Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SECURITY SYSTEM AND METHOD OF TRANSMITTING DISTRESS SIGNAL
Document Type and Number:
WIPO Patent Application WO/2021/059296
Kind Code:
A1
Abstract:
A method of transmitting a distress signal is disclosed. The method includes receiving a distress signal triggered by a device A (20) at an application server (10) by a security system (50) along with location of the device A (20). Subsequently, the method involves identifying at least one device B (30) present within a predefined distance from the device A (20) by the security system (50). A notification is then transmitted to the at least one device B (30). The notification includes type of distress and distance of the device A (20) from the at least one device B (30). Further, an acknowledgement is received from the at least one device B (30) at the application server (10) by the security system (50). Lastly, the location of the device A (20) is transmitted to the at least one device B (30).

Inventors:
BHAKAT SANJIV (IN)
Application Number:
PCT/IN2020/050818
Publication Date:
April 01, 2021
Filing Date:
September 25, 2020
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
BHAKAT SANJIV (IN)
HERDUM SYSTEMS PRIVATE LTD (IN)
International Classes:
G08B21/02; G08B21/18; G08B25/00; G08C17/02
Foreign References:
US20140118140A12014-05-01
US20180176362A12018-06-21
Other References:
KRISHNA, G . SHRI ET AL.: "Advanced SOS App in Smartphone", JOURNAL OF BASIC AND APPLIED ENGINEERING RESEARCH (JBAER) PRINT, vol. 1, no. 8, 31 October 2014 (2014-10-31), XP055809504, ISSN: 2350-0077, Retrieved from the Internet
Attorney, Agent or Firm:
SHUCHI AGARRWAL, SS INTELLECTUAL PROPERTY NEETI CONSULTANCY LLP (IN)
Download PDF:
Claims:
WE CLAIM:

1. A method of transmitting a distress signal, the method including: receiving a distress signal triggered by a device A (20) at an application server (10) by a security system (50) along with location of the device A (20); identifying at least one device B (30) present within a predefined distance from the device A (20) by the security system (50); transmitting a notification to the at least one device B (30), the notification including type of distress and distance of the device A (20) from the at least one device B (30); receiving an acknowledgement from the at least one device B (30) at the application server (10) by the security system (50); and transmitting the location of the device A (20) to the at least one device B (30).

2. The method of transmitting a distress signal as claimed in claim 1 wherein the security system (50) is hosted on the application server (10).

3. The method of transmitting a distress signal as claimed in claim 1 wherein the device A (20) includes an electronic device of a victim.

4. The method of transmitting a distress signal as claimed in claim 1 wherein the device B (30) includes an electronic device of a subscriber.

5. The method of transmitting a distress signal as claimed in claim 1 wherein the identifying at least one device B (30) within the predefined distance includes detecting at least device B (30) within a range of 5 m to 5 km from the device A (20).

6. The method of transmitting a distress signal as claimed in claim 1 wherein the identifying at least one device B (30) includes detecting the at least device B (30) of a pre-configured subscriber category.

7. The method of transmitting a distress signal as claimed in claim 1 wherein the method includes receiving a message from the device A (20) indicating the victim is out of danger.

8. The method of transmitting a distress signal as claimed in claim 1 wherein the method includes enhancing the predefined distance in case of absence of receipt of the acknowledgement from the at least one device B (BO) within a predefined time period and identifying and transmitting the notification to at least one new device B (30).

Description:
SECURITY SYSTEM AND METHOD OF TRANSMITTING DISTRESS SIGNAL

FIELD OF INVENTION

[001] The present invention relates to a security system and a method thereof. More specifically, the present invention relates to a method of transmission of distress signals at the time of emergency situations.

BACKGROUND

[002] For decades, many innocent individuals have found themselves victims of crime. The nature of the threats and/or crime varies from minor wrongdoing, such as theft to stalking, verbal assault, threatening behaviour, locational situation such as disturbances, accident etc., and violent assault such as rape or murder. Such individuals mostly include women/girls, kids and/or elderly who are at a risk of being attacked or feels threatened.

