclusively how large a sensor battery needs to be, as this depends largely on questions such as

- how data is collected (e.g. by lightemitting sensor or by chemical reaction),

- what size of data is collected per time unit etc, furthermore,

- is data is transmitted constantly from the sensor and then evaluated in the receiving device, or

- is data collected and evaluated in the sensor and only in case of an emergency a trigger is sent and/or corresponding data is sent to the device. This latter question is not part of the method herein described, as these methods are both well known. [0015] New, in particular mobile Internet communication means enable better solutions that work by immediately connecting an user of the system in case of an emergency with his or her friends, family, and other people using the same type of devices.

[0016] The following solution allows to immediately know where potential first responders are, and hands this information out to all potential first responders; by connecting them via mobile internet it is possible to strengthen and accelerate rescue efforts even without resorting to the assistance of call centers; the line display is to give the first resonders a better grasp of the wehereabouts of the person and still conserve energy using an intelligent way of triggering GPS chips in time intervals.

[0017] The three methods are best combined to enable the most comprehensive PERS currently possible. However each one of them can be used on its own and they all stand in their own right.

Definitions

[001 8] The term "personal device " will be used in the following both for bracelets, pendants and any other devices that are easy to carry for the user and do not need to be taken off during the day and potentially night.

[0019] The word„sensor" can mean one sensor with one measuring ability, a set of sensors measuring different states or one sensor capable of measuring more than one state. It is always meant in the sense of a body-worn sensor.

[0020] The word„Bluetooth" is meant to describe any wireless connectivity which can be used for a low dinstance media connection using little or no energy on at least one of the devices connected.

[0021 ] The word ..First responder" means mainly family and friends of an user, whom he or she predefines to help him or her in an emergency. However, it can also mean police, fire brigades and ambulance services, if the user defines them to be contacted.

[0022] The words "device" and , , mobile device" mean either a standalone, special device or a smartphone with embedded apps and service.

BRIEF DESCRIPTION OF THE DRAWINGS

The following figures are provided for a better understanding of the present invention.

Fig. 1 depicts a flow chart of a method according to a first embodiment of the present invention.

Fig. 2 depicts a flow chart of a method according to a second embodiment of the present invention.

Fig. 3 depicts a flow chart of a method according to a third embodiment of the present invention.

Fig. 4 depicts a schematic view of a PERS according to a first embodiment of the present invention.

Fig. 5 is a logical diagram of an embodiment of the present invention.

Fig. 6 is a logical diagram of an embodiment of the present invention following the procedure of Fig. 5.

Fig. 7 is a logical diagram of an embodiment of the present invention. DESCRIPTION OF EMBODIMENTS Outline of the solution [0023] The minimum requirement for smart phones and bracelet alike to perform use of the energy conservation and/or operation method in the current invention are as follows

- GPS chip

- GPRS cell sensor

- GSM module with loudspeaker and microphone attached

- Bluetooth or other module for wirelessly and over short distances in low energy consuming ways transmitting data

- Alarm trigger for manual alarms

- RAM and ROM to collect, evaluate and store data

and potentially, not necessarily, a Wi-Fi chip.

[0024] An alarm trigger for manual alarms which can be either a switch, a girometer to recognise particular movement patterns or any other like movement sensor must be embedded in the bracelet; the alarm can also be triggered by any other means, in particular by a touch sensitive screen which might display other information as well.

[0025] In the following is presupposed, that both devices are capable of sending out text messages, making phone calls over cell phone carrier networks and to receive and send data through mobile Internet connections; the bracelet is therefore considered„genuine" as it can fully functions on its own.

[0026] B) This embodiment is also depicted in Fig. 5. Every user of the new system has a device that consists of at least

- a display,

- a cell phone unit, preferably a GSM unit, with loudspeaker and microphone

- GPS and GPRS tracking,

and at least one switch, functioning to show

-"Yes, I can help" or "no, I cannot help".

In an alternate version of the invention one additional switch to show -"yes I can administer the emergency response, but cannot help physically" or "no I cannot adminster the call".

