Fenomy - For Real People in Real LifePersonal safety is an essential need and the basis of a person. When there is a threat to the life and health of our children, family members and friends, everything we consider important becomes meaningless. Providing safety is then our foremost task.
According to official data from the Ministry of Internal Affairs, in the UK, about 300,000 people go missing every year. In the US and EU, that number goes up to 600,000 people who are declared missing every year. A significant proportion of them are children. We also must remember that not every single case is accounted for.
The Fenomy developers’ main goal was to create an efficient information tool, primarily for situations where help is needed, when there is a real threat to life and health.
We provide different tools for different situations, which include:
— The ALARM function on Fenomy app, available for the most common Android devices;
— Automatic data collection of the location and battery level of the device that activated the alarm;
— Maximum battery saving in alarm mode;
— Triggering an alarm and accumulating data OFFLINE, transferring information to the data processing center using a special protocol, even in case of a short-term weak network signal;
— Ability to send short messages to the data center;
— Notifying everyone who agrees to receive requests by triggering an alarm;
— Transferring information in real time and tracking movement on the map when accepting a request;
Another special feature allows you to request the location of any first-circle user at any time, even if an alarm is not triggered. This feature is available if you have given personal permission for such requests when establishing a connection.
A user can allow their parents, partner, and/or close friends to request their location.
Our work never stops, and we are only moving forward!
A comprehensive industry solution for partners based on the Fenomy ecosystem for the organization of safety and security in a natural environmentThe Fenomy ecosystem has become the base for safety and security management, as well as participant coordination, in a series of international events held in a remote wildlife environment with complex terrain covering an area of more than 100,000 square meters.
The series' first and largest event will take place in June 2023. The main trail is more than 1,200 kilometers long, making it one of the world's longest and most difficult extreme races in 2023.
The development team is working with the partner's company to complete the main components so that the ecosystem's full capabilities can be used at the event.
The primary solutions are as follows:
— Incident Control Center for the entire area
— Tracking of participant moments in real time
— Setting off emergency alarms (manual or automatic)
— Route notifications for participants
— Safety perimeter
— Satellite communication on the route's most dangerous sections
It's encouraging to know that, despite being in its early stages, the Fenomy System is gaining traction in the most important field—safety in real life.
Great trust comes with great responsibility.
Preparation has already begun. During this time, the system will be subjected to extensive development and debugging of the most essential tools and solutions.
This, in turn, will increase project awareness and the possibility of forming new partnerships in the present and future, as well as attract a new audience to the project.
Success in this partnership is a significant step toward new solutions and opportunities, and thus new accomplishments.
We will keep the community informed of our progress and preparations for this and future events.
You can find the official article here:
https://helpdesk.fenomy.com/knowledge/details/144/industry-solution-for-the-organization-of-safety-a
Fenomy CirclesThe Fenomy ecosystem consists of circles and are a vital component. So, what exactly are they? And how do they function?
Fenomy circles are real, not virtual, and reflect real-life connections between people.
The first circle is formed by making direct personal contact with others via mobile devices or by exchanging special codes. Your family, friends, and coworkers make up the first circle. In a nutshell, it will include everyone you personally know and with whom you have established a mutual connection using the system tools.
The second circle is made up of people who are connected to you through the first circle. Many of them you probably know and trust, so you can promote them to your first circle through personal contact if you like.
The third and fourth circles are formed using the same principles.
The data center, not the user, forms the second, third, and fourth circles based on the exchange of connections between all system users.
All system interactions take place within the circles.
The Alarm FunctionThe “Alarm” function is an essential tool in the Fenomy ecosystem, intertwined with numerous other tools and functions.
The “Alarm” can be used not only by individual system users, but also in the “Group” tool in all categories, “People's dispatch,” and the safety perimeter tool.
When a member activates the “Alarm,” or “Emergency call,” the device from which the call was sent enters power saving mode and begins collecting data on the device's movement and tracking cellular signals.
Even if you have poor to no cellular reception, the Fenomy app can collect and send the accumulated data to the DPS (data processing server) in small packages using a special protocol.
