Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
PERSONAL SECURITY SYSTEM AND DEVICE
Document Type and Number:
WIPO Patent Application WO/2017/201561
Kind Code:
A1
Abstract:
A security system for dispatching assistance to a user includes a mobile electronic device worn by the user. The device is connected to a network and configured to establish a voice and data channel over the network with a preconfigured recipient. A security command point, being the preconfigured recipient, is connected to the network and configured to complete the voice channel and data channel with the device. The security command point is further connected to a plurality of responders. Upon establishment of the voice data channel with the security command point, the device mutes a sound reproducing means thereof and transmits to the security command point sound/noise from within a vicinity of the device and a user identifier unique to the device. The security command point, upon establishment of the voice and data channel with the device, assesses a situation of the user from the sound/noise transmitted thereto and dispatches one or more appropriate responders to a location of the user.

Inventors:
LAGA'AIA ELISAIA (AU)
Application Number:
PCT/AU2016/000179
Publication Date:
November 30, 2017
Filing Date:
May 23, 2016
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
APS 000 PTY LTD TRADING AS 3G SAFETY WATCH (AU)
International Classes:
G08B25/00; H04M11/04; H04M3/42; H04W4/90
Foreign References:
US9069333B12015-06-30
US20100285771A12010-11-11
Other References:
3G SAFETY WATCH OFFICIAL VIDEO, 16 March 2015 (2015-03-16), Retrieved from the Internet [retrieved on 20160624]
Attorney, Agent or Firm:
WYNNES PATENT AND TRADE MARK ATTORNEYS (AU)
Download PDF:
Claims:
THE CLAIMS DEFINING THE INVENTION ARE AS FOLLOWS:

1 . A security system for dispatching assistance to a user, the system comprising: a mobile electronic device worn by the user, the mobile electronic device connected to a network and configured to establish a voice channel and data channel over the network with a preconfigured recipient;

a security command point, being the preconfigured recipient, connected to the network and configured to complete the voice channel and data channel with the mobile electronic device, the security command point further connected to a plurality of responders via a telecommunications and/or data link; and

a profile server storing therein a profile of the user, the profile containing personal information relevant to the user, wherein

the mobile electronic device, upon establishment of the voice channel and data channel with the security command point, mutes a sound reproducing means of the mobile electronic device and transmits to the security command point sound/noise from within a vicinity of the mobile electronic device and a user identifier unique to the mobile electronic device, and

the security command point, upon establishment of the voice channel and data channel with the mobile electronic device, retrieves the profile of the user from the server using the user identifier, and from the profile and the sound/noise transmitted thereto, assesses a situation of the user and dispatches one or more appropriate responders to a location of the user.

2. A system as claimed in claim 1 , wherein the mobile electronic device comprises a location receiver for wirelessly receiving location information from a location information service.

3. A system as claimed in claim 2, wherein the wireless transceiver further transmits the location information to the security command point, and the security command point assesses the situation further based on the location information.

4. A system as claimed in claim 2 or 3, wherein the security command point comprises a plurality of geographically dispersed command points, and the mobile electronic device establishes the voice channel and data channel with a selected one of the plurality of geographically dispersed command points based on the location information.

5. A system as claimed in any one of claims 2 to 4, wherein the location information service comprises at least one of: a global positioning system (GPS) service; cellular network information service; and a Wi-Fi location service.

6. A system as claimed in any one of claims 1 to 5, wherein the mobile electronic device, upon muting the sound reproducing means, transmits an audio output status indicator signal to the security command point to indicate to the security command point that the sound reproducing means is muted.

7. A system as claimed in any one of claims 1 to 6, wherein the user input means is operable to unmute the sound reproducing means of the mobile electronic device, and upon unmuting the sound reproducing means, to transmit an audio output status indicator signal to the security command point to indicate to the security command point that the sound reproducing means is unmuted .

8. A system as claimed in any one of claims 1 to 7, wherein the mobile electronic device further comprises one or more vitality sensors configured to sense vital information of the user wearing the mobile electronic device, and transmits the vital information to the command security point.

