MULTI-ALERT SECURITY MESSAGING SYSTEM
20220284785 · 2022-09-08
Inventors
Cpc classification
H04W4/90
ELECTRICITY
H04W12/66
ELECTRICITY
International classification
G06F21/62
PHYSICS
Abstract
A method disclosing a multi-alert security messaging system is disclosed. The method includes receiving, by a computing system, an authorization request message from a user equipment (UE), the authorization request message including a set of identification credentials, wherein the identification credentials identify a user, a device, and a location. The method includes performing, by the computing system, a validation process via one or more databases, to determine if the identification credentials are valid, and meet an authorization clearance level. The method includes sending, via the computing system an in-session indication, to a host device. The method includes monitoring at the host device an alert trigger from the UE, based on one or more priority values. The method includes sending at least one alert message from the UE, associated with one or more alert triggers to the host device. The method includes alerting a second device of the one or more alert triggers received from the UE.
Claims
1. A method comprising: receiving, by a computing system, an authorization request message from a user equipment (UE), the authorization request message including a set of identification credentials, wherein the identification credentials identify a user, a device, and a location; performing, by the computing system, a validation process via one or more databases, to determine if the identification credentials are valid, and meet an authorization clearance level; sending, via the computing system an in-session indication, to a host device; monitoring at the host device an alert trigger from the UE, based on one or more priority values; sending at least one alert message from the UE, associated with one or more alert triggers to the host device; and alerting a second device of the one or more alert triggers received from the UE.
2. The method of claim 1, further comprising: receiving, by the computing system, an authorization request message from the host device, the authorization request message including a set of identification credentials.
3. The method of claim 1, wherein the at least one alert message includes information regarding each of the one or more alert triggers.
4. The method of claim 1, further comprising: determining, by the computing system, priority values corresponding to the one or more alert triggers satisfied by the transaction; determining, by the computing system, a priority of the multiple alert triggers based on the priority values corresponding to the one or more alert triggers; and generating, by the computing system, one or more alert messages based on the priority of the one or more alert triggers to send to one or more additional user equipments (UEs).
5. The method of claim 1, wherein the priority value for each of the alert triggers is predetermined by an issuer.
6. The method of claim 1, further comprising: tracking each of the one or more alert triggers; and storing the priority values of each of the one or more alert triggers in a storage.
7. The method of claim 1, wherein the one or more alert triggers includes a set of identification information including one or more of a location-based value, a time of day-based value, a room number value, a user identification value, an alert level value and a threshold value.
8. The method of claim 1, wherein the computing system is coupled to a processing network having an enrollment database in the storage, that contains a list of account identifiers enrolled in the computing system.
9. The method of claim 8, wherein the authorization request message is received by the computing system in response to the processing network determining a matching account identifier.
10. The method of claim 8, wherein the authorization request message includes one or more of a username, a password, a user ID, and a location.
11. The method of claim 1, wherein the one or more alert triggers indicate one or more indications selected from call my phone, knock on door, help emergency, and cancel request.
12. The method of claim 1, wherein the host device is configured to: access one or more active session relating to a plurality of user equipments (UEs); send a request to a user in possession of one of the plurality of UEs; receive a notification from one of the plurality of UEs; sound an alarm; determine security compliance based on one or more of a predetermined security values and the Health Insurance Portability and Accountability Act (HIPAA); or communicate with one or more emergency alert services.
13. A system for multi-alert security messaging, the system comprising: receiving, an authorization request message from a user equipment (UE), the authorization request message including a set of identification credentials; performing, by the computing system, a validation process via one or more databases, to determine if the identification credentials are valid, and meet an authorization clearance level; sending, via the computing system an in-session indication, to a host device; monitoring at the host device an alert trigger from the UE, based on one or more priority values; sending at least one alert message from the UE, associated with one or more alert triggers to the host device; and alerting a second device of the one or more alert triggers received from the UE.
14. The system of claim 1, wherein the identification credentials identify a user, a device, and a location.
15. The system of claim 1, wherein the UE is configured to display a user enabled mobile application.
16. The system of claim 15, wherein the mobile application comprises of a web-based service accessed by the user through the Internet.
17. The system of claim 15, wherein the mobile application is configured to send a plurality of messages to one or more other user equipments (UEs), the plurality of messages including one or more alerts.
18. The system of claim 17, wherein the one or more alert triggers indicate one or more indications selected from call my phone, knock on door, help emergency, and cancel request.
