WO1996020464A1 - A personal gps security system - Google Patents

A personal gps security system Download PDF

Info

Publication number
WO1996020464A1
WO1996020464A1 PCT/CA1994/000703 CA9400703W WO9620464A1 WO 1996020464 A1 WO1996020464 A1 WO 1996020464A1 CA 9400703 W CA9400703 W CA 9400703W WO 9620464 A1 WO9620464 A1 WO 9620464A1
Authority
WO
WIPO (PCT)
Prior art keywords
secxirity
signal
emergency
chip
fxirther
Prior art date
Application number
PCT/CA1994/000703
Other languages
French (fr)
Inventor
Diane P. Green
Original Assignee
Green Diane P
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Green Diane P filed Critical Green Diane P
Priority to AU13768/95A priority Critical patent/AU1376895A/en
Priority to PCT/CA1994/000703 priority patent/WO1996020464A1/en
Publication of WO1996020464A1 publication Critical patent/WO1996020464A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S2205/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S2205/001Transmission of position information to remote stations
    • G01S2205/002Transmission of position information to remote stations for traffic control, mobile tracking, guidance, surveillance or anti-collision

Definitions

  • the present invention relates generally to an elaborate security system for protecting a human being hereinafter referred to as "host”.
  • host a human being
  • host refers to any living creature of value. Measuring the “value” of any living creature is relative. A prized race horse or beloved pet will fall within the scope of this invention.
  • the major component of the present invention is an implanted electronic memory circuit or chip hereinafter referred to as "chip,” triggered mainly but not limited to noncontrollable physiologic parameters of the host for expediting a response by law enforcement personnel whenever his personal security is compromised.
  • the reference “his” in this invention relates to both the male and female gender.
  • a host found to be in physical distress such as from a heart attack will also fall within the scope of this invention.
  • a variety of personal security conditions including a LORAN-C, GPS or any other positioning interrogation signal for lost or missing hosts may establish contact with the central station.
  • the device then cc ⁇ unicates longitude and latitude coordinate, emergency, and personal information to the central dispatch station 19. All pertinent information is convenientlydisplayed to an operator at the central dispatch station in a manner which permits the most efficient dispatching possible of the proper responding authorities to administer appropriate security measures.
  • the aim of the invention was to implant a uniquely programmed transmitter (implanted electronic memory circuitry or chip) in the animals so that a transmission signal for each animal was received each time the transmitter was brought into brief contact with an electromagnetic field which externally induced the energy which was required for transmission.
  • a uniquely programmed transmitter implanted electronic memory circuitry or chip
  • the prior art generally teaches the tracking of an animal that is within range to be scanned by a hand-held gun and antenna loop.
  • the prior art devices provide means of identifying animals that are safe and already in custody.
  • the prior art does not offer an Loran-C or GPS interrogator means for a specific host or provide means for dispatching emergency personnel to a host in distress.
  • PDA Personal Digital Assistants
  • They offer handwriting recognition. Marks made an the screen may by translated into the digital representations of the printed or handwritten characters they symbolize. But these recognition software packages are still in a fairly primitive stage, and recognition is often slow and inaccurate enough to render the product ineffective. Surprisingly, individual handwriting techniques may vary to such a extent that it would take a powerful software program to adequately provide the first time user with not only a worthwhile but truly functional product.
  • a proposal is made to combine the benefits of a controller; similar to that of a personal digital assistant (PDA); LORAN-C, GPS, or other positioning means along with improved handwriting recognition software as outlined later, and/or verbal dictation means through a speech recognition component.
  • PDA personal digital assistant
  • LORAN-C LORAN-C
  • GPS satellite positioning
  • verbal dictation means through a speech recognition component.
  • a controller as described above be combined with a highly confidential identification scanning means for security purposes where one or more hosts are gathered together in a crowd.
  • prior art devices have been proposed for monitoring the comings and goings of one or more hosts in a controlled environment.
  • Boykin provides a magnetic cuff or anklet to announce movement upon which the magnetic cuff or anklet is attached when passing through an entrance way.
  • the following proposed electronic surveillance interrogator as described below, will not only provide law enforcement personnel the opportunity to plan their line of attack in advance but also help to protect museums, banks and airports, etc. from dangerous or unwanted felons. In short, law enforcement personnel are offered that essential edge through improved performance if the intruder or intruders are known ahead of time.
  • Information displayed an a digitized map will allow for efficient dispatching of emergency personnel to a host in distress.
  • the controller may be any suitable microprocessor, microccuputer, or microcontroller or its functional equivalent; preferably similar to that of a personal digital assistant (PDA); along with LORAN-C, GPS or other positioning means.
  • PDA personal digital assistant
  • Other beneficial features include either improved handwriting recognition software and/or cmumuly known verbal dictation means through a speech recognition component.
  • controller as outlined above may be any suitable microprocessor, ⁇ croco ⁇ puter, or microcontroller or its functional equivalent; preferably similar to that of a personal digital assistant (FDA); along with I ⁇ RAN-C, GPS or any other positioning means, and highly confidential identification scanning means for security purposes where one or more hosts are gathered together in a crowd. Additionally, features may include either improved handwriting recognitionsoftware and/or verbal dictation means through speech recognition.
  • FDA personal digital assistant
  • I ⁇ RAN-C GPS or any other positioning means
  • highly confidential identification scanning means for security purposes where one or more hosts are gathered together in a crowd.
  • features may include either improved handwriting recognitionsoftware and/or verbal dictation means through speech recognition.
  • Each of these 24 satellites are potentially linked to a multitude of telescopes.
  • control of this nature may adequately provide law enforcement personnel with anunderstanding as to what an emergency situation entails where there is more than a single incident in a similar geographical area.
  • Means for storage and production of hard copies are also provided.
  • Conditions of bail may restrict the host to certain geographical boundaries or forbid him from knowingly associating with other more specific hosts.
  • the above-described and other objects are accomplished by providing a method for both ccm ⁇ unication and interaction between host and law enforcement personnel utilizing the benefits of world-wide LORAN-C, GPS or other positioning systems.
  • FIG. 1 & 2 depicts potential i plantees.
  • FIG. 3 depicts a top view section of a chip.
  • FIG. 4 depicts a side view section of a chip.
  • FIGS. 5, 5A and 5B depict a satellite with a cc ⁇ r ⁇ unication link between central dispatch and police for finding lost children.
  • FIGS. 6, and 6A depict satellite and central dispatch monitoring everyday life.
  • FIG. 7 depicts a child in the process of wandering off with a stranger.
  • FIG. 8 depicts a crowd which may be interrogated by an officer equipped with scanner.
  • FIG. 9 depicts a man in an airport which may be an escaped felon.
  • FIG. 10 depicts a couple exercising; emergency frequency shall not activate.
  • FIG. 11 depicts an officer in ccm ⁇ unication with h ⁇ mebase.
  • FIGS. 12 and 13 show various types of interrogators.
  • FIG. 14 depicts a view of a multitude of telescopes (broken apart); each manipulated by a central dispatch operator.
  • FIG. 15 depicts a top view of these telescopes.
  • FIG. 16. depicts an officer in cc ⁇ wnication with homebase.
  • FIG.17 depicts a threat whichwill induce an emergency frequency activation.
  • FIG. 18 depicts a moneybag potentially equipped with a mobile interrogator.
  • FIGS. 19 and 20 show various styles of mobile interrogators with optional flashing lights.
  • FIG. 21 depicts a top view of a detection apparatus.
  • a personal security system co ⁇ prises satellite imaging means 14, detection apparatus 15, electronic surveillance interrogator 16, mobile interrogator 17, implanted electronic memory circuit or chip 18 which transmits a uniquely coded beacon signal in response to a general interrogation signal in addition to a second more important physiological controlled emergency frequency which c ⁇ tt ⁇ unicates emergency data when necessary to a central dispatch station 19 which is manned by a central dispatch operator.
  • FIGS. 1 and 2 depict humanbeings potentially i ⁇ planted with a chip.
  • the chip 18 is to be placed in a location under the skin which is insensitive to external influences. Alternatively, the chip may be implanted in any other type of living host such as a race horse or beloved pet.
  • the chip 18 comprises a housing inside which electronic c ⁇ ip ⁇ nents are installed. These electronic co ⁇ p ⁇ nents comprise: a transmitter unit; receiving unit; memory storage unit; and a power source. It is desirable that the chip provide for reliability, low cost, relatively long life of batteries or other power supplies and convenient to use. Security over the chip 18 and its contents are of the utmost importance.
  • the chip shall not be changed by any external magnetic or electric influences and it must have a lengthy lifespan. The longer the lifespan the better. But it is to be understood that the chip is constantly being monitored for weaknesses or unusual data errors; if the battery or other power source should become weak or if there appears to be any hardware problems, the chip is targeted for re-i ⁇ plantati ⁇ n purposes and the host should be notified.
  • the chip 18 be a) completely replaced and parts recycled or destroyed so as to avoid the possibility of fraudulent use; and b) the power source ' fr m within the ' chip may be completely replaced or recharged by any known method of recharging internally or externally in or out of the host.
  • the beacon signal is preferably a periodic pulse transmission.