9. A system as claimed in claim 8, wherein the security command point assesses the situation further based on the vital information.

10. A system as claimed in any one of claims 1 to 9, wherein the at least one selected responder comprises an emergency services provider. 1 1 . A system as claimed in any one of claims 1 to 10, wherein the mobile electronic device is operable to set a timer duration for countdown, and upon lapsing of the delay the mobile electronic device establishes the voice channel and data channel with the security command point.

12. A system as claimed in claim 1 1 , wherein the mobile electronic device transmits to the security command point the duration of the timer, and the security command point commences an independent countdown of the timer. 13. A system as claimed in claim 12, wherein the mobile electronic device further transmits with the duration of the timer one or more of the location information, vital information, user identifier, and additional information input to the mobile electronic device during setting of the timer duration. 14. A system as claimed in claim 13, wherein upon lapsing of the independent countdown, the security command point dispatches one or more appropriate responders to the location of the user.

17. A system as claimed in any one of claims 1 to 16, wherein the at least one mobile electronic device further comprises an accelerometer circuitry having one or more accelerometers configured to sense whether the user has experienced a fall event and the wireless transceiver is activated to transmit the communication signal in response to the fall event being sensed. 18. A system as claimed in any one of claims 1 to 17, wherein the mobile electronic device is a watch.

19. A system as claimed in claim 1 , wherein the mobile electronic device further transmits voice and/or data respectively along the voice channel and data channel to an application resident on a recipient electronic device.

20. A system as claimed in any one of claims 1 to 19, wherein the user input means comprises a physical/mechanical button that is operated by the user to establish the voice channel and data channel with the security command point.

Description:
Personal Security System and Device

FIELD OF INVENTION

The present invention relates to a personal security device and system for providing safety and security measures to users of the system . The present invention has particular but not exclusive application in safety and security services for civilian individuals, and safety and security services for personnel of private organisations. BACKGROUND OF THE INVENTION

With recent advances in the fields of mobile telecommunications and mobile electronics, mobile and wearable electronic devices have become widespread.

Various uses for wearable electronic devices, such as watches have been developed to, for example, monitor a wearer's vital statistics (e.g . fitness trackers), facilitate carers/parents to monitor their charges/children, and to allow elderly people and/or people who are not able to live fully independently to live more independently.

Such wearable electronic devices have generally assumed the wearer is in a safe environment, and are ill suited for use in less benign, or outright hostile, environments.

OBJECT OF THE INVENTION

It is one object of the present invention to provide a mobile electronic device and system that provides its user with safety and security measures, and which mobile electronic device and system are suited for use in potentially hostile environments.

This and other objects of the present invention will be made apparent from the following disclosure of the invention.

SUMMARY OF THE INVENTION

According to an aspect of the present invention, a security system for dispatching assistance to a user comprises a mobile electronic device worn by the user, the mobile electronic device connected to a network and configured to establish a voice channel and data channel over the network with a preconfigured recipient; a security command point, being the preconfigured recipient, connected to the network and configured to complete the voice channel and data channel with the mobile electronic device, the security command point further connected to a plurality of responders via a telecommunications and/or data link; and a profile server storing therein a profile of the user, the profile containing personal information relevant to the user. The mobile electronic device, upon establishment of the voice channel and data channel with the security command point, mutes a sound reproducing means of the mobile electronic device and transmits to the security command point sound/noise from within a vicinity of the mobile electronic device and a user identifier unique to the mobile electronic device. The security command point, upon establishment of the voice channel and data channel with the mobile electronic device, retrieves the profile of the user from the server using the user identifier, and from the profile and the sound/noise transmitted thereto, assesses a situation of the user and dispatches one or more appropriate responders to a location of the user.

In one form, the mobile electronic device comprises a location receiver for wirelessly receiving location information from a location information service.

In a further form, the wireless transceiver further transmits the location information to the security command point, and the security command point assesses the situation further based on the location information.

In a further form, the security command point comprises a plurality of geographically dispersed command points, and the mobile electronic device establishes the voice channel and data channel with a selected one of the plurality of geographically dispersed command points based on the location information..