[00S] In order to address the above problem, various methods have been devised for individuals to initiate emergency help when in such situations. With advancements in communication technologies and a grave need for efficient systems, such systems/methods have grown exponentially.

[004] However, in circumstances where an individual is being attacked or individual feels imminent threat / feels vulnerable, chances are unlikely that the victim will be able to access their mobile device and reach out for help. On the other hand, the attacker may seize such deterrents including the mobile device, thus leaving the victim without many options to reach out for assistance.

[005] Even if the user somehow manages to send a distress signal from the device to a predefined group of helpers, the helpers might not be present near the user for effective intervention and thus the user may be left unattended at the time of any distress.

[006] Further, the conventional systems do not provide any provision to ensure the physical presence of the helpers for helping the victim. Further, the conventional systems are incapable of authenticating the intentions of the helpers. Hence, the identity of the helpers as well as their intention to help remains questionable.

[007] Therefore, in accordance to the problems mentioned above, there is a need for a simple, inconspicuous, automated system and a method to seek help in the event of a threatening situation. SUMMARY

[008] The present invention discloses a security system and a method of transmitting a distress signal using the same. The said method entails various steps such as receiving a distress signal triggered by a device A (20) at an application server (10) by a security system (50) along with location of the device A (20). Subsequently, the method involves identifying at least one device B (30) present within a predefined distance from the device A (20) by the security system (50). A notification is then transmitted to the at least one device B (30). The notification includes type of distress and distance of the device A (20) from the at least one device B (30). Further, an acknowledgement is received from the at least one device B (30) at the application server (10) by the security system (50). Lastly, the location of the device A (20) is transmitted to the at least one device B (30).

BRIEF DESCRIPTION OF THE DRAWINGS

[009] The summary above, as well as the following detailed description of illustrative embodiments, is better understood when read in conjunction with the appended drawings. For the purpose of illustrating the present disclosure, exemplary constructions of the disclosure are shown in the drawings. However, the disclosure is not limited to specific methods and instrumentalities disclosed herein. Moreover, those in the art will understand that the drawings are not to scale.

[0010] FIG. 1A illustrates a network of connected devices in accordance with an embodiment of the present invention.

[0011] FIG. IB illustrates an alternate embodiment of a network of connected devices in accordance with an embodiment of the present invention.

[0012] FIG. 1C illustrates a yet another embodiment of a network of connected devices in accordance with an embodiment of the present invention. [0013] FIG. 2 illustrates various modules possessed by the security system of the present invention.

[0014] FIG. 3 indicates a flowchart including all steps involved in performing safety measures by an individual in accordance with an embodiment of the present invention.

DETAILED DESCRIPTION OF THE DRAWINGS [0015] Methods and systems for transmitting one or more distress signals triggered by a victim to one or more subscribers are disclosed. It should be noted that the term 'victim' in the following present invention corresponds to an individual who is in danger or foresees immediate danger. More specifically, 'victim' relates to individuals / persons who feel threatened / oppressed due to threats and / or crime varying from minor wrongdoing, such as stalking, verbal assault, threatening behaviour, locational situation such as disturbances, accident etc. , violent assault such as rape or murder. The term 'subscriber' corresponds to an individual who volunteers for helping the victim at the time of distress. The subscribers in the present invention are classified into different categories including, but not limited to security guards, organised neighbourhood watch organisations, policemen, doctors, family, friends, good Samaritans, public etc.

[0016] The following description is presented to enable any person skilled in the art to make and use the invention. For purposes of explanation, specific nomenclature is set forth to provide a thorough understanding of the present invention. Descriptions of specific applications are provided only as examples. Various modifications to the preferred embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.

