US20050141676A1 - Method and system of providing emergency data - Google Patents

Method and system of providing emergency data Download PDF

Info

Publication number
US20050141676A1
US20050141676A1 US11/070,069 US7006905A US2005141676A1 US 20050141676 A1 US20050141676 A1 US 20050141676A1 US 7006905 A US7006905 A US 7006905A US 2005141676 A1 US2005141676 A1 US 2005141676A1
Authority
US
United States
Prior art keywords
data
emergency
page
information
emergency data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/070,069
Inventor
Felix Andrew
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to US11/070,069 priority Critical patent/US20050141676A1/en
Publication of US20050141676A1 publication Critical patent/US20050141676A1/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management

Definitions

  • the present invention relates generally to computer systems, and more particularly to data access via a computer system.
  • the present invention provides a method and system for maintaining emergency data in a manner that provides straightforward user access thereto via a displayed emergency page (or set of pages) or other suitable user interface.
  • the operating system or other suitable components maintain a repository of emergency data such that emergency type information can be aggregated and displayed in one place.
  • Emergency data can be entered manually or via a communication mechanism connected to a remote source, such as a directly connected source, or one indirectly connected via the internet or the like.
  • a remote source such as a directly connected source, or one indirectly connected via the internet or the like.
  • the source may comprise a .NET service.
  • the source intentionally provides data that includes the emergency data, such as in a special XML document for emergency data, or by flagging certain pieces of data as being emergency-related.
  • the device may abstract emergency data from other data without the source having knowledge that the data is emergency data.
  • a user executes an emergency page application program that provides an emergency page, or the user otherwise selects the emergency page.
  • User interaction with the page and any sub-pages linked thereto results in the system accessing, aggregating, and/or merging data based on a type of emergency, and then providing the data to the user.
  • the emergency page application program may also perform some action or actions with respect to the emergency. For example, the emergency page application program can issue an alert to a remote data receiver, send an email message, place a telephone (e.g., “911”) call, gather additional relevant data from the user or other device and/or perform other useful operations.
  • a telephone e.g., “911”
  • FIG. 1 is a block diagram representing a computer system into which the present invention may be incorporated;
  • FIG. 2 is a block diagram representing components for implementing an emergency page in accordance with an aspect of the present invention
  • FIG. 3 is a block diagram representing components in an alternative arrangement for implementing an emergency page in accordance with an aspect of the present invention
  • FIG. 4 is a representation of a suitable data structure such as an XML document that maintains emergency-related data in accordance with an aspect of the present invention
  • FIG. 5 is a representation of an initial emergency page displayable to a user to facilitate simple and rapid access to the emergency-related data
  • FIG. 6 is a flow diagram describing general logic for storing emergency-related data in accordance with an aspect of the present invention.
  • FIG. 7 is a flow diagram describing general logic for providing emergency-related data in accordance with an aspect of the present invention.
  • FIG. 1 illustrates an example of a suitable operating environment 120 in which the invention may be implemented, particularly for decoding image and/or video data.
  • the operating environment 120 is only one example of a suitable operating environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention.
  • Other well known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
  • program modules include routines, programs, objects, components, data structures and so forth that perform particular tasks or implement particular abstract data types.
  • functionality of the program modules may be combined or distributed as desired in various embodiments.
  • Computer-readable media can be any available media that can be accessed by the computing device 120 .
  • Computer readable media may comprise computer storage media and communication media.
  • Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by the computing device 120 .
  • Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
  • modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
  • communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
  • FIG. 1 shows functional components of one such handheld computing device 120 , including a processor 122 , a memory 124 , a display 126 , and a keyboard 128 (which may be a physical or virtual keyboard).
  • the memory 124 generally includes both volatile memory (e.g., RAM) and non-volatile memory (e.g., ROM, PCMCIA cards, and so forth).
  • An operating system 130 is resident in the memory 124 and executes on the processor 122 , such as the Windows® CE operating system from Microsoft® Corporation, or another operating system.
  • One or more application programs 132 are loaded into memory 124 and run on the operating system 130 .
  • applications include email programs, scheduling programs, PIM (personal information management) programs, word processing programs, spreadsheet programs, Internet browser programs, and so forth.
  • the handheld personal computer 120 may also include a notification manager 134 loaded in the memory 124 , which executes on the processor 122 .
  • the notification manager 134 handles notification requests, e.g., from the application programs 132 .
  • the handheld personal computer 120 has a power supply 136 , which is implemented as one or more batteries.
  • the power supply 136 may further include an external power source that overrides or recharges the built-in batteries, such as an AC adapter or a powered docking cradle.
  • the exemplary handheld personal computer 120 represented in FIG. 1 is shown with three types of external notification mechanisms: one or more light emitting diodes (LEDs) 140 and an audio generator 144 . These devices may be directly coupled to the power supply 136 so that when activated, they remain on for a duration dictated by a notification mechanism even though the handheld personal computer processor 122 and other components might shut down to conserve battery power.
  • the LED 140 preferably remains on indefinitely until the user takes action.
  • contemporary versions of the audio generator 144 use too much power for today's handheld personal computer batteries, and so it is configured to turn off when the rest of the system does or at some finite duration after activation.
  • FIG. 2 shows a block diagram including a consumer device 200 (such as the device 120 of FIG. 1 ) configured so as to be capable of providing an emergency page in accordance with one aspect of the present invention.
  • the computer system 200 ( FIG. 1 ) preferably includes a communication mechanism 202 which can receive emergency data from a remote source 204 .
  • a data source may comprise an infrared transmitter at a retailer's (e.g., rental car company) counter or kiosk, an automobile, a keycard, a website, and virtually anything capable of communicating information to the device 120 .
  • the communication mechanism 202 can also receive emergency-related data from a .NET service 206 or the like (which may have also received it from the source 204 ) via the internet 208 .
  • .NET services provide identity-based data access for users, groups and other entities.
  • a user can employ virtually any device capable of connecting to the Internet and running a .NET compatible application to access the user's data via .Net services.
  • One of the .NET services may be arranged to provide emergency data, however as will be understood, the present invention can also interpret general data and determine that it is emergency data.
  • the communication mechanism 202 may receive and buffer (e.g., in the buffer 210 ) data on behalf of an application program 212 that knows nothing about emergency data. Instead, the application program maintains its own data such as in files or other data structures 214 . Indeed, the data source 204 or .NET service also need not know that its data is emergency data. For example, an emergency data capture engine 210 can select data it thinks may be emergency related, such as data that matches a particular format, e.g., telephone numbers, names beginning with “Dr.”, VIN numbers, and so on, and prompt the user via a user interface 216 as to whether the data is emergency, and if so, how it should be typed.
  • a particular format e.g., telephone numbers, names beginning with “Dr.”, VIN numbers, and so on
  • a user may also input emergency data directly via the user interface, such as by executing an emergency page application program 218 .
  • the application program is not limited to a conventionally-thought of application program (such as one that executes over an operating system), but rather may comprise an operating system component, some script in a page that a browser may interpret, and/or virtually any other type of executable code.
  • data may be tagged as emergency data by its source.
  • a rental car company may transmit information about a car that has been rented to a user to the user's device 200 .
  • Some or all of this data such as the VIN number, emergency 800 number, and so on may be tagged, and preferably categorized so that when transmitted, it is known to be emergency data, and of a certain type.
  • the emergency data capture engine 210 can thus quickly and automatically (without prompting) store the emergency data in an emergency page database 220 or the like.
  • the data need not be stored in the device, e.g., .NET may maintain this information for access via the Internet, however locally caching emergency data is beneficial in case the Internet is inaccessible.
  • the emergency data capture engine and emergency data application program may be incorporated into the same component.
  • the emergency page data can be stored with regular system data 322 , but the emergency data capture engine 320 may tag it with an attribute or the like. Then, when needed by an emergency page application program 324 , an emergency page data locator 326 (which may be incorporated in the emergency page application program 324 ) can select that which is tagged as emergency data, and/or also type the data dynamically.
  • the emergency data capture engine 320 may maintain its own internal tables or the like to track the emergency data, type it, and so forth, whereby the locator 326 may access those tables.
  • the device 200 includes components that can rapidly locate relevant emergency data for appropriate types of emergencies. Note that it is likely preferable to maintain emergency data separately from other data, however, so that it is not inadvertently deleted.
  • a user can thus execute an emergency page application program 218 or the like to obtain needed emergency data relevant to a particular type of emergency.
  • the emergency page application program 216 can do more than display the data, in that the emergency page application program 216 can take some action with respect to the emergency.
  • the emergency page application program 218 can send an email message, place a telephone (e.g., “911”) call, gather additional relevant data from the user or other device (such as from a vehicle's computer, a GPS system and so on) and/or perform other useful operations.
  • the emergency page application program 218 is connected to the communication mechanism 202 .