In an alternate version of the invention one additional switch to show

- "1 cannot help / 1 cannot administer but still want to communicate with the victim.

This can be virtually shown on a mobile device 200 or a standalone device particularly built for that purpose.

[0027] In an alternative embodiment there is also a particular loudspeaker ("Piezo") which cannot be used for listening to a conversation, however to emit high pitched noise of, say. more than -90 db.

[0028] The system as depicted in Fig. 4 may furthermore comprise a remote server 100, by means of which incoming calls can be set up in a conference call like setting.

[0029] In the devices and/or in a remote server 100 the numbers of first responders in case of an emergency predefined by the user are stored; in particular of the first responders their respective cell phone numbers and other contact information are known.

[0030] The system also embeds a mobile Internet connectivity, which is generally set to "constantly on" but can manually be switched off by choice of the user.

[003 1 ] The following is also depicted in Fig. 6 and may be read with above mentioned embodiment and Fig. 5 of the present invention. The following may be constantly measured

- GPS coordinates in certain, predefined intervals

- potentially GPRS coordinates between these intervals and in cases, in which no mobile Internet connection is possible

- is mobile Internet connectivity available or not

- is standard cell phone connectivity available to a degree that allows at least text messaging and/or cell phone communication. The user can choose, if additional first responders beyond his direct predefinition are supposed to be contacted, in case that no first responder is able to help physically while additional first responders in the area are closer to him then his personally predefined first responders.

[0032 ] In the reverse any user can

- set his device to "1 cannot help", which means he or she is unable to help for a while;

- predefine if he or she in general only wants to help people in his or her direct line, that is people he personally has set up to be his first responders,

- if he wants to help all those people who set him up as first responder, even though he might not have the person set up as his one of his first responders

- if he is willing to help a second line of first responders, that is people who are connected to the first responders that he set up,

and/or if he is willing to help any person in need, when he or she is in close proximity.

[0033] In an alternate version of the invention the use of socalled„LifeCircles" as described in patent WIPO 2014 170081 can be used. In this case the user can additionally predefine if he wants only predefined people in the LifeCircie in which the accident happened are to be called, and/or if in a certain LifeCircie it is generally not allowed to have more than his personally predefined first responders contacted.

[0034] The user can predefine if in case that no predefined first responder is able to administer the call, a call center to be contacted.

A) Energy conservation method for PERS bracelets

Ve si n 1 : Connection between the Mobile devce 200 and the personal device 300 without use of one or more sensor(s) 400

1) existing connection betwee mobile device 200 and personal device 300

[0035] Once a connection between the mobile device 200 and personal device 300 exists and is functional, GPS, Wi-Fi, GPRS and GSM of personal device 300 can be switched off or put into a state of rest. Only active on personal device 300 remain the alarm trigger and the Bluetooth module.

[0036] All data of GPS, potentially Wi-Fi data, potentially GPRS cell functionality, GSM functionality are found by mobile device 200 and, using Bluetooth connectivity with personal device 300, important data are transmitted to personal device 300. This data is mainly the last position(s) of the mobile device 200, as within functioning Bluetooth connection local proximity between the two devices can be presupposed. The transfer of data will be important, once the wireless connection between personal device 300 and mobile device 200 is lost.

[0037] The alarm trigger on the personal device 300 needs to continually work, as both on mobile device 200 and on personal device 300 the alarm could be triggered. If the alarm is triggered on either of these two, the data is sent out using the mobile device's 200 modules.

[0038] The only data transferred in this case from personal device 300 to mobile device 200 is a potential alarm triggered on personal device 300.

2) connection lost

[0039] If the Bluetooth connection gets lost between mobile device 200 and personal device 300, both act as a standalone system in the same way as described before, while continuing to attempt to regain Bluetooth connectivity.

[0040] Personal device 300 now re-starts the modules GPS, potentially Wi-Fi, GPRS and GSM. For the GPS and GPRS modules, the data received previously from mobile device 200 can be used in order to avoid so-called cold starts that would require more time and energy.

