Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
DIGITAL PERSONAL SAFETY APPLICATION
Document Type and Number:
WIPO Patent Application WO/2024/092184
Kind Code:
A1
Abstract:
Descriptions of cosmetic items with personal safety devices are disclosed herein. In some embodiments, the cosmetic items hold personal beautification products such as makeup. In some embodiments, in addition to makeup, the cosmetic items also include a testing assembly which indicates the presences of specific chemicals mixed in liquids such as alcohol or water. In some embodiments, the cosmetic item includes a computer code trigger which initiates an emergency system. In various embodiments the computer code trigger takes the form of a button or printed computer code, and may include a wireless transmitter for automatically sending signals to one or more computers.

Inventors:
HOOVER JOY (US)
GORDER CHARLES DAVID (US)
BITKOWSKI DAVID EUGENE (US)
CHIARAVALLI PAOLO (US)
Application Number:
PCT/US2023/077999
Publication Date:
May 02, 2024
Filing Date:
October 27, 2023
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ESŌES COSMETICS LLC (US)
International Classes:
G08B27/00; H04H20/00; H04L67/55; H04W4/90; H04H20/59; H04H40/27
Domestic Patent References:
WO2021089463A12021-05-14
Foreign References:
US20160037292A12016-02-04
US20190327597A12019-10-24
US20170013093A12017-01-12
US20170005958A12017-01-05
US20150373521A12015-12-24
Attorney, Agent or Firm:
BASILE, Todd C. (US)
Download PDF:
Claims:
CLAIMS

What is claimed is:

1. A computer-implemented method comprising: identifying, by a processor, a particular device capable of communicating with a plurality of computing devices via a network; utilizing, by the processor, the particular device to detect at least one distress action occurring in a predetermined proximity of the particular device; generating, by the processor, a unique notification within a digital application, wherein the digital application is stored on the particular device; utilizing, by the processor, a configurable action state module to establish a predetermined threshold of interaction by a particular user based on preferences associated with the particular user; automatically determining, by the processor, a distress level associated with the at least one distress action based on a plurality of parameters; dynamically transmitting, by the processer and in response to establishing the predetermined threshold of interaction by the particular user, the unique notification to the plurality of computing devices via the network based on the distress level of the at least one distress action exceeding the threshold of interaction; and automatically triggering, by the processor, a selection of at least one workflow to mitigate the distress level associated with the at least one distress action, wherein the at least one workflow comprises a plurality of external action modules.

2. The method of claim 1, wherein the particular device is a beacon device capable of communicating via a Bluetooth network.

3. The method of claim 1, wherein the at least one distress action comprises an event that requires a presence of the plurality of parameters.

4. The method of claim 1, wherein the predetermined proximity of the particular device is a range of area that the particular device collects data via sensors to determine potential distress levels.

5. The method of claim 1, wherein the unique notification comprises an automated emergency message detailing information associated with the at least one distress action.

6. The method of claim 1, further comprising utilizing a natural language processing module to dynamically convert audio data into text data to generate the unique notification.

7. The method of claim 1, wherein the predetermined threshold of interaction associated with the particular user comprises a quantified value associated with the number of interactions of the particular user with the digital application.

8. The method of claim 1, wherein the preferences associated with the particular user comprise: a determined pattern of behavior associated with the particular user over time, a plurality of received user-specific preferences, the established predetermined threshold of interaction, and any data collected in the predetermined proximity of the particular device.

9. The method of claim 1, wherein the distress level comprises a quantified range of distress associated with a presence of the plurality of parameters associated with the at least one distress action.

10. A computer-implemented method for automatically notifying one or more external sources of an emergency situation, the computer-implemented method comprising: receiving, by a processor, one or more electronic signals generated by a computing device or companion device, the one or more electronic signals being generated in response to input from a user of the computing device or companion device and having characteristics uniquely corresponding to the particular input from the user; automatically identifying, by the processor and based on the characteristics of one or more electronic signals, one or more external sources to be notified and one or more notifications containing information regarding an emergency situation involving a user of the computing device or companion device; and dynamically transmitting, by the processor, the one or more notifications to the one or more external sources.

11. The method of claim 10, wherein the user input includes actuating an actuator of the computing device or companion device, and wherein the characteristics uniquely correspond to at least one of a duration and a sequence of the actuation.

12. The method of claim 10, wherein the user input includes making a touch gesture on a touchscreen of the computing device or companion device, and wherein the characteristics uniquely correspond to at least one of a type, duration, and a sequence of the touch gesture.

13. The method of claim 10, wherein the user input includes scanning a printed computer code with the computing device or companion device.

14. The method of claim 10, wherein the user input includes executing a positive test for one or more predetermined chemicals applied to a chemical testing assembly of the computing device or companion device.

15. The method of claim 10, wherein the one or more external sources and the one or more notifications are stored in association with the corresponding electronic signal characteristics.

16. The method of claim 10, wherein the information regarding the emergency situation includes at least one of a nature of the emergency situation, a distress level of the user, a location of the user, and a requested action to be taken by the one or more external sources.

17. A system for automatic initiation of an emergency alert system, comprising: a companion device, comprising: a cosmetic container configured to house one or more cosmetic items; and a chemical presence indicator configured to indicate the presence of one or more chemicals within a liquid when the liquid is applied to the chemical presence indicator; wherein the chemical presence indicator is coupled to the cosmetic container; and a digital application configured to operate on a computing device and to automatically transmit, in response to user input or a signal transmitted from a companion device, one or more notifications containing information regarding a potential emergency situation involving a user to one or more external data sources.

18. The system of claim 17, wherein the companion device is capable of sending the signal for receipt by the digital application when the chemical presence indicator detects a particular chemical.

19. The system of claim 17, wherein the companion device comprises an alert generation module that the user actuates and activates to send the signal for receipt by the digital application.

20. The system of claim 17, wherein the information regarding the potential emergency situation includes a notice that the user is in an unsafe situation.

Description:
DIGITAL PERSONAL SAFETY APPLICATION

CROSS-REFERENCE TO RELATED APPLICATION

[0001] This application claims the benefit of and priority to U.S. Provisional Application No. 63/420,076, filed October 27, 2022, which is hereby incorporated herein by reference in its entirety for all purposes.

BACKGROUND

[0002] In the United States alone, a woman is assaulted every 9 seconds. 1 in 3 women will be victims of domestic violence in their lifetime. Approximately 70 women commit suicide every day in the US following act of sexual violence. Domestic violence is the leading cause of injury to women: more than car accidents, muggings, and rapes combined. There is an economic price to domestic violence as well. Domestic violence victims lose nearly 8 million days of paid work per year in the US, which is the equivalent of 32,000 full-time jobs.

[0003] Women are also the perpetual target of strangers with ill intent. One of the most common tools of these predators are so called “date rape drugs” that can cause a victim to become both physically and mentally incapacitated. These illicit drugs can be surreptitiously added to a woman’ s drink in a social setting and quickly render her vulnerable to sexual assault. [0004] This is an all too common scenario, and even if a stranger has no ill intent, the prospect of being drugged can be frightening and put a damper on social interactions. Efforts to test a drink using conventional methods are likely to be noticeable, and thus women may be hesitant to use them for fear of prompting a dangerous reaction or of offending a suitor. Still further, many women do not know what to do if they find themselves in a potentially dangerous situation. Calls to friends or authorities may be difficult to make without being noticed, or may not be possible once the chemical has taken affect.

[0005] Accordingly, there is a need for discrete way to test a beverage for the presence of date rape drugs or other substances by integrating a chemical testing kit with cosmetic items likely to always be carried by the user and utilizing a digital application stored on a computing device to transmit hidden emergency messages to particular users without alerting potential attackers. There is a further need for a way to clearly and discretely provide contact information for support lines and other sources of help should a user find themselves in a dangerous situation. SUMMARY

[0006] The present disclosure is directed to a cosmetic container comprising a cosmetic item, a chemical testing assembly, and/or an automated emergency alert system.

[0007] In some embodiments, the present disclosure provides an exemplary technically improved computer-implemented method that includes at least the following steps: identifying a particular device capable of communicating with a plurality of computing devices via a network utilizing the particular device to detect at least one distress action occurring in a predetermined proximity of the particular device; generating a unique notification within a digital application, where the digital application is stored on the particular device; utilizing a configurable action state module to establish a predetermined threshold of interaction by a particular user based on preferences associated with the particular user; automatically determining a distress level associated with the at least one distress action based on a plurality of parameters; dynamically transmitting, in response to establishing the predetermined threshold of interaction by the particular user, the unique notification to the plurality of computing devices via the network based on the distress level of the at least one distress action exceeding the threshold of interaction; and automatically triggering a selection of at least one workflow to mitigate the distress level associated with the at least one distress action, where the at least one workflow includes a plurality of external action modules.

[0008] In some embodiments, the present disclosure provides a technically-improved testing chemical compositions system that includes a cosmetic container configured to house one or more cosmetic items; and/or a chemical presence indicator configured to indicate the presence of one or more chemicals within a liquid when the liquid is applied to the chemical presence indicator.

