Once you Safety Application is installed on the smartphone, you are connected to the alert management portal. You can send alarms and receive notifications. If you give it permission, your application accesses your phone's sensors to improve your security.
Lone Worker application permissions and operation
At your first use, you must perform authorizations for optimal operation of the safety App. Depending on the application you choose, for example, you have to:
- Authorize the application to you send notifications (alerts, sounds, icons)
- Allow the application to connect to the alert management portal.
These permissions allow your application to run in the background. In fact, the application must transmit the data useful for your protection in the background. One application in the background of the mobile has the advantage of operating discreetly without having to be in the forefront. So she stays invisible to third parties, attackers for example, while interacting with your mobile's operating system. This functioning application allows you to use the phone's sensors.
Thus, if assistance is needed, the emergency services will use the data of your GPS or Bluetooth location to geolocate you.
Did you know that your alerts and data are transmitted through various networks?
Transmission of alerts
Indeed, your alerts are sent by the GSM network or even by the Wi-Fi network. In fact, your phone uses LTE (4G), 3G mobile networks... to communicate information and your location to the alert management platform. In addition, it is equipped with wireless technologies including Wi-Fi.
This function is the guarantee of a extended coverage for your protection everywhere! So wherever you are, if of course you are under GSM coverage, you can send or receive alerts and notifications.
On the other hand, with a simple glance at the screen of your mobile, you can easily identify active alarms and alarms transmitted. Indeed, the vast majority of Safety App use visual and/or sound notifications : SMS, push notifications, etc. The use of color pictograms allows a very simple and quick identification of current alerts. Example: green icon = alarm active and red icon = alarm inactive.
For a secure Safety application operation, these notifications contribute to a intuitive user experience. An application that is too complex would obviously not be used correctly or even not used at all!