  • the emergency page application program 218 also may invoke other application programs, such as one that interfaces with a car's computer to obtain relevant data in the event of a breakdown, e.g., for sending to a technician. Note that part of the emergency data can include data regarding appropriate actions to take.
  • FIG. 4 provides example data structures 400 1 - 400 n that hold the emergency data, such as in an XML (extensible Markup Language) document.
  • XML extensible Markup Language
  • .NET uses XML documents to store, transfer, and otherwise provide users with access to appropriate data.
  • Conventional objects and the like can also be used to store the data.
  • each document may have an identifier (e.g., a UUID) associated with it, along with various other data that may or may not be present for a given data structure.
  • a UUID e.g., a UUID
  • useful information may include a name, type (and subtype) information, duration information, sensitivity information, and an action.
  • one data structure 400 1 may store emergency information related to a credit card.
  • a data structure may be classified as corresponding to a financial-type emergency (e.g., lost or stolen card), a subtype of credit card (versus other financial-related emergencies such as locating a checking account number).
  • a duration may be provided, which may be some date at which time the data is no longer considered valid. For example, for a credit card it may be the expiration date of the credit card, while for a rental car it may be two weeks after the car is scheduled to be returned. In this way, records can expire to reclaim storage space, reduce the risk of obsolete data, and so forth.
  • the emergency application program or other utility can query (or otherwise search) to delete expired data structures.
  • Each data structure may also have a sensitivity setting, such as top secret, high, medium, low, public, and so on.
  • Passwords, PIN numbers, and other methods may be used to control access. For example, a user might want credit card numbers to be known to the system, but be blocked from display or always encrypted, with an alert message sent to the credit card company if the card is lost or stolen. In this way, the credit card company can deactivate the card, but no one can ever see the actual card number.
  • a user who has medical problems might want some of his or her emergency medical information to be publicly available to any viewer in possession of the device, so that, for example, a paramedic could quickly look up any allergies to medications and the like of an unconscious user.
  • the device may be made configurable to provide some access to the emergency page, (i.e., with restricted information). For example, if the user is involved in some kind of accident, paramedics or others can get at some, but not all, emergency information about the user, without knowing the password for the device.
  • Each data structure may also have certain standard actions that the device can take, such as to send an alert to a remote data receiver, and/or send an email message, page someone, place a telephone call, and so on.
  • the data structure also may contain type-specific information.
  • the type-specific information may include the credit card number, card issuer name, telephone number, expiration date, email or website address and so forth.
  • the data for multiple records may be maintained in the same data structure, and/or multiple data structures can be returned in an appropriate (e.g. type/subtype) query when needed.
  • the information needed to take an action such as the text and/or code of a message to send, may be stored in this section.
  • FIG. 5 represents an example user interface 500 including an emergency page 502 that a user receives when the emergency page application is run.
  • the application may be run in any number of ways, such as via the start menu, by accessing the page through a browser, by clicking an icon 504 in a system tray or the like, and so on.
  • the application program causes the emergency page, and possibly child pages, to be rendered.
  • the present invention is not limited to displayable pages, but indeed, may use voice recognition and/or audio playback to handle the emergency data input and/or output, such as for visually impaired users.
  • the emergency page application program when executed, the emergency page application program initially displays, via the user interface 500 , very straightforward links or the like that a user can select. This enables a user to obtain needed emergency data without a lot of thought. Less critical information and functions may be accessed by an “Other” link or the like. For example, a user might use such a link to locate an input screen for manually entering emergency data.
  • relevant sub-selections may appear.
  • an “automobile”-like link may provide the user with a page that enables a choice of vehicles, if the user has emergency data for more than one vehicle stored in the device.
  • the user may receive a sub-page that allows one or more cards to be selected, or even all cards at once, so that, for example, one can be canceled/reissued if only one is lost, or all if a purse or wallet is stolen.
  • FIGS. 6 and 7 provide an explanation of the operation of the present invention.
  • the process e.g., the emergency data capture engine
  • Step 602 represents evaluating this data, such as to see whether the data is tagged as emergency data, or matches a pattern such that a user may be prompted to decide whether to store it as such.
  • step 606 is executed to determine whether the data is already stored as emergency data so as to not unnecessarily store it multiple times. Note that in a database operation, this may be automatically handled by an insert operation or the like that does not add duplicate records; however, in an environment where some user prompting is needed to determine whether and/or how to store emergency data, before prompting, the emergency data capture engine may first query for the existence of such data, so as to avoid unnecessarily interrupting the user.
  • step 608 represents constructing the data structure or structures (e.g., an XML document) needed to maintain this data, prompting the user if necessary.
  • the source of the data can tag the data as emergency data, type the data, indicate that it should overwrite other data that may exist with superseding data, and so on.
  • Some authentication e.g., a certificate
  • step 610 represents storing the data structure or structures.
  • FIG. 7 is directed to the emergency page application program that recalls the data when needed, beginning at step 700 which represents rendering the topmost (e.g., home) emergency page.
  • this rendering may be simply interpreting static data, but may instead perform some dynamic processing, such as to not display a “financial” link on the emergency page when the user has no financial-related emergency data stored in the device or otherwise accessible. Thus, some data access may occur as part of rendering the topmost emergency page.
  • Step 702 represents waiting for a user selection. Note that this may be event driven, but is represented as a loop for purposes of simplicity. Further, given the importance of such a program, the selection step may actually loop and/or execute in a critical section so that a user is not confused by other user-interface activities (e.g., pop-up reminders and the like) that may coincidentally appear at any given moment. In general, a user may exit (cancel) the emergency page screen, although an “Are you sure” prompt or the like may be provided to handle situations wherein a user has tapped the wrong location.
  • a user may exit (cancel) the emergency page screen, although an “Are you sure” prompt or the like may be provided to handle situations wherein a user has tapped the wrong location.
  • Step 704 represents a next evaluation being executed when a valid link or the like is actuated at step 702 , to render an appropriate sub-page.
  • a user may select a general financial emergency via step 702 , but that may result in a more focused financial emergency page being needed, such as to allow selection of one or more various credit cards.
  • security e.g., a password
  • any security is described as being handled before retrieving and displaying the data, rather than when a page directed to user selection input is rendered.
  • step 706 renders the sub-page, which includes any needed data access, while step 708 waits for a user selection via that page.
  • Steps 710 and 712 represent some or all of the types of selections that a user may select. For example, a user may click on a page-specific link command, such as to select a given credit card name, a “cancel all cards” command button, and so on. If so, the process returns to step 704 to see if a sub-page is needed for this selection.
  • step 712 represents general navigational commands, such as “Home” (which if actuated will return to step 700 ), “Back” (which if actuated will render an appropriate higher page at step 714 ), or “Exit” (which will exit the program, possibly following a confirmation prompt).
  • a user selection will be one that requires no sub-pages. In keeping with the present invention, preferably this will not be too many levels below the home page, and may even be one level below if no sub-page is needed.
  • Step 716 represents retrieving the appropriate records for the page, merging any data as necessary. For example, for a car problem, a user may have an insurance company's telephone number in both a rental car's data structure and in a personal car's data structure, and there would not be any reason to display it twice. However, VIN information would vary by the car.
  • Step 718 represents the handling of security, if any, before displaying the data, such as requiring a pin number, password, and so on, e.g., in accordance with sensitivity settings on the data.
  • the highest sensitivity setting may control the security, or security may be per data piece or data structure, e.g., so as to not prevent a user from seeing telephone numbers of credit card companies when the user cannot remember a password or PIN required to see a credit card number.
  • handling security includes allowing the user to back out, start over, end the process and so on, and indeed, security can end the process to hinder its evasion, e.g., start over if a password is incorrectly entered some number of times.
  • step 720 represents outputting the emergency data.
  • Step 722 represents waiting for a user selection, such as to exit, or take some action, including navigation actions (home or back) as described above.
  • Step 724 represents taking the appropriate action, which may, for example, include issuing an alert, sending an email message, dialing a telephone number and/or placing a pre-recorded call or page, and so on. Note that any user selection may come after an action is automatically taken.
  • the steps represented in FIG. 7 provide an application program with significantly flexible programming and various selectable levels of sophistication, from a user's perspective the interaction is simple, and may be very streamlined.
  • the top-level page or first sub-page may contain the information a user needs, without any security concerns, in which event a user could obtain needed emergency data and even take action with as little as one or two taps on the screen (or voice commands). For example, this would seem particularly valuable with types of emergencies predicted to be more serious, such as those related to a medical emergency.
  • a user may need (and want) to navigate through several levels of pages, with security constraints required to be met, to obtain other data.
  • an improved method system for providing access to emergency data via a computer system is provided.
  • the method and system are flexible, such as to allow tradeoffs between usability and security, and extensible, such as to allow different types of data to be stored as emergency data.