BRIEF DESCRIPTION OF THE DRAWINGS

[0009] Illustrative, non-limiting example embodiments will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings. [00010] FIG. 1 illustrates aspects of an automatic emergency alert system, in accordance with one or more embodiments of the present disclosure.

[00011] FIG. 2 depicts an example of a digital application associated with the automatic emergency alert system, in accordance with one or more embodiments of the present disclosure. [00012] FIG. 3 is a flowchart illustrating operational steps for automatically triggering at least one workflow based on a detection of at least one escalating distress action, in accordance with one or more embodiments of the present disclosure.

[00013] FIGS. 4 A and 4B depict a public state of the digital application and a private state of the digital application, in accordance with one or more embodiments of the present disclosure.

[00014] FIG. 5 depict an exemplary automated emergency message within the digital application, in accordance with one or more embodiments of the present disclosure.

[00015] FIG. 6 depicts an example contact list within the digital application, in accordance with one or more embodiments of the present disclosure.

[00016] FIG. 7 depicts an example location setting feature within the digital application, in accordance with one or more embodiments of the present disclosure.

[00017] FIG. 8 depicts an example pre-generated click state legend within the digital application, in accordance with one or more embodiments of the present disclosure.

[00018] FIG. 9 depicts an example user setting interface within the digital application, in accordance with one or more embodiments of the present disclosure.

[00019] FIG. 10 depicts a block diagram of an exemplary computer-based system/platform in accordance with one or more embodiments of the present disclosure.

[00020] FIG. 11 depicts a block diagram of another exemplary computer-based system/platform in accordance with one or more embodiments of the present disclosure.

[00021] FIGS. 12 and 13 are diagrams illustrating implementations of cloud computing architecture/aspects with respect to which the disclosed technology may be specifically configured to operate, in accordance with one or more embodiments of the present disclosure. [00022] FIG. 14 depicts a partial exploded view of chemical testing assembly and alert module, in accordance with one or more embodiments of the present disclosure.

[00023] FIG. 15 depicts the cosmetic container in a fully assembled state, in accordance with one or more embodiments of the present disclosure.

[00024] FIG. 16 illustrates aspects of a bottom portion of the cosmetic container, in accordance with one or more embodiments of the present disclosure.

[00025] FIG. 17 shows a cross-section view A- A of the cosmetic container, in accordance with one or more embodiments of the present disclosure.

[00026] FIG. 18 shows a cross-section view B-B of the cosmetic container, in accordance with one or more embodiments of the present disclosure. [00027] FIG. 19 shows a cross-section view C-C of the cosmetic container, in accordance with one or more embodiments of the present disclosure.

[00028] FIG. 20 shows a cross-section view D-D of the cosmetic container, in accordance with one or more embodiments of the present disclosure.

[00029] FIG. 21 illustrates a longitudinal cross-sectional view E-E of the cosmetic container, in accordance with one or more embodiments of the present disclosure.

[00030] FIG. 22 shows a different longitudinal cross-section view F-F of the cosmetic container according to some embodiments.

DETAILED DESCRIPTION

[00031] Embodiments of the present disclosure are directed to systems and methods (collectively referred to as the “system”) to end self-directed, interpersonal, and collective violence by providing tools that increase safety and solidarity. As described in more detail herein, the system can include an automatic emergency system configured to discreetly notify one or more third parties of an emergency situation involving a user of the system. In various embodiments, the automatic emergency system may include a digital application and a user interface for interacting with the digital application. In some embodiments, the user interface may be an integral part of the mobile device (e.g., a touch screen and/or one or more buttons), while in other embodiments the user interface may be a device in communication with the mobile device (e.g., a smart watch or other peripheral, such as the cosmetic item later described herein. Generally speaking, the automatic emergency system of the present disclosure may be configured to receive or otherwise detect one or more signals indicative of the user being in an emergency situation and implement a corresponding workflow in response, as described in more detail below.

System General Overview

[00032] FIG. 1 illustrates aspects of the system 100 that includes computer system 102 enabling or including the systems and methods described herein in accordance with some embodiments of an automatic emergency alert system. In some embodiments, the computer system 102 can operate and/or process printed and/or electronic computer-executable code. Further, in some embodiments, the computer system 102 can operate and/or display information within one or more graphical user interfaces (e.g., HMIs) integrated with or coupled to the system such as through a digital application.

[00033] In some embodiments, the computer system 102 can include at least one processor 104. In some embodiments, the at least one processor 104 can reside in, or coupled to, one or more conventional server platforms 106. In some embodiments, the computer system 102 can include a network interface 108a and an application interface 108b coupled to the least one processor 104 capable of processing at least one operating system 110. Further, in some embodiments, the interfaces 108a, 108b coupled to at least one processor 104 can be configured to process one or more of software modules (e.g., such as enterprise applications) 112. In some embodiments, the software application modules 112 can include server-based software, and can operate to host at least one user account and/or at least one client account, and operate to transfer data between one or more of these accounts using the at least one processor 104.

[00034] With the above embodiments in mind, it is understood that the system can employ various computer-implemented operations involving data stored in computer systems. Moreover, the above-described databases and models described throughout this disclosure can store analytical models and other data on computer-readable storage media within the computer system 102 and on non-transitory computer-readable storage media coupled to the computer system 102 according to various embodiments. In addition, in some embodiments, the abovedescribed applications of the system can be stored on computer-readable storage media within the computer system 102 and on computer-readable storage media coupled to the computer system 102. In some embodiments, these operations are those requiring physical manipulation of physical quantities. Usually, though not necessarily, in some embodiments these quantities take the form of one or more of electrical, electromagnetic, magnetic, optical, or magnetooptical signals capable of being stored, transferred, combined, compared and otherwise manipulated. In some embodiments, the computer system 102 can comprise at least one computer readable medium 114 coupled to one or more of at least one data source 116a, at least one data storage 116b, and/or at least one input/output 116c. In some embodiments, the computer system 102 can be embodied as computer readable code on a printed and/or electronic non-transitory computer readable medium 114. In some embodiments, the non- transitory computer readable medium 114 can be any data storage that can store data, which can thereafter be read by a computing device 118 (such as a computer or a smart phone). In some embodiments, the computer readable medium 114 can be any physical or material medium that can be used to tangibly store the desired information or data or instructions and which can be accessed by a computer 118 or processor 104. In some embodiments, the computer readable medium 114 can include hard drives, network attached storage (NAS), readonly memory, random-access memory, FLASH based memory, CD-ROMs, CD-Rs, CD-RWs, DVDs, magnetic tapes, other optical and non-optical data storage. In some embodiments, various other forms of computer-readable media 114 can transmit or carry instructions to a remote computer 118 and/or at least one user 120, including a router, private or public network, or other transmission or channel, both wired and wireless. In some embodiments, the software application modules 112 can be configured to send and receive data from a database (e.g., from a computer readable medium 114 including data sources 116a and data storage 116b that can comprise a database), and data can be received by the software application modules 112 from at least one other source. In some embodiments, at least one of the software application modules 112 can be configured within the computer system 102 to output data to at least one user 120 via at least one graphical user interface rendered on at least one digital display.

[00035] In some embodiments, the computer readable medium 114 can be distributed over a conventional computer network via the network interface 108a where the system embodied by the computer readable code can be stored and executed in a distributed fashion. For example, in some embodiments, one or more components of the computer system 102 can be coupled to send and/or receive data through a local area network (“LAN”) 122a and/or an internet coupled network 122b (e.g., such as a wireless internet). In some embodiments, the networks 122a, 122b can include wide area networks (“WAN”), direct connections (e.g., through a universal serial bus port), or other forms of computer-readable media 114, or any combination thereof.

[00036] In some embodiments, components of the networks 122a, 122b can include any number of personal computers 118 which include for example desktop computers, and/or laptop computers, or any fixed, generally non-mobile internet appliances coupled through the LAN 122a. For example, some embodiments include one or more of personal computers 118, databases 124, and/or servers 126 coupled through the LAN 122a that can be configured for any type of user including an administrator. Some embodiments can include one or more personal computers 118 coupled through network 122b. In some embodiments, one or more components of the computer system 102 can be coupled to send or receive data through an internet network (e.g., such as network 122b). For example, some embodiments include at least one user 120 is coupled wirelessly and accessing one or more software modules of the system including at least one enterprise application 112 via an input and output (“I/O”) 116c. In some embodiments, the computer system 102 can enable at least one user 120to be coupled to access enterprise applications 112 via an I/O 116c through LAN 122a. In some embodiments, the user 120 can comprise a user 120 coupled to the computer system 102 using a desktop computer, and/or laptop computers, or any fixed, generally non-mobile internet appliances coupled through the internet 122b. In some embodiments, the user can comprise a mobile user 120 coupled to the computer system 102. In some embodiments, the user 120 can connect using any mobile computing device 118 to wireless coupled to the computer system 102, including, but not limited to, one or more personal digital assistants, at least one cellular phone, at least one mobile phone, at least one smart phone, at least one pager, at least one digital tablets, and/or at least one fixed or mobile internet appliances.