[0017] The embodiments are described below with reference to block diagrams and/or data flow illustrations of methods, apparatus, systems, and computer program products. It should be understood that each block/module of the block diagrams and/or data flow illustrations, respectively, may be implemented in part by computer program instructions, e.g., as logical steps or operations executing on a processor in a computing system. These computer program instructions may be loaded onto a computer, such as a special purpose computer or other programmable data processing apparatus to produce a specifically-configured machine, such that the instructions which execute on the computer or other programmable data processing apparatus implement the functions specified in the data flow illustrations or blocks/modules.

[0018] These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including computer-readable instructions for implementing the functionality specified in the flowchart block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions that execute on the computer or other programmable apparatus provide operations for implementing the functions specified in the data flow illustrations or blocks.

[0019] Accordingly, modules of the block diagrams and data flow illustrations support various combinations for performing the specified functions, combinations of operations for performing the specified functions and program instructions for performing the specified functions. It should also be understood that each module of the block diagrams and flowchart illustrations, and combinations of modules in the block diagrams and flowchart illustrations, can be implemented by special purpose hardware-based computer systems that perform the specified functions or operations, or combinations of special purpose hardware and computer instructions or standard off the shelf products with on board processing / computing capability that may meet requirements.

[0020] Further, applications, software programs or computer readable instructions may be referred to as components or modules. Applications may be hardwired or hardcoded in hardware or take the form of software executing on a general purpose computer such that when the software is loaded into and/or executed by the computer, the computer becomes an apparatus for practicing the invention, or they are available via a web service. Applications may also be downloaded in whole or in part through the use of a software development kit or a toolkit that enables the creation and implementation of the present invention. In this specification, these implementations, or any other form that the invention may take, may be referred to as techniques. In general, the order of the steps of disclosed processes may be altered within the scope of the invention.

[0021] Referring now to the drawings, FIG. 1A is a system 100 configured as a client/server architecture used in an embodiment of the present invention. A "client" is a subscriber of a class or group that uses the services of another class or group to which it is not related. In the context of a computer network, such as the Internet, a client is a process (i.e. roughly a program or task) that requests a service which is provided by another process, known as a server program. The client process uses the requested service without having to know any working details about the server program or the server itself. In networked systems, a client process usually runs on a computer that accesses shared network resources provided by another computer running a corresponding server process.

[0022] A "server" is typically a remote computer system that is accessible over a communication medium such as the Internet. The client process may be active on a second computer system, and communicate with the server process over a communication medium that allows multiple clients to take advantage of the information-gathering capabilities of the server. Thus, the server essentially acts as an information provider for a computer network.

[0023] In FIG. 1A, the system 100 for practicing the teachings of the present disclosure, as per an embodiment, includes an application server 10 equipped with a security system 50, a device A 20 and at least one device B 30, any of which exchange data through network 40.

[0024] The application server 10 may host a security system 50 which obtains inputs from the device A 20 and/or device B 30 and further processes the obtained inputs. In an embodiment, the application server 10 may be a cloud based server. In another embodiment, the application server 10 may be a remote computer system having processing capability required for the security system 50.

[0025] The security system 50 is capable of performing and mediating all functionalities, operations and methods of the present disclosure. The security system 50 includes various modules as provided in FIG. 2. The said modules of the security system 50 mediate transmission of one or more distress signals triggered by the device A 20 (victim) to at least one device B 30 (subscriber). Further, as an embodiment shown in FIG. 1C, the application server 10 may additionally serve to activate one or more alert devices 60 when the device A 20 triggers one or more distress signals.

[0026] The device A 20 of the present invention corresponds to an electronic device which may be held by the victim or in vicinity of the victim. The electronic devices may be any conventional known devices such as without limitation, a laptop, a handheld device as a smartphone, a personal digital assistant (PDA), a tablet, etc., a wearable device like a smart watch, a NFC device, etc.

[0027] The device A 20 may communicate with the application server 10 when the victim foresees danger or at the time of emergency such as physical assault, rape, theft, health issue, etc. The victim may trigger one or more distress signals directly via the device A 20. In an embodiment, the device A 20 includes a specialized button or icon for activating the distress signal. Alternately, the device A 20 may be in communication with another device such as a wearable gadget 20a as shown in FIG. IB. In an embodiment, the victim triggers the distress signal(s) indirectly via voice activation or by pressing a push button provided with the said wearable gadget 20a.