[0041 ] Also, if the alarm is triggered on personal device 300 after the connection is lost yet before personal device 300 can establish GPS and or GPRS connection and would otherwise be without the potential to transmit a coordinates of personal device 300, these previous coordinates are used.

[0042] On which ever of the 2 devices the alarm trigger is pressed or the alarm otherwise executed, the alarm is sent out. So, if the alarm is triggered on mobile device 200, it can be assumed that the user put away his personal device 300, and mobile device 200 sends the alarm message. If it is pressed or otherwise executed on personal device 300, it can be assumed, that the user is still wearing personal device 300 and the transmission is executed through personal device 300 GSM module.

3) Connection re-established

[0043] In case that the two devices re-establish connectivity via Bluetooth, they can be brought back to the state described in Al); however with the particularity, that now the data found by both personal device 300 and the smartwatch needs to be compared. This happens using the limestamps of the stored data. As the data found by the two devices are compared and collected on mobile device 200, they get arranged in the order in which they have been received, as soon as personal device 300 has transmitted this data to mobile device 200, and after comparison then in correct order fully or partially re-sent to personal device 300, so that both personal device 300 and mobile device 200 are again in sync as far as these coordinates are concerned.

Version 2: connection between mobile device 200 and personal device 300 with use of sensor(s) 400

1) existing connection between mobile device 200, personal device 300 and sensor 400

[0044] As soon as a wirelessly connected sensor 400 is involved, matters become slightly more complicated. a) sensor 400 connected to both mobile device 200 and personal device 300

[0045] When sensor 400 is connected both to mobile device 200 and personal device 300 sensor 400 transmits data to mobile device 200; only this then transmits, if necessary, the data to personal device 300. In the following it is presupposed that sensor 400 data is not only meant to trigger the alarm, but also to be transmitted in case of an alarm. b) sensor 400 connected to both mobile device 200 and personal device 300, but connection lost between mobile device 200 and personal device 300

[ 0046 ] Once mobile device 200 and personal device 300 loose contact to each other, yet both still have connectivity to sensor 400, sensor 400 continues to send data to mobile device 200 and starts transmitting to personal device 300, which in turn starts to receive this data now directly from sensor 400.

[0047] If sensor 400 has both capacity to send and receive data, data from sensor 400 can be sent to mobile device 200 as described in A2, then resent to sensor 400 as a channel to have it received by personal device 300, c) sensor 400 connected to both mobile device 200 and personal device 300, and lost

connection between mobile device 200 and personal device 300 re-established

[0048] Once connectivity between mobile device 200 and personal device 300 is re-established, Bluetooth connection between mobile device 200 and sensor 400 exchanges data and compares data as described in A3, however not only coordinates, but also sensor 400 data retrieved, while sensor 400 and personal device 300 no longer exchange data, as the data is again sent from from mobile device 200 to personal device 300.

2) sensor 400 loses the connection to mobile device 200 but keeps connection to personal device 300 a) sensor 400 connected to personal device 300, and existing connection between mobile device 200 and personal device 300 [0049] As long as the connection between mobile device 200 and personal device 300 still exists, and sensor 400 can, for whatever reason possible, such as a malfunction of the bluetooth module of the smartphone, only establish wireless connection with personal device 300, personal device 300 is used to receive data and transmit it directly to mobile device 200, where all calculation processes in this case are affected. b) sensor 400 connected to personal device 300, connection between mobile device 200 and

personal device 300 lost

[0050] Once now the connection between personal device 300 and mobile device 200 is lost, too, mobile device 200 becomes a standalone system, that tries to regain connectivity with both sensor 400 and personal device 300, while personal device 300 and sensor 400 stay in contact and personal device 300 receives the data emitted from sensor 400. c) sensor 400 connected to personal device 300, lost connection between mobile device 200 and personal device 300 reestablished

[0051 ] As soon as personal device 300 and mobile device 200 reestablish contact, with sensor 400 still not able to establish contact with mobile device 200, the data received from sensor 400 on personal device 300 is again sent to the smartphone in the same way as described earlier with exchange of data according to the timestamps used.