In a further form, the location information service comprises at least one of: a global positioning system (GPS) service; cellular network information service; and a Wi-Fi location service.

In a further form, the mobile electronic device, upon muting the sound reproducing means, transmits an audio output status indicator signal to the security command point to indicate to the security command point that the sound reproducing means is muted.

In a further form, the user input means is operable to unmute the sound reproducing means of the mobile electronic device, and upon unmuting the sound reproducing means, to transmit an audio output status indicator signal to the security command point to indicate to the security command point that the sound reproducing means is unmuted. In a further form, the mobile electronic device further comprises one or more vitality sensors configured to sense vital information of the user wearing the mobile electronic device, and transmits the vital information to the command security point.

In a further form, the security command point assesses the situation further based on the vital information.

In a further form, the at least one selected responder comprises an emergency services provider.

In a further form, the mobile electronic device is operable to set a timer duration for countdown, and upon lapsing of the delay the mobile electronic device establishes the voice channel and data channel with the security command point.

In a further form, the mobile electronic device transmits to the security command point the duration of the timer, and the security command point commences an independent countdown of the timer.

In a further form, the mobile electronic device further transmits with the duration of the timer one or more of the location information, vital information, user identifier, and additional information input to the mobile electronic device during setting of the timer duration.

In a further form, upon lapsing of the independent countdown, the security command point dispatches one or more appropriate responders to the location of the user.

In a further form, the mobile electronic device further comprises an accelerometer circuitry configured to sense whether the user has experienced a fall event and the wireless transceiver is activated to transmit the communication signal in response to a fall event being sensed.

In a further form, the mobile electronic device is a watch.

In a further form, the mobile electronic device further transmits voice and/or data respectively along the voice channel and data channel to an application resident on a recipient electronic device.

In a further form, the user input means comprises a physical/mechanical button that is operated by the user to establish the voice channel and data channel with the security command point. BRIEF DESCRIPTION OF THE DRAWINGS

In order that the present invention can be more readily understood, reference will now be made to the accompanying drawings which illustrate preferred

embodiments of the invention and wherein:

Fig. 1 is a schematic view of a mobile electronic device according to an embodiment of the invention;

Fig. 2 is a schematic view of a system according to an embodiment of the invention;

Fig. 3 is a further schematic view of a system according to an embodiment of the invention;

Fig. 4 is a flow diagram of an exemplary operation of the system according to an embodiment of the invention;

Fig. 5 is a flow diagram of another exemplary operation of the system according to an embodiment of the invention;

Fig. 6 is a flow diagram of another exemplary operation of the system according to an embodiment of the invention; and

Fig. 7 is a flow diagram of another exemplary operation of the system according to an embodiment of the invention. DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

According to an embodiment of the present invention, and as illustrated in Figs. 1 and 2, there is provided a wearable mobile electronic device 10, and a security system 1 1 of which the wearable mobile electronic device 10 is part. In a preferred embodiment of the present invention, the mobile electronic device 10 is a "smart" watch (hereinafter referred to simply as a watch), however, it is to be understood that the mobile electronic device 10 is not limited to a watch, and may be another form of preferably wearable electronic device.

With reference to Fig. 1 , the mobile electronic device 10 is described in greater detail. As illustrated in Fig. 1 , the mobile electronic device 10 comprises a sound recording means 12, a location finder 16, user input means 18, an interfacing display 20, accelerometer circuitry 23, electronic circuitry 21 including a processor, memory, and bus, a wireless transceiver 24, a sound reproducing means 26, and a band 28. In the preferred embodiment, the sound recording 12 is a microphone operable to record noise and sound from within the vicinity of the mobile electronic device 10. The recorded noise and sound is stored in the mobile electronic device 10 and/or transmitted from the watch by the wireless transceiver 24 to external recipients.

The location finder 16 is a GPS receiver, but may alternatively or additionally be a GLONASS receiver, cellular signal receiver, and/or Wi-Fi receiver.

The user input means 18 comprises one or more physical/mechanical buttons electronically coupled to the electronic circuitry 21 .