  • the non-volatile memory can be depended upon to retain identification and history data when removed.
  • the chip 18 must be able to identify with both the known and unknown state of each physical system by variant signatures.
  • physiological parameters cc ⁇ prise multi-dimensional regions. Heart rate, blood pressure etc. differ greatly from person to person. But each has their own inner and outer boundary from which is the norm. If the response signature lies wholly within the boxmded region, the system is deemed to be in the known state. Conversely, if the response signature does not lie wholly within the bounded region, the system is deemed to be in a state other than the known state.
  • each chip 18 Upon implantation each chip 18 will monitor the physical system until a determination is made as to the normal physical state of the host. Stress is the body's response to external conditions that are emotionally upsetting or perceived as a threat. The resulting physiological changes are referred to as the fight or flight response which prepares the body to deal with danger. This response involves almost every organ and body function, including the brain and nerves, the heart and blood flow, the release of hormones, digestion, and muscle function. With day to day stress fluctuation is expected but is to be held within the bounded region.
  • Lifespan of the system may be extensive depending on the source chosen to power a chip. It is therefore intended to provide for a chip 18 that potentially calibrates itself to the user day to day. As the physical system ages, the bounded region fluctuates to adequately reflect its normal physical state.
  • a response signature representative of the unknown system state would have been compared to the calibrating but uniform signature representative of the known state.
  • the difference between the two signatures is to be distinct; a severe rise outside the bounded region that is not momentarily broken.
  • a person suddenl startled by a friend may register outside the boxmded region but a decline toward the boxmded region; however slight, is expected because the perceived threat is gone.
  • Emergency frequencies are not to be activated by simple physical exertion but rather by real-life emergency situations.
  • a gradxial rise in heart rate etc. is expected dxiring physical activity such as a leisxirely jog or hard aerobics.
  • the purpose of the emergency frequency is to detect not only unnaturally high; but sudden increases of physiological parameters in the physical system.
  • time may be marked for data verification and a brief analysis will occxir. If the response signatxire representative of the xmknown system state as compared to the calibrated but uniform signatxire representative of the known state severe then activation will occur.
  • Measxires to prevent xmauthorized interrogations may inclxide the utilization of an encryption featxire. Chips 18 scanned by xmauthorized interrogators may yield cryptic data only. A special code or codes may also be reqxiired before actual interpretation takes place. Police issue scanners as outlined later will be outfitted with secxirity measures of its own. Unfortunately, there are a number of reasons why the emergency frequency featxire woxild no longer be necessary after implantation occurs. Therefore a means for deactivation and reactivation is provided by software control.
  • False alarms are of great concern and should be taken into account when a host befalls the following: a sudden accident, illness, mental or physical handicaps; any circxmstance that would cause the host significant physical distress and therefore inaccxirately send a message for help. It is to be xmderstood that great care must be taken to ensxire the proper maintenance of records for legal pxirposes. It is advised that a form (s) be filled out prior to any changes in the service provided by this personal secxirity system such as activation or deactivation of the emergency signal.
  • Implantation is recommended soon after birth. But a newborn is so often very fragile; his behavioxir xmcertain, it is sx ⁇ ggested that the emergency frequency featxire not be activated until a certain age. A parent may request activation at a later time; or activation may take place automatically throxigh software control when the child reaches a certain age.
  • Execution of i ⁇ plantation may be xmiform in that every host receives said chip 18 in a specific limb for example.
  • the implantation may be strictly random; for secxirity pxirposes only the administrator of the chip may know the exact point of insertion. Therefore no part of the human body can be easily dismembered if the whereabouts of the chip is completely xmknown.
  • the chip woxild be implanted near a major artery; any attempt made to remove the chip by either the host himself or an xmdesirable such as a serial killer could render the host dead.
  • Method of implantation is in no way a part of the present invention althoxigh anyone skilled in the art will realize that transport of the chip 18 can be carried out using any mechanical means but preferably with the aid of some disinfectant so as to avoid the possibility of infection. It is also possible to allow transport to take place by any means of flxiid means.
  • the chip 18 and central dispatch controller; the controller being any sxiitable microprocessor, microcomputer, or microcontroller or its fxmctional eqxiivalent, are in the state of continuous communication via GPS satellites. Information may be received and transmitted at any time 24 h ⁇ xirs a day.
  • Reliablemonitoring behind the scenes by software control allows the dispatch operator (s) to deal with emergencies at hand without the distraction of regular transmissions.
  • the controller designates it as a "priority" alert.
  • the central dispatch operator is made aware of a "priority” status as related information appears on the controller display.
  • Backxip copies of the "priority" statxis readings may be preserved by tape, floppy or other retention means.
  • FIG. 21 depicts a top view of a detection apparatus 15 for use by law enforcement personnel such as the police or FBI.
  • Information displayed an the device is highly confidential. It is therefore intended to be xised only by those authorized to do so. For secxirity pxirposes it is advised that a special code be entered before each xise.
  • the on/off switch 27 may prompt the user to input a series of secret numbers before accessing the system.
  • a GPS transponder 25 is also provided to aid in locating lost or stolen police issue hardware.
  • the enhanced detection apparatus 15 comprises a controller.
  • the controller may be any suitable microprocessor, microcomputer, or microcontroller or its functional equivalent; preferably similar to that of a personal digital assistant (PDA); along with LORAN-C, GPS or any other positioning means, microphone 23, display 26, and more importantly a highly confidential identification scanning means 24 and activation switch 32. Additional featxires inclxide handwriting recognition software and/or verbal dictation means 35 throxigh a speech recognition system.
  • PDA personal digital assistant
  • a generic detection apparatus 15 may be just as valuable. It would incorporate a si ⁇ ple controller or its fxmctional equivalent, microphone 23, display 26, confidential scanning means 24 and activationswitch 32 and finally LCRAN-C, GPS or any other positioning means.
  • the detectionapparatxis 15 hereinafter referred to as "scanner” includes a display 26; which is preferably a pressxire sensitive display, allowing for not only writing thereof but for conveying messages between central dispatch and law enforcement personnel throxigh a keyboard 36, digital or manxial.
  • the dispatch operator is able to transmit information throxigh software control to the scanner 15 sxich as criminal records, mug shot pictorials, known aliases, in addition to satellite images that may allow the law enforcement officer a better understanding as to where a host (s) may be sitxiated; whether nearby or possibly within a specific dwelling.
  • central dispatch is provided a zoom fxmction 28 to allow the operator to reduce or enlarge specific areas of a digitized map. These particular images may be transmitted to law enforcement officers out in the field. In turn these images may be reduced or enlarged. Likewise, the o ⁇ ficer may generate a search of his own with the appropriate digitized maps aiding in the location of a specific host (s).
  • Other information that may be displayed on the scanner display 26 may also include: the identification of a host if a chip 18 is detected through manual scanning 32. Alternately, the scanner 15 may be fashioned to locate a specific chip where one or more hosts are in a crowd. The targeted chip may be recognized throxigh any sensing or electromagnetic field 24 which is radiated outward or any other registering means. An axidible signal may soxmd to alert the xiser of accxirate identification.
  • a switch from digital (serial) communication 30 to voice communication 31 may occxir at any time.
  • voice mode 31 the operator can better direct law enforcement personnel in an emergency sitxiation.
  • Voice mode 31 is a especially xiseful if the officer signals a need for assistance.
  • a panel of indicator lights is provided xmder pxish buttons to indicate which of the push buttons have been depressed.
  • an optional axidible signal may be incorporated to soxmd when a pxish button has been depressed.
  • a collapsible handle 37 is provided for easy handling.
  • the scanner 15 will be the law enforcement officers right hand aid. Field notes may be written cm the pressxire sensitive display 26 or verbally recorded 33 throxigh verbal dictation means 35.
  • the controller may be programmed to recognize the voice of a particular individual or it may be dxial progra ⁇ med to interpret dialogue of several (potentially any) individuals taking into account the differences in speech patterns, such as inflections, pitch, accents, and other variations in spoken words throxigh speaker independent technology.
  • a law enforcement officer may be able to record conversations dxiring encoxmters out in the field. Dictation may occxir at the time of encoxmter or may take place at a later time. Alternatively, the xiser may chose to make hand written notes. Therefore a switch from digital 30 and/or verbal dictation 35 to handwriting mode 34 may occur at any time.
  • the present invention may utilize pre-programmed templates defining handwriting styles stored in the controller memory. Also inclxided is a method of improved handwriting recognition software throxigh a training mode 29 wherein the xiser may program his or her handwriting into the controller memory via writing on the pressxire sensitive display 26 or other platform means. During the programming phase, the xiser may write or print discretionary words or in a predetermined sequence as pre-progra ⁇ med by the controller. For example, the controller will caxise the word "meeting" to be displayed on the associateddisplaying device. Then the controller will caxise the display 26 to give an indication that the xiser is to write the word "meeting" on the display 26 or other platform means.