3) sensor 400 loses the connection to personal device 300 and keeps connection to mobile device 200 a) sensor 400 connected to mobile device 200, existing connection between mobile device

200 and personal device 300

[0052] As soon as sensor 400 loses contact with personal device 300, but keeps connection with mobile device 200 which is still connected to personal device 300, the data is transmitted from sensor 400 to mobile device 200, and then to personal device 300 from the smartphone. b) sensor 400 connected to smart phone, connection between mobile device 200 and personal device 300 lost

[0053 ] As soon as the connection between mobile device 200 and personal device 300 is lost, sensor 400 can only transmit to mobile device 200. personal device 300 now functions on a standalone basis, trying to regain connectivity, but without the potential to transmit data from sensor 400, In this case only the manual alarm trigger can be used on personal device 300, which should be made known to the user so he can get his smartphone for security reasons.

c) sensor 400 connected to smartphone, lost connection between mobile device 200 and personal dev ice 300 reestablished

[0054] Once connectivity between mobile device 200 and personal device 300 is reestablished, the information is transmitted from mobile device 200 to personal device 300 as described earlier.

4) Complete sensor 400, personal device 300 and smartphone disconnect is reestablished

[0055] In case that sensor 400, mobile device 200 and personal device 300 have all lost connection to each other, and can reconnect, it is important to manage the data stream according to the following principles; the exact time of re-establishment is crucial: a) Mobile device 200 connects first with personal device 300, secondly personal device 300 with sensor 400

[0056] f mobile device 200 connects first with personal device 300 and then personal device 300 with sensor 400 before sensor 400 and mobile device 200 have re-connected, personal device 300 sends data received to mobile device 200 to have it compared and resent. After this, personal device 300 continues to transmit sensor 400 data received to mobile device 200. b) mobile device 200 connects first with personal device 300, secondly personal device 300 with sensor 400 and finally mobile device 200 with sensor 400

[0057] As soon as mobile device 200 now finally reconnects to sensor 400, the data received is transmitted to personal device 300, by effect of which the transmission between sensor 400 and personal device 300 is discontinued as described in A l . c) mo bile device 200 connects first with personal device 00, secondly mobile dev ice 200

with sensor 0

[0058] If sensor 400 connects with mobile device 200, the data is sent from sensor 400 to mobile device 200, and from mobile device 200 to personal device 300. d) M bile dev ice 200 connects first with personal device 300, then mobile dev ice 200 with sensor 400 and finally personal device 300 w ith sensor 400

[0059] Once personal device 300 has reconnected to mobile device 200 and finally reestablishes contact with sensor 400 as well, no data is exchanged, as the data has been processed and transmitted in the most energy conserving way.

B) Automating PERS

Standard fu nctionality without emergency

[0060] Day and night, every user is constantly monitored using his device; thus, in predefined intervals GPS data is transferred via mobile Internet connection or WiFi to a remote data server 100. The said is also true for GPRS field connectivity during preset intervals within the said GPS intervals or in case that no GPS signals can be found, which is normal in particular inside buildings. If WifiBlink technology as described in WIPO 2014 170081 by the same author is used, the found data can also be transmitted.

[0061 ] Changes to the personal data given by the user such as allergies can be stored in the database.

[0062] It is furthermore stored, if the user has set his system to "no I cannot help" in general settings.

[0063] If sensor 400 data is collected and predefined to be sent out in case of an emergency, it can be stored as well. Instead of a particular device, the method can, using an application, be used on mobile devices 200.

Functionality in case of emergency 1) User has internet connection

[0064] Once the user presses the alarm trigger or a remote sensor 400 triggers the alarm the following information is sent to server 100

- last position, if GPS can be found very quickly, in particular between pressing the alarm trigger and the end of the initial data transfer

- personal code of the user

- strength of the mobile Internet connection and strength of the cell phone signal.

A voice over IP connection is then established between the telephone of the victim and server 100

[0065] In the next step the system now checks for the following information :

- who of the first responders predefined by the user is in close proximity to the user; this happens using current or stored GPRS and/or stored GPS data of all of his predefined first responders. [0066] A connection via mobile Internet connection using voice over IP is established between server 100 and all first responders predefined by the user, unless they have chosen "I am not available" and unless there is no mobile Internet connectivity to the respective device of the first responders.