[00037] System 100, in various embodiments, may further comprise one or more companion devices 119 in communication with computing device 118, as later described in more detail.

Digital Application 127

[00038] Referring now to FIGS. 2-9, the system 100, in various embodiments, may include a digital application 127 configured to operate on computing device 118 and implement one or more to the various methods described herein. More specifically, in various embodiments, digital application 127 may receive input(s) in connection with an emergency situation and, in response, automatically determine and implement one or more appropriate actions or workflows.

[00039] FIG. 2 depicts an exemplary schematic of the digital application 127, in accordance with one or more embodiments of the present disclosure. In some embodiments, the digital application 127 may include a plurality of modules that communicate with each other and external computing devices. The plurality of modules may refer to an exemplary distress mitigation module 128, a device reader module 130, an alert generation module 131, a configurable action state module (“CASM”) 132, a trigger module 133, a machine learning module 134, a natural language processing module 136, and a graphical user interface generation module 138.

Distress Mitigation Module

[00040] The exemplary distress mitigation module 128 may automatically transmit notifications and automatically select pre-generated workflows to mitigate emergency events. This transmission may refer to a communication between the digital application 127 and any external computing devices, even the companion device 101. [00041] In some embodiments, the exemplary distress mitigation module 128 may determine an occurrence of an emergency event utilizing a plurality of sensors housed within the computing device 118. In certain embodiments, the exemplary distress mitigation module 128 automatically generate instructions for the computing device 118 to interact with external data sources and/or the companion device 101. The exemplary distress mitigation module 128 may be utilized by the computing device 118 to automatically select a particular workflow to mitigate a distress level associated with the emergency event. This mitigation may refer to automatically contacting emergency services, authorities, and/or preselected contacts previously determined by a user. In certain embodiments, the exemplary distress mitigation module 128 may generate instructions based on communications with the companion device 101, where the companion device 101 may refer to cosmetic item capable of detecting illegal substances within a liquid.

[00042] In some embodiments, the exemplary distress mitigation module 128 selects the particular workflow to mitigate emergency events at an increased efficiency than typical emergency systems can. These workflows may contain a plurality of external action modules that assist the exemplary distress mitigation module 128 in determining an appropriate course of action to optimize a mitigation of a particular emergency event. Each external action module may refer to a set of instructions that the exemplary distress mitigation module 128 determines as an optimal course of action to mitigate a plurality of features associated with the particular emergency event. This provides an additional source of security to the user of the computing device 118 and dynamically reduces potential risk to the user.

[00043] In some embodiments, the exemplary distress mitigation module 128 may automatically mitigate the particular emergency event by identifying the computing device 118 as a beacon device capable of communicating with the plurality of computing devices; utilizing the beacon device to detect an emergency event occurring in a predetermined proximity of the beacon device; automatically generating a unique notification within the digital application 127; utilizing the CASM module 132 to establish a threshold of interaction associated with the particular user 120; automatically determine the distress level of the emergency event based on the plurality of parameters; dynamically transmit the unique notification to the plurality of computing devices via the network, and automatically trigger a selection of a particular workflow to mitigate the distress level of the emergency event.

[00044] In certain embodiments, the computing device 118 when interacting with the exemplary distress mitigation module 128 may be referred to as a beacon device, where the beacon device may be configured to communicate with external data sources (i.e., the plurality of computing devices) via blue tooth technology. These external data sources may refer to external computing devices associated with emergency service providers, authorities, and/or particular contacts previously selected by the user 120.

[00045] In some embodiments, the exemplary distress mitigation module 128 may utilize the computing device 118 (i.e., beacon device) to advertise a unique notification to the digital application 127 associated with the system 100. In some embodiments, the exemplary distress mitigation module 128 may dynamically interact with a device reader module 130 to broadcast a plurality of data states and/or unique notifications from the computing device 118. In certain embodiments, the exemplary distress mitigation module 128 may utilize the device reader module 130 to break these data states, broadcast each broken data state based on a number of times the user 120 clicks a touch screen of the computing device 118, and generates a clicked data state. In certain embodiments, the beacon device may include an alert generation module 131. In some embodiments, the system 100 may utilize exemplary distress mitigation module 128 to interact with a configurable action state machine (“CASM”) 132 to analyze a plurality of emergency situations, predicted responses to each emergency situation, a workflow containing a plurality of external action modules and the number of clicks associated with the device reader module 130. In certain embodiments, the CASM 132 may define the predicted response to each emergency situation in states related to each click state. These actions may be pre-configured based on a plurality of various distress mitigation actions such as automated notifications, phone calls, and/or other actions that provide information to the external data sources identified by the user 120. A different action state may refer to an escalating path of distress mitigation based on the user 120 matching the mitigation to the severity of the emergency situation. In certain embodiments, the exemplary distress mitigation module 128 may utilize a printed code to trigger the selection of a particular workflow based on the predicted response and the analysis of the emergency situation. The exemplary distress mitigation module 128 may utilize a plurality of camera devices and/or sensor devices within the computing device 118 to read the printed code. In some embodiments, the CASM 132 may transmit a particular data state associated with the plurality of plurality of external action modules of the particular workflow to a trigger module 133. The trigger interface 133 may collect any data associated with each action, verify the particular workflow is capable of mitigated the distress level of the emergency event, and generate instructions to execute each action of the particular workflow. In certain embodiments, the trigger interface 133 may determine whether the action is internal or external of the computing device 118. [00046] The exemplary distress mitigation module 128 may be integrated into the computing device 118 and/or may direct the user to a portion of the digital application (e.g., website, server) by way of an actuator 318 and/or printed computer code scannable by an image capturing device (e.g., a camera, laser scanner). In certain embodiments, the mobile application may refer to a discrete and customizable plurality of widgets that allow the user to discretely generate emergency messages 502 to external data sources, such as computing devices associated with contacts, authorities, and/or emergency services. The exemplary distress mitigation module 128 may include one or more tangible, non-transitory computer readable media with instructions stored thereon that when executed by one or more processors cause the one or more computers to implement one or more steps. In some embodiments, upon scanning the printed computer code with an image capturing device or pressing the actuator 318. In some embodiments, the exemplary distress mitigation module 128 may be configured to implement one or more of: uploading a photograph of test results to an emergency data storage 116b; uploading incident evidence (e.g., photographs, videos, recordings) of the environment and/or perpetrator to the emergency data storage 116b; uploading location data; notifying emergency response personnel (e.g., police, ambulance); notifying emergency contacts (set up in the digital application 127); initiating location tracking and reporting of current location to one or more emergency response teams and/or contacts; and/or initiating a safety call to and/or from emergency response teams and contacts. The exemplary distress mitigation module 128 dramatically improves safety by removing the need for the user 120 to manage the response to the danger, as the illicit substance may incapacitate the user 120 before they can find help or the use of a discrete application does not raise suspicion by a potential attacker to the user reaching out for help.

[00047] In some embodiments, the system 100 enables the user 120 to document the results, time, place, and even the perpetrator by opening a system app and/or mobile phone camera and scanning the printed computer code and/or pressing actuator 318. The system is configured to then automatically upload photos or videos to the emergency system database, which the user 120 discretely obtains either directly or indirectly. The programming instructions then cause one or more computers to alert an emergency operator and/or dispatch an emergency responder to the victim’s location. The exemplary distress mitigation module 128 also sends and/or tracks the user’s location and provides that information to emergency contacts. Although the user 120 may begin to lose consciousness from the effects of the drug the authorities and/or contacts can locate the user 120 and/or perpetrator using the mobile phones global positioning system (GPS) and/or cellphone tower location data. Although the user 120 may become unconscious, the system 100 is configured to provide a description of the predator to emergency responders to facilitate arrest, as well as the chemical composition of the drug (e.g., based on color, shape) so that proper medical recovery procedures can be applied.

[00048] In some embodiments, the user 120 may directly interact with the digital application 127 via the computing device 118. In certain embodiments, the user 120 may be referred to as a victim of the emergency situation. The user may interact with the digital application 127 within the computing device 118 via a plurality of haptic sensors equally distributed over the surface of the computing device 118 to form a touchscreen display. This touchscreen display of the computing device 118 may utilize the plurality of haptic sensors to capture pressure of touch of the user 120. For example, the touchscreen display of the computing device 118 may determine a gesture of the user 120 (i.e., tapping an icon within the digital application 127). In certain embodiments, the touchscreen display may distinguish the pressure of the user 120 to determine whether the user 120 is holding down a particular icon rather than tapping the particular icon.

[00049] In some embodiments, the user 120 may interact with the digital application 127 within the computing device 118 via a button layout, where each button is responsible for a particular action. For example, the user 120 may automatically transmit an emergency message to the plurality of external computing devices by inputting a unique sequence of buttons within the button layout. In certain embodiments, the digital application 127 may utilize a combination of the touchscreen display and the button layout to automatically transmit the emergency message by inputting a unique sequence, where a portion of the unique sequence may refer to a pressure threshold of a particular button.