  • the xiser may chose to accept the style or rewrite the word to his preference. It is to be xmderstood that handwriting styles may vary greatly even among single users. Bxiilt in dictionaries have been known to help in the recognition of words, but they are not 100% accxirate. Words are often changed to other than what the user intended. Therefore it is necessary to provide a means for greater accuracy by storing more than a single likeness of a word. Even further it is to be understood that the controller may look for and xmderstand foxir out of five letters of a word; the letter misxmderstood may then be added individxially or within its entirety to a template. An option for this addition may be provided through prompting.
  • a series of drop down menxis may aid the user. '*Yes” or “No” may be highlighted. If addition is requested, the "Yes” selection is actxiated. The very essence of the character (from start to finish; the bridge between other known characters) may be highlighted.
  • a drop down ⁇ niatxire keyboard may be provided on the display 26 to indicate which of the xmknown characters it represents. The xiser only needs to press the corresponding key and the controller will come to recognize it as another form of the xiser's own unique writing style.
  • the programming phase should be quick and easy for the user to understand. All letters of the alphabet will be encompassed throxigh the programming of varioxis words or strings of words. Certain letters will be concentrated on more than others such as the letter Z; ones that are less freqxiently xised in everyday
  • the controller may still have difficulties understanding certain character representations due to the broad writing style of an individxial. Therefore the xiser is given a choice as to make additions to a template dxiring or after an entry is completed.
  • the present invention includes a testmode wherein the xiser may test the qxiality of the templates created in training mode 29.
  • the system will caxise a word to the displayed on the screen and ask the user towrite the word. If the systemmatches the word* recognition parameters ' with the word on the display, the system will give an indication that the word is correctly tested and move on to the next word. If there is no match, the system will prompt the xiser to either add the latest addition to its memory or begin the process over again by rewriting the word.
  • the present invention includes a control means, which is able to read the fxmction keys.
  • the system is txirned on by holding down a function key as designated for a predetermined time.
  • the training mode 29 is selected by pressing the same or other designated key.
  • the test mode is selected by pressing other designated keys.
  • Satellite imaging is another very important aspect of this invention. It may provide law enforcement personnel a better xmderstanding as to what an emergency sitxiation entails, especially where there is at least one or more criminal occxirrences within parallel geographical areas. Therefore multiple telescope manipxilation is an aspect of this invention.
  • FIG. 14 depicts a view of a multitxide of telescopes (broken apart); each manipulated by a central dispatch operator.
  • FIG. 15 depicts a top view of these telescopes.
  • Telescope casing 22 rotates on the stem 20 allowing the lens 21 to potentially focus on any given emergency. Even with the uprise in violent crime, it has been found in some cases that police force numbers have not risen, but rather declined in areas where needed. The cxilprit most probably: budget cuts and the simple lack of dollars and cents in our ever fragile economy. Therefore it is desired to provide law enforcement officers a potential means of quicker response time where more serioxis cases of violent crime are being carried out against oxir fellow hxman beings.
  • Another aspect accredited to the xise of satellite imaging is bringing about the principle of accountability for ones actions back to life. If it were xmiversally assximed that becoming involved in the commission of a violent crime meant more easily apprehended and convicted offenders, one would be less likely to commit the crime.
  • a central dispatch operator to utilize a system of telescopes 14 linked to their own satellite.
  • An individual satellite may be linked up to 6 telescopes for example with each one being manipulated in any direction by central dispatch operators.
  • Zoom featxires 28 may easily allow for close-xips or enlargements of any potential crime scene, especially neighbouring crime scenes.
  • Up to six images may be displayed on a single dispatch monitor at a time. Therefore any one or more of six monitoredsitxiati ⁇ ns can be recorded 33 ondemand.
  • a more personal approach be taken such as one monitor and one or possibly two telescopes per dispatch operator.
  • central dispatch operators may perform a number of scans within their jurisdiction in the event of an emergency. Earnergencies may entail the notification of central dispatch by an emergency frequency signal from an implanted chip 18 for example, whether medically or criminally induced. Detection of an emergency frequency should effect a reading to be displayed on a monitor qxiickly identifying who specifically is in need of assistance.
  • Central dispatch station 19 provides a zoom fxmcti ⁇ n 28 to allow the operator the reduce or enlarge specific areas of a digitized nap in which the emergency frequency signal transmits.
  • the dispatch operator nay begin with a general map of Canada and the emergency freqxiency signal woxild indicate a province in which an emergency has occurred. The dispatch operator may then zoom in on that particular province, city, then area, and finally pinpoint the street or building in which the host is tracked.
  • Supplemental personal information may inclxide social security nxj ⁇ bers, names of relatives to contact in an emergency, special medical needs, and/or medical records, as well as continuous physiological monitoring.
  • operators at central dispatch may initiate an additional search; or the search may be automatic through software control.
  • the search entails a GPS radial scanwhich shoxild readily identify additional persons in the vicinity of the endangered.
  • any xmxisxial but n ⁇ ncontrollable physiologic parameters such as excessively increased heart ate, blood pressxire etc. will be instantly established. Therefore culpability in the event of a criminal act may be easier to determine; especially when coupled with eye witness accounts of the victim or bystanders.
  • Images transmitted to central dispatch may occxir in any of a variety of ways.
  • the following examples are not to be taken in a limiting sense, but are ⁇ ade merely for the purpose of describing a means for data retrieval and storage.
  • Signals may be transmitted to: a) a relay station, which in turn transmits to central station; b) or transmits directly to central station.
  • Databases can be created for addresses, landmarks, and the like. Databases consisting of street nxambers and street names can be compiled in ASCII files, which can then be imported into a map scheme and individxially located. Once these custom locations are saved to the map, the xiser has a permanent record of locations, and other important data that appears on a map of a particular city.
  • the central dispatch operator may actxiate a command to record the incident as it is being observed.
  • records may be automatic throxigh software control once central dispatch has initiated a satellite imaging search.
  • all physiological data is duly recorded. It is preferred that all data be stored on Cd-Rom because of its extensive storage capability. Additional backxips may remain on the central dispatch controller for a designated period of time.
  • SURVEILLANCE MEANS Another aspect of this invention relates to the electronic sxirveillance means of a host once detected in both authorized or unauthorized areas.
  • An interrogator 16 as known in the art, or any other form of registering means can be discretely mox ted near a door and/or recessed anywhere in the wall of a structxire. Interrogators 16 may be placed anywhere throughout an establishment. As such they are potentially moxmted in the following areas: private dwellings, warehouses, banks, retail outlets, vehicles, ar oxired vehicles and/or commodity carrying pieces thereof, airports, government facilities etc., wherever the need arises.
  • a person with an implanted chip 18 approaches an interrogator signal; the signal is received by an implanted chip. The chip will respond to the interrogation signal by giving coded information to the interrogator 16.
  • a hosts special identification code can be registered in a small database or controller for a predetermined period of time.
  • detection of xmwanted hosts may be transmitted i ⁇ mediately to any form of secxirity monitoring agency.
  • secxirity pxirposes this code should be decipherable by police investigation only. Date, time of entry and/or exit is important especially when a host is involved in the cc ⁇ missi ⁇ n of a crime.
  • the implanted chip 18 operates with two very important modes that provide for the following energy preserving measxires: a) since the chip is in a state of continuous sensing by the central controller it need only discharge intermittent pulses in an effort to exact an efficient amount of power from its internal battery or other power soxirce; and b) when a host having a chip implanted therein wanders throxigh a monitored area, the internal battery; or other power soxirce, may terminate transmission of these intermittent pulses, in txirn receiving power from the interrogator so as to preserve the life of the battery. When the stored energy from the interrogation signal is not available, the internal battery or other power soxirce within the chip 18 resumes operation.
  • the combination interrogator / transponder 17 is mobile and is itself capable of being interrogated by h ⁇ mebase or whatever the case may be, and its mere presence should be obscured so as to avoid immediate detection.
  • any information stored by the mobile interrogator 17, as attached to money sacks or the like, may be interrogated throxigh GPS technology by central dispatch or homebase. Any host fox d i ⁇ mediately near or within the vicinity of this mobile interrogator 17 for any xmxisual or prolonged periods of time may be questioned by law enforcement personnel for eye witness accoxmts.
  • the mobile interrogator 17 comprises a transmitter xmit, receiving xmit, an interrogator xmit and memory storage xmit or any other element needed to provide for the scope of this invention.
  • Featxires of the mobile interrogator 17 may include any one or more of the following: a) in the event of loss or theft the object in addition to the identity of the carrier; if chip implanted, nay be traced at any time by a secxirity monitoring agency throxigh GPS technology; b) progra ⁇ med to remain within a designated area right down to the inch. Tampering or attempted removal may induce an emergency frequency of its own; c) programmed to movewith designated hosts only and within certain time frames; d) retention of data such as date, time, identity and location of the last several known hosts for example to have came within close proximity of said object.
  • Readings from the object may offer a clue as to its joxirney if lost or stolen; h) periodic recordings as well as objects foxmd stationary after a certain period of time may trigger the calculation of new longitude and latitxide coordinates; i) all data such as description of item, owner of item, etc. may be maintained in both the mobile interrogator device as well as the central dispatch database.
  • anipxilati ⁇ n of data such as registered ownership should not be easily af ectedby external soxirces unless authorized to do so.