[0067] If no mobile Internet connectivity is possible to one or more first responders, server 1 00 attempts to place phone calls to the respective device or devices using standard cell phone connectivity; the first responder is in this case given the choice of options called USSD / MMI encoded functions, by which he can define if he is able to help, unable to help or physically unable to help but might like to administer the call, depending on which of these three options is chosen the phone connection is disabled or he or she participates in the conference call.

[0068] If either no first responder can be reached or no first responder can work as an administrator, a call center can be informed, if the victim has chosen to do so.

[0069 ] The victim himself can chose to administer the call, for example if he is fully conscious yet cannot move („broken leg"), then he himself can chose to administer the call.

[0070] The administrator can now use the device ' s three switches which are now to be relabeled as "call ambulance", "call police" and "call fire police" and function accordingly, using global databases stored on server 100 which, depending on the whereabouts of the victim can direct the respective call to the next available police, ambulance and fire station.

[0071 ] The administrator is shown a random pin code and another telephone number which is to be given to the first responders, ambulance, police or fire brigade responding and which they can later use to trigger a loud signal on the victim ' s device to locate the victim, once they are closing in on his location.

[0072] In an alternative embodiment of the invention, the victim can choose to have more first responders outside his personal base invited to join the rescue effort. If the victim has allowed to use a second line of first responders, the system now searches the database with all the numbers of all the first responders anywhere predefined by the victim and then the database of first responders for all those persons, which are using the system and have been predefined by the victim's first line of first responders as their respective first responders, and invites them to join the rescue effort for the - possibly unknown to them at this point - victim, by sending them an invitation to join the rescue and their current distance to the place where the emergency happened. Once they confirm "I can help" they can join the conference call and are sent name and location and personal data etc. of the victim and are also sent the pin code by which they can later trigger the loud noise of the device.

[0073] In an alternate version of the invention the they can also be invited to become administrator of the conference call.

[0074] In an alternate version of the invention, the victim can in general or for some areas choose to have

- more lines of first responders, in particular predefined first responders of his own first responders, be they known or unknown to him, as the line of trust is extends over from the first line of trust to more remote lines of trust or

----- even anyone who is user of the system or users of the device with special characteristics invited to the rescue.

The differentiation will be according to his personal privacy requirements - when jogging in an open park, every help is welcome in case of an emergency, at home one might only trust his own family and friends and potentially one more line of first responders, but one would not like to invite a stranger into the house; in a gated community meanwhile, it makes sense only to ask those people with access to the community to join the effort, which excludes family and friends not within the enclosed compound but includes anyone known or unknown with access to the community. For a person with a particular health problem, only known and unknown first responders with a particular medical knowledge might be invited.

2) The victim is not able to communicate via mobile Internet connection, but there is a phone connectivity [0075] If the user is not connected via mobile, but there is possibility of a phone connection, the data needed are sent to server 100 using an USSD / MMI code. The method works the same as described in 1 with the particularity, that the victim is connected to the conference call only by phone connection and all additional data other than the latest and newest GPS coordinates is used from the server storage.

3) Arrival of Rescue forces

[0076] Once ambulance, police and fire brigades and/or first responders using the conference call tell the administrator about their arrival at the scene of the emergency, either they or the administrator trigger the loud noise on the victim's device in order to facilitate the search for the victim on the last meters.

C) The display of several found coordinates

I) "Beeline " display of coordinates - general

[0077] In personal emergency response system described above and in PERS in general, in order to recognize that a position person might be inside a building, it is sufficient to store the last position of the person. As GPS contact is under normal conditions immediately lost upon entering a building, it is sufficient to know the last position found in front of the building.

[0078] a) As it is possible, that one position cannot be specifically calculated but only with a perimeter and that a bounce back happened, which is even more likely with a person nearing a large building structure, a line of positions can be shown, which herein shall be called „beeline", of at least n>=l last positions.