[00050] In some embodiments, the user 120 may interact with the digital application 127 within the computing device 118 via a microphone. In some embodiments, the user 120 may speak a plurality of verbal cues near the microphone of the computing device 118 to automatically transmit the emergency message to the plurality of external computing devices. For example, a particular verbal cue may be the word “help.” In other examples, the particular verbal cue may refer to a plurality of unique code words and/or phrases that may detected via the microphone of the computing device 118. In some embodiments, the digital application 127 may utilize the natural language processing module to convert audio data associated with the plurality of verbal cues into text data to assist in generating the emergency message.

[00051] System 100, in various embodiments, may comprise further tools for assisting a user (e.g., potentially vulnerable person, concerned citizen, bartender, etc.) in automatically contacting a hotline or other services for advice and support when navigating a potentially dangerous situation, whether or not a drink has tested positive for debilitating drugs, and whether or not an assailant is a stranger or a domestic partner.

[00052] In some embodiments, the exemplary distress mitigation module 128 may include an automated emergency message 502 printed onto a chemical testing surface such as test strips. The automated emergency message 502 may also include and/or be computer code that, when executed, triggers one or more aspects of the exemplary distress mitigation module 128. Advantageously, in some embodiments the automated emergency message 502a includes readable text such as “I’m in danger! Please help!” so that the testing strip, with or without a positive result, can be discretely passed to an authority figure who can then remove the victim from the dangerous situation. In certain embodiments, the automated emergency message 502b may be automatically transmitted to an external data source in response to the computing device 118 receiving a particular code previously established by the user, where the particular code may refer to click states input within the digital application.

[00053] In some embodiments, one or more chemical testing surfaces (e.g., strips, tokens) comprise printed computer code (e.g., a QR code, barcode) configured to trigger the automatic emergency alert system upon execution in one or more computer systems. In some embodiments, the printed computer code is located on a testing surface cover (e.g., adhesive cover, door). In some embodiments, the printed computer code, is located one or more portions of the container body 305 and/or the container cap 313. Advantageously, since the printed computer code 502 triggers various other aspects of the automatic emergency alert system it can take any form, such as one or more alphanumeric characters (e.g., “Help!”), as a nonlimiting example. In some embodiments the automatic emergency alert system comprises printed characters located one or more physical system components (e.g., cosmetic container, testing surface), where the one or more system components serve as one or more non-transitory computer readable media.

[00054] Additionally or alternatively, in some embodiments, digital application 127 may interface with one or more companion devices 119 in communication with computing device 118 and automatically receive information concerning a potential emergency situation from companion device 119. For example, in various embodiments, companion device 119 may include one or more of the cosmetic containers and systems described in U.S. Patent 11,976,478 entitled Cosmetic Item for Personal Safety filed on 10/27/2021, which is hereby incorporated by reference for all purposes. In some such embodiments, the alert generation module 131 may be configured to automatically trigger the exemplary distress mitigation module 128 by sending a wireless signal to computing device 118, where digital application 127 may in turn send a corresponding message or instructions to a remote server configured to implement remaining steps of the method. Upon receiving the signal, the one or more computers may execute computer code to send emergency messages and the like. In certain embodiments, the alert generation module 131 may communicate with the device reading module 130 and the CASM 132 to generate instructions to execute at least one external action to mitigate an escalating emergency distress action in response to determining the presence of at least one escalating emergency distress action. For example, in an embodiment, companion device 119 may be configured to transmit a wireless signal to computing device 118 for processing and action by digital application 127 in response to (and, in some embodiments, corresponding with) user 120 activating an emergency button on companion device 119. Additionally or alternatively, in another embodiment, the detection of one or more chemicals within the liquid applied to a chemical testing assembly of the companion device 119 may automatically cause companion device 119 to transmit a wireless signal to computing device 118 for processing and action by digital application 127. It should be recognized that companion device 119 need not necessarily include the referenced cosmetic item, but rather may include any device suitable for providing an interface with digital application 127 running on computing device 118.

[00055] In some embodiments, the system 100 uses an actuator 318 in the form of an actuator button which can be used in place of the printed computer code in any of the various embodiments described herein. In general, all forms of triggering the exemplary distress mitigation module 128 described herein (e.g., scanning printed code or actuating actuator 318) cause one or more computer implemented steps described herein, which are not repeated for various embodiments in the interest of being concise.

In Operation

[00056] FIG. 3 is a flowchart 200 illustrating operational steps for automatically triggering at least one workflow based on a detection of at least one escalating emergency distress action, in accordance with one or more embodiments of the present disclosure.

[00057] In step 202, the exemplary distress mitigation module 128 may identify a particular device 118. In some embodiments, the exemplary escalating distress mitigation module 128 may identify the particular device 118 as a beacon device. In certain embodiments, the particular device may advertise a particular message to a digital application 127 associated with the computing device 118. The particular device 118 may be capable of communicating with a plurality of computing devices via a network. In some embodiments, the particular device 118 may transmit multiple messages and/or data states to a single device. In some embodiments, the exemplary distress mitigation module 128 may utilize a device reader module 130 to interact with the particular device 118 and/or the companion device 119.

[00058] In step 204, the exemplary distress mitigation module 128 may detect at least one distress action. In some embodiments, the exemplary distress mitigation module 128 may utilize the particular device 118 to detect at least one distress action occurring a predetermined proximity of the particular device. The exemplary distress mitigation module 128 may utilize a plurality of sensors, such as visual sensors, audio sensors, thermal sensors, etc., to detect the at least one escalating distress action occurring near the particular device. In certain embodiments, the user may manually enter the digital application 127 to input a distress action. The predetermined proximity may be determined via preferences of the user, where a range of a minimum area of one meter and a maximum area of ten meters encompassing the particular device 118.

[00059] In step 206 the exemplary escalating distress mitigation module 128 may generate a unique notification. In some embodiments, the exemplary distress mitigation module 128 may automatically generate the unique notification within the digital application 127. The unique notification may refer to the automated emergency message 502 in response to a detection of the at least one distress action occurring near the particular device 118. In some embodiments, the exemplary distress mitigation module 128 may automatically generate a unique notification based on the detection of the at least one distress action, where the unique notification corresponds directly with the nature of the distress action.

[00060] In step 208, the exemplary distress mitigation module 128 may establish a predetermined threshold of interaction by a particular user 120. In some embodiments, the exemplary distress mitigation module 128 may utilize a configurable action state module (“CASM”) 132 to establish a predetermined threshold of interaction by the particular user 120. In some embodiments, the exemplary distress mitigation module 128 may utilize a plurality of machine learning modules 134 to collect training data associated with the behavior of the particular user via monitoring the particular device 118 and identifying a pattern of behavior based on the collected training data to establish the predetermined threshold of interaction by the particular user 120. The threshold of interaction may refer to a quantified value of time the particular user spends interacting with the digital application 127 of the computing device 118. In some embodiments, the exemplary distress mitigation module 128 may utilize the CASM 132 to establish the predetermined threshold of interaction by the particular user 120 based on user-specific preferences associated with the particular user 120. These user-specific preferences may refer to the permission to monitor the plurality of activities associated with the particular device 118. In certain embodiments, the user-specific preferences may refer to a unique customization of a plurality of widgets associated with the digital application 127, such as the order of discrete codes on the display page of the digital application 127. In other embodiments, the user-specific preferences may also refer to a click state legend associated with the number of clicks required by the particular user 120 to automatically transmit a generated unique notification to an external data source.

[00061] In step 210, the exemplary distress mitigation module 128 may automatically determine a distress level associated with the at least one distress action. In some embodiments, the exemplary distress mitigation module 128 may automatically determine the distress level associated with the at least one distress action based on a plurality of parameters. The plurality of parameters associated with the distress level may refer to the determined pattern of behavior associated with the particular user 120, the user-specific preferences, the established predetermined threshold of interaction, and the data collected in the proximity near the particular device 118. The distress level increases with the presence of each parameter of the plurality of parameters. In certain embodiments, the exemplary distress mitigation module 128 may assign a value to each parameter, where the presence of the particular parameter, the assigned value of that particular parameter is aggregated with any other particular parameters detected as present. The distress level may refer to a range of values based on the aggregated values of the plurality of parameters, where a low distress level, mid distress level, and high distress level correspond with separate thresholds associated with the aggregated values of the present parameters. The low distress level may correspond to a range of one to three, the mid distress level may correspond to a range of four to six, and the high distress level may correspond to a range of seven to ten, with ten being the maximum. In certain instances, the presence of one parameter may be assigned a value that automatically corresponds with the high stress level, such as the presence of the illegal substance on the testing strip.