[0028] In an embodiment, the device A 20 transmits details such as location co-ordinates, secure ID, date, time, etc. to the application server 10 on activation of distress signals. The location may be transmitted once or in real-time at regular intervals, say, 30 seconds. As an additional embodiment, the device A 20 is capable of transmitting a message to the application server 10 once the victim is out of danger. In an embodiment, the said message is only transmitted through a password or a pass key to ensure deliberate stand down after due authentication and to ensure that only the victim relays the message and not any passerby.

[0029] The device A 20 may include one of, a GPS receiver, a Wi-Fi positioning data device, or other equivalent means which are capable of determining the location of the device A 20. In an embodiment, the device A 20 may receive global positioning system (GPS) data from one or combination of global navigation satellite system (GNSS), GLONASS, Galileo or Beidou, etc. and process the received data to produce location coordinates.

[0030] The device A 20 may transmit such details via the network 40 or combination of networks 40 such as cellular network or other packet switched network such as Wi-Fi, Internet, Bluetooth etc. to the application server 10.

[0031] In addition to the above, an application corresponding to the security system 50 may be installed on the device A 20 which aids the victim to provide one or more inputs. The application may be downloaded from the internet, android marketplace, etc.

[0032] In an embodiment, the one or more inputs include selection of preferred category of subscriber(s) out of the plurality of subscriber categories. The victim may select the said preferred subscriber category (ies) at the time of the emergency situation or may pre-select the preferred subscriber category(ies).

[0033] The one or more device(s) B 30 may correspond to one or more electronic devices of the one or more subscribers of the present invention. The electronic devices may be any conventional known devices such as without limitation, a laptop, a handheld device as a smartphone, a personal digital assistant (PDA), a tablet, etc., a wearable device like a smart watch, a NFC device, etc.

[0034] An application corresponding to the security system 50 may be installed on the device B 30 which may be similar or different to the one installed on the device A 20. The application may be accessed through a user interface provided with device A 20 and/or device(s) B 30. The device(s) B 30 may include one or more processors, memories, input/output devices, and a network interface, such as a conventional modem. Further, like the device A 20, the device(s) B 30 may include location detection capability for example, a GPS receiver, assisted GPS, Wi-Fi networks, etc. The device(s) B 30 may communicate with the application server 10 via network 40 bi-directionally.

[0035] The network 40 may include, without limitation, internet, a local area network, a wide area network and/or a wireless network. The network 40 may include copper transmission cables, optical transmission fibres, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.

[0036] The one or more alert devices 60 as shown in FIG. 1C may include any conventionally known audio and/or visual indicator. It should be noted that other type of conventionally known alert devices are also within the scope of the present invention. In an embodiment, each of the alert devices 60 is an audio-visual indicator which includes a coloured light emitting diode (or other such devices) and capable to produce a predefined sound at a predefined decibel. The coloured light and the predefined sound may be produced simultaneously or consecutively.

[0037] The alert device(s) 60 may be a conventional stand-alone device that is self-powered and re-chargeable. The alert device (60) is so powered that it is capable of sustaining its functionality for longer period of time.

[0038] Further, the alert device (60) may be hermetically sealed and have a water proof enclosure. In an embodiment, the alert device (60) is capable of enduring ambient temperature exceeding 55 deg C and not lower than minus 15 deg C (depending on the ambient conditions in the user area). [00B9] The alert devices 60 may be installed in various buildings such as schools, hospitals, office spaces and/or public vehicles such as cabs, buses, etc.