19. The system of claim 13, further comprising a physical memory storing instruction and the one or more alert triggers.
20. The system of claim 19, wherein the memory is configured to: receive a request from the UE for the one or more alert triggers or location information of a mobile device amongst a plurality of mobile devices, submitting the one or more alert triggers; authenticate the request from the UE as being from a UE that is subscribed to the system as a result of an authorization clearance level being met; and transmit the one or more alert triggers or location information to the UE.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0025] Disclosed herein are embodiments of a multi-alert security messaging system. The accompanying figures are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification. The figures illustrate embodiments of the invention and, together with the description, serve to explain the principles of the invention.
[0026] The foregoing and other objects, aspects, features, and advantages of the disclosure will become more apparent and better understood by referring to the following description taken in conjunction with the accompanying drawings, in which:
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033] Elements in the figures are illustrated for simplicity and clarity and have not been drawn to scale. For example, the dimensions and/or relative positioning of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of various embodiments of the present invention.
[0034] Also, common but well-understood elements that are useful or necessary in a commercially feasible embodiment are often not depicted in order to facilitate a less obstructed view of these various embodiments of the present invention. Certain actions and/or steps may be described or depicted in a particular order of occurrence while those skilled in the art will understand that such specificity with respect to sequence is not actually required.
[0035] The terms and expressions used herein have the ordinary technical meaning as is accorded to such terms and expressions by persons skilled in the technical field as set forth above except where different specific meanings have otherwise been set forth herein.
DETAILED DESCRIPTION
[0036] Some detailed example embodiments are disclosed herein. However, specific structural and functional details disclosed herein are merely representative for purposes of describing example embodiments. Example embodiments may, however, be embodied in many alternate forms and should not be construed as limited to only the embodiments set forth herein.
[0037] The invention may be embodied in other specific forms without departing from the spirit of essential characteristics thereof. The present embodiments therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
[0038] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items. As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well as the singular forms, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, elements, components, and/or groups thereof.
[0039] The following description is not to be taken in a limiting sense, but is made merely for the purpose of describing the general principles of exemplary embodiments. Reference throughout this specification to “one embodiment,” “an embodiment,” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases “in one embodiment,” “in an embodiment,” and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
[0040] The detailed description set forth below in connection with the appended drawings is intended as a description of the presently contemplated embodiments of the multi-alert security messaging systems, and is not intended to represent the only form in which the disclosed invention may be developed or utilized. The description sets forth the various functions and features in connection with the illustrated embodiments. It is to be understood, however, that the same or equivalent functions may be accomplished by different embodiments that are also intended to be encompassed within the scope of the present disclosure.
[0041] It is further understood that the use of relational terms such as first and second, top and bottom and the like are used solely to distinguish one from another entity without necessarily requiring or implying any actual such relationship or order between such entities.
[0042] All the terminologies and techniques mentioned herein are not particular to any specific embodiment, and it does not scale down different personifications of our invention. Use of words like “and/or” herein includes all the associated listed items and holds all the combinations of different embodiments. Use of singular form of words like “a/an/the” also associate their plural forms into the context unless otherwise clearly defined for their singular meaning.
[0043] Referring to
[0044] Additionally, patient information, or client information can be stored on the storage device in order to be easily accessed by an admin (administrator) in connection with, or in possession of the host device. The administrator is configured with the ability to login to the user interface or software with a username and password. The backend in communication with the host device, performs a validation process to determine if the user is accessing from the authorized office internet protocol (IP) address. Upon confirmation and validation of the username and password, the administrator is provided with access to the backend hosted cloud server.
[0045] In one embodiment, each of the users of the one or more UEs can be provided access to a user interface or software platform configured to be in communication with the host device. In a preferred embodiment, each of the UEs are configured to communicate with the host device wirelessly. The user interface provides users the ability to login to the user interface using a username and password, and access all of the patient or client session that have been predetermined or stored on the user's schedule or calendar.
[0046] Accordingly, in one embodiment, the computing system is configured to receive an authorization request message from a user equipment (UE). The authorization request message is configured to include a set of identification credentials, wherein the identification credentials are configured to identify a user, a device, and/or a location. The computing system can further perform a validation process via one or more databases, to determine if the identification credentials are valid, and meet an authorization clearance level. The authorization clearance level can be predetermined by the administrator to be a level suitable for the role the user is responsible for with an organization.
[0047] The system can then send an in-session indication, to a host device, upon a user selection or activation of a session with a client or patient. The host device, upon receiving the in-session indication, is configured to monitor the device for any additional alerts, messages, or a set of alert triggers from the one or more UEs. Each of the one or more alert triggers are configured with a set of priority values, that are predetermined based on the severity of the alert trigger sent by a user of the one or more UEs. Upon an alert trigger being sent by the user from the one or more UEs, the host device receives the alert and notifies the administrator of the location, the user, and the patient or client currently in session.