Abstract

A method and system for providing access to emergency data. Emergency data is collected from various sources and maintained such that it can be efficiently recalled in an emergency. In one implementation, the data is maintained in XML documents. An emergency application program provides a page and/or sub-pages via which a user interacts to obtain the data. The data is typed according to types of emergencies to facilitate user access to the appropriate data when needed. The emergency data may be automatically loaded from a remote source, such as a .NET service, or provided by a retailer. Actions may be associated with emergency data, such as to provide an easy or automated way to send an alert, email message, and the like in the event of an emergency.

Description

    FIELD OF THE INVENTION
  • The present invention relates generally to computer systems, and more particularly to data access via a computer system.
  • BACKGROUND OF THE INVENTION
  • People have come to depend on small, highly portable computing devices such as Pocket-sized personal computing devices. In general, various types of users have found these devices useful for things ranging from running fairly complex programs, such as to browse the web or access email, to simpler tasks such as storing contact information, keeping a schedule, and so forth. These devices thus hold a lot of information about users and other people they know.
  • However, when it comes to an emergency, these devices have a number of drawbacks, essentially because they are not engineered to expose needed emergency information in a comprehensive, and simple manner. For example, in an emergency situation, people are expected to access a significant amount of information from different sources, such as a phone number for road-side assistance, their vehicle's identification (VIN) number, insurance information, and licensing data. Other emergencies require other types of data, such as a doctor's telephone number, a credit card number, and so on. While even the most conscientious users may take the time to put such information in a computer system, they may not be able to pull the information together when needed.
  • In sum, what is needed is a way to provide users with access to needed emergency information. This should be simple from the user's perspective, so that even very emotional users can find what is needed in a straightforward, yet comprehensive process.
  • SUMMARY OF THE INVENTION
  • Briefly, the present invention provides a method and system for maintaining emergency data in a manner that provides straightforward user access thereto via a displayed emergency page (or set of pages) or other suitable user interface. In one embodiment, the operating system or other suitable components maintain a repository of emergency data such that emergency type information can be aggregated and displayed in one place.
  • Emergency data can be entered manually or via a communication mechanism connected to a remote source, such as a directly connected source, or one indirectly connected via the internet or the like. For example, the source may comprise a .NET service.
  • In one implementation, the source intentionally provides data that includes the emergency data, such as in a special XML document for emergency data, or by flagging certain pieces of data as being emergency-related. In another implementation, the device may abstract emergency data from other data without the source having knowledge that the data is emergency data.
  • When emergency data is needed, a user executes an emergency page application program that provides an emergency page, or the user otherwise selects the emergency page. User interaction with the page and any sub-pages linked thereto results in the system accessing, aggregating, and/or merging data based on a type of emergency, and then providing the data to the user. The emergency page application program may also perform some action or actions with respect to the emergency. For example, the emergency page application program can issue an alert to a remote data receiver, send an email message, place a telephone (e.g., “911”) call, gather additional relevant data from the user or other device and/or perform other useful operations.
  • Other advantages will become apparent from the following detailed description when taken in conjunction with the drawings, in which:
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram representing a computer system into which the present invention may be incorporated;
  • FIG. 2 is a block diagram representing components for implementing an emergency page in accordance with an aspect of the present invention;
  • FIG. 3 is a block diagram representing components in an alternative arrangement for implementing an emergency page in accordance with an aspect of the present invention;
  • FIG. 4 is a representation of a suitable data structure such as an XML document that maintains emergency-related data in accordance with an aspect of the present invention;
  • FIG. 5 is a representation of an initial emergency page displayable to a user to facilitate simple and rapid access to the emergency-related data;
  • FIG. 6 is a flow diagram describing general logic for storing emergency-related data in accordance with an aspect of the present invention; and
  • FIG. 7 is a flow diagram describing general logic for providing emergency-related data in accordance with an aspect of the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • Exemplary Operating Environment
  • FIG. 1 illustrates an example of a suitable operating environment 120 in which the invention may be implemented, particularly for decoding image and/or video data. The operating environment 120 is only one example of a suitable operating environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention. Other well known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. For example, it is likely that encoding image and/or video image data often will be performed on a computer with more processing power than contemporary hand-held personal computers, but there is no reason encoding cannot be performed on the exemplary device, or decoding on a more powerful machine.
  • The invention may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures and so forth that perform particular tasks or implement particular abstract data types. Typically the functionality of the program modules may be combined or distributed as desired in various embodiments.
  • Computing device 120 typically includes at least some form of computer readable media. Computer-readable media can be any available media that can be accessed by the computing device 120. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by the computing device 120. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
  • FIG. 1 shows functional components of one such handheld computing device 120, including a processor 122, a memory 124, a display 126, and a keyboard 128 (which may be a physical or virtual keyboard). The memory 124 generally includes both volatile memory (e.g., RAM) and non-volatile memory (e.g., ROM, PCMCIA cards, and so forth). An operating system 130 is resident in the memory 124 and executes on the processor 122, such as the Windows® CE operating system from Microsoft® Corporation, or another operating system.
  • One or more application programs 132 are loaded into memory 124 and run on the operating system 130. Examples of applications include email programs, scheduling programs, PIM (personal information management) programs, word processing programs, spreadsheet programs, Internet browser programs, and so forth. The handheld personal computer 120 may also include a notification manager 134 loaded in the memory 124, which executes on the processor 122. The notification manager 134 handles notification requests, e.g., from the application programs 132.
  • The handheld personal computer 120 has a power supply 136, which is implemented as one or more batteries. The power supply 136 may further include an external power source that overrides or recharges the built-in batteries, such as an AC adapter or a powered docking cradle.
  • The exemplary handheld personal computer 120 represented in FIG. 1 is shown with three types of external notification mechanisms: one or more light emitting diodes (LEDs) 140 and an audio generator 144. These devices may be directly coupled to the power supply 136 so that when activated, they remain on for a duration dictated by a notification mechanism even though the handheld personal computer processor 122 and other components might shut down to conserve battery power. The LED 140 preferably remains on indefinitely until the user takes action. Note that contemporary versions of the audio generator 144 use too much power for today's handheld personal computer batteries, and so it is configured to turn off when the rest of the system does or at some finite duration after activation.
  • Emergency Page
