Sign In to Follow Application
View All Documents & Correspondence

A System And Method Of M2 M Cloud Based Emergency Communication Network

Abstract: Abstract The present invention provides devices-out the extended coverage, emergency alarm, location services, audio response and video response. Further, the invention defines all the communication networks, electrical networks includes a transmitter and receiver which has the dedicated protocol and acts only in case of any surrounding person suffers due to emergency.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
02 April 2014
Publication Number
52/2015
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
afsar@krishnaandsaurastri.com
Parent Application

Applicants

Nichehands Technologies Pvt Ltd
748, Sai Nilaya, 8th B Main Road, 21st Cross Rd, 7th Sector, HSR Layout, Bangalore, Karnataka 560102.

Inventors

1. Natarajan Sengodagounder
Nichehands Technologies Pvt Ltd 748, Sai Nilaya, 8th B Main Road, 21st Cross Rd, 7th Sector, HSR Layout, Bangalore, Karnataka 560102.

Specification

CLIAMS:. ,TagSPECI:
FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENTS RULES, 2003

PROVISIONAL SPECIFICATION
(See section 10, rule 13)

“A System and Method of M2M Cloud based Emergency Communication Network”

By
Nichehands Technologies Pvt Ltd
748, Sai Nilaya, 8th B Main Road, 21st Cross Rd,
7th Sector, HSR Layout, Bangalore, Karnataka 560102.

The following specification particularly describes the invention.

Field of the Invention

The present invention relates generally to the field of wireless communication systems. More particularly, in one exemplary aspect, the present invention is directed to the transmission of emergency or similar call data within a wireless network using a protocol which enables emergency communication protocol which makes 99.9% availability at all time.

Background – Problem Statement
. Historically the primary responsibility for personal protection has always fallen on the individuals. This is true regardless of the community where one lives. Police agencies have been unable to protect everyone. Today, many innocent people find themselves victims of crime. The nature of the crime varies from minor misdemeanors, such as theft, to violent assault, such as rape or murder. Typically, the victim of a crime is physically unable to prevent or deter an attack.

There are a large number of personal safety devices currently available. Personal protection devices such as chemical sprays, for example, pepper sprays, audible personal security alarms, and stun guns, when used properly, all have a deterrent effect on an aggressor without the consequences associated with a firearm. These devices, however, have limitations and can proved to be ineffective depending upon the circumstances. Chemical sprays and audible alarms have their advantages and disadvantages. Chemical sprays generally offer a user the advantage of deterring an assailant at a distance of as much as 10 to 15 feet, as well as giving notice to the assailant that the user is not totally defenseless. However, a chemical spray is of no use when the assailant covers his eyes with eyeglasses. Audible alarms on the other hand when used as a standalone device has lost its usefulness, since most people in the metropolitan city areas no longer pay attention to such sound generated devices. Moreover, as such, many people have resorted to carrying lethal weapons, such as hand guns. However, in certain jurisdictions, a person is forbidden by law to possess or use a lethal weapon.

Recent advances in mobile computing and wireless technology have transformed traditional mobile phones into invaluable tools that help users with not only communicating with others, but also with managing all aspects of their personal lives and business activities. Mobile devices are increasingly being used for personal safety management as well, where mobile devices can be used to capture evidence, thwart potential perpetrators, and transmit an alarm for help.

However, mobile phones are very visually intensive devices, whereby users must look at the device in order to manipulate it. It is very difficult for current mobile devices to be correctly operated while the devices are concealed. A user cannot normally discern the current state of the device without looking at it, and therefore cannot be sure as to the current location or state of various on-screen buttons and controls at any given time. This makes it difficult to control the device while it is one's pocket, or while one is engaged in a situation or task that prevents one's ability to look at the device. Even, considering that the person is successful in operating the phone, the problems associated may be the mobile devices has limitation in coverage, secondly the device has limitation in battery capacity, thirdly size of the mobile device and also having the limitation in technologies to interoperability. Even the signal from the mobile device has triggered, one should get the help in time. All the presently available solutions doesn’t solve problem associated with the limitation of communication network range, coverage, quick response etc.