[00062] In step 212, the exemplary distress mitigation module 128 may dynamically transmit the unique notification. In some embodiments, the exemplary distress mitigation module 128 may dynamically transmit the unique notification to the plurality of computing devices via the network. In some embodiments, the exemplary distress mitigation module 128 may dynamically transmit the unique notification to the plurality of computing devices via the network based on a range of the distress level of the at least one distress action. The transmission of the unique notification may refer to the exemplary escalating distress mitigation module 128 instructing the particular device 118 to transmit the automated emergence message 502 to emergency authorities, unique contact groups, individual contacts, and other unique combinations.

[00063] In step 214, the exemplary distress mitigation module 128 may automatically trigger a selection of a workflow. In some embodiments, the exemplary distress mitigation module 128 may automatically trigger the selection of a particular workflow to mitigate the distress level associated with the at least one distress action. The automatic trigger may require the utilization of the machine learning module 134 to select at least one workflow of a plurality of workflows that corresponds to the distress level of the at least one distress action and the plurality of parameters present. In certain embodiments, the at least one workflow may include a plurality of external action modules, each capable of performing the function of transmitting the automated emergency message to the necessary recipients.

[00064] FIGs. 4A-4B depict an example of a digital application 127 associated with the automatic emergency alert system 100, in accordance with one or more embodiments of the present disclosure. FIG. 4A depicts the digital application 127 in a public data state 402, where the digital representations depict common features of a make-up blog site. In the public data state 402, the click state legend may display, via a graphical user interface using a plurality of programmable elements, a plurality of sham links, such as a blog link 403, a color guide link 404, a trends link 405, a new color link 406, a wow factor link 407, a coming soon link 408, and an about link 409. The public data state 402 is a facade that allows the particular user 120 to interact with the automated emergency alert system 100 without being obvious and serves as a rouse to the actual click state legend in relation to the private data state 410 of the digital application as seen in FIG. 4B. In the private data state 410, the click state legend may display, via the GUI, the plurality of actual links, such as actions link 403, a contacts link 404, a location link 405, a device link 406, a message link 407, a user settings link 408, and an about link 409. The particular use may manipulate the actual links as many times as required.

[00065] FIG. 5 depicts an exemplary automated emergency message 502 within the digital application 127, in accordance with one or more embodiments of the present disclosure. In some embodiments, the digital application 127 may allow the user 120 to manually input a message within the digital application 127 to be transmitted. In some embodiments, the exemplary distress mitigation module 128 may utilize a natural language processing module 136 to generate text data based on received audio data collected via the particular device 118. In some embodiments, the digital application may provide a first section 503 for the user to enter a unique notification for a plurality of selected contacts, where this section may be automatically populated via the exemplary distress mitigation module 128. In some embodiments, the digital application 127 may provide a section 50 for the particular user to enter an audio notification for the plurality of selected contacts. In FIG. 5, the automated emergency message 502a states that the user 120 is experiencing an emergency and would like a selected contact to monitor the location of the computing device 118, and the automated emergency message 502b is a transcription of audio data associated with the user 120 detailing the emergency.

[00066] FIG. 6 depicts an example contact list 600 within the digital application 127, in accordance with one or more embodiments of the present disclosure. In some embodiments, the contact list 600 may be sorted into pre-curated groups of select contacts based on user preference.

[00067] FIG. 7 depicts an example location setting feature 700 within the digital application 127, in accordance with one or more embodiments of the present disclosure. In some embodiments, the location of the particular device 118 is displayed via a map GUI 702. In some embodiments, the exemplary distress mitigation module 128 may utilize global positioning system modules to determine the location of the particular device 118 in real-time. In certain embodiments, the map GUI 702 may display common landmarks to assist the particular user 120 in determining a current location. In some embodiments, the exemplary distress mitigation module 128 may communicate the location of the particular device 118 with the external data sources.

[00068] FIG. 8 depicts an example pre-generated click state legend 800 within the digital application 127, in accordance with one or more embodiments of the present disclosure. In some embodiments, the pre-generated click state legend 800 may include a one click action state 802, a two click action state 804, and a three click action state 806. Each click action state may be modified by the particular user 120 at any time. In one example, the particular user 120 has two actions in the one click action state 802. In response to detecting the one click within the digital application 127 by the particular user 120, the exemplary distress mitigation module 128 may automatically select the two workflows to execute each external action. For example, in response to detecting the one click by the user 120, the exemplary distress mitigation module 128 automatically transmits a generated notification to David to call the particular device 118 and automatically transmit a test message to a selected group of contracts. In another example, the user 120 may establish an automatic transmission of a text message to a particular contract for the two click action state 804. In another example, the user 120 may establish two simultaneous actions for the three click action stat 806, specifically to record audio via the computing device 118 and automatically contact emergency services.

[00069] FIG. 9 depicts a user setting interface 807 within the digital application 127, in accordance with one or more embodiments of the present disclosure. In some embodiments, the user setting interface 807 provides the user 120 with the ability to edit a profile 808 of a particular contact. For example, the user 120 may update the phone number of on the profile 808 of a particular individual. In some embodiments, the user 120 may manually cancel an emergency alert 809 via the user setting interface 807. In some embodiments, the user setting interface 807 may require a unique code 810 associated with the user 120 to modify any previously recorded settings of the digital application 127.

[00070] In a non -limiting example of a method of use of the system 100 as applied to FIG. 3, a user witnesses a predator slip an unknown powdery substance into an unsuspecting patron’ s drink as she walks toward the restroom. The user takes out her cosmetic container 312 and follows the victim into the restroom where she confides in the victim what she saw. The user and victim agree to work together, and the user opens the door on the container body 306 and hands the victim a test strip 308. The user then opens a camera app on her phone and scans the QR computer code which automatically initiates one or more recording and/or reporting aspects of the system. The user records the testing of the drink and subsequent interaction between the victim and perpetrator using the mobile phone’s video recording software which is automatically uploaded and saved by the system. The video records the victim brazenly dipping the test strip into the drink as the perpetrator looks on. She turns to confront the predator, who is enraged by the accusation. The user comes to the aid of the victim, telling the perpetrator that she saw everything and that everything is being recorded. The perpetrator steals the phone from the user and runs out of the bar.

[00071] However, the system has already been initiated and cannot be turned off without a proper password. Although this individual has attempted to stop the video recording by trying to power off the phone, some embodiments of the system keep recording audio and video as well as sending the phone’s location to the system while presenting a powered-off screen. The user calls the hotline on the test strip and provides an account name and description of the incident to the system operator. The authorities track the thief/predator to their home, and obtain a search warrant based on the uploaded audio and video evidence. Unbeknownst to the sexual predator, the phone has been recording everything since the emergency alert system was activated so the evidence also includes a recording of a phone call made to an acquaintance admitting to the crime and asking what to do. Upon entry into the predator’s home, the police find the phone, illegal date rape drugs, and a disturbing library of images of previous victims. The cooperation between the two females enables by various aspects of the system has led to this sexual predator being removed from the streets.

[00072] FIG. 10 depicts a block diagram of an exemplary computer-based system/platform 900 in accordance with one or more embodiments of the present disclosure. However, not all of these components may be required to practice one or more embodiments, and variations in the arrangement and type of the components may be made without departing from the spirit or scope of various embodiments of the present disclosure. In some embodiments, the exemplary inventive computing devices and/or the exemplary inventive computing components of the exemplary computer-based system/platform 900 may be configured to automatically trigger the selection of a particular workflow to mitigate the distress level associated with the at least one distress action, as detailed herein. In some embodiments, the exemplary computer-based system/platform 900 may be based on a scalable computer and/or network architecture that incorporates varies strategies for assessing the data, caching, searching, and/or database connection pooling. An example of the scalable architecture is an architecture that is capable of operating multiple servers. In some embodiments, the exemplary inventive computing devices and/or the exemplary inventive computing components of the exemplary computer-based system/platform 900 may be configured to manage the exemplary distress mitigation module 128 of the present disclosure, utilizing at least one machine-learning model described herein.