  • FIG. 2 shows a block diagram including a consumer device 200 (such as the device 120 of FIG. 1) configured so as to be capable of providing an emergency page in accordance with one aspect of the present invention. As represented in FIG. 2, the computer system 200 (FIG. 1) preferably includes a communication mechanism 202 which can receive emergency data from a remote source 204. For example, a data source may comprise an infrared transmitter at a retailer's (e.g., rental car company) counter or kiosk, an automobile, a keycard, a website, and virtually anything capable of communicating information to the device 120.
  • The communication mechanism 202 can also receive emergency-related data from a .NET service 206 or the like (which may have also received it from the source 204) via the internet 208. As is known, .NET services provide identity-based data access for users, groups and other entities. For example, with .NET, a user can employ virtually any device capable of connecting to the Internet and running a .NET compatible application to access the user's data via .Net services. One of the .NET services may be arranged to provide emergency data, however as will be understood, the present invention can also interpret general data and determine that it is emergency data.
  • In one implementation, the communication mechanism 202 may receive and buffer (e.g., in the buffer 210) data on behalf of an application program 212 that knows nothing about emergency data. Instead, the application program maintains its own data such as in files or other data structures 214. Indeed, the data source 204 or .NET service also need not know that its data is emergency data. For example, an emergency data capture engine 210 can select data it thinks may be emergency related, such as data that matches a particular format, e.g., telephone numbers, names beginning with “Dr.”, VIN numbers, and so on, and prompt the user via a user interface 216 as to whether the data is emergency, and if so, how it should be typed. Of course, a user may also input emergency data directly via the user interface, such as by executing an emergency page application program 218. Note that as used herein, the application program is not limited to a conventionally-thought of application program (such as one that executes over an operating system), but rather may comprise an operating system component, some script in a page that a browser may interpret, and/or virtually any other type of executable code.
  • In one preferred implementation, data may be tagged as emergency data by its source. For example, a rental car company may transmit information about a car that has been rented to a user to the user's device 200. Some or all of this data, such as the VIN number, emergency 800 number, and so on may be tagged, and preferably categorized so that when transmitted, it is known to be emergency data, and of a certain type. The emergency data capture engine 210 can thus quickly and automatically (without prompting) store the emergency data in an emergency page database 220 or the like. Note that the data need not be stored in the device, e.g., .NET may maintain this information for access via the Internet, however locally caching emergency data is beneficial in case the Internet is inaccessible. Further note that the emergency data capture engine and emergency data application program may be incorporated into the same component.
  • In an alternative embodiment represented in FIG. 3, the emergency page data can be stored with regular system data 322, but the emergency data capture engine 320 may tag it with an attribute or the like. Then, when needed by an emergency page application program 324, an emergency page data locator 326 (which may be incorporated in the emergency page application program 324) can select that which is tagged as emergency data, and/or also type the data dynamically. The emergency data capture engine 320 may maintain its own internal tables or the like to track the emergency data, type it, and so forth, whereby the locator 326 may access those tables. In any event, the device 200 includes components that can rapidly locate relevant emergency data for appropriate types of emergencies. Note that it is likely preferable to maintain emergency data separately from other data, however, so that it is not inadvertently deleted.
  • Returning to FIG. 2, a user can thus execute an emergency page application program 218 or the like to obtain needed emergency data relevant to a particular type of emergency. Moreover, the emergency page application program 216 can do more than display the data, in that the emergency page application program 216 can take some action with respect to the emergency. For example, the emergency page application program 218 can send an email message, place a telephone (e.g., “911”) call, gather additional relevant data from the user or other device (such as from a vehicle's computer, a GPS system and so on) and/or perform other useful operations. To this end, the emergency page application program 218 is connected to the communication mechanism 202. The emergency page application program 218 also may invoke other application programs, such as one that interfaces with a car's computer to obtain relevant data in the event of a breakdown, e.g., for sending to a technician. Note that part of the emergency data can include data regarding appropriate actions to take.
  • FIG. 4 provides example data structures 400 1-400 n that hold the emergency data, such as in an XML (extensible Markup Language) document. For example, .NET uses XML documents to store, transfer, and otherwise provide users with access to appropriate data. Conventional objects and the like can also be used to store the data.
  • As generally represented in FIG. 4, each document may have an identifier (e.g., a UUID) associated with it, along with various other data that may or may not be present for a given data structure. For example, such useful information may include a name, type (and subtype) information, duration information, sensitivity information, and an action.
  • By way of example, one data structure 400 1 may store emergency information related to a credit card. Such a data structure may be classified as corresponding to a financial-type emergency (e.g., lost or stolen card), a subtype of credit card (versus other financial-related emergencies such as locating a checking account number). A duration may be provided, which may be some date at which time the data is no longer considered valid. For example, for a credit card it may be the expiration date of the credit card, while for a rental car it may be two weeks after the car is scheduled to be returned. In this way, records can expire to reclaim storage space, reduce the risk of obsolete data, and so forth. The emergency application program or other utility can query (or otherwise search) to delete expired data structures.
  • Each data structure may also have a sensitivity setting, such as top secret, high, medium, low, public, and so on. Passwords, PIN numbers, and other methods may be used to control access. For example, a user might want credit card numbers to be known to the system, but be blocked from display or always encrypted, with an alert message sent to the credit card company if the card is lost or stolen. In this way, the credit card company can deactivate the card, but no one can ever see the actual card number. At the other end, a user who has medical problems might want some of his or her emergency medical information to be publicly available to any viewer in possession of the device, so that, for example, a paramedic could quickly look up any allergies to medications and the like of an unconscious user. Note that along these lines, if the user has a password ‘lock’ on the device, the device may be made configurable to provide some access to the emergency page, (i.e., with restricted information). For example, if the user is involved in some kind of accident, paramedics or others can get at some, but not all, emergency information about the user, without knowing the password for the device.
  • Each data structure may also have certain standard actions that the device can take, such as to send an alert to a remote data receiver, and/or send an email message, page someone, place a telephone call, and so on.
  • The data structure also may contain type-specific information. For example, for a credit card structure, the type-specific information may include the credit card number, card issuer name, telephone number, expiration date, email or website address and so forth. Note that the data for multiple records may be maintained in the same data structure, and/or multiple data structures can be returned in an appropriate (e.g. type/subtype) query when needed. Also, the information needed to take an action, such as the text and/or code of a message to send, may be stored in this section.
  • FIG. 5 represents an example user interface 500 including an emergency page 502 that a user receives when the emergency page application is run. As is known, the application may be run in any number of ways, such as via the start menu, by accessing the page through a browser, by clicking an icon 504 in a system tray or the like, and so on. As part of its execution, the application program causes the emergency page, and possibly child pages, to be rendered. It should be noted that the present invention is not limited to displayable pages, but indeed, may use voice recognition and/or audio playback to handle the emergency data input and/or output, such as for visually impaired users.