Therefore, there is a need for systems and methods that overcome the deficiencies as mentioned above and provides a simple, inconspicuous, and easy-to-use means to seek help in the event of a threatening situation, and which addresses the above-mentioned drawbacks of traditional systems.

Solution
The solution is to develop the protocol which enables emergency communication protocol which makes 99.9% availability at all time and also to solve the deficiency in the present system like communication network range, coverage, quick response. The novel solution provides devices-out the extended coverage, emergency alarm, location services, audio response and video response. Further, the solution defines all the communication networks, electrical networks includes a transmitter and receiver which has the dedicated protocol and acts only in case of any surrounding person suffers due to emergency. Any kind of communication, electronic systems surrounded the victims will get the emergency signal transmitted by means of biometric, voice and or video data directly to the care taker, and or nearby human’s and or nearby machine’s to get their help. The signals can be collected from any kind of apparels associated with human body or the system or installation under emergency. Once the data collected from the device it broadcast to all nearby communication and or electronic devices. It could be mobile phone, laptop, base stations or any other communication device. These communication devices will do have emergency support protocol that transparently receive the signal, and classifies the data, send to the network it connected. The kind of emergency got classified into multiple types and certain types it creates alarm in the nearby device with alarm type, emergency category and location of victim. By using this, the help can arrive from care taker and nearby human or machines. The Processing of the user data will be cloud based processing.
Working
1. This idea makes use of all the electronics devices are close-by.
2. This idea makes all the electronics devices will have common frequency to use transmit & receive the emergency signals
3. This dedicated frequency transmitter will be activated once there is an emergency.
4. The receiver always in sniffer mode to save the power and not creating interference with surrounding networks.
5. The transmitter once comes to active, it broadcast the nature of emergency, audio and video to all.
6. The receiver fitted into all the neighbors will listen this broad cast signal & start interacting with the victim’s device.
7. The victim’s device can be transceiver or only the transmitter. If its transceiver, then the neighbor devices can query the informations to get more data if need and If the victims device is only the transmitter then it sends the predefined or processed data.
8. The communication can work as point to point or point to multi-point to reach through the care taker.
9. The protocol will be running in technology agonistic way.

Inventive Concept
• A protocol in all the electronic and communication network which has the transmitter and receiver.
• A method which operates once the emergency signal is received from the nearby device, which started listening to the device and re-send it to caretaker.
• A emergency signal which consists of nature of emergency, location of victim, optional biometric data, audio and video data.
• A method to create alarm based on the emergency.
• An alarm created in the victims own device, nearby devices and caretaker.
• A method in ad-hoc fashion to transmit the signal to longer distance
• A method to receive the care-taken help to nearby devices closer to the victim.
• A method to automatically collects and sends the victims previous data to the nearby devices
• A protocol involved new protocol or existing communication protocol to offer as service.
• A protocol or application which always meant to run in all electronics devices which has full transmitter & receiver capability or only receiver capability.

Abstract
The present invention provides devices-out the extended coverage, emergency alarm, location services, audio response and video response. Further, the invention defines all the communication networks, electrical networks includes a transmitter and receiver which has the dedicated protocol and acts only in case of any surrounding person suffers due to emergency.

Documents

Application Documents

# Name Date
1 Provisional Application - Safety over protocol.pdf 2014-04-02
2 FORM 5.pdf 2014-04-02
3 FORM 3.pdf 2014-04-02
4 1785-CHE-2014 FORM-2 06-04-2015.pdf 2015-04-06
5 1785-CHE-2014 DRAWINGS 06-04-2015.pdf 2015-04-06
6 1785-CHE-2014 DESCRIPTION(COMPLETE) 06-04-2015.pdf 2015-04-06
7 1785-CHE-2014 CORRESPONDENCE OTHERS 06-04-2015.pdf 2015-04-06
8 1785-CHE-2014 CLAIMS 06-04-2015.pdf 2015-04-06
9 1785-CHE-2014 ABSTRACT 06-04-2015.pdf 2015-04-06
10 abstract-1785-CHE-2014.jpg 2015-04-17
11 1785-CHE-2014-FER.pdf 2019-10-17

Search Strategy

1 2019-10-1711-00-53_17-10-2019.pdf