If an “Alarm” is triggered without an active internet connection, the app will wait for the network and immediately send the accumulated data to the server with the most recent relevant coordinates and information. If there is a stable internet connection, Fenomy will share the entire movement track from the moment the “Alarm” was triggered.
When the server receives an “Alarm,” the system notifies those in the first circle and those who have agreed to receive alarms from the second to fourth circles, as well as the “People's dispatch,” if the member who triggered the “Alarm” has that option selected, and their groups.
* The system is fully customizable for any system member.
Everyone who receives an “Emergency call” notification can see where and how far the source is, as well as an option of sending an accompanying text message.
Both the person in need of assistance and those who accept the “Alarm” will see useful information on how to act in the given circumstances, to provide or receive assistance as soon as possible.
When recipients are ready to assist, they press “Accept call” and are automatically connected to information updates from the “Alarm” source. The requester’s movements are displayed in the Fenomy app, as well as how many people have accepted the “call,” how far they are, and coordinate on how they can best help.
The Fenomy Group tool - a powerful way to organize safety and communication The Fenomy "Group" tool is a strong tool for managing and organizing people and smart devices to tackle a wide range of cooperative tasks. In Fenomy, there are many forms of "Groups" such as Companies (both public and private), Associations that can only be private, and Groups that only have a public status and the option of being temporary. Members of all group types are not required to have a pre-existing relationship with one another and may remain anonymous.
We will tell you about the "Group" tool using examples that users are interested in.
You can find the official article in the link below:
https://medium.com/fenomy/the-fenomy-group-tool-a-powerful-way-to-organize-safety-and-communication-5afe475e6ca0
Safe ModeA safe mode for your personal profile in the system will be available in upcoming updates.
Safe mode will allow the profile owner to:- Protect the right of the profile owner to perform sensitive transactions such as editing personal and contact information, creating groups, sending messages, triggering alarms, and making transactions.
- Prevent profile theft as a result of criminal activity.
To switch your profile to safe mode, you must have the mobile app that allows you to change the modes.
When you switch to safe mode, the application will connect to the Fenomy Blockchain, register the first block in the network, and do so 4 to 8 times per day.
The profile's owner must also specify a cool down period ranging from 3 to 90 days, as well as the types of operations that will be subject to additional network verification.
How does safe mode work?When performing sensitive transactions, a special request to the network is made to verify each operation.
Following receipt of an operation request for verification, the network will send a confirmation request to the device that originated the oldest block source code, which should be older than the established cool down period.
When the source code and age of the block are confirmed, the operation is validated and the right to perform it is confirmed.
The operation is not carried out if there is no block source code on the device.
What this providesIn the event that the secret code is stolen or lost, a person with criminal intent will be unable to perform operations using the profile in question during the cool down period, and the true owner will be able to change the secret code and retrieve the account.
Any suspicious transaction attempts from the profile will be reported to the owner.
Nuances- When safe mode is enabled, authorization in the web application without the mobile app is impossible.
- Only while online will you be able to make changes to your profile. Offline, only emergency functions are available.
- The application's permissions must be enabled at all times.
- If the main device is replaced, the owner must wait for the entire cool down period that they established when setting up safe mode before being able to perform operations with his own profile.
Incident Control CenterWe are currently preparing the Incident Control Center (IC2) for use at public events, in nature, and in urban settings.
The Incident Center will allow you to keep track of all events in your circles and groups, set up safety perimeters, coordinate between participants/devices, accept requests, and complete other tasks.
The Incident Control Center Only will only be accessible through the web app.
Here is a visual representation of the IC2:
https://i.postimg.cc/yd2hnnw7/image.png
Use case: Fenomy for the elderly and people with disabilitiesAs you may be aware, the Fenomy ecosystem can be used for a variety of purposes; today, we will look at how the system can help the elderly and people with disabilities by ensuring a better quality of life, safety, and a quick response if assistance is required.