The interfacing display 20 is a touch screen display operable to both display information and receive touch input from a user. Icons 22 are displayed on the interfacing display 20 to facilitate operation of and interaction with the mobile electronic device 10.

The accelerometer circuitry 23 is an electro-mechanical circuit comprising one or more accelerometers, each preferably arranged in a different orientation. In the preferred embodiment, the accelerometer circuitry 23 comprises two accelerometers arranged approximately orthogonal to each other, and a gyroscope. Additionally, the accelerometer circuitry 23 is associated with and monitored by a fall detection algorithm configured to detect a fall event based on outputs of the accelerometer circuitry 23. The fall detection algorithm, in the preferred embodiment, is in part configured using test outputs from the accelerometer circuitry 23 while conducting a large plurality of test falls. The accelerometer circuitry 23 and fall detection algorithm are together operable to detect a fall-event, which is an occurrence of a user of the mobile electronic device 10 falling to the ground.

The wireless transceiver 24 includes a Wi-Fi transceiver compliant with

IEEE802.1 1 or similar standards, and a cellular transceiver compliant with cellular standards such as (but not limited to) 3G, 4G, LTE, EDGE, HSPA, CDMA, GSM, and the like. The mobile electronic device 10 includes a SIM (not shown) to enable communication using the appropriate cellular standards.

The sound reproducing means 26 includes a speaker operable to generate and output noise/sound, and may further include an interface adapted to couple with appropriate sound output means via a 3.5mm headphone jack, Bluetoothâ„¢, and the like. The band 28 may be provided, where necessary, to facilitate wearing of the mobile electronic device 10. In the preferred embodiment, the band 28 comprises sensors (not shown), such as vitality sensors (e.g. heart rate sensor), embedded therein to sense vital information of the user. Alternatively (or additionally), sensors may be located at the back of the interfacing display 20. In one form, the band 28 includes a detector for detecting unauthorized removal or unclasping of the band . The detector in the preferred embodiment is a sensor on the clasp of the watch to detect when the band is unclasped without first toggling a setting on the user input means 18 or interfacing display 20. In the event of an unauthorized removal, the mobile electronic device 10 is configured to initiate a distress call to the security command point 32.

With reference next to Fig. 2, the security system 1 1 is described in greater detail. As illustrated in Fig. 2, the security system 1 1 comprises the mobile electronic device 10, one or more networks 30, 31 to which the mobile electronic device 10 is configured to connect via telecommunication links 34, a security command point 32 connected to the one or more networks 30, 31 via telecommunication links 36 and configured to receive communication requests initiated by the mobile electronic device 10 over the networks 30, 31 , a profile server 37 connected to the security command point 32, and responders 33 connected via a telecommunications or data link 35 with the security command point 32.

The network 30, in the preferred embodiment, is the Internet (more specifically a Virtual Private Network established over the Internet) and is accessible by the mobile electronic device 10 via Wi-Fi, cellular/mobile connection, Bluetoothâ„¢, and the like. In other embodiments, the network 30 may be a closed/private network. The network 31 in the preferred embodiment is a cellular mobile network, for example a 3G, 4G, LTE, EDGE, HSPA, CDMA, GSM, or similar network and accessible by the mobile electronic device 10 through the aforementioned SIM card/chip. The network 30 may further include a satellite telecommunications network (e.g. Iridiumâ„¢).

The security command point 32 is a manned centre for receiving a distress call from the mobile electronic device 10, and from the distress call assessing the situation that a user 5 of the mobile electronic device 10 is in and determining an appropriate response for rendering assistance to the user 5. The security command point 32 has a direct line to the responders 33. The server 37 includes therein a database storing one or more user profiles. Each user profile contains personal details of a user of the security system 1 1 and is uniquely identified by a user identifier. The server 37 is connected to the security command point 32, whereby upon receipt of a user identifier the security command point 32 is operable to retrieve a user profile corresponding to the user identifier from the server 37.

The responders 33, in one form, are conventional emergency services such as the police, ambulance/paramedic service, fire station, state emergency service (SES), and the like. As will be described in greater detail below, the responders 33 may further include specialized teams specific to a need of the user, for example a quick response force (QRF) in the case where the user 5 is a member of the police force and the security command point 32 is a police-specific command point (as will be described in greater detail below).