[0040] As an exemplary embodiment, the alert devices 60 may be activated by the security system 50 i.e. emit light and produce sound, only when the device A 20 triggers one or more distress signals. In an embodiment, only those alert devices 60 which lie in close proximity of the device A 20 are activated. It must be noted that the term 'close proximity' in the aforesaid statement refers to 5 to 500 m or a distance that may be defined by the server / user / administrator. The said range may vary depending upon whether the device is mounted on a static body or on a moving body such as a vehicle.

[0041] Thus, the presence of alert device 60 and activation thereof enhance the chances of immediate help by making all individuals present in the vicinity of the device A 20, aware of the emergency situation of the victim.

[0042] FIG.2 illustrates the plurality of modules of the security system 50. The said modules of the security system 50 may include a geo-location module 210, a distance determination module 220, a notification module 230, an acknowledgement module 240 and a database module 250. Though the description mentions the explicit presence of the aforesaid modules, it must be noted that the security system 50 may include various other modules depending upon the functions performed by the security system 50.

[0043] The said geo-location module 210 may receive location co-ordinates from the device A 20 and/or the device(s) B 30. The geo-location module 210 may receive the location co ordinates in real-time or as per configured durations, e.g. 2 minutes or at a configured instance, say, when the victim triggers the one or more distress signals.

[0044] The distance determination module 220 may work using location obtained via the geo location module 210 to calculate the distance between the location co-ordinates of the device A 20 and the device(s) B 30. Post calculation, the distance determination module 220 compares the calculated distance between the device A 20 and the device(s) B 30 with a threshold value. In an embodiment, the distance determination module 220 segregates the device(s) B 30 for which the calculated distance is less than or equal to the threshold valve. As an exemplary embodiment, the threshold value is 5 kms.

[0045] The notification module 230 is configured to trigger one or more notifications to the device A 20 and/or device B 30. The notifications may be in the form of a short messaging service (SMS), a push notification (alert or update), a phone call via server and/or other forms of electronic communications with or without a unique ringtone or alert on the subscriber's device.

[0046] The acknowledgement module 240 is configured to seek as well as manage one or more acknowledgements from the device(s) B 30. In an embodiment, the acknowledgements are sought from the device(s) B 30 which have been segregated by the distance determination module 220. The said acknowledgements are provided by the associated subscribers of the segregated device(s) B 30 who are willing to help the victim. Therefore, an 'acknowledgement' in the present invention corresponds to a confirmation sent at the time of the emergency situation by one or more subscribers present in the vicinity of the victim assuring to help the victim.

[0047] The database module 250 is equipped to store all details of the victims and the subscribers associated with the security system 50. The details of the victim may include name, address, selected categories of subscribers, location etc. Likewise, the details of the subscribers include name, address, category, criminal background, location, etc.

[0048] The database module 250 may further store various inputs received from the device A 20 and the device(s) B 30. The database module 250 also includes one or more look up tables of features that the victim may have subscribed. The list of features includes without limitation type of notifications, categories of subscribers, etc.

[0049] Optionally/Additionally, the security system 50 may include an alert activation module (not shown). The alert activation module may be configured to activate the one or more alert devices 60 once the distress signals are triggered by the device A 20.

[0050] Now referring to FIG.3, a flowchart entailing the steps involved in transmission of the distress signals via security system 50 is disclosed. It should be noted that though the present invention may be used for various applications as provided above, the following steps disclose the use of security system 50 at the time of say, physical attack.

[0051] At step 301, a distress signal is triggered by the victim via the device A 20. Alternately, the distress signal may be triggered by the victim using a wearable gadget 20a through a wired or wireless circuitry. In such a case, the trigger of the distress signal by the victim through the wearable gadget 20a first activates the device A 20 by establishing a communication via a communication protocol but not limited to Bluetooth, RFID, NFC, WiFi etc. Subsequently, the device A 20 interacts with the application server 10 via the network 40.

[0052] In an embodiment, the victim may trigger the distress signal by pressing a button, say SOS button, speaking a keyword, etc.