[0079] We have found that a number of five last positions, found in intervals of 50 to 90 seconds is both sufficient, saves well on battery power and is for rescue purposes necessary. [0080 ] b) As a person might move through a street and then sit down, for example on an open bus stop or in front of a coffee shop, it would not make sense to erase the previous positions and overwrite them with coordinates found of the person sitting in close proximity, even though the coordinates found might and will differ slightly, as this would only lead to a series of very close points; usually both the center point and diameter change slightly,

[0081 ] Therefore the following calculation is to be made to better the result without compromising previous, very helpful coordinates of the beeline:

aa) in general every new interval is added to the line of n=T ,2,3,4,5... coordinates to be shown to the first responder(s). Once a new coordinate is added, the first coordinates found is deleted. Thus old GPS(n=l ) becomes GPS(n=2), old GPS(n=2) becomes GPS(n=3) and so on. If 5 positions are to be shown. GPS(n=5) is deleted from the beeline and GPS(n=4) becomes GPS(n=5 )and thus the earliest position found to be shown.

bb) If the last coordinate found has a very large perimeter and is thus deemed not very accurate, the following calculation can be made :

if the center of the new position is within the perimeter of the old position

and

the perimeter of the new position is smaller than the last position GPSin^l ),

the last position GPS (n=T ) is about to be deleted instead of the earliest position found. The new position takes the place of the position GPS(n=l ), and GPS(n=2) to - in the above example of 5 positions - GPS(n=5) remain untouched.

cc) If a new coordinate is found, in which the center of the perimeter is inside the last GPS coordinate GPS(n=l ), however the new perimeter is larger than the one of the last coordinate GPS(n=l ) found, the new coordinate is not used and deleted; the time stamp used can be updated to the new time.

dd) If the center of the perimeter of the newly found coordinate is outside the perimeter of the last position n= l , the new perimeter becomes the last perimeter found and all previous coordinates are moved down 1 each and the earliest GPS coordinate deleted as described in the general method aa).

2) Post alarm positioning attempt [0082] In an embodiment of the invention, once the alarm has been triggered, the device can try one more time to make an exact estimate of the location, in particular if the last position has been found at a point of time, which is more than 2 time of the predefined intervals, as this is a sign that the user has been inside a building; this is true both if and if not the display via said beeline is used or not.

[0083] In this case the energy conservation restraints explained in 3) do not apply, but rather a longer time frame of ca 2 minutes; if a position is found in such a way it can be sent to the first responder(s) as additional information, with or without beeline. The calculation logic described in 1 ) b) does not apply, as it is just an additional posibility.

[0084] If a post alarm position is found, it can be used by first responders to either rescale rescue efforts or to easier find the victim to be rescued,

3) GPS chip energy conservation management for predefined intervals

[0085] The following embodiment is also shown in Fig. 7. For conservation of energy, within the predefined intervals the following logic can be applied for best results while saving energy; this is true both if and if not the display via said bee!ine is used or not, This is particularly important in case of a mobile device 200 and a personal device 300, when both devices are not connected (see A2) and energy would be drained from personal device 300.

[0086] aa) Initially the GPS chip can run for up to 2 minutes or the time recommended by the chip producer for a soc ailed„cold start", which describes a start without any data of the whereabouts of the device, such as after starting a device new.

[0087] If a position is found, the next step is already with the chip ' s approximate knowledge of the position and thus easier („warm start'"); if not, 1 ) bb) aaa) applies.

[0088] bb) After the initial positive attempt, the Chip can be programmed to search for new coordinates for initially 5- 10 seconds;

[0089] aaa) if within this timeframe no GPS signal at all is received, the chip is set to silent and retriggered after the next interval time;

[0090] bbb) if within this timeframe at least one GPS signal is received, the chip continues to locate more GPS signals in order to find a position, however only for a second predefined time frame, e.g. 20 seconds; this is either stopped

- once a position with very little perimeter can be established or

- if within 20 seconds no position or only a very unclear position, i.e. one with a large perimeter can be found.