  • Pass codes nay be helpful to ensxire secxirity over data changes; and j) alert central dispatch of low or rapidly diminishing power sxipply.
  • any xmwanted tampering of this mobile interrogator should evoke emergency measxires of its own. If the signal from this mobile device is out of satellite view and tampering continues in an attempt to remove stored data such as the name of a registered owner, the internal device might become totally inoperable. Benefits are realized when manipulation of data cannot occur. On the other hand, if tampering is successful and the emergency frequency is not detected by central dispatch, non-volatile memory must be depended xipon to retain identification and history data if the mobile interrogator 17 is in fact ever recovered at a later date.
  • Secxirity of these units is of paramoxmt importance to prevent fraudulent use. But most important of all, it is strongly recommended that any mobile interrogator 17 employed in the commission of a crime be interrogated and any or all information obtained thereof albeit coded, be deciphered by police investigation only. The identity of perpetrators should be adeqxiately protected from xmauthorized personnel . More importantly, a mobile xmit shall not be manipulated to randomly interrogate people and illegally imitate another's identity.
  • the occxirrence of a variety of secxirity conditions will compel the chip 18 to transmit an emergency frequency signal which will reqxiire immediate attention from an operator at the central dispatch station 19.
  • the chip communicates l ⁇ ngitxide and latitxde coordinate data, as well as emergency and personal information such as name etc. , to the central dispatch operator. The information is conveniently displayed to the dispatch operator along with continuous physiological monitoring.
  • An emergency frequency activation or GPS interrogation may quickly advise the authorities of the child's whereabouts. This technique would facilitate recovery in both parental and stranger abductions. Divorce related abductions are incredibly high, and an emergency frequency may not be actixrated since a child would not perceive his parent as a threat. Interrogation is essential in these cases.
  • ADULT ABDUCTIONS Both males and females have fallen prey to abductions. Some are never heard from again; while others are found stolen with their angxiish and its perpetrator never exposed. Futxire incidents nay be reduced drastically if an implanted chip 18 was employed. Circxmstances leading up to a missing person report may vary but ultimately this filed report will provide the law enforcement officers with a legal means of GPS interrogation. VIOLENT RAPES - In some cases rapists are repeat offenders. If incarcerated, they are eventually paroled by convincing everyone that they have learned their lesson and they would never rape again. Such is not always the case. Both women and men alike are victims of violent rape, and if eqxiipped with the chip 18 an emergency freqxiency may help a victim escape this fate.
  • AIRPORT SECURITY / HIJACKINGS Metal detectors coupled with interrogators 16 nay aid airport secxirity in the detection of wanted or dangeroxis felons. As a person passes through the detector system, his presence is registered and silent alarms are soxmded. Secxirity is alerted to the presence of this offender. Identification codes are reqxiired to be pre ⁇ programmed in the secxirity database. When a match is detected, security is instantly informed and local authorities are notified. Within minutes he may be taken into custody for questioning. CONVICT ESCAPES - Persons wanted by local or national axithorities wouldn't succeed in being so elusive. . Anyone having been implanted with a chip 18 can never, ever easily escape again without being detected throxighout the world. A GPS interrogation should qxiickly reveal his or her whereabouts.
  • BURGLARIES A si ⁇ ple store theft or sophisticated heist of historical treasxires, museum artifacts, or priceless gems would otherwise be stopped throxigh the use of mobile and/or improved electronic sxirveillance interrogators 16.
  • Mobile interrogators 17 have a dual fxmcticn; to interrogate and be interrogated itself at any time. Secxirity over a priceless item may be ensxired by attaching a si ⁇ ple mobile interrogator to it. Once positioned in a gallery, execution of a GPS scan will determine the exact longitxide and latitxide coordinates of any item deemed to be of valxie. These coordinates are then locked in the computer memory. Movement, however slight, will actxiate ani ⁇ mediate response by central dispatchor hcmebase, whichever tn ' e tease may be.
  • MEDICAL EMERGENCIES Persons reqxiiring immediate medical attention would benefit from an implanted chip 18.
  • a signatxire response outside the bounded region is cause to actixrate the emergency freqxiency featxire. Once geographically located, assistance will be on its way. Physiological parameters are duly monitored by a central dispatch operator.
  • RED FLAG FREQUENCIES Potentially red flag frequencies may be put on sxich citizens as police officers or recently paroled convicts. An officers' safety is imperative out in the field. Activation of his or her emergency frequency however hoxised; by chip 18 or scanner 15, will caxise the sitxiati ⁇ n to override all others monitored at central dispatch.
  • Jxidicial Jxidge nay specify that a paedophile not be foxmd within so many feet of a specific child or children xmder a certain age, althoxigh an encoxmter between a particular host and child; whilst meeting briefly in passing, will not be enough to red-flag the sitxiati ⁇ n.
  • An extended time period of close-proximity time allowances being kept within reason
  • TROUBLE READINGS It is the intention to potentially prox ⁇ de authorities the means of compiling data throxigh software control concerning abnormal behaviour once a pattern has been established over a period of time. Unxisxial behaviour might involve two implanted hosts coming within close proximity at xmusxial times, such as in the middle of the night. This alone isn't enough to red-flag the sitxiati ⁇ n. But specific patterns cox led with sporadic readings slightly outside the boxmded region are. Chips sensed are identified by name and age. If the chip 18 emitting trouble readings is determined as belonging to a minor the chip is red-flagged.
  • the nxanber of occxirrences may be ten or twenty before the controller targets the individual for potential investigation. Chances are instances of child abuse where it exists may be diminished. Whatever the case, children discovered to be under severe stress must be appropriately dealt with. Their happiness and well being is a co ⁇ mon goal for all parents.

Abstract

A fully automatic personal security system which combines the benefits of world-wide LORAN-C or GPS navigation. The security system comprises satellite imaging means (14), detection apparatus (15), electronic surveillance interrogator (16), mobile interrogator (17), implanted electronic memory circuitry or chip (18) which transmits a uniquely coded beacon signal in response to a general interrogation signal in addition to a second more important physiologically controlled emergency frequency which communicates emergency data including position coordinates, and a central dispatch station (19) which receives the emergency data and accurately displays all necessary emergency information, superposed on a digitized map at a position corresponding to the specific location of an emergency frequency emittance.

Description

A PERaSONAL GPS SECURITY SYSTEM BACKGROUND OF THE INVENTION
1. Field of the invention
The present invention relates generally to an elaborate security system for protecting a human being hereinafter referred to as "host". In turn
"host" refers to any living creature of value. Measuring the "value" of any living creature is relative. A prized race horse or beloved pet will fall within the scope of this invention.
In particular, the major component of the present invention is an implanted electronic memory circuit or chip hereinafter referred to as "chip," triggered mainly but not limited to noncontrollable physiologic parameters of the host for expediting a response by law enforcement personnel whenever his personal security is compromised. The reference "his" in this invention relates to both the male and female gender. In addition, a host found to be in physical distress such as from a heart attack will also fall within the scope of this invention. Thus a variety of personal security conditions including a LORAN-C, GPS or any other positioning interrogation signal for lost or missing hosts may establish contact with the central station. The device then ccππunicates longitude and latitude coordinate, emergency, and personal information to the central dispatch station 19. All pertinent information is convenientlydisplayed to an operator at the central dispatch station in a manner which permits the most efficient dispatching possible of the proper responding authorities to administer appropriate security measures. 2. Description of the Background
As a society, we haven't been able to adequately prevent the widespread uprise in violent crime. Statistics tell us that there are too nunerous murders, forcible rapes, robberies, aggravated assaults, child abductions both by known and unknown hosts, burglaries, etc. Most times a violent offender has been incarcerated more than once. Our continuing efforts to combat violent crime must be congratulated but we are still in need of assistance. A method of countering violent crime is proposed by utilizing the advantages of LQRAN-C, GPS or other positioning means as well as providing even the slightest chance of saving the life of someone in serious medical distress.
Prior art devices have been proposed for tracking lost pets or farm animals. For'example, Netherlands Pat. No. 8,701,027 issued to B.J. Leferink and M.B.B. Gebbink discloses a means for providing farm animals with an individual distinguishing mark, particularly for identification and
1 registration. The aim of the invention was to implant a uniquely programmed transmitter (implanted electronic memory circuitry or chip) in the animals so that a transmission signal for each animal was received each time the transmitter was brought into brief contact with an electromagnetic field which externally induced the energy which was required for transmission.
Despite the above-described field of identification and registration, it is important to note that the prior art generally teaches the tracking of an animal that is within range to be scanned by a hand-held gun and antenna loop. For example, the prior art devices provide means of identifying animals that are safe and already in custody. However, the prior art does not offer an Loran-C or GPS interrogator means for a specific host or provide means for dispatching emergency personnel to a host in distress.
Another iπportant factor of this invention relates to the Personal Digital Assistants (PDA's) of today. They offer handwriting recognition. Marks made an the screen may by translated into the digital representations of the printed or handwritten characters they symbolize. But these recognition software packages are still in a fairly primitive stage, and recognition is often slow and inaccurate enough to render the product ineffective. Surprisingly, individual handwriting techniques may vary to such a extent that it would take a powerful software program to adequately provide the first time user with not only a worthwhile but truly functional product.