The mobile electronic device 10, as part of the system 1 1 , is pre-configured to only establish a communication request to a predetermined recipient, that is, the security command point 32 or delegated command point. In the preferred embodiment, the contact details (e.g. phone number, IP address, etc.) of the security command point 32 are the only contact details stored in the mobile electronic device 10 and otherwise available thereto. Additionally, in the preferred embodiment, the interfacing display 20 is not configured to provide means for the user 5 to input alternative contact details for the security command point 32. The modification of such information and details, in the preferred embodiment, is possible only by a delegated authority of the security command point 32.

With reference to Fig. 3, a security system 1 1A which is a variation of the security system 1 1 of Fig. 2 is described.

The security system 1 1A is in all respects identical to the security system 1 1 , but further includes a monitoring device 48 operated by a monitor 7. The monitoring device 48 is connected to the network 30 and, upon appropriate configuration of the mobile electronic device 10, receives the same information as would otherwise be received by the security command point 32 were a distress call to be made (and/or when a distress call is made) to the security command point 32. The monitoring device 48 may further receive map addresses and longitude/latitude coordinates, MAC addresses, and the like. The monitoring device 48 is further connected to a cellular network such as the network 31 , and thereby to the security command point 32. It is to be understood that one or more monitoring devices 48 may be connected to the network 30 to monitor the same, or a plurality of different mobile electronic devices 10.

As previously mentioned, the mobile electronic device 10 is designed for use by users who may have reason to at times have concern for their safety. Such users include, for example, late night shift workers, law enforcement officers, paramedics, humanitarian/aid workers, adult industry workers, security personnel, and the like.

With reference now to Fig. 4, an exemplary general operation 100 of the mobile electronic device 10 and security system 11 ,1 1 A to effect and respond to a distress call is described.

The general operation 100 is initiated when the user 5 considers themselves to be in, or entering into, a potentially dangerous situation. For the purposes of this description, the user 5 is a shift worker, and the potentially dangerous situation is one where the user 5 is feeling threatened by an aggressor.

The general operation 100 commences at 101 where the user 5 operates one or more of the user interface means 18 and/or interface display 20 in a manner that has been predesignated as for initiating a distress call. In the preferred embodiment, one of the physical/mechanical buttons of the user interface means 18 is designated as a distress button, and operation thereof in a "one-touch/hold" manner for a predetermined duration (e.g. 3 seconds) initiates the distress call. Operation of the one or more user interface means 18 and/or interface display 20 in the above manner causes the wireless transceiver 24 to generate a communication signal over the networks 30, 31 to initiate the distress call with the security command point 32.

At 102, the security command point 32 receives the communication signal and accepts the distress call, whereupon a communication channel between the security command point 32 and the mobile electronic device 10 is established across telecommunication links 34, 36. In the preferred embodiment, the communication channel includes a voice channel and a data channel.

At 103, upon the establishment of the communication channel between the security command point 32 and the mobile electronic device 10, the mobile electronic device 10 communicates to the security command point 32 the user identifier that is unique to the mobile electronic device 10, an audio stream of sound/noise from within a vicinity of the user 5, and preferably also vital statistics of the user. Additionally, the mobile electronic device 10 mutes the sound reproducing means 26 to ensure that sound is not emitted thereby. The status of the sound reproducing means 26 (e.g. whether it is muted or unmuted) is preferably indicated to the security command point 32 by an audio output status indicator signal which is sent from the mobile electronic device 10 to the security command point 32 also via the communication channel.

The status of the sound reproducing means 26 may be toggled by the user 5 through operation of one or more of the user input means 18 and/or the interface display 20.

At 104, the security command point 32 accesses the server 37 and, using the received user identifier, retrieves a user profile corresponding to the user 5. The security command point 32 then analyses the vital statistics of the user, the audio stream, and information about the user 5 contained in the user profile to determine the situation that the user 5 is currently in, and thereby assess what type of response and from which of the responders 33 a response is most appropriate.