[0053] At step 303, as soon as the distress signal is triggered by the device A, the distress signal is transmitted to the security system 50 along with the location of the victim (or device A 20). The location of the device A 20 may be transmitted in real time, say, in every 30 seconds up to 5 minutes.

[0054] At step 305, once the application server 10 receives the distress signal and the location of device A, the security system 50 refers the database module 250 in order to identify the details of any category of subscribers which have to be mandatorily intimated about the distress (or emergency situation) say, family category. Subsequent to the same, the application server 10 immediately transmits the details of the victim, location and the type of distress to the devices B 30 of family category irrespective of their distance from the device A 20.

[0055] Based upon the location of the victim, the security system 50 establishes a communication with the devices B 30 which are present within a range of 5m to 5 km (depending on user / victim choice) with respect to the device A 20. The distance determination module 220 of the security system 50 identifies and segregates such devices B 30 which are placed in vicinity of the device A 20 (nearby devices B 30). In case, there are no devices B 30 present in the said range, the range may be increased by, for example, 10 km to identify devices B 30 which lie within such range.

[0056] As an optional/additional step 307, on receiving the distress signal(s) and the location of device A, the security system 50 activates all alert devices 60 present in a distance of 100m from the location of device A 20. The said distance is calculated by the distance determination module 220. The said step may be simultaneously take place with the step 305 or may be preceded/followed by step 305.

[0057] At step 309, the security system 50 subsequently transmits a notification to each of the identified devices B 30 via the notification module 230. Hence, each of the subscribers are notified about the emergency situation irrespective of their categories. Alternately, the security system 50 may transmit notifications to defined categories of the subscribers which may either be pre-selected by the victim or selected in real-time. [0058] In an embodiment, the notification may include the type of danger, urgency thereof, distance of the device A from the device B, etc. However, the notification may not include identity of the victim, location of the victim, etc. Such contents of the notification eliminate the risk of transmitting information of the user to non-genuine subscribers with ill intentions.

[0059] At step 311, the acknowledgement module 240 seeks acknowledgement from the notified devices B 30 of the step 309. The acknowledgment corresponds to a confirmation from the subscriber that the subscriber is willing to help the victim. The subscribers may provide their acknowledgement via a user interface provided with the corresponding devices. Alternately, the acknowledgement may be provided by speaking few predefined words on the microphone say, 'Ready to help', or pressing a button, etc. In case, the acknowledgement module 240 does not receive any acknowledgement from any of the notified devices B 30, the device may resend the notification in a predefined time say every 30 seconds till an acknowledgement is received.

[0060] At step 313, as soon as the acknowledgement module 240 receives an acknowledgement from at least one of the devices B 30, the geo-location module 210 transmits the location of the victim to the said device(s) B 30.

[0061] In an embodiment, once the acknowledgement module 240 receives the acknowledgement from any of the nearby devices B 30, the details of the subscriber(s) who has volunteered to help is saved in the database module 250. Such a provision helps to create an audit trail of such subscribers to recognise, reward and/or seek evidence from and /or eliminate from list of subscribers based on particular subscriber's behaviour at the point of rendering assistance.

[0062] At step 315, the device A 20 is notified about the details of the subscriber(s) of the device(s) B 30 who are willing to help and hence, the victim may be rescued from the emergency situation by genuine and authentic subscribers.

[0063] The above disclosed method of the present invention ensures efficient transmission of the distress signals in real-time so that the victim may be provided with immediate help at the time of emergency situation. Further, the present invention reduces any risk of further mishappenings which may arise due to transmission of distress signals to the subscribers having ill intentions or non-authentic or non-genuine subscribers.

[0064] The present invention is explained with the help of the below examples: [0065] Example 1: A victim senses an attack by a group of goons and triggers a distress signal via device A 20. Once the device A 20 establishes a communication with the application server 10, the distress signal is transmitted to the security system 50 along with the location of the device A 20. The security system 50 receives the distress signal as well as the location of the device A and queries the database module 250 in order to identify the details of the subscribers listed in the family category. At the time of receiving the distress signal, the database module 250 of the security system 50 includes the following information:

TABLE 1

[0066] The application server 10 immediately transmits the details of the victim, location and the type of distress to the devices B 30 of family category (Bl, B2, B3) irrespective of their distance from the device A 20 as provided in the database module 250.