  • In keeping with the present invention, when executed, the emergency page application program initially displays, via the user interface 500, very straightforward links or the like that a user can select. This enables a user to obtain needed emergency data without a lot of thought. Less critical information and functions may be accessed by an “Other” link or the like. For example, a user might use such a link to locate an input screen for manually entering emergency data.
  • When a link is selected, relevant sub-selections (pages) may appear. For example, an “automobile”-like link may provide the user with a page that enables a choice of vehicles, if the user has emergency data for more than one vehicle stored in the device. For credit cards, the user may receive a sub-page that allows one or more cards to be selected, or even all cards at once, so that, for example, one can be canceled/reissued if only one is lost, or all if a purse or wallet is stolen.
  • By way of summary, FIGS. 6 and 7 provide an explanation of the operation of the present invention. As represented in FIG. 6, at step 600, the process (e.g., the emergency data capture engine) waits for some data to be made available. Step 602 represents evaluating this data, such as to see whether the data is tagged as emergency data, or matches a pattern such that a user may be prompted to decide whether to store it as such.
  • If data is deemed to be emergency-related data at step 604, step 606 is executed to determine whether the data is already stored as emergency data so as to not unnecessarily store it multiple times. Note that in a database operation, this may be automatically handled by an insert operation or the like that does not add duplicate records; however, in an environment where some user prompting is needed to determine whether and/or how to store emergency data, before prompting, the emergency data capture engine may first query for the existence of such data, so as to avoid unnecessarily interrupting the user.
  • If not already stored, step 608 represents constructing the data structure or structures (e.g., an XML document) needed to maintain this data, prompting the user if necessary. Note that in one preferred implementation, the source of the data can tag the data as emergency data, type the data, indicate that it should overwrite other data that may exist with superseding data, and so on. Some authentication (e.g., a certificate) may be used to ensure that a source can only overwrite its own emergency data, or certain types of it, and so on. In any event, step 610 represents storing the data structure or structures.
  • FIG. 7 is directed to the emergency page application program that recalls the data when needed, beginning at step 700 which represents rendering the topmost (e.g., home) emergency page. Note that this rendering may be simply interpreting static data, but may instead perform some dynamic processing, such as to not display a “financial” link on the emergency page when the user has no financial-related emergency data stored in the device or otherwise accessible. Thus, some data access may occur as part of rendering the topmost emergency page.
  • Step 702 represents waiting for a user selection. Note that this may be event driven, but is represented as a loop for purposes of simplicity. Further, given the importance of such a program, the selection step may actually loop and/or execute in a critical section so that a user is not confused by other user-interface activities (e.g., pop-up reminders and the like) that may coincidentally appear at any given moment. In general, a user may exit (cancel) the emergency page screen, although an “Are you sure” prompt or the like may be provided to handle situations wherein a user has tapped the wrong location.
  • Step 704 represents a next evaluation being executed when a valid link or the like is actuated at step 702, to render an appropriate sub-page. For example, a user may select a general financial emergency via step 702, but that may result in a more focused financial emergency page being needed, such as to allow selection of one or more various credit cards. Note that security (e.g., a password) may be required before any sub-page (or even the home emergency page) is rendered, although for simplicity herein, any security is described as being handled before retrieving and displaying the data, rather than when a page directed to user selection input is rendered.
  • If a sub-page is needed, step 706 renders the sub-page, which includes any needed data access, while step 708 waits for a user selection via that page. Steps 710 and 712 represent some or all of the types of selections that a user may select. For example, a user may click on a page-specific link command, such as to select a given credit card name, a “cancel all cards” command button, and so on. If so, the process returns to step 704 to see if a sub-page is needed for this selection. If not, step 712 represents general navigational commands, such as “Home” (which if actuated will return to step 700), “Back” (which if actuated will render an appropriate higher page at step 714), or “Exit” (which will exit the program, possibly following a confirmation prompt).
  • Ultimately, at step 704, a user selection will be one that requires no sub-pages. In keeping with the present invention, preferably this will not be too many levels below the home page, and may even be one level below if no sub-page is needed. Step 716 represents retrieving the appropriate records for the page, merging any data as necessary. For example, for a car problem, a user may have an insurance company's telephone number in both a rental car's data structure and in a personal car's data structure, and there would not be any reason to display it twice. However, VIN information would vary by the car.
  • Step 718 represents the handling of security, if any, before displaying the data, such as requiring a pin number, password, and so on, e.g., in accordance with sensitivity settings on the data. The highest sensitivity setting may control the security, or security may be per data piece or data structure, e.g., so as to not prevent a user from seeing telephone numbers of credit card companies when the user cannot remember a password or PIN required to see a credit card number. Note that in addition to prompting for and/or evaluating user input data, handling security includes allowing the user to back out, start over, end the process and so on, and indeed, security can end the process to hinder its evasion, e.g., start over if a password is incorrectly entered some number of times.
  • When security, if any, is cleared, step 720 represents outputting the emergency data. Step 722 represents waiting for a user selection, such as to exit, or take some action, including navigation actions (home or back) as described above. Step 724 represents taking the appropriate action, which may, for example, include issuing an alert, sending an email message, dialing a telephone number and/or placing a pre-recorded call or page, and so on. Note that any user selection may come after an action is automatically taken.
  • It should be noted that while the steps represented in FIG. 7 provide an application program with significantly flexible programming and various selectable levels of sophistication, from a user's perspective the interaction is simple, and may be very streamlined. For example, the top-level page or first sub-page may contain the information a user needs, without any security concerns, in which event a user could obtain needed emergency data and even take action with as little as one or two taps on the screen (or voice commands). For example, this would seem particularly valuable with types of emergencies predicted to be more serious, such as those related to a medical emergency. On the other hand, a user may need (and want) to navigate through several levels of pages, with security constraints required to be met, to obtain other data.
  • As can be seen from the foregoing detailed description, there is provided an improved method system for providing access to emergency data via a computer system. The method and system are flexible, such as to allow tradeoffs between usability and security, and extensible, such as to allow different types of data to be stored as emergency data.
  • While the invention is susceptible to various modifications and alternative constructions, certain illustrated embodiments thereof are shown in the drawings and have been described above in detail. It should be understood, however, that there is no intention to limit the invention to the specific forms disclosed, but on the contrary, the intention is to cover all modifications, alternative constructions, and equivalents falling within the spirit and scope of the invention.