[00073] In some embodiments, referring to FIG. 10, members 902-904 (e.g., clients) of the exemplary computer-based system/platform 900 may include virtually any computing device capable of automatically authenticating an action associated with the computing device 118 based on a data beacon of a plurality of data beacons generating a primed signal via a network (e.g., Bluetooth network), such as network 905, to and from another computing device, such as servers 906 and 907, each other, and the like. In some embodiments, the member devices 902-904 may be personal computers, multiprocessor systems, microprocessor-based or programmable consumer electronics, network PCs, and the like. In some embodiments, one or more member devices within member devices 902-904 may include computing devices that connect using a wireless communications medium such as cell phones, smart phones, pagers, walkie talkies, radio frequency (RF) devices, infrared (IR) devices, CBs, integrated devices combining one or more of the preceding devices, or virtually any mobile computing device, and the like. In some embodiments, one or more member devices within member devices 902- 904 may be devices that are capable of connecting using a wired or wireless communication medium such as a PDA, POCKET PC, wearable computer, a laptop, tablet, desktop computer, a netbook, a video game device, a pager, a smart phone, an ultra-mobile personal computer (UMPC), and/or any other device that is equipped to communicate over a wired and/or wireless communication medium (e g., NFC, RFID, NBIOT, 3G, 4G, 5G, GSM, GPRS, WiFi, WiMax, CDMA, satellite, ZigBee, etc.). In some embodiments, one or more member devices within member devices 902-904 may include may launch one or more applications, such as Internet browsers, mobile applications, voice calls, video games, videoconferencing, and email, among others. In some embodiments, one or more member devices within member devices 902-904 may be configured to receive and to send web pages, and the like. In some embodiments, an exemplary distress mitigation module 128 of the present disclosure may be configured to receive and display graphics, text, multimedia, and the like, employing virtually any web based language, including, but not limited to Standard Generalized Markup Language (SMGL), such as HyperText Markup Language (HTML), a wireless application protocol (WAP), a Handheld Device Markup Language (HDML), such as Wireless Markup Language (WML), WMLScript, XML, JavaScript, and the like. In some embodiments, a member device within member devices 902-904 may be specifically programmed by either Java, .Net, QT, C, C++ and/or other suitable programming language. In some embodiments, one or more member devices within member devices 902-904 may be specifically programmed include or execute an application to perform a variety of possible tasks, such as, without limitation, messaging functionality, browsing, searching, playing, streaming or displaying various forms of content, including locally stored or uploaded messages, images and/or video, and/or games.

[00074] In some embodiments, the exemplary network 905 may provide network access, data transport and/or other services to any computing device coupled to it. In some embodiments, the exemplary network 905 may include and implement at least one specialized network architecture that may be based at least in part on one or more standards set by, for example, without limitation, Global System for Mobile communication (GSM) Association, the Internet Engineering Task Force (IETF), and the Worldwide Interoperability for Microwave Access (WiMAX) forum. In some embodiments, the exemplary network 905 may implement one or more of a GSM architecture, a General Packet Radio Service (GPRS) architecture, a Universal Mobile Telecommunications System (UMTS) architecture, and an evolution of UMTS referred to as Long Term Evolution (LTE). In some embodiments, the exemplary network 905 may include and implement, as an alternative or in conjunction with one or more of the above, a WiMAX architecture defined by the WiMAX forum. In some embodiments and, optionally, in combination of any embodiment described above or below, the exemplary network 905 may also include, for instance, at least one of a local area network (LAN), a wide area network (WAN), the Internet, a virtual LAN (VLAN), an enterprise LAN, a layer 3 virtual private network (VPN), an enterprise IP network, or any combination thereof. In some embodiments and, optionally, in combination of any embodiment described above or below, at least one computer network communication over the exemplary network 905 may be transmitted based at least in part on one of more communication modes such as but not limited to: NFC, RFID, Narrow Band Internet of Things (NBIOT), ZigBee, 3G, 4G, 5G, GSM, GPRS, WiFi, WiMax, CDMA, satellite and any combination thereof. In some embodiments, the exemplary network 905 may also include mass storage, such as network attached storage (NAS), a storage area network (SAN), a content delivery network (CDN) or other forms of computer or machine-readable media.

[00075] In some embodiments, the exemplary server 906 or the exemplary server 907 may be a web server (or a series of servers) running a network operating system, examples of which may include but are not limited to Microsoft Windows Server, Novell NetWare, or Linux. In some embodiments, the exemplary server 906 or the exemplary server 907 may be used for and/or provide cloud and/or network computing. Although not shown in FIG. 10, in some embodiments, the exemplary server 906 or the exemplary server 907 may have connections to external systems like email, SMS messaging, text messaging, ad content providers, etc. Any of the features of the exemplary server 906 may be also implemented in the exemplary server 907 and vice versa.

[00076] In some embodiments, one or more of the exemplary servers 906 and 907 may be specifically programmed to perform, in non-limiting example, as authentication servers, search servers, email servers, social networking services servers, SMS servers, IM servers, MMS servers, exchange servers, photo-sharing services servers, advertisement providing servers, financial/banking-related services servers, travel services servers, or any similarly suitable service-base servers for users of the member computing devices 901-904.

[00077] In some embodiments and, optionally, in combination of any embodiment described above or below, for example, one or more exemplary computing member devices 902-904, the exemplary server 906, and/or the exemplary server 907 may include a specifically programmed software module that may be configured to automatically determine the distress level associated with the at least one distress action based on a plurality of parameters; automatically generate the unique notification within the digital application; and to automatically trigger the selection of a particular workflow to mitigate the distress level associated with the at least one distress action. [00078] FIG. 11 depicts a block diagram of another exemplary computer-based system/platform 1000 in accordance with one or more embodiments of the present disclosure. However, not all of these components may be required to practice one or more embodiments, and variations in the arrangement and type of the components may be made without departing from the spirit or scope of various embodiments of the present disclosure. In some embodiments, the member computing devices 1002a, 1002b through 1002n shown each at least includes a computer-readable medium, such as a random-access memory (RAM) 1008 coupled to a processor 1010 or FLASH memory. In some embodiments, the processor 1810 may execute computer-executable program instructions stored in memory 1008. In some embodiments, the processor 1010 may include a microprocessor, an ASIC, and/or a state machine. In some embodiments, the processor 1010 may include, or may be in communication with, media, for example computer-readable media, which stores instructions that, when executed by the processor 1010, may cause the processor 1010 to perform one or more steps described herein. In some embodiments, examples of computer-readable media may include, but are not limited to, an electronic, optical, magnetic, or other storage or transmission device capable of providing a processor, such as the processor 1010 of client 1002a, with computer- readable instructions. In some embodiments, other examples of suitable media may include, but are not limited to, a floppy disk, CD-ROM, DVD, magnetic disk, memory chip, ROM, RAM, an ASIC, a configured processor, all optical media, all magnetic tape or other magnetic media, or any other medium from which a computer processor can read instructions. Also, various other forms of computer-readable media may transmit or carry instructions to a computer, including a router, private or public network, or other transmission device or channel, both wired and wireless. In some embodiments, the instructions may comprise code from any computer-programming language, including, for example, C, C++, Visual Basic, Java, Python, Perl, JavaScript, and etc.

[00079] In some embodiments, member computing devices 1002a through 1002n may also comprise a number of external or internal devices such as a mouse, a CD-ROM, DVD, a physical or virtual keyboard, a display, a speaker, or other input or output devices. In some embodiments, examples of member computing devices 1002a through 1002n (e.g., clients) may be any type of processor-based platforms that are connected to a network 1806 such as, without limitation, personal computers, digital assistants, personal digital assistants, smart phones, pagers, digital tablets, laptop computers, Internet appliances, and other processorbased devices. In some embodiments, member computing devices 1002a through 1002n may be specifically programmed with one or more application programs in accordance with one or more principles/methodologies detailed herein. In some embodiments, member computing devices 1002a through 1002n may operate on any operating system capable of supporting a browser or browser-enabled application, such as Microsoft™, Windows™, and/or Linux. In some embodiments, member computing devices 1002a through 1002n shown may include, for example, personal computers executing a browser application program such as Microsoft Corporation's Internet Explorer™, Apple Computer, Inc.'s Safari™, Mozilla Firefox, and/or Opera. In some embodiments, through the member computing client devices 1002a through 1002n, users, 1012a through 1012n, may communicate over the exemplary network 1006 with each other and/or with other systems and/or devices coupled to the network 1006. As shown in FIG. 10, exemplary server devices 1004 and 1013 may be also coupled to the network 1006. Exemplary server device 1004 may include a processor 1005 coupled to a memory that stores a network engine 1017. Exemplary server device 1013 may include a processor 1014 coupled to a memory 1016 that stores a network engine. In some embodiments, one or more member computing devices 1002a through 1002n may be mobile clients. As shown in FIG. 12, the network 1006 may be coupled to a cloud computing/architecture(s) 1025. The cloud computing/architecture(s) 1025 may include a cloud service coupled to a cloud infrastructure and a cloud platform, where the cloud platform may be coupled to a cloud storage.