The Fenomy ecosystem enables you to effectively monitor the condition and needs of the elderly and people with disabilities, informing the appropriate agencies or people and monitoring the help-giving services.
The Incident Control Center allows you to track the location and activity of the elderly and people with disabilities 24 hours a day, seven days a week.
Older people and people with disabilities will be able to send a request for assistance to all responsible individuals and organizations at the same time with a single button press or voice command.
You can set up a safety perimeter for each individual. If the perimeter is left unattended, an alarm is automatically triggered.
An automatic alarm can be sent if a person is inactive for an extended period of time.
Assistance in organizing search and rescue operations if the person is elderly or disabled, disoriented, lost, or in other cases.
Senior citizens and people with disabilities will be able to create one-time/regular visits and orders for responsible organizations, people, and other groups.
The system will be able to function without the use of a smartphone. A simple push-button phone/bracelet or other solutions, such as satellite navigation, are sufficient.
Use case: Natural parks and nature reservesA single dispatch center enables park managers to track the movements of all visitors and personnel, receive incident alerts, coordinate interactions, and send messages.
Visitors will be able to autonomously and automatically register their stay at the territory at any entry point using QR scanning or code exchange, outline their stay period, and approximate path even lacking a network connection.
Creating a safety perimeter—the boundaries of locations where visitors are permitted or discouraged from entering.
This would allow visitors to receive automatic notifications about boundary violations and potential threats even when there is no active connection. The dispatch center, rangers, and personnel will get information concerning border breaches.
Visitors will be able to call headquarters to ask questions or send an emergency alert.
If a visitor's information is not updated for an extended period of time, the visitor remains motionless, or the declared stay period is exceeded, an alarm will automatically be triggered.
Special equipment can be used to deliver telemetry and alarm signals over satellite communication channels.
Ecosystem Component “Safety Perimeter”Designed to define the boundaries of territories to which specific rules and actions can be applied automatically.
Perimeters are system entities that can be associated with other entities such as groups, circles, and tasks. Each perimeter has geographic coordinates, descriptions, conduct rules, and a set of system reactions.
Perimeters can be set to “enter” and “exit” mode.
When all the set conditions are met, such as crossing a border of a set perimeter or approaching an object, a system reaction is triggered, which can be a warning, an informational message, or automatically triggering an alarm, which is displayed in the Incident Control Center. These will appear as pop-ups on the user's mobile screen, with alerts that correspond to the form of the notification.
The perimeters are stored on the client device and work offline without Internet access.
The Groups component is currently being tested alongside the Safety Perimeter component. The component will be available for personal circles and tasks in the near future.
Perimeters can also be used to manage the operations of security systems at facilities that use electronic unmanned devices and sensors.
System images available below:
https://i.postimg.cc/zXLLV39x/image.pnghttps://i.postimg.cc/4NJYQB7F/image.pnghttps://i.postimg.cc/C1F7gbrP/image.pnghttps://i.postimg.cc/L8K0WgS7/image.pnghttps://i.postimg.cc/52KpVHWb/image.png
Use Case: Mass event coordination and law enforcement services In a bid to enhance workplace efficiency, employees are now able to coordinate field activities seamlessly. This is made possible through the exchange of location data and the creation and coordination of tasks. The new system allows for better field coordination among employees, ultimately leading to improved productivity.
The system allows for monitoring and overseeing of events through a single dispatch center or via a mobile device from anywhere within the event area. This technology provides event organizers with greater flexibility and control, enabling them to manage their events more effectively and efficiently. With this system, event staff can stay connected and informed, ensuring that everything runs smoothly and that any issues are addressed promptly.
The system facilitates rapid event registration, allowing participants to quickly sign up through QR code scanning or code exchange. This streamlined process eliminates the need for lengthy registration forms and reduces wait times for attendees.
At the event, it is possible for participants to receive signals from other participants.
In a move to streamline communication, the features of the platform that allow for bulk notifications to be sent to all participants. This will save time and effort for those who need to distribute information to a large group of people.
The registration process allows for payment to be accepted at the time of registration.