[0067] The security system 50 then identifies nearby devices B 30 which are present in a range of 5 m to 5 km with respect to the device A 20. The security system 50 detects eight nearby devices B BO in total which include two nearby devices B 30 in policemen category (B4, B5), three nearby devices B 30 in doctor category (B6, B7, B8) and the remaining three nearby devices B 30 belonging to security guards (B9, B10, Bll) as provided in table above.

[0068] On identifying such nearby devices B 30, the security system 50 transmits a notification to all the eight nearby devices B 30 (irrespective of their categories) seeking an acknowledgement from at least one of the devices B 30 for helping the victim. The notification includes the type of danger i.e. attack by a group of people and the distance between the device A 20 and the respective devices B 30.

[0069] The application server 10 then receives acknowledgements from three nearby devices B 30 (B4, B6, B9) as shown in Table 1 below. Thereafter, the security system 50 transmits the exact location of the device A 20 and the identity of the victim to the said devices B 30 that have acknowledged to help the victim.

[0070] Further, the details of the said three devices B 30 are communicated to the victim via a text.

[0071] Example 2: A victim is attacked by a group of goons and triggers a distress signal via device A 20. Once the device A 20 establishes a communication with the application server 10, the distress signal is transmitted to the security system 50 along with the location of device A 20.

[0072] The security system 50 receives the distress signal as well as the location of the device A and refers the database module 250 in order to identify the details of subscribers of family category. Subsequent to the same, the security system 50 immediately transmits the details of the victim, location and the type of distress to the devices B 30 of family category (B12, B13) irrespective of their distance from the device A 20.

[0073] The security system 50 then identifies nearby devices B 30 which are present in a range of 5 m to 5 km with respect to the device A 20. The security system 50 detects five nearby devices B 30 in total which include two nearby devices B 30 (B14, B15) belonging to the category of policemen while three nearby devices B 30 (B16, B17, B18) are of doctors category.

[0074] As the victim had pre-configured the type of category of subscribers for help as doctors category only, the security system 50 transmits a notification to the three nearby devices B 30 of doctor category (B16, B17, B18), seeking an acknowledgement from at least one of the nearby devices B 30 for helping the victim. The notification includes the type of danger i.e. attack by a group of people and the distance between the device A 20 and the respective devices B BO. However, none of the three devices B 30 sends any acknowledgement as represented in Table 2 below:

TABLE 2 [0075] Thereafter, the range is increased to 10 km and the security system 50 starts to identify the devices B 30 present within the said range. The security system 50 detects the presence of three devices B 30 of doctor category (B19, B20, B21) and hence, the notifications were sent to each of the said devices B 30 (B19, B20, B21) by the security system 50.

[0076] The application server 10 receives an acknowledgement from one nearby devices B 30 for helping the victim. Subsequently, the security system 50 shares the details of the said nearby devices B 30 with the victim on device A 20.

[0077] Subsequently, the security system 50 transmits the details of the victim i.e. identity and exact location of the device A 20 to the device B 30 (B20) that has acknowledged to help the victim. The same is tabulated below in Table 3: TABLE 3

[0078] Various additional features can be provided to the above security system and method thereof. For example, audio alarms, flashing lights, activation of immobilisers, etc.

[0079] The foregoing description of preferred embodiments of the present disclosure provides illustration and description, but is not intended to be exhaustive or to limit the disclosure to the precise form disclosed. Modifications and variations are possible in light of the above teachings or may be acquired from practice of the disclosure.

[0080] No element, act, or instruction used in the description of the present disclosure should be construed as critical or essential to the invention unless explicitly described as such. Also, as used herein, the article "a" is intended to include one or more items. Where only one item is intended, the term "one" or similar language is used.