In the example of the general operation 100, for instance, the audio stream received by the security command point will likely contain dialogue between the aggressor and the user 5 where the aggressor is making one or more demands of the user 5. Based on this dialogue and the other aforementioned information, the security command point 32 is able to assess that the user is in a dangerous situation involving, in this example, what appears to be a theft.

Accordingly, at 105, the security command point 32 establishes a communication channel 35 with an appropriate responder 33, which in this case would be the police and possibly also the ambulance service, to convey thereto details of the user's situation.

At 106, the appropriate responder(s) (e.g. police and ambulance service) are dispatched by the security command point 32 to the user's location as an appropriate response to the user's situation.

At any time, should the user 5 assess that they are in a situation where it would be appropriate to unmute the sound reproducing means 26 so as to enable two-way voice communication with the security command point 32, the user 5 may toggle the user input means 18 and/or interfacing display 20 to unmute the sound reproducing means 26. Upon doing so, the mobile electronic device 10 preferably sends a new audio output status indicator signal to the security command point 32 to indicate to the security command point 32 that the sound reproducing means 26 has been enabled. Unmuting of the sound reproducing means 26 allows two-way voice communication between the user 5 and the security command point 32, such that more detailed information can be communicated to and from the security command point 32. Two-way communication may be more appropriate, for example, when the user 5 has suffered an injury, and/or when there is otherwise no longer a need to conceal the fact that the user 5 is seeking assistance.

With reference next to Fig. 5, an exemplary timer based operation 200 of the mobile electronic device 10 and security system 1 1 , 11A to automatically effect and respond to a distress call is described.

The exemplary timer based operation 200 has particular use and application in situations where the user 5 knows beforehand that they will be entering into a potentially dangerous situation. For purposes of this description, the timer based operation 200 will be described in relation to a user 5 who is an adult industry worker, and who has an appointment with a client that has a pre-agreed duration of 1 hour.

The timer based operation 200 commences at 201 , where the user 5 operates the user input means 18 and/or interfacing display 20 to set a predetermined timer duration. For purposes of this example, the user 5 sets a timer duration of 1 hour 30 minutes. In the preferred embodiment, the mobile electronic device 10 may further prompt the user 5 for further information such as a description of the situation the user 5 is about to enter, a room number, other more detailed location information, likely risks the user 5 may face, and the like.

Next at 202, the user 5 commences the timer and begins their appointment with their client. Upon commencement of the timer, the mobile electronic device 10 in the preferred embodiment preferably establishes a data communications channel with the security command point 32 using telecommunication links 34, 36 and communicates thereby a signal to the security command point 32 indicating that a timer has been set, and the duration of the timer. Additionally, any further information obtained from the user 5 at step 201 , as well as GPS coordinates of the mobile electronic device 10, and the user identifier are also preferably communicated to the security command point 32. The security command point 32 records the timer duration, and any further information received, and commences an independent countdown of the timer. Assuming an incident free appointment with their client, the user 5 at 203 operates the user input means 18 and/or interfacing display 20 to deactivate the timer. In the preferred embodiment, and as will be described in greater detail below, deactivation of the timer may require the user 5 to input a PIN or other passcode. Upon deactivation of the timer, the mobile electronic device 10 in the preferred embodiment preferably establishes a data communications channel with the security command point 32 using telecommunication links 34, 36 to communicate to the security command point 32 a signal indicating that the timer has been deactivated . The security command point 32, upon receipt of the signal indicating that the timer has been deactivated by the user 5 deactivates and ceases the independent countdown.

Conversely, in the event of an incident, for example if the user 5 is detained by their client, the timer is caused to eventually lapse. Upon lapsing of the timer, the mobile electronic device 10 at 204 automatically and without further user input establishes a distress call with the security command point 32, whereupon steps 102 to 106 of the previously described generation operation 100 are then executed.

In the preferred embodiment where the mobile electronic device 10 at step 202 communicated to the security command point 32 the setting of the timer, the timer duration, and further information obtained at 201 , the security command point 32 at the lapsing of the timer may itself establish a distress call with the mobile electronic device 10 (if one has not already been established) and/or automatically and without further user input or communication from the mobile electronic device 10 dispatch an appropriate responder 33 to the GPS coordinated provided by the user 5 at step 202, or to a location deemed most appropriate by the security command point 32 based on any further information that was provided by the user 5 at step 202.