A proposal is made to combine the benefits of a controller; similar to that of a personal digital assistant (PDA); LORAN-C, GPS, or other positioning means along with improved handwriting recognition software as outlined later, and/or verbal dictation means through a speech recognition component.
It is further proposed that a controller as described above be combined with a highly confidential identification scanning means for security purposes where one or more hosts are gathered together in a crowd. Still, prior art devices have been proposed for monitoring the comings and goings of one or more hosts in a controlled environment. For example, a United States Pat. No. 5,341,126 issued to Roger 0. Boykin provides a magnetic cuff or anklet to announce movement upon which the magnetic cuff or anklet is attached when passing through an entrance way. However, the following proposed electronic surveillance interrogator, as described below, will not only provide law enforcement personnel the opportunity to plan their line of attack in advance but also help to protect museums, banks and airports, etc. from dangerous or unwanted felons. In short, law enforcement personnel are offered that essential edge through improved performance if the intruder or intruders are known ahead of time.
SUMMARY OF THE INVENTION
It is, therefore an object of the present invention to provide a personal security system which promptly alerts a central dispatch operator to an emergency situation in progress. Information displayed an a digitized map will allow for efficient dispatching of emergency personnel to a host in distress.
It is an object of the present invention to provide a means of continuous sensing or communication between the implanted "chips" and central dispatch control system through 24 military satellites orbiting the earth.
It is an object of the present invention to provide a chip with special encrypted data to be read only by those authorized to do so. Unauthorized interrogations shall not provide the administrator with confidential information. It is an object of the present invention to provide a chip that adapts to the individual physiologic parameters of each host such as heart rate, blood pressure, etc. Upon iπplantation each chip will monitor the physical systemuntil a determination is made as to the normal physical state of the host. Additionally, it is another object of the present invention to provide a means for disengaging the emergency frequency feature from time to time. Records such as "Forms of Authorization" related to this particular feature manipulation should be maintained in an appropriate manner. Backup tests should also be performed to verify correct status, whether the feature is indeed activated or not.
It is another object of the present invention to provide law enforcement personnel with the means of locating any lost or missing hosts once implanted with the chip comprising a transmitter with a uniquely coded beacon signal in response to a general interrogation signal. It is another object of the present invention to provide the benefits of a uniquely designed controller for mass private use. The controller may be any suitable microprocessor, microccuputer, or microcontroller or its functional equivalent; preferably similar to that of a personal digital assistant (PDA); along with LORAN-C, GPS or other positioning means. Other beneficial features include either improved handwriting recognition software and/or cmumuly known verbal dictation means through a speech recognition component.
It is still another object of the present invention to provide law enforcement personnel witha detection apparatus comprising a controller. The controller as outlined above may be any suitable microprocessor, πάcrocoπputer, or microcontroller or its functional equivalent; preferably similar to that of a personal digital assistant (FDA); along with IΛRAN-C, GPS or any other positioning means, and highly confidential identification scanning means for security purposes where one or more hosts are gathered together in a crowd. Additionally, features may include either improved handwriting recognitionsoftware and/or verbal dictation means through speech recognition.
It is another object of this invention to provide a method for inproved handwriting recognition software through a training mode 29 wherein the user may program his or her handwriting into the computer memory via writing on the screen or other platform means.
It is yet another object of the present invention to provide law enforcement personnel with a means of establishing two-way verbal contact utilizing the aforementioned controller enhancement with the central dispatch operator or more specifically their own home base or station.
It is further another object of the present invention to provide the central dispatch officer or home base with a means of relaying a facsimile depiction; through control of the mother controller to the enhanced controller, of any information such as mug shots, in addition to any scanned satellite images that may help a law enforcement officer in the carrying out of his duties.
It is still another object of the present invention to provide central dispatch operators with a quick means of satellite imaging through control over any nuitoer of satellites. Each of these 24 satellites are potentially linked to a multitude of telescopes. Thus, control of this nature may adequately provide law enforcement personnel with anunderstanding as to what an emergency situation entails where there is more than a single incident in a similar geographical area. Means for storage and production of hard copies are also provided.
It is another object of the present invention to provide law enforcement personnel with a means of greater safety measures by accurately identifying any intruder ascertained to be illegally within a dwelling or involved in the cαπmissiαn of a crime prior to actual physical confrontation with said intruder.
It is yet another object of the present invention to provide coπmercial or residential security monitoring agencies with greater electronic identification means. One that will allow the operator at the central dispatch station 19 to work more closely with local law enforcement agencies by accurately identifying any intruders equipped with the chip. For security^ purposes, this code should be decipherable by police investigation only. Furthermore, it is another object of the present invention to provide commercial or residential security monitoring agencies with a mobile interrogator / transponder device which may itself be interrogated at any time for locating lost or stolen valuables.
It is another object of the present invention to provide law enforcement agencies with the means of enforcing judgements such as restraining orders, and conditions of bail . Conditions of bail may restrict the host to certain geographical boundaries or forbid him from knowingly associating with other more specific hosts.
Finally, it is an object of the present invention to provide law enforcement agencies with the means of compiling data through software control concerning abnormal behaviour once a pattern has been established over a period of time.
According to the present invention, the above-described and other objects are accomplished by providing a method for both ccmπunication and interaction between host and law enforcement personnel utilizing the benefits of world-wide LORAN-C, GPS or other positioning systems. BRIEF DESCRIPTION OF THE DRAWINGS
These and other features and advantages of the present invention will be more readily apprehended from the following detailed description in connection with the appended drawings, in which:
FIG. 1 & 2 depicts potential i plantees. FIG. 3 depicts a top view section of a chip.
FIG. 4 depicts a side view section of a chip.
FIGS. 5, 5A and 5B depict a satellite with a ccπrπunication link between central dispatch and police for finding lost children.
FIGS. 6, and 6A depict satellite and central dispatch monitoring everyday life.
FIG. 7 depicts a child in the process of wandering off with a stranger.
FIG. 8 depicts a crowd which may be interrogated by an officer equipped with scanner.
FIG. 9 depicts a man in an airport which may be an escaped felon. FIG. 10 depicts a couple exercising; emergency frequency shall not activate.
FIG. 11 depicts an officer in ccmπunication with hαmebase.
FIGS. 12 and 13 show various types of interrogators.
FIG. 14 depicts a view of a multitude of telescopes (broken apart); each manipulated by a central dispatch operator. FIG. 15 depicts a top view of these telescopes.
FIG. 16. depicts an officer in ccππwnication with homebase.
FIG.17 depicts a threat whichwill induce an emergency frequency activation.
FIG. 18 depicts a moneybag potentially equipped with a mobile interrogator. FIGS. 19 and 20 show various styles of mobile interrogators with optional flashing lights.
FIG. 21 depicts a top view of a detection apparatus.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
The following description is of the best mode presently contemplated for carrying out the invention. This description is not to be taken in a limiting sense, but is made merely for the purpose of describing the general purposes of the invention.
A personal security system coπprises satellite imaging means 14, detection apparatus 15, electronic surveillance interrogator 16, mobile interrogator 17, implanted electronic memory circuit or chip 18 which transmits a uniquely coded beacon signal in response to a general interrogation signal in addition to a second more important physiological controlled emergency frequency which cαttπunicates emergency data when necessary to a central dispatch station 19 which is manned by a central dispatch operator.
FIGS. 1 and 2 depict humanbeings potentially iπplanted with a chip. The chip 18 is to be placed in a location under the skin which is insensitive to external influences. Alternatively, the chip may be implanted in any other type of living host such as a race horse or beloved pet. The chip 18 comprises a housing inside which electronic cαipαnents are installed. These electronic coπpαnents comprise: a transmitter unit; receiving unit; memory storage unit; and a power source. It is desirable that the chip provide for reliability, low cost, relatively long life of batteries or other power supplies and convenient to use. Security over the chip 18 and its contents are of the utmost importance.
Therefore the chip shall not be changed by any external magnetic or electric influences and it must have a lengthy lifespan. The longer the lifespan the better. But it is to be understood that the chip is constantly being monitored for weaknesses or unusual data errors; if the battery or other power source should become weak or if there appears to be any hardware problems, the chip is targeted for re-iπplantatiαn purposes and the host should be notified.
In the event of power loss it is suggested that the chip 18 be a) completely replaced and parts recycled or destroyed so as to avoid the possibility of fraudulent use; and b) the power source'fr m within the' chip may be completely replaced or recharged by any known method of recharging internally or externally in or out of the host. To conserve the battery life, the beacon signal is preferably a periodic pulse transmission. Also in the case of exchanging power sources, the non-volatile memory can be depended upon to retain identification and history data when removed.
Potential for the emergency frequency to correctly activate for one person, but not the other when really needed is too great a disadvantage to overcome if using standardized chips. Therefore if emergency frequencies are to work effectively, the chip 18 must be able to identify with both the known and unknown state of each physical system by variant signatures. For many physical systems, physiological parameters ccπprise multi-dimensional regions. Heart rate, blood pressure etc., differ greatly from person to person. But each has their own inner and outer boundary from which is the norm. If the response signature lies wholly within the boxmded region, the system is deemed to be in the known state. Conversely, if the response signature does not lie wholly within the bounded region, the system is deemed to be in a state other than the known state.
