Patent classifications
H04M11/04
Purchase good or service based upon detected activity and user preferences in wireless communication device
Systems, apparatus, and methods are disclosed for accurately identifying one or more mobile thing motion activity (MTMAs; e.g., stationary, walking, running, biking, driving, etc.) associated with a mobile thing (MT; e.g., a person) using sensor data from one or more sensors associated with a wireless communication device (WCD) transported by the MT and for facilitating purchase of a good or service based at least in part upon the one or more MTMAs and one or more predefined user preferences. The sensor data from the one or more sensors (e.g., accelerometer, gyroscope, magnetometer, etc.) is designed to produce data indicative of physical movement of the WCD in three dimensions of a three dimensional (3D) space. In some embodiments, the one or more MTMAs are a plurality of instances of the same MTMA (e.g., a plurality of running sessions) and the purchase of the good or service (e.g., new running shoes) is initiated when a total time duration or total travel distance exceeds a predefined threshold (e.g., 300 hours or 500 miles, respectively), as defined by the WCD user in a predefined preference.
Purchase good or service based upon detected activity and user preferences in wireless communication device
Systems, apparatus, and methods are disclosed for accurately identifying one or more mobile thing motion activity (MTMAs; e.g., stationary, walking, running, biking, driving, etc.) associated with a mobile thing (MT; e.g., a person) using sensor data from one or more sensors associated with a wireless communication device (WCD) transported by the MT and for facilitating purchase of a good or service based at least in part upon the one or more MTMAs and one or more predefined user preferences. The sensor data from the one or more sensors (e.g., accelerometer, gyroscope, magnetometer, etc.) is designed to produce data indicative of physical movement of the WCD in three dimensions of a three dimensional (3D) space. In some embodiments, the one or more MTMAs are a plurality of instances of the same MTMA (e.g., a plurality of running sessions) and the purchase of the good or service (e.g., new running shoes) is initiated when a total time duration or total travel distance exceeds a predefined threshold (e.g., 300 hours or 500 miles, respectively), as defined by the WCD user in a predefined preference.
Method and system for emergency safety checks via payment systems
A method for facilitating a safety check in emergency situations includes: storing a plurality of account profiles, each including a primary account number, account details, and sets of communication data; receiving a transaction message including a specific primary account number and an indication that an associated individual is safe; identifying a specific account profile that includes the specific primary account number; and transmitting a safety notification including the account details stored in the specific account profile the indication of the associated individual's safety for at least one of the sets of communication data stored in the specific account profile.
Method for identifying a portable computing device within a predetermined radius
A method for identifying an unknown portable computing device within a specified radius is completed through a portable computing device and a plurality of communication towers that wirelessly communicate with the portable computing device. When a user of the portable computing device senses danger or an emergency, the user communicates with an arbitrary tower from the plurality of communication towers. The arbitrary tower receives a notification from the portable computing device which triggers the arbitrary tower to scan a radius of influence of the arbitrary tower. After scanning the radius of influence, the arbitrary tower saves a list of identification data for at least one unknown portable computing device. A list of location coordinates and a list of user data is saved along with the list of identification data. Therefore, the list of identification data can be later analyzed to recognize the user of the unknown portable computing device.
METHOD AND SYSTEM FOR AUTOMATICALLY PROVIDING ALTERNATE NETWORK ACCESS FOR TELECOMMUNICATIONS
A communications unit is provided that can be coupled to a building's telecommunication wiring to provide an automated mechanism for isolating the building's wiring from a PSTN, while also providing a telecommunications connection to an alternative communications network via, for example, broadband or cellular networks. The communications unit can further be configured to be coupled to an alarm controller unit of a security system, thereby permitting the security system to communicate with a remote server system without loss of alarm data. The communications unit can also be configured to permit the legacy security system to provide normal disconnect functionality of building telephones from an outgoing telecommunications line while an alarm condition is present.
METHOD AND SYSTEM FOR AUTOMATICALLY PROVIDING ALTERNATE NETWORK ACCESS FOR TELECOMMUNICATIONS
A communications unit is provided that can be coupled to a building's telecommunication wiring to provide an automated mechanism for isolating the building's wiring from a PSTN, while also providing a telecommunications connection to an alternative communications network via, for example, broadband or cellular networks. The communications unit can further be configured to be coupled to an alarm controller unit of a security system, thereby permitting the security system to communicate with a remote server system without loss of alarm data. The communications unit can also be configured to permit the legacy security system to provide normal disconnect functionality of building telephones from an outgoing telecommunications line while an alarm condition is present.
Integration of cellular phone detection and reporting into a prison telephone system
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
Integration of cellular phone detection and reporting into a prison telephone system
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
Method, Computer Program, and System for Monitoring a Being
A method, computer program, and system for monitoring a person in a structure having a first room and a second room. The system includes motion sensors and accelerometers to determine states and activities within the states, respectively. No visual images of any type are used to monitor the person. The person does not need to wear any type of equipment or component or necklace or bracelet or special clothing with any type of equipment or component in order to be monitored by the system.
Alarm notification system
A system and method providing for ascertaining the status of a user and escalating an alarm in the event the user is ascertained to be disposed in a dangerous condition. The of the invention attempts to contact the user at a predetermined check-in time, and notifies a pre-designated third-party which may be an emergency responder such as law enforcement or other emergency contact in the event that the user fails to respond to the check in request or signals that they are in danger using an escalate feature of the invention. The system operates autonomously to notify pre-designated emergency contacts or emergency responders in the case in which a user has been rendered unable to respond. The user may identify specific individuals with whom they plan to meet and the invention may also track the user's geo-location. The invention may also monitor biometric data of the user.