[0048] A storage location can also be in communication with the system in order to store a plurality of historical records of all messages, and alert triggers sent. Each historical record can include a timestamp, location coordinates, room location, and an associated schedule or event that may be relevant to an alert trigger or request sent.
[0049] Referring to
[0050] In the instance where the session option is selected, a user can send an indication via the user equipment to the host device, to receive information about the session, or to start or stop an in-session timer and indication, as shown in
[0051] In some instances, as shown in
[0052] The de-escalation options that are provided can be changed or determined based on the relevancy to the organizational structure. This system can be implemented in healthcare institutions, public schools, private schools, private practice, or corporate environments where risk, or various levels of danger could be imminent. The emergency options provided for de-escalation can also be provided a tiered system that allows for different types of de-escalation tactics or requests, via message, based on the current circumstances or event taking place.
[0053]
[0054]
[0055] Advantageously, a company may have more than one Administrator 1002 and unlimited users. The Administrator 1002 can organize users by Departments and create unlimited Groups with unlimited members in each group. The Administrator 1002 is also able to access the master message log in the server 20 to filter and analyze sent messages, de-escalation requests, and alert triggers. The logs may be printed or exported in Microsoft Excel™, plain text, or Adobe™ formats, to name just a few examples.
[0056] The messaging system described herein may be configured to send an email notification, instant alert, instant message, or a pop-up message to the Administrator 1002, via the administrator UE or device, when an alert trigger or message is sent from a member UE in the system.
[0057] Advantageously, the company's administrator 1002, through an administrative service interface, can have access to every message that is sent through the system to and from each employee, or member UE. The log accessible by the administrator shows the message sender, the message recipient(s), the list of the attachments for each message, location from where the message is sent, the alert trigger, de-escalation request and the message text. Each message is encrypted and optionally compressed at a protocol or a technical specialist level. Therefore, the messaging system described herein presents great difficulties for hackers and spammers to launch attacks, decipher a message, or create a false alarm which would inappropriately direct organization resources incorrectly or inconveniently.
[0058]
[0059] The server 20 is capable of receiving messages sent via Web browsers or mobile applications from a respective user equipment or device over an Internet or Intranet connection. One skilled in the art would appreciate that the execution of a system such as this, as provided by any combination of the examples or embodiments described by Applicant, can be used in various environments other than the Internet. Also, various communication channels may be used such as local area network, wide area network, or point-to-point dial up connection. Also, a server system may comprise any combination of hardware or software that can generate application submission in response to the application submission being performed. A client system may comprise any combination of hardware or software that can interact with the server system. These systems may include television-based systems or various other consumer products through which application may be placed.
[0060]
[0061]
[0062] The method and system described above for establishing a bi-directional communications session and for messaging may be embodied in one or more software applications comprising computer executable instructions executed by the server and other devices. The software application(s) may comprise program modules including routines, programs, object components, data structures etc. and may be embodied as computer readable program code stored on a computer readable medium. The computer readable medium is any data storage device that can store data, which can thereafter be read by a computing device. Examples of computer readable media include for example read-only memory, random-access memory, CD-ROMs, magnetic tape and optical data storage devices. The computer readable program code can also be distributed over a network including coupled computer systems so that the computer readable program code is stored and executed in a distributed fashion.
[0063] Although the present invention has been described in terms of various embodiments, it is not intended that the invention be limited to these embodiments. Modification within the spirit of the invention will be apparent to those skilled in the art.
[0064] Example embodiments having thus been described, it will be obvious that the same may be varied in many ways. Such variations are not to be regarded as a departure from the intended spirit and scope of example embodiments, and all such modifications as would be obvious to one skilled in the art are intended to be included within the scope of the following claims.
[0065] Although the present invention has been described in terms of various embodiments, it is not intended that the invention be limited to these embodiments. Modification within the spirit of the invention will be apparent to those skilled in the art. It is additionally noted and anticipated that although the device is shown in its most simple form, various components and aspects of the device may be differently shaped or modified when forming the invention herein. As such those skilled in the art will appreciate the descriptions and depictions set forth in this disclosure or merely meant to portray examples of preferred modes within the overall scope and intent of the invention and are not to be considered limiting in any manner. While all of the fundamental characteristics and features of the invention have been shown and described herein, with reference to particular embodiments thereof, a latitude of modification, various changes and substitutions are intended in the foregoing disclosure and it will be apparent that in some instances, some features of the invention may be employed without a corresponding use of other features without departing from the scope of the invention as set forth. It should also be understood that various substitutions, modifications, and variations may be made by those skilled in the art without departing from the scope of the invention.