Upon implantation each chip 18 will monitor the physical system until a determination is made as to the normal physical state of the host. Stress is the body's response to external conditions that are emotionally upsetting or perceived as a threat. The resulting physiological changes are referred to as the fight or flight response which prepares the body to deal with danger. This response involves almost every organ and body function, including the brain and nerves, the heart and blood flow, the release of hormones, digestion, and muscle function. With day to day stress fluctuation is expected but is to be held within the bounded region.
Lifespan of the system may be extensive depending on the source chosen to power a chip. It is therefore intended to provide for a chip 18 that potentially calibrates itself to the user day to day. As the physical system ages, the bounded region fluctuates to adequately reflect its normal physical state.
When an emergency frequency is to be activated, a response signature representative of the unknown system state would have been compared to the calibrating but uniform signature representative of the known state. The difference between the two signatures is to be distinct; a severe rise outside the bounded region that is not momentarily broken. A person suddenl startled by a friend may register outside the boxmded region but a decline toward the boxmded region; however slight, is expected because the perceived threat is gone.
Emergency frequencies are not to be activated by simple physical exertion but rather by real-life emergency situations. A gradxial rise in heart rate etc. , is expected dxiring physical activity such as a leisxirely jog or hard aerobics. The purpose of the emergency frequency is to detect not only unnaturally high; but sudden increases of physiological parameters in the physical system.
Prior to an emergency frequency activation, time may be marked for data verification and a brief analysis will occxir. If the response signatxire representative of the xmknown system state as compared to the calibrated but uniform signatxire representative of the known state severe then activation will occur.
Security over confidential information must be adequately protected if the public will even atteπpt to accept the idea of mass microchipping. Measxires to prevent xmauthorized interrogations may inclxide the utilization of an encryption featxire. Chips 18 scanned by xmauthorized interrogators may yield cryptic data only. A special code or codes may also be reqxiired before actual interpretation takes place. Police issue scanners as outlined later will be outfitted with secxirity measures of its own. Unfortunately, there are a number of reasons why the emergency frequency featxire woxild no longer be necessary after implantation occurs. Therefore a means for deactivation and reactivation is provided by software control. False alarms are of great concern and should be taken into account when a host befalls the following: a sudden accident, illness, mental or physical handicaps; any circxmstance that would cause the host significant physical distress and therefore inaccxirately send a message for help. It is to be xmderstood that great care must be taken to ensxire the proper maintenance of records for legal pxirposes. It is advised that a form (s) be filled out prior to any changes in the service provided by this personal secxirity system such as activation or deactivation of the emergency signal.
Implantation is recommended soon after birth. But a newborn is so often very fragile; his behavioxir xmcertain, it is sxαggested that the emergency frequency featxire not be activated until a certain age. A parent may request activation at a later time; or activation may take place automatically throxigh software control when the child reaches a certain age.
Execution of iπplantation may be xmiform in that every host receives said chip 18 in a specific limb for example. Likewise, the implantation may be strictly random; for secxirity pxirposes only the administrator of the chip may know the exact point of insertion. Therefore no part of the human body can be easily dismembered if the whereabouts of the chip is completely xmknown. Preferably the chip woxild be implanted near a major artery; any attempt made to remove the chip by either the host himself or an xmdesirable such as a serial killer could render the host dead. Method of implantation is in no way a part of the present invention althoxigh anyone skilled in the art will realize that transport of the chip 18 can be carried out using any mechanical means but preferably with the aid of some disinfectant so as to avoid the possibility of infection. It is also possible to allow transport to take place by any means of flxiid means. The chip 18 and central dispatch controller; the controller being any sxiitable microprocessor, microcomputer, or microcontroller or its fxmctional eqxiivalent, are in the state of continuous communication via GPS satellites. Information may be received and transmitted at any time 24 hαxirs a day. Reliablemonitoring behind the scenes by software control allows the dispatch operator (s) to deal with emergencies at hand without the distraction of regular transmissions. When an emergency occurs or there appears to be a hardware problem with a particular transmission the controller designates it as a "priority" alert. As the situation continues to be monitored the central dispatch operator is made aware of a "priority" status as related information appears on the controller display. Backxip copies of the "priority" statxis readings may be preserved by tape, floppy or other retention means.
Chances are that a host nay not always be in a view of a satellite. Sx±ways or particular types of buildings may pose some problems. Whereas, reading and storing the last seven pulses transmitted from the chip 18 for eg. vail provide the controller a means of mathematically calcxilating the last known navigational position before falling out of view. The controller will be faithfully searching for the host once messages between it and the chip are disrupted. When and if the satellite finds the lost or missing chip and an emergency frequency has not in fact been activated the "alert" statxis will be abandoned.
In the event of sudden death an emergency frequency will signal the central dispatch operator. But it is the intention of this invention to intervene before actxial death occxirs. If in view of a satellite, host deterioration or complete loss of vital signs are monitored by central dispatch station 19. All pertinent information sxich as date and time of an emergency frequency signal activation, as well as rate of blood loss, and heart failxire etc. right through to the actual death may be duly recorded and maintained in the chip 18 as well as the central dispatch backxip system for future analysis. It is advised that the chip 18 be eqxiipped with a secondary; passive power source, one that may be powered by external means in the event that a host is found long after the life of the primary power soxirce. Additionally, non-volatilememory can be depended upon to retedn identification and history data when analyzed. Readings from the chip may offer a clue as to the events surrounding death.
FIG. 21 depicts a top view of a detection apparatus 15 for use by law enforcement personnel such as the police or FBI. Information displayed an the device is highly confidential. It is therefore intended to be xised only by those authorized to do so. For secxirity pxirposes it is advised that a special code be entered before each xise. The on/off switch 27 may prompt the user to input a series of secret numbers before accessing the system. A GPS transponder 25 is also provided to aid in locating lost or stolen police issue hardware. The enhanced detection apparatus 15 comprises a controller. The controller may be any suitable microprocessor, microcomputer, or microcontroller or its functional equivalent; preferably similar to that of a personal digital assistant (PDA); along with LORAN-C, GPS or any other positioning means, microphone 23, display 26, and more importantly a highly confidential identification scanning means 24 and activation switch 32. Additional featxires inclxide handwriting recognition software and/or verbal dictation means 35 throxigh a speech recognition system.
It is to be understood that a generic detection apparatus 15 may be just as valuable. It would incorporate a siπple controller or its fxmctional equivalent, microphone 23, display 26, confidential scanning means 24 and activationswitch 32 and finally LCRAN-C, GPS or any other positioning means.
The detectionapparatxis 15 hereinafter referred to as "scanner" includes a display 26; which is preferably a pressxire sensitive display, allowing for not only writing thereof but for conveying messages between central dispatch and law enforcement personnel throxigh a keyboard 36, digital or manxial. The dispatch operator is able to transmit information throxigh software control to the scanner 15 sxich as criminal records, mug shot pictorials, known aliases, in addition to satellite images that may allow the law enforcement officer a better understanding as to where a host (s) may be sitxiated; whether nearby or possibly within a specific dwelling.
Additionally, central dispatch is provided a zoom fxmction 28 to allow the operator to reduce or enlarge specific areas of a digitized map. These particular images may be transmitted to law enforcement officers out in the field. In turn these images may be reduced or enlarged. Likewise, the oϊficer may generate a search of his own with the appropriate digitized maps aiding in the location of a specific host (s). Other information that may be displayed on the scanner display 26 may also include: the identification of a host if a chip 18 is detected through manual scanning 32. Alternately, the scanner 15 may be fashioned to locate a specific chip where one or more hosts are in a crowd. The targeted chip may be recognized throxigh any sensing or electromagnetic field 24 which is radiated outward or any other registering means. An axidible signal may soxmd to alert the xiser of accxirate identification.
Cαimunication between field officers and their prospective home base or central dispatch is of utmost importance. Therefore a switch from digital (serial) communication 30 to voice communication 31 may occxir at any time. In voice mode 31, the operator can better direct law enforcement personnel in an emergency sitxiation. Voice mode 31 is a especially xiseful if the officer signals a need for assistance.
A panel of indicator lights is provided xmder pxish buttons to indicate which of the push buttons have been depressed. In addition, an optional axidible signal may be incorporated to soxmd when a pxish button has been depressed. A collapsible handle 37 is provided for easy handling.
It is to be understood that the aforementioned controller is provided for both private andpublic sectors. Therefore an enhanced controller without confidential scanning means is to be inclxided in this invention.
The scanner 15 will be the law enforcement officers right hand aid. Field notes may be written cm the pressxire sensitive display 26 or verbally recorded 33 throxigh verbal dictation means 35.
The controller may be programmed to recognize the voice of a particular individual or it may be dxial prograπmed to interpret dialogue of several (potentially any) individuals taking into account the differences in speech patterns, such as inflections, pitch, accents, and other variations in spoken words throxigh speaker independent technology. A law enforcement officer may be able to record conversations dxiring encoxmters out in the field. Dictation may occxir at the time of encoxmter or may take place at a later time. Alternatively, the xiser may chose to make hand written notes. Therefore a switch from digital 30 and/or verbal dictation 35 to handwriting mode 34 may occur at any time.