[00080] In some embodiments, at least one database of exemplary databases 1007 and 1015 may be any type of database, including a database managed by a database management system (DBMS). In some embodiments, an exemplary DBMS-managed database may be specifically programmed as an engine that controls organization, storage, management, and/or retrieval of data in the respective database. In some embodiments, the exemplary DBMS- managed database may be specifically programmed to provide the ability to query, backup and replicate, enforce rules, provide security, compute, perform change and access logging, and/or automate optimization. In some embodiments, the exemplary DBMS-managed database may be chosen from Oracle database, IBM DB2, Adaptive Server Enterprise, FileMaker, Microsoft Access, Microsoft SQL Server, MySQL, PostgreSQL, and a NoSQL implementation. In some embodiments, the exemplary DBMS-managed database may be specifically programmed to define each respective schema of each database in the exemplary DBMS, according to a particular database model of the present disclosure which may include a hierarchical model, network model, relational model, object model, or some other suitable organization that may result in one or more applicable data structures that may include fields, records, files, and/or objects. In some embodiments, the exemplary DBMS-managed database may be specifically programmed to include metadata about the data that is stored. [00081] FIG. 12 and FIG. 13 illustrate schematics of exemplary implementations of the cloud computing/architecture(s) in which the exemplary inventive computer-based systems/platforms, the exemplary inventive computer-based devices, and/or the exemplary inventive computer-based components of the present disclosure may be specifically configured to operate. FIG. 12 illustrates an expanded view of the cloud computing/architecture(s) 1025 found in FIG. 11. FIG 13. illustrates the exemplary inventive computer-based components of the present disclosure may be specifically configured to operate in the cloud computing/architecture 1025 as a source database 1204, where the source database 1204 may be a web browser, a mobile application, a thin client, and a terminal emulator. In FIG. 13, the exemplary inventive computer-based systems/platforms, the exemplary inventive computer- based devices, and/or the exemplary inventive computer-based components of the present disclosure may be specifically configured to operate in a cloud computing/architecture such as, but not limiting to: infrastructure a service (laaS) 1210, platform as a service (PaaS) 1208, and/or software as a service (SaaS) 1206.

[00082] While one or more embodiments of the present disclosure have been described, it is understood that these embodiments are illustrative only, and not restrictive, and that many modifications may become apparent to those of ordinary skill in the art, including that various embodiments of the inventive methodologies, the inventive systems/platforms, and the inventive devices described herein can be utilized in any combination with each other. Further still, the various steps may be carried out in any desired order (and any desired steps may be added and/or any desired steps may be eliminated).

Cosmetic Item Companion Device

[00083] FIGS. 14-22 illustrate an exemplary companion device 119 in the form of a cosmetic system 300. Complementary and supplemental disclosure may be found in U.S. Patent 11,796,478 entitled Cosmetic Item for Personal Safety filed on 10/27/2021, which is hereby incorporated by reference for all purposes. FIG. 14 depicts a partially exploded view of a chemical testing assembly 302 and an automatic alert module 303 of cosmetic system 300, in which a testing shuttle 304 is partially inserted into a container body 305. Testing shuttle 304, in various embodiments, may include one or more openings 306 positioned proximate the distal end of testing shuttle 304, as shown. As positioned, air within container body 305 can escape through openings 306 until just before testing shuttle 305 is fully inserted and an o-ring 307 forms a seal, thereby minimizing the amount of air that may become trapped within container body 305. Exposure to air can unduly limit the life of a chemical presence indictor 308. This is especially true when the chemical presence indicator 308 is in the form of a testing strip, where exposure to a chemical causes a change in the testing strip appearance. Openings 306 provide the benefit of preventing over-pressurization of the container body 305 and/or preventing humid air from being trapped and absorbed by the one or more chemical presence indicators 308.

[00084] It should be noted; however, that a small amount of air may still become trapped inside the container body 305 after testing shuttle 304 is fully inserted and the o-ring 307 sealed. Over time even a small amount of air or humidity can cause issues, so a removable moisture absorber 309 (e.g., a desiccant) may be positioned within testing shuttle 304 as a novel solution to remove residual moisture. As positioned, moisture absorber 309 is placed into fluid communication with chemical presence indicators 308 to draw moisture out of any trapped air to which chemical presence indicators 308 are exposed within container body 205.

[00085] As later shown in and described with reference to FIG. 18 and FIG. 21, moisture absorber 309 may be physically separated from cosmetic item 310 by cosmetic chamber 311 to prevent moisture absorber 309 from drying out cosmetic item 310. If, alternatively, moisture absorber 309 were in fluid communication with cosmetic item 310, moisture absorber 309 could potentially dry out cosmetic item 310 and, in turn, become spent prematurely thereby reducing its effectiveness in absorbing moisture from air trapped within container body 305. It may also be advantageous to separate cosmetic item 310 from fluid communication with chemical presence indicators 308 such that chemical presence indicators 308 do not become contaminated by liquid from cosmetic item 310.

[00086] FIG. 15 depicts the cosmetic container 312 in a fully assembled state according to some embodiments. As shown in various embodiments described herein, container cap 313 is located at and/or configured to couple to a container first end 314 of the container body 305. Viewing window 315 is positioned over cosmetic item 310.

[00087] FIG. 16 illustrates aspects a bottom portion of the cosmetic container 312 according to some embodiments. Shown in this view are end cap 316, wireless transmitter 317, and actuator 318. In some embodiments, at least a portion of end cap 316, or o-ring 307 if equipped, is configured to contact at least a portion of the container body 305 at least partially seal the testing assembly 302 from atmosphere. In some embodiments, the actuator 318 comprises an actuator button. In some embodiments, the actuator 318 is configured to activate wireless transmitter 317 which is configured to send a wireless signal to one or more computers (e.g., cell phone(s), computer networks, etc.). [00088] FIG. 17 shows a cross-section view A-A of the cosmetic container 312 according to some embodiments. Container cap 313 is configured to encase at least a portion of cosmetic item 310, which in this example is the item second portion 319. One or more couplers 320 may secure item second portion 319 (see also FIG. 21) within the interior of cap 313, such as through a friction fit or adhesive.

[00089] FIG. 18 shows a cross-section view B-B of the cosmetic container 312 according to some embodiments. As previously noted, in some embodiments, the testing shuttle 304 comprises one or more indicator housing sections 321 configured to enable one or more chemical presence indicators 308 to reside between the container body 305 and the testing shuttle 304 when the testing shuttle 304 is inserted into container body 305. As shown in this non-limiting example, the indicator housing sections 321 include slots recessed into the testing shuttle 304. In various embodiments, the testing shuttle 304 is configured to at least partially surround the cosmetic chamber 311 when the cosmetic item 310 is inserted into the container body 305. Cosmetic chamber 311 may include one or more couplers 320 configured to secure item first portion (see also FIG. 21) within cosmetic chamber 311. In some embodiments, the cosmetic chamber 311 is integrally formed with the chamber body 305 such that it forms a “bucket” for the cosmetic item 310 when viewed from the top with the container cap 313 removed. In some embodiments, the cosmetic chamber 311 walls are continuously solid with the exception of the opening provided when the container cap 313 is removed, thereby separating the cosmetic item 310 from fluid communication with chemical presence indicators 308 such that chemical presence indicators 308 do not become contaminated by liquid from cosmetic item 310. The container body 305 also forms shuttle chambers 322 which take the form of two “crescent moon” cavities in FIG. 18. The shuttle chambers 322 allow the testing shuttle 304 to be nested within the container body 305 while remaining fluidly separated from the cosmetic chamber 311 to prevent the moisture absorber 309 from damaging the cosmetic item 310.

[00090] FIG. 19 shows a cross-section view C-C of the cosmetic container 312 according to some embodiments. This view is below a bottom of the cosmetic chamber 311. Visible in this view is the moisture absorber 309 at least partially surrounded by the testing shuttle 304, which is surrounded by the container body 305. The moisture absorber 309 includes desiccant according to some non-limiting examples. As later shown best in FIG. 21, in some embodiments, the testing shuttle 304 comprises at least one fluid path 324 configured to provide a path for air to travel between the one or more chemical presence indicators 308 and the moisture absorber 309 when the testing shuttle 304 is housed within the container body 305 and at least a portion of the actuator cap 325 is in contact with the container second end 326. In various embodiments, openings 306 may serve as fluid paths 324, as shown. As previously described, the one or more fluid paths 324 enable fluid communication to the chemical presence indicators enabling moisture removal from their location extending product life.

[00091] FIG. 20 shows a cross-section view D-D of the cosmetic container 312 according to some embodiments. In this view, base 327 houses and/or secures in place one or more of the battery 328 and wireless transmitter 317.

[00092] FIG. 21 illustrates a longitudinal cross-sectional view E-E of the cosmetic container 312 according to some embodiments. The container body 305 is configured to house at least an item first portion 329 of a cosmetic item 310 within cosmetic chamber 311, which is viewable through the viewing window 315. Removal of the container cap 313 exposes at least an item second portion 319 of the cosmetic item 310. In some embodiments, the cosmetic item 310 is a conventional cosmetic item, such as lipstick as a non-limiting example, which allows the system 300 to be used multiple times and/or for multiple cosmetic items. The item second portion 319 of the (conventional) cosmetic item 310 may comprise makeup content (i.e., liquid makeup) and/or a makeup applicator 330 such as a brush. In some embodiments, removal of the container cap 313 is configured to enable access to the makeup content and/or makeup applicator 330 without having to reposition a first portion of the cosmetic item 310 from the container body and/or the remove the entire cosmetic item 310 from the container body 305. In some embodiments, the container cap 313 is configured to couple to the item second portion 319 such that removal of the container cap 313 also removes the applicator 330. The container cap 313 serves as a handle in this respect increasing the gripping surface area of the item second portion enabling easier makeup application. FIG. 21 also illustrates how the cosmetic item 310 item second portion 319 can be removed without removing the item first portion 329 from the container body 305. In some embodiments, an applicator 330 configured to gather makeup from the item first portion 902 is attached to the item second portion 319.