Claims (19)

1. A computer-implemented method, comprising:
receiving data;
determining that the data comprises emergency data;
maintaining an emergency data record related to the emergency data that was received such that the emergency data can be accessed on demand;
maintaining type of emergency information in association with the emergency data record;
receiving a request for emergency data, the request corresponding to a type of emergency;
in response to the request, locating emergency data records relevant to that type of emergency;
aggregating data of at least some of the relevant emergency data records into aggregated emergency information for that type of emergency; and
outputting a page based on the aggregated emergency information.
2. The method of claim 1, wherein receiving data comprises communicating with a remote data source, and wherein maintaining the emergency data record comprises maintaining the emergency data record in a local data store.
3. The method of claim 1, wherein determining that the data comprises emergency data comprises detecting information associated with the emergency data that indicates the data comprises emergency data.
4. The method of claim 1, wherein determining that the data comprises emergency data comprises matching the data to a pattern.
5. The method of claim 1, wherein maintaining an emergency data record related to the emergency data comprises flagging the data as emergency data to differentiate the emergency data from other data.
6. The method of claim 1, wherein the request for emergency data is received via a top emergency page and outputting the page comprises rendering an emergency sub-page.
7. The method of claim 1, further comprising sending an alert with respect to at least some of the emergency data to a remote data receiver, the alert based on data maintained in association with the relevant emergency data records.
8. A computer-readable medium having computer-executable instructions for performing the method of claim 1.
9. A computer-implemented method, comprising:
providing an emergency selection input mechanism via a user interface;
receiving a request via the emergency selection input mechanism to provide emergency data, the request including information corresponding to a type of emergency;
accessing a data store of emergency data based on the type of emergency information to locate at least two different records classified as corresponding to the type of emergency; and
outputting via the user interface the emergency data for the identified type of emergency based on information in the different records.
10. The method of claim 9, wherein providing an emergency selection input mechanism via the user interface comprises rendering an emergency page and at least one emergency sub-page based on a selection made at the emergency page.
11. The method of claim 9, further comprising verifying security information prior to outputting at least some of the emergency data.
12. The method of claim 9, further comprising receiving data, determining that the data comprises emergency data, and maintaining the emergency data in a record in the data store.
13. The method of claim 12, wherein receiving data comprises communicating with a remote data source, and wherein maintaining the emergency data comprises maintaining the record in a local data store.
14. The method of claim 12, wherein determining that the data comprises emergency data comprises detecting information associated with the emergency data that indicates the data comprises emergency data.
15. The method of claim 12, wherein maintaining information related to the emergency data comprises storing the emergency data in a data structure.
16. The method of claim 15, further comprising constructing at least part of the data structure.
17. A computer-readable medium having computer-executable instructions for performing the method of claim 9.
18. A computer-readable medium having stored thereon a data structure, comprising:
an emergency type field;
a duration field including expiry information for the data structure;
an emergency data field containing emergency data corresponding to the emergency type field; and
wherein user interaction with executable code causes the data structure to be accessed based on its emergency type to return the emergency data to the executable code, and wherein the data structure may be automatically deleted based on the expiry information in the duration field.
19. The data structure of claim 18, further comprising an identifier field, a sensitivity field containing information regarding the sensitivity of the emergency data, an action field, and at least one subtype field.
US11/070,069 2001-10-23 2005-03-01 Method and system of providing emergency data Abandoned US20050141676A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/070,069 US20050141676A1 (en) 2001-10-23 2005-03-01 Method and system of providing emergency data