The present invention may utilize pre-programmed templates defining handwriting styles stored in the controller memory. Also inclxided is a method of improved handwriting recognition software throxigh a training mode 29 wherein the xiser may program his or her handwriting into the controller memory via writing on the pressxire sensitive display 26 or other platform means. During the programming phase, the xiser may write or print discretionary words or in a predetermined sequence as pre-prograπmed by the controller. For example, the controller will caxise the word "meeting" to be displayed on the associateddisplaying device. Then the controller will caxise the display 26 to give an indication that the xiser is to write the word "meeting" on the display 26 or other platform means. At this point, the xiser may chose to accept the style or rewrite the word to his preference. It is to be xmderstood that handwriting styles may vary greatly even among single users. Bxiilt in dictionaries have been known to help in the recognition of words, but they are not 100% accxirate. Words are often changed to other than what the user intended. Therefore it is necessary to provide a means for greater accuracy by storing more than a single likeness of a word. Even further it is to be understood that the controller may look for and xmderstand foxir out of five letters of a word; the letter misxmderstood may then be added individxially or within its entirety to a template. An option for this addition may be provided through prompting. A series of drop down menxis may aid the user. '*Yes" or "No" may be highlighted. If addition is requested, the "Yes" selection is actxiated. The very essence of the character (from start to finish; the bridge between other known characters) may be highlighted. In the event that a manual keyboard 36 is not incorporated in the design of the controller, a drop down πάniatxire keyboard may be provided on the display 26 to indicate which of the xmknown characters it represents. The xiser only needs to press the corresponding key and the controller will come to recognize it as another form of the xiser's own unique writing style.
Initially, the programming phase should be quick and easy for the user to understand. All letters of the alphabet will be encompassed throxigh the programming of varioxis words or strings of words. Certain letters will be concentrated on more than others such as the letter Z; ones that are less freqxiently xised in everyday
Figure imgf000014_0001
After the programming phase is complete, the controller may still have difficulties understanding certain character representations due to the broad writing style of an individxial. Therefore the xiser is given a choice as to make additions to a template dxiring or after an entry is completed.
The present invention includes a testmode wherein the xiser may test the qxiality of the templates created in training mode 29. During the test phase the system will caxise a word to the displayed on the screen and ask the user towrite the word. If the systemmatches the word* recognition parameters' with the word on the display, the system will give an indication that the word is correctly tested and move on to the next word. If there is no match, the system will prompt the xiser to either add the latest addition to its memory or begin the process over again by rewriting the word.
The present invention includes a control means, which is able to read the fxmction keys. The system is txirned on by holding down a function key as designated for a predetermined time. The training mode 29 is selected by pressing the same or other designated key. The test mode is selected by pressing other designated keys.
Satellite imaging is another very important aspect of this invention. It may provide law enforcement personnel a better xmderstanding as to what an emergency sitxiation entails, especially where there is at least one or more criminal occxirrences within parallel geographical areas. Therefore multiple telescope manipxilation is an aspect of this invention.
FIG. 14 depicts a view of a multitxide of telescopes (broken apart); each manipulated by a central dispatch operator. FIG. 15 depicts a top view of these telescopes. Telescope casing 22 rotates on the stem 20 allowing the lens 21 to potentially focus on any given emergency. Even with the uprise in violent crime, it has been found in some cases that police force numbers have not risen, but rather declined in areas where needed. The cxilprit most probably: budget cuts and the simple lack of dollars and cents in our ever fragile economy. Therefore it is desired to provide law enforcement officers a potential means of quicker response time where more serioxis cases of violent crime are being carried out against oxir fellow hxman beings.
Another aspect accredited to the xise of satellite imaging is bringing about the principle of accountability for ones actions back to life. If it were xmiversally assximed that becoming involved in the commission of a violent crime meant more easily apprehended and convicted offenders, one would be less likely to commit the crime.
As with any city in the world, there are certain populated areas reqxiiring additional police attention due to higher outbreaks in crime. Therefore it is more advantageous for a central dispatch operator to utilize a system of telescopes 14 linked to their own satellite. An individual satellite may be linked up to 6 telescopes for example with each one being manipulated in any direction by central dispatch operators. Zoom featxires 28 may easily allow for close-xips or enlargements of any potential crime scene, especially neighbouring crime scenes. Up to six images may be displayed on a single dispatch monitor at a time. Therefore any one or more of six monitoredsitxiatiαns can be recorded 33 ondemand. However, it is recommended that a more personal approach be taken such as one monitor and one or possibly two telescopes per dispatch operator. With these clxister telescopes 14 at their disposal , central dispatch operators may perform a number of scans within their jurisdiction in the event of an emergency. Earnergencies may entail the notification of central dispatch by an emergency frequency signal from an implanted chip 18 for example, whether medically or criminally induced. Detection of an emergency frequency should effect a reading to be displayed on a monitor qxiickly identifying who specifically is in need of assistance. Central dispatch station 19 provides a zoom fxmctiαn 28 to allow the operator the reduce or enlarge specific areas of a digitized nap in which the emergency frequency signal transmits. The dispatch operator nay begin with a general map of Canada and the emergency freqxiency signal woxild indicate a province in which an emergency has occurred. The dispatch operator may then zoom in on that particular province, city, then area, and finally pinpoint the street or building in which the host is tracked.
Supplemental personal information may inclxide social security nxjπbers, names of relatives to contact in an emergency, special medical needs, and/or medical records, as well as continuous physiological monitoring.
At the same time, operators at central dispatch may initiate an additional search; or the search may be automatic through software control. The search entails a GPS radial scanwhich shoxild readily identify additional persons in the vicinity of the endangered. In txirn any xmxisxial but nαncontrollable physiologic parameters such as excessively increased heart ate, blood pressxire etc. will be instantly established. Therefore culpability in the event of a criminal act may be easier to determine; especially when coupled with eye witness accounts of the victim or bystanders.
Let it be x derstood that in all probability not every host will have been outfitted with an implanted chip. Accordingly, in the event that only a single freqxiency were detected; most probably the victims', a qxiick satellite scan utilizing a powerful multitude of telescopes 14 should provide central dispatch v th a better -understanding at to what the "priority" alert situation entails. Iπportant clues that might have otherwise gone astray due to the inadvertent lack of immediate police attention, may be preserved throxigh controller storage and production of hard copies.
Images transmitted to central dispatch may occxir in any of a variety of ways. The following examples are not to be taken in a limiting sense, but are πade merely for the purpose of describing a means for data retrieval and storage.
Signals may be transmitted to: a) a relay station, which in turn transmits to central station; b) or transmits directly to central station.
In any event these transmitted signals should effect the images scanned to be displayed on the central dispatch monitor. The dispatch operator determines whether an emergency sitxiation is in progress.
It is to be understood that hospitals, seniors' homes, or thrill rides at theme parks; may be seen as potential trouble spots, and as such nay be registered in the controller as hot spots with the aid of software which provides electronic mapping of cities as detailed below. Nevertheless, central dispatch operators should be reqxiired to check the integrity of data of each transmitted signal. A child on a roller coaster is not to be construed as an emergency.
Databases can be created for addresses, landmarks, and the like. Databases consisting of street nxambers and street names can be compiled in ASCII files, which can then be imported into a map scheme and individxially located. Once these custom locations are saved to the map, the xiser has a permanent record of locations, and other important data that appears on a map of a particular city.
If an emergency situation is in progress, the central dispatch operator may actxiate a command to record the incident as it is being observed. Alternatively, records may be automatic throxigh software control once central dispatch has initiated a satellite imaging search. At the same time all physiological data is duly recorded. It is preferred that all data be stored on Cd-Rom because of its extensive storage capability. Additional backxips may remain on the central dispatch controller for a designated period of time. SURVEILLANCE MEANS Another aspect of this invention relates to the electronic sxirveillance means of a host once detected in both authorized or unauthorized areas. An interrogator 16, as known in the art, or any other form of registering means can be discretely mox ted near a door and/or recessed anywhere in the wall of a structxire. Interrogators 16 may be placed anywhere throughout an establishment. As such they are potentially moxmted in the following areas: private dwellings, warehouses, banks, retail outlets, vehicles, ar oxired vehicles and/or commodity carrying pieces thereof, airports, government facilities etc., wherever the need arises. When a person with an implanted chip 18 approaches an interrogator signal; the signal is received by an implanted chip. The chip will respond to the interrogation signal by giving coded information to the interrogator 16. Once interrogated, a hosts special identification code can be registered in a small database or controller for a predetermined period of time. Alternatively, detection of xmwanted hosts may be transmitted iπmediately to any form of secxirity monitoring agency. For secxirity pxirposes, this code should be decipherable by police investigation only. Date, time of entry and/or exit is important especially when a host is involved in the ccπmissiαn of a crime.
