Patent classifications
G08B5/14
System for managing personal safety
A personal safety management system (100) comprising at least one portable communication device (200) communicatively connected to a wireless communication network (400); and a central computing device (500) communicatively connected to the wireless communication network (400). The at least one portable communication device (200) is configured to enable the activation of an alarm condition by a user (700) and transmitting data on the activation of the alarm condition to the central computing device (500). The central computing device (500) is configured to receive the data on the activation of the alarm condition from the at least one portable communication device (200). Furthermore, the central computing device (500) is configured to activate the alarm condition at the end of a predetermined time delay after the activation of a first operating element (210) on the communication device (200). In one embodiment, the portable communication device comprises a second operating element (220) and is configured to input, from the second operating element (220), extension data indicating the extension of the predetermined delay, and to transmit the extension data to the central computing device (500); and the central computing device (500) is configured to extend the predetermined delay based on the extension data.
Doorbell avoidance techniques
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for reducing a likelihood that a doorbell might be used. One of the methods includes determining that a visitor arrived at a premises; determining that the visitor used a computing device at a first time; determining that a user device of a person of the premises received a message at a second time; determining that the first time and the second time both satisfy a timing criteria; and in response to determining that the first time and the second time both satisfy the timing criteria, sending, to the user device, a notification that indicates that the visitor arrived at the premises.
Doorbell avoidance techniques
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for reducing a likelihood that a doorbell might be used. One of the methods includes determining that a visitor arrived at a premises; determining that the visitor used a computing device at a first time; determining that a user device of a person of the premises received a message at a second time; determining that the first time and the second time both satisfy a timing criteria; and in response to determining that the first time and the second time both satisfy the timing criteria, sending, to the user device, a notification that indicates that the visitor arrived at the premises.
DOORBELL AVOIDANCE TECHNIQUES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for reducing a likelihood that a doorbell might be used. One of the methods includes determining that a visitor arrived at a premises; determining that the visitor used a computing device at a first time; determining that a user device of a person of the premises received a message at a second time; determining that the first time and the second time both satisfy a timing criteria; and in response to determining that the first time and the second time both satisfy the timing criteria, sending, to the user device, a notification that indicates that the visitor arrived at the premises.
DOORBELL AVOIDANCE TECHNIQUES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for reducing a likelihood that a doorbell might be used. One of the methods includes determining that a visitor arrived at a premises; determining that the visitor used a computing device at a first time; determining that a user device of a person of the premises received a message at a second time; determining that the first time and the second time both satisfy a timing criteria; and in response to determining that the first time and the second time both satisfy the timing criteria, sending, to the user device, a notification that indicates that the visitor arrived at the premises.