As mentioned above, deactivation of the timer may require the input of a PIN or other passcode. The requirement for a passcode prevents deactivation of the timer by an unauthorized entity. In the preferred embodiment, an incorrect input of a passcode a predetermined number of times causes the mobile electronic device 10 to automatically and without further user input establish a distress call with the security command point 32, whereupon steps 102 to 106 of the previously described general operation 100 are then executed.

Additionally, in accordance with the preferred embodiment, one or more alternate, predetermined passcodes may be pre-set. Input by the user 5 of a predetermined alternate passcode causes the mobile electronic device 10 to indicate on the interfacing display that the timer has been deactivated but to otherwise establish a distress call with the security command point 32, whereupon steps 102 to 106 of the previously described general operation 100 are subsequently executed and/or the security command point 32 is instructed by the mobile electronic device 10 to immediately dispatch an appropriate responder.

With reference next to Fig. 6, an exemplary fall-based operation 300 of the mobile electronic device and security system 11 , 11A to automatically effect and respond to a distress call is described.

The exemplary fall-based operation 300 has particular use and application in situations where the user 5 knows beforehand that there is a high likelihood that the user 5 may suffer a fall, and that the fall will constitute a serious threat to the user 5. The fall-based operation 300 has particular application when, for example, the user 5 will be in an unstable/unbalanced situation at heights, or in a situation where the user 5 is likely to be involuntarily taken to the ground by another party. For purposes of this description, the fall-based operation 300 will be described in relation to a user 5 who is a police officer, and who is about to engage a group/crowd of people.

The fall-based operation 300 commences at 301 , where the user 5 operates the user input means 18 and/or interfacing display 20 to set the mobile electronic device 10 into a fall-based mode. As part of the process of setting the mobile electronic device 10 into the fall-based mode, the mobile electronic device 10 in the preferred embodiment may further prompt the user 5 for further information, such as a description of the situation the user 5 is about to enter, and the like.

Next at 302, the user 5 enters the situation, which in the present example involves the user 5 engaging with the group/crowd of people.

Assuming an incident free engagement with the group/crowd of people, the user 5 at 303 operates the user input means 18 and/or interfacing display 20 to switch the mobile electronic device 10 out of the fall-based mode.

Conversely, in the event of an incident, for example if the group/crowd of people engages with the user 5 in a physically aggressive manner and causes the user 5 to be knocked to the ground, the falling of the user 5 to the ground is detected by the accelerometer circuitry 23 and associated fall detection algorithm of the mobile electronic device 10 at 304. Detection of a fall event causes the mobile electronic device 10 at 204 to establish a distress call with the security command point 32, whereupon steps 102 to 106 of the general operation 100 are then executed. In one embodiment, the distress call is established after the detection of the fall event and the further elapse of a predetermined amount of time where the mobile electronic device 10 detects no movement of the user.

The security command point 32 of the present invention may be implemented in a number of forms.

In a first form, the security command point 32 is a command point set up to service any person who is a user of the mobile electronic device 10 and has a service subscription with the security system 1 1 , 1 1 A. In this form, the users 5 are generally civilians, and the public.

In a second form, the security command point 32 is a command point set up to be manned by and provide service specifically only to members of a particular organisation/agency. An example of a security command point 32 set up in this manner is a command point set up to service a local law enforcement agency. The security command point 32 of the second form allows customized "standard operating procedures" to be set up that better cater to the types of distress calls likely to be faced by their users. Other organisations/agencies such as intelligence agencies, aid agencies, the military, and the like would similarly benefit from a security command point 32 set up according to this second form.

The security command point 32 may be comprised of a plurality of geographically dispersed command points. The mobile electronic device 10, using its GPS derived location, determines the geographically nearest or otherwise most appropriate command point to communicate with when necessary. In this arrangement, the security command point 32 is particularly effective for ensuring that responders 33 are able to attend the user 5 as expediently as possible, and further that any possible language issues (for example, if the user 5 is travelling in a foreign country) are ameliorated.