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/999,002 US6882706B2 (en) 2001-10-23 2001-10-23 Method and system of providing emergency data
US11/070,069 US20050141676A1 (en) 2001-10-23 2005-03-01 Method and system of providing emergency data

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/999,002 Continuation US6882706B2 (en) 2001-10-23 2001-10-23 Method and system of providing emergency data

Publications (1)

Publication Number Publication Date
US20050141676A1 true US20050141676A1 (en) 2005-06-30

Family

ID=25545759

Family Applications (3)

Application Number Title Priority Date Filing Date
US09/999,002 Expired - Lifetime US6882706B2 (en) 2001-10-23 2001-10-23 Method and system of providing emergency data
US11/070,069 Abandoned US20050141676A1 (en) 2001-10-23 2005-03-01 Method and system of providing emergency data
US11/078,853 Expired - Fee Related US7570744B2 (en) 2001-10-23 2005-03-09 Providing emergency data

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/999,002 Expired - Lifetime US6882706B2 (en) 2001-10-23 2001-10-23 Method and system of providing emergency data

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/078,853 Expired - Fee Related US7570744B2 (en) 2001-10-23 2005-03-09 Providing emergency data

Country Status (1)

Country Link
US (3) US6882706B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110018959A1 (en) * 2009-07-27 2011-01-27 Cisco Technology, Inc. Automatic Display Latency Measurement System for Video Conferencing
US20120257729A1 (en) * 2011-04-08 2012-10-11 Rave Wireless, Inc. Emergency response data management

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7024662B2 (en) 2001-03-14 2006-04-04 Microsoft Corporation Executing dynamically assigned functions while providing services
US20030131142A1 (en) * 2001-03-14 2003-07-10 Horvitz Eric J. Schema-based information preference settings
US7302634B2 (en) 2001-03-14 2007-11-27 Microsoft Corporation Schema-based services for identity-based data access
US8489063B2 (en) * 2001-10-24 2013-07-16 Sipco, Llc Systems and methods for providing emergency messages to a mobile device
US8180704B2 (en) * 2002-05-17 2012-05-15 At&T Intellectual Property I, L.P. Lost credit card notification system and method
US9886309B2 (en) 2002-06-28 2018-02-06 Microsoft Technology Licensing, Llc Identity-based distributed computing for device resources
US7224957B2 (en) * 2003-03-17 2007-05-29 Spector Shelley J Apparatus and method for broadcasting messages to selected group(s) of users
US9984170B2 (en) * 2004-02-19 2018-05-29 Celeritasworks, Llc Community awareness management systems and methods
US7827120B1 (en) * 2004-02-19 2010-11-02 Celeritasworks Llc Community awareness management systems and methods
US20070027903A1 (en) * 2004-02-19 2007-02-01 Evans Scott A Community Awareness Management Systems and Methods
US20050245232A1 (en) * 2004-04-30 2005-11-03 Robert Jakober Emergency response mission support platform
US7616942B2 (en) * 2004-08-23 2009-11-10 Karl Maurice W Alert system and personal apparatus
US20060118636A1 (en) * 2004-12-07 2006-06-08 Planready, Inc. System and method for coordinating movement of personnel
US7545916B2 (en) * 2005-02-28 2009-06-09 At&T Intellectual Property I Methods of placing emergency calls using data networks
US20080088428A1 (en) * 2005-03-10 2008-04-17 Brian Pitre Dynamic Emergency Notification and Intelligence System
US7603432B2 (en) * 2005-06-06 2009-10-13 Aa, Llc Locality based alert method and apparatus
US20070105528A1 (en) * 2005-11-10 2007-05-10 Juergen Haas System and method for communicating emergency data
ES2385838T3 (en) 2006-04-18 2012-08-01 Research In Motion Limited System and method to provide access to information on portable devices
US20070288561A1 (en) * 2006-05-23 2007-12-13 Beckhusen Fred K Hyperlink-based notification system method
US11019007B1 (en) 2006-07-13 2021-05-25 United Services Automobile Association (Usaa) Systems and methods for providing electronic official documents
US20080043932A1 (en) * 2006-08-04 2008-02-21 Elliott Timothy J Method of transmitting emergency information
JP2008158664A (en) * 2006-12-21 2008-07-10 Sony Corp Communication system, server, communication terminal and communication method
US7983407B2 (en) * 2007-03-28 2011-07-19 Verizon Patent And Licensing Inc. Calling party number override for emergency services
US20090015397A1 (en) * 2007-07-10 2009-01-15 Allert All, Inc. Emergency light system
US7894843B2 (en) 2008-01-23 2011-02-22 Smart David A Handheld computer for emergency responders
US8910299B2 (en) * 2008-02-08 2014-12-09 Steven Charles Michalske Emergency information access on portable electronic devices
US20100017743A1 (en) * 2008-06-19 2010-01-21 Emerson Network Power - Embedded Computing, Inc. Graphical User Interface
US8649759B2 (en) * 2009-01-28 2014-02-11 Blackberry Limited Method of providing location information in an emergency
US8543081B2 (en) * 2009-01-28 2013-09-24 Blackberry Limited Method of integrating emergency information in a mobile device
US8521122B2 (en) * 2009-01-28 2013-08-27 Blackberry Limited Mobile device user interface for displaying emergency information
US9491604B2 (en) * 2010-10-22 2016-11-08 Blackberry Limited Method and system for placing an emergency phone call from a mobile communication device to an enterprise
US8666361B2 (en) 2012-07-17 2014-03-04 Blackberry Limited System and method of providing information access on a portable device
US9763098B2 (en) 2013-01-11 2017-09-12 Apple Inc. Bypassing security authentication scheme on a lost device to return the device to the owner