[00093] FIG. 22 shows a different longitudinal cross-section view F-F of the cosmetic container 312 according to some embodiments. With the cosmetic item 310 within the container body 305, the container cap 313 in place, and the testing shuttle 304 fully inserted, air is prevented from entering the container body 305 extending the life of one or more components. Further aiding in sealing, the testing shuttle comprises an o-ring 307, which may be located adjacent the moisture absorber 309 and/or the end cap 316 according to some embodiments. Operation

[00094] In operation, the cosmetic container provides three main functions: storage for items such as makeup; a “date-rape” drug testing kit; and an automated emergency alert system. To use for makeup, a user simply needs to remove the container cap 313 and remove the cosmetic item or a portion of the cosmetic item such as applicator 330 (see FIG. 212). After applying the makeup, the user replaces cosmetic item 310 (or a portion of) and the container cap 313 to return the cosmetic container 312 to its assembled state. If a user becomes suspicious that their drink has been tampered with, the chemical testing assembly 302 provides a way to test for illicit chemicals.

[00095] Generally speaking, the testing shuttle 304 is configured to store one or more chemical presence indicators 308. The chemical presence indicators 308 are accessed by a user pulling on the end cap 316 and extending the testing shuttle 304 out from the container body 305. This exposes the chemical presence indicator 308 for removal from the chemical testing assembly 302 for dipping into a drink. Alternatively, a user can place a drop on the exposed chemical presence indicator 308 while it is still partially inserted into the container body 305. Upon receiving a positive test result showing the presence of an illicit chemical, the user can dynamically send a signal to a companion device (e.g., cellular phone, smart device) using alert module 303, which automatically implements program instructions for one or more emergency procedure steps as described herein according to various embodiments. The communication link between the cosmetic container 312 and the companion device is provided by wireless transmitter 317 which is powered by the battery 328.

[00096] The subject matter described herein are directed to technological improvements to the field of safety by integrating an automated alert trigger with communication capabilities to a cosmetic item and a computing device 118 The disclosure also describes the specifics of how a machine including one or more computers comprising one or more processors and one or more non-transitory computer readable media implement the system and its improvements over the prior art. The instructions executed by the machine cannot be performed in the human mind or derived by a human using a pen and paper but requires the machine to convert process input data to useful output data. Moreover, the claims presented herein do not attempt to tie-up a judicial exception with known conventional steps implemented by a general-purpose computer; nor do they attempt to tie-up a judicial exception by simply linking it to a technological field. Indeed, the systems and methods described herein were unknown and/or not present in the public domain at the time of filing, and they provide technologic improvements advantages not known in the prior art. Furthermore, the system includes unconventional steps that confine the claim to a useful application.

[00097] It is understood that the system is not limited in its application to the details of construction and the arrangement of components set forth in the previous description or illustrated in the drawings. The system and methods disclosed herein fall within the scope of numerous embodiments. The previous discussion is presented to enable a person skilled in the art to make and use embodiments of the system. Any portion of the structures and/or principles included in some embodiments can be applied to any and/or all embodiments: it is understood that features from some embodiments presented herein are combinable with other features according to some other embodiments. Thus, some embodiments of the system are not intended to be limited to what is illustrated but are to be accorded the widest scope consistent with all principles and features disclosed herein.

[00098] Some embodiments of the system are presented with specific values and/or setpoints. These values and setpoints are not intended to be limiting and are merely examples of a higher configuration versus a lower configuration and are intended as an aid for those of ordinary skill to make and use the system.

[00099] References to a test “strip” or “token” is a general reference to a surface configured to detect and/or display the presences of one or more chemicals and does not limit the surface to a particular shape or dimension.

[000100] Furthermore, acting as Applicant’s own lexicographer, Applicant imparts the explicit meaning and/or disavow of claim scope to the following terms:

[000101] Applicant defines any use of “and/or” such as, for example, “A and/or B,” or “at least one of A and/or B” to mean element A alone, element B alone, or elements A and B together. In addition, a recitation of “at least one of A, B, and C,” a recitation of “at least one of A, B, or C,” or a recitation of “at least one of A, B, or C or any combination thereof’ are each defined to mean element A alone, element B alone, element C alone, or any combination of elements A, B and C, such as AB, AC, BC, or ABC, for example.

[000102] “Substantially” and “approximately” when used in conjunction with a value encompass a difference of 5% or less of the same unit and/or scale of that being measured.

[000103] “Simultaneously” as used herein includes lag and/or latency times associated with a conventional and/or proprietary computer, such as processors and/or networks described herein attempting to process multiple types of data at the same time. “Simultaneously” also includes the time it takes for digital signals to transfer from one physical location to another, be it over a wireless and/or wired network, and/or within processor circuitry. [000104] As used herein, “can” or “may” or derivations there of (e.g., the system display can show X) are used for descriptive purposes only and is understood to be synonymous and/or interchangeable with “configured to” (e.g., the computer is configured to execute instructions X) when defining the metes and bounds of the system.

[000105] In addition, the term “configured to” means that the limitations recited in the specification and/or the claims must be arranged in such a way to perform the recited function: “configured to” excludes structures in the art that are “capable of’ being modified to perform the recited function but the disclosures associated with the art have no explicit teachings to do so. For example, a recitation of a “container configured to receive a fluid from structure X at an upper portion and deliver fluid from a lower portion to structure Y” is limited to systems where structure X, structure Y, and the container are all disclosed as arranged to perform the recited function. The recitation “configured to” excludes elements that may be “capable of’ performing the recited function simply by virtue of their construction but associated disclosures (or lack thereof) provide no teachings to make such a modification to meet the functional limitations between all structures recited. Another example is “a computer system configured to or programmed to execute a series of instructions X, Y, and Z.” In this example, the instructions must be present on a non-transitory computer readable medium such that the computer system is “configured to” and/or “programmed to” execute the recited instructions: “configure to” and/or “programmed to” excludes art teaching computer systems with non- transitory computer readable media merely “capable of’ having the recited instructions stored thereon but have no teachings of the instructions X, Y, and Z programmed and stored thereon. The recitation “configured to” can also be interpreted as synonymous with operatively connected when used in conjunction with physical structures.

[000106] It is understood that the phraseology and terminology used herein is for description and should not be regarded as limiting. The use of “including,” “comprising,” or “having” and variations thereof herein is meant to encompass the items listed thereafter and equivalents thereof as well as additional items. Unless specified or limited otherwise, the terms “mounted,” “connected,” “supported,” and “coupled” and variations thereof are used broadly and encompass both direct and indirect mountings, connections, supports, and couplings. Further, “connected” and “coupled” are not restricted to physical or mechanical connections or couplings.

[000107] The previous detailed description is to be read with reference to the figures, in which like elements in different figures have like reference numerals. The figures, which are not necessarily to scale, depict some embodiments and are not intended to limit the scope of embodiments of the system.

[000108] Any of the operations described herein that form part of the invention are useful machine operations. The invention also relates to a device or an apparatus for performing these operations. The apparatus can be specially constructed for the required purpose, such as a special purpose computer. When defined as a special purpose computer, the computer can also perform other processing, program execution or routines that are not part of the special purpose, while still being capable of operating for the special purpose. Alternatively, the operations can be processed by a general-purpose computer selectively activated or configured by one or more computer programs stored in the computer memory, cache, or obtained over a network. When data is obtained over a network the data can be processed by other computers on the network, e.g. a cloud of computing resources.

[000109] The embodiments of the invention can also be defined as a machine that transforms data from one state to another state. The data can represent an article, that can be represented as an electronic signal and electronically manipulate data. The transformed data can, in some cases, be visually depicted on a display, representing the physical object that results from the transformation of data. The transformed data can be saved to storage generally, or in particular formats that enable the construction or depiction of a physical and tangible object. In some embodiments, the manipulation can be performed by a processor. In such an example, the processor thus transforms the data from one thing to another. Still further, some embodiments include methods can be processed by one or more machines or processors that can be connected over a network. Each machine can transform data from one state or thing to another, and can also process data, save data to storage, transmit data over a network, display the result, or communicate the result to another machine. Computer-readable storage media, as used herein, refers to physical or tangible storage (as opposed to signals) and includes without limitation volatile and non-volatile, removable and non-removable storage media implemented in any method or technology for the tangible storage of information such as computer-readable instructions, data structures, program modules or other data.

[000110] Although method operations are presented in a specific order according to some embodiments, the execution of those steps do not necessarily occur in the order listed unless explicitly specified. Also, other housekeeping operations can be performed in between operations, operations can be adjusted so that they occur at slightly different times, and/or operations can be distributed in a system which allows the occurrence of the processing operations at various intervals associated with the processing, as long as the processing of the overlay operations are performed in the desired way and result in the desired system output.

[000111] Although the present disclosure and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the disclosure as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present disclosure. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.