With reference to Fig. 7, a further operation 700 of the mobile electronic device 10 and security system 1 1 , 1 1A is described. The operation 700 is a broadcast operation for broadcasting certain information from one mobile electronic device 10 to a plurality of other mobile electronic devices 10 connected to the same security command point 32. The broadcast operation 700 has particular use and application in alerting users 5 to a common threat, and/or sharing information pertinent to a security event. Examples of common threats include but are not limited to weather warnings (e.g. typhoons, tsunamis, earthquakes, floods, bush fires), presence/approach of hostile forces (e.g. for aid organisations working in hostile environments), and the like. Examples of sharing information pertinent to a security event include but are not limited to the broadcast of photos of missing persons, number plates or descriptions of stolen vehicles, and the like.

For purposes of this description, the broadcast operation 700 will be described in relation to a system 1 1 having a security command point 32 set up according to the aforementioned second form. Specifically, the security command point 32 has been set up to service the local law enforcement agency. Additionally, for purposes of this description, the broadcast operation 700 will be described in relation to the theft of a vehicle that has been witness by a first police officer (first user).

At 701 , upon witnessing the theft of the vehicle, the first user operates the user input means 18 and/or the interfacing display 20 to commence a broadcast action.

At 702, the first user is optionally prompted for information about the theft. For purposes of this description, the first user inputs "503: 938VDU - Grey - Renault".

At 703, the mobile electronic device 10 establishes a communication channel with the security command point 32. Upon establishment of the communication channel, the mobile electronic device communicates thereto the information inputted at 702. Additionally, the first user may, by voice, provide further information to the security command point 32.

At 704, the security command point 32 assigns the event witnessed by the first user with an identifier. The security command point 32 then identifies one or more other police officers (second users) to broadcast information about the theft to. Identification of the second users may be, for example, by one or more of rank, current location, responsible area of operations, on/off duty status, duty/responsibility/division/team, and the like.

At 706, the security command point 32 broadcasts the information about the theft to all identified second users and the first user.

At 707, upon one or more of the second users having information pertinent to the theft, the second user(s) operates their mobile electronic device 10 to indicate that they have pertinent information. Their mobile electronic device 10 then establishes a communication channel with the security command point 32, sending along a data channel thereof the identifier identifying the security event for which the second user(s) has pertinent information, and initiating (or waiting for the security command point 32 to initiate) a voice channel. Additionally, further information such as the GPS location of the mobile electronic device 10, and the vital statistics of the second user are also sent to the security command point 32 on the data channel.

At 708, upon establishment of a voice channel, the second user communicates the pertinent information to the security command point 32.

Further aspects of the method will be apparent from the above description of the security system 1 1 , 1 1A and the mobile electronic device 10. Persons skilled in the art will also appreciate that the method could be embodied in program code. The program code could be supplied in a number of ways, for example on a tangible computer readable medium, such as a disc or a memory or as a data signal or data file (for example, by transmitting it from a server), or it can be stored in the memory of the mobile electronic device 10 and or the memory of the security command point 32.

ADVANTAGES

The system of the present invention has a number of advantages including providing a user wearing or carrying a mobile electronic device of the system with an increased level of safety and security. This can be achieved by establishing a communication channel between the mobile electronic device and a security command point of the system so that audio signals are sent to the security command point but sound is not outputted by the mobile electronic device which could, for instance, be heard and compromise the user's positon in an emergency situation. VARIATIONS

It will of course be realised that while the foregoing has been given by way of illustrative example of this invention, all such and other modifications and variations thereto as would be apparent to persons skilled in the art are deemed to fall within the broad scope and ambit of this invention as is herein set forth.

Throughout the description and claims of this specification the word

"comprise" and variations of that word such as "comprises" and "comprising", are not intended to exclude other additives, components, integers or steps. It is to be understood that, if any prior art is referred to herein, such reference does not constitute an admission that the prior art forms a part of the common general knowledge in the art in any country.