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4236068A (en) * 1979-03-29 1980-11-25 Walton Charles A Personal identification and signaling system
US5483586A (en) * 1994-07-18 1996-01-09 Sussman; Lester Electronic on-line subscriber telephone directory
US5742666A (en) * 1994-10-05 1998-04-21 Tele Digital Development, Inc. Emergency mobile telephone
US6065016A (en) * 1996-08-06 2000-05-16 At&T Corporation Universal directory service
US6125287A (en) * 1997-09-05 2000-09-26 Fujitsu Limited Wireless telephone having an improved user interface
US20020065063A1 (en) * 1999-05-24 2002-05-30 Christopher R. Uhlik System and method for emergency call channel allocation
US20020068599A1 (en) * 2000-12-04 2002-06-06 International Business Machines Corporation System and method for dynamic local phone directory
US6459497B1 (en) * 1994-12-21 2002-10-01 Canon Kabushiki Kaisha Method and apparatus for deleting registered data based on date and time of the last use
US6515695B1 (en) * 1998-11-09 2003-02-04 Kabushiki Kaisha Toshiba Terminal and system for multimedia communications
US6560222B1 (en) * 1998-04-03 2003-05-06 Vertical Networks, Inc. Systems and methods for multiple voice and data communications using intelligently bridged TDM and packet buses and methods for performing telephony and data functions using the same
US6574484B1 (en) * 1999-12-02 2003-06-03 Worldcom, Inc. Method for emergency service access using a mobile phone
US6662026B1 (en) * 2000-09-28 2003-12-09 International Business Machines Corporation Apparatus and method for detecting and handling accidental dialing on a mobile communications device
US6766159B2 (en) * 2000-03-10 2004-07-20 Nokia Mobile Phones Ltd. Alpha tagging and type indication of emergency call number
US6832263B2 (en) * 2000-04-27 2004-12-14 Hyperion Solutions Corporation Method and apparatus for implementing a dynamically updated portal page in an enterprise-wide computer system
US6996407B2 (en) * 2000-09-27 2006-02-07 Nec Corporation Shared-use portable telephone and method of sharing portable telephone

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0810538B1 (en) * 1996-05-28 2002-08-28 Fujitsu Limited Management system for using IC card with registered personal information
JPH11328562A (en) * 1998-05-18 1999-11-30 Nec Software Tohoku Ltd Emergency notification system
US6560165B1 (en) * 2000-03-28 2003-05-06 Diane K. Barker Medical information appliance
KR20010069619A (en) * 2001-04-23 2001-07-25 김남중 The telephone directory service based XML format

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4236068A (en) * 1979-03-29 1980-11-25 Walton Charles A Personal identification and signaling system
US5483586A (en) * 1994-07-18 1996-01-09 Sussman; Lester Electronic on-line subscriber telephone directory
US5742666A (en) * 1994-10-05 1998-04-21 Tele Digital Development, Inc. Emergency mobile telephone
US6459497B1 (en) * 1994-12-21 2002-10-01 Canon Kabushiki Kaisha Method and apparatus for deleting registered data based on date and time of the last use
US6065016A (en) * 1996-08-06 2000-05-16 At&T Corporation Universal directory service
US6125287A (en) * 1997-09-05 2000-09-26 Fujitsu Limited Wireless telephone having an improved user interface
US6560222B1 (en) * 1998-04-03 2003-05-06 Vertical Networks, Inc. Systems and methods for multiple voice and data communications using intelligently bridged TDM and packet buses and methods for performing telephony and data functions using the same
US6515695B1 (en) * 1998-11-09 2003-02-04 Kabushiki Kaisha Toshiba Terminal and system for multimedia communications
US20020065063A1 (en) * 1999-05-24 2002-05-30 Christopher R. Uhlik System and method for emergency call channel allocation
US6574484B1 (en) * 1999-12-02 2003-06-03 Worldcom, Inc. Method for emergency service access using a mobile phone
US6766159B2 (en) * 2000-03-10 2004-07-20 Nokia Mobile Phones Ltd. Alpha tagging and type indication of emergency call number
US6832263B2 (en) * 2000-04-27 2004-12-14 Hyperion Solutions Corporation Method and apparatus for implementing a dynamically updated portal page in an enterprise-wide computer system
US6996407B2 (en) * 2000-09-27 2006-02-07 Nec Corporation Shared-use portable telephone and method of sharing portable telephone
US6662026B1 (en) * 2000-09-28 2003-12-09 International Business Machines Corporation Apparatus and method for detecting and handling accidental dialing on a mobile communications device
US20020068599A1 (en) * 2000-12-04 2002-06-06 International Business Machines Corporation System and method for dynamic local phone directory

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110018959A1 (en) * 2009-07-27 2011-01-27 Cisco Technology, Inc. Automatic Display Latency Measurement System for Video Conferencing
US8599235B2 (en) * 2009-07-27 2013-12-03 Cisco Technology, Inc. Automatic display latency measurement system for video conferencing
US20120257729A1 (en) * 2011-04-08 2012-10-11 Rave Wireless, Inc. Emergency response data management
US10341494B2 (en) * 2011-04-08 2019-07-02 Rave Wirless, Inc. Emergency response data management

Also Published As

Publication number Publication date
US20030076932A1 (en) 2003-04-24
US7570744B2 (en) 2009-08-04
US6882706B2 (en) 2005-04-19
US20050157853A1 (en) 2005-07-21

Similar Documents

Publication Publication Date Title
US7570744B2 (en) Providing emergency data
US11086979B1 (en) Security system and method for controlling access to computing resources
US7634732B1 (en) Persona menu
US10860737B2 (en) Sending and tracking document data sent via URL
US9178995B2 (en) Systems and methods for event and incident reporting and management
US8725537B2 (en) Method and system for providing online records
EP1734464A1 (en) Work flow managing system
US20140095498A1 (en) Systems And Methods For Facilitating Access To Documents Via A Set Of Content Selection Tags
US20040181711A1 (en) Change request form annotation
US20100269157A1 (en) System and Method for User Control of Authorizing and Tracking Access to Electronic Records
US9037537B2 (en) Automatic redaction of content for alternate reviewers in document workflow solutions
AU2011201369A1 (en) Systems and methods for redacting sensitive data entries
JPH1091265A (en) Portable information equipment
US8930326B2 (en) Generating and utilizing a data fingerprint to enable analysis of previously available data
US20090007245A1 (en) System and method for controlled content access on mobile devices
WO2002086744A1 (en) Methods, systems and emails to link emails to matters and organizations
WO2005099381A9 (en) Expression and time-based data creation and creator-controlled organization
US6785680B1 (en) Method and apparatus for providing individualized client data from a service provider to a portable digital device of a client
CN111815421B (en) Tax policy processing method and device, terminal equipment and storage medium
US20090138482A1 (en) Law enforcement data management techniques
WO2000067108A1 (en) Method and apparatus for populating a personal information record of a personal information management application
US8886687B2 (en) Online safety deposit box
US20030208719A1 (en) Immigration law case management system
WO2009154635A1 (en) System and method for controlled content access on mobile devices
US20060190433A1 (en) Distributed navigation business activities data

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034766/0001

Effective date: 20141014