The implanted chip 18 operates with two very important modes that provide for the following energy preserving measxires: a) since the chip is in a state of continuous sensing by the central controller it need only discharge intermittent pulses in an effort to exact an efficient amount of power from its internal battery or other power soxirce; and b) when a host having a chip implanted therein wanders throxigh a monitored area, the internal battery; or other power soxirce, may terminate transmission of these intermittent pulses, in txirn receiving power from the interrogator so as to preserve the life of the battery. When the stored energy from the interrogation signal is not available, the internal battery or other power soxirce within the chip 18 resumes operation.
Provided is a new and innovative interrogator device that may be attached to any distinct object of value sxich as a musexm artifact. The combination interrogator / transponder 17 is mobile and is itself capable of being interrogated by hσmebase or whatever the case may be, and its mere presence should be obscured so as to avoid immediate detection.
In the case of a stolen armoured truck commodity carrying piece, any information stored by the mobile interrogator 17, as attached to money sacks or the like, may be interrogated throxigh GPS technology by central dispatch or homebase. Any host fox d iπmediately near or within the vicinity of this mobile interrogator 17 for any xmxisual or prolonged periods of time may be questioned by law enforcement personnel for eye witness accoxmts. The mobile interrogator 17 comprises a transmitter xmit, receiving xmit, an interrogator xmit and memory storage xmit or any other element needed to provide for the scope of this invention.
Featxires of the mobile interrogator 17 that may be attached to any suitable object of value may include any one or more of the following: a) in the event of loss or theft the object in addition to the identity of the carrier; if chip implanted, nay be traced at any time by a secxirity monitoring agency throxigh GPS technology; b) prograπmed to remain within a designated area right down to the inch. Tampering or attempted removal may induce an emergency frequency of its own; c) programmed to movewith designated hosts only and within certain time frames; d) retention of data such as date, time, identity and location of the last several known hosts for example to have came within close proximity of said object. Particular variants of data stored in memory is relative; e) draw primary yet uninterrupted power sx*pply through modern technology; f) rely on its own internal battery or power soxirce when out of range of primarily sxipplied power soxirce; g) potentially equipped with a passive power soxirce, one that may be powered by external means in the event that an object is fox d after the secondary power soxirce such as battery had died. Additionally, non-volatile memory can be depended upon to retain identification and history data when analyzed. Readings from the object may offer a clue as to its joxirney if lost or stolen; h) periodic recordings as well as objects foxmd stationary after a certain period of time may trigger the calculation of new longitude and latitxide coordinates; i) all data such as description of item, owner of item, etc. may be maintained in both the mobile interrogator device as well as the central dispatch database. For security purposes, anipxilatiαn of data such as registered ownership should not be easily af ectedby external soxirces unless authorized to do so. Pass codes nay be helpful to ensxire secxirity over data changes; and j) alert central dispatch of low or rapidly diminishing power sxipply.
These mobile interrogators are intended for both private and public sector xise, althoxigh control over secxirity issue xmits such as those potentially xised in museums are of utmost importance. Measxires should be taken to provide for access of internal circuitry only by those authorized to do so.
By all rights any xmwanted tampering of this mobile interrogator should evoke emergency measxires of its own. If the signal from this mobile device is out of satellite view and tampering continues in an attempt to remove stored data such as the name of a registered owner, the internal device might become totally inoperable. Benefits are realized when manipulation of data cannot occur. On the other hand, if tampering is successful and the emergency frequency is not detected by central dispatch, non-volatile memory must be depended xipon to retain identification and history data if the mobile interrogator 17 is in fact ever recovered at a later date.
Secxirity of these units is of paramoxmt importance to prevent fraudulent use. But most important of all, it is strongly recommended that any mobile interrogator 17 employed in the commission of a crime be interrogated and any or all information obtained thereof albeit coded, be deciphered by police investigation only. The identity of perpetrators should be adeqxiately protected from xmauthorized personnel . More importantly, a mobile xmit shall not be manipulated to randomly interrogate people and illegally imitate another's identity.
EXAMPLES OF HOW THE SECURITY SYSTEM MAY BE USED
The following are some examples in which the personal secxirity system may be xised:
MURDER - In general operation, the occxirrence of a variety of secxirity conditions will compel the chip 18 to transmit an emergency frequency signal which will reqxiire immediate attention from an operator at the central dispatch station 19. When a communication link is established, the chip communicates lαngitxide and latitxde coordinate data, as well as emergency and personal information such as name etc. , to the central dispatch operator. The information is conveniently displayed to the dispatch operator along with continuous physiological monitoring.
Execution of a GPS radial scans might readily identify other hosts or a qxiick satellite scan with powerful telescopes 14 may better explain the situation at hand. Important clxies may be preserved throxigh controller storage and production of hard copies.
CHILD ABDUCTIONS - A child abducted may be qxiickly foxmd if implanted with the chip 18. An emergency frequency activation or GPS interrogation may quickly advise the authorities of the child's whereabouts. This technique would facilitate recovery in both parental and stranger abductions. Divorce related abductions are amazingly high, and an emergency frequency may not be actixrated since a child would not perceive his parent as a threat. Interrogation is essential in these cases.
ADULT ABDUCTIONS - Both males and females have fallen prey to abductions. Some are never heard from again; while others are found murdered with their angxiish and its perpetrator never exposed. Futxire incidents nay be reduced drastically if an implanted chip 18 was employed. Circxmstances leading up to a missing person report may vary but ultimately this filed report will provide the law enforcement officers with a legal means of GPS interrogation. VIOLENT RAPES - In some cases rapists are repeat offenders. If incarcerated, they are eventually paroled by convincing everyone that they have learned their lesson and they would never rape again. Such is not always the case. Both women and men alike are victims of violent rape, and if eqxiipped with the chip 18 an emergency freqxiency may help a victim escape this fate.
AIRPORT SECURITY / HIJACKINGS - Metal detectors coupled with interrogators 16 nay aid airport secxirity in the detection of wanted or dangeroxis felons. As a person passes through the detector system, his presence is registered and silent alarms are soxmded. Secxirity is alerted to the presence of this offender. Identification codes are reqxiired to be pre¬ programmed in the secxirity database. When a match is detected, security is instantly informed and local authorities are notified. Within minutes he may be taken into custody for questioning. CONVICT ESCAPES - Persons wanted by local or national axithorities wouldn't succeed in being so elusive. .Anyone having been implanted with a chip 18 can never, ever easily escape again without being detected throxighout the world. A GPS interrogation should qxiickly reveal his or her whereabouts.
BURGLARIES - A siπple store theft or sophisticated heist of historical treasxires, museum artifacts, or priceless gems would otherwise be stopped throxigh the use of mobile and/or improved electronic sxirveillance interrogators 16.
When an intruder wanders through a portal his presence may be immediately registered by electronic sxirveillance interrogators 16 moxmted near a door and/or recessed anywhere in the wall of a structxire. Once interrogated, a silent alarm may alert the secxirity monitoring agency which in turn notifies local authorities. An exact nxmber of intruders as well as codes reflecting their identity nay be easily fxirnished. True identification should be decipherable by police investigation only. Interrogators 16 and 17 may also be programmed to simply retain information related to the crime without the collaboration of any secxirity monitoring agencies. Police investigation will still be reqxiired for deciphering the true identification of an intrxider.
Mobile interrogators 17 have a dual fxmcticn; to interrogate and be interrogated itself at any time. Secxirity over a priceless item may be ensxired by attaching a siπple mobile interrogator to it. Once positioned in a gallery, execution of a GPS scan will determine the exact longitxide and latitxide coordinates of any item deemed to be of valxie. These coordinates are then locked in the computer memory. Movement, however slight, will actxiate aniπmediate response by central dispatchor hcmebase, whichever tn'e tease may be.
MEDICAL EMERGENCIES - Persons reqxiiring immediate medical attention would benefit from an implanted chip 18. A signatxire response outside the bounded region is cause to actixrate the emergency freqxiency featxire. Once geographically located, assistance will be on its way. Physiological parameters are duly monitored by a central dispatch operator.
RED FLAG FREQUENCIES - Potentially red flag frequencies may be put on sxich citizens as police officers or recently paroled convicts. An officers' safety is imperative out in the field. Activation of his or her emergency frequency however hoxised; by chip 18 or scanner 15, will caxise the sitxiatiαn to override all others monitored at central dispatch.
Likewise, the whereabouts of a paroled convict may be closely monitored at all times. Thus, parole violations may be kept to a minimum, and hosts may effectively be kept away from another. Depending on stipulations at time of convictiona Jxidicial Jxidge nay specify that a paedophile not be foxmd within so many feet of a specific child or children xmder a certain age, althoxigh an encoxmter between a particular host and child; whilst meeting briefly in passing, will not be enough to red-flag the sitxiatiαn. An extended time period of close-proximity (time allowances being kept within reason) will give caxise to investigate for the possibility of infractions.
TROUBLE READINGS - It is the intention to potentially proxάde authorities the means of compiling data throxigh software control concerning abnormal behaviour once a pattern has been established over a period of time. Unxisxial behaviour might involve two implanted hosts coming within close proximity at xmusxial times, such as in the middle of the night. This alone isn't enough to red-flag the sitxiatiαn. But specific patterns cox led with sporadic readings slightly outside the boxmded region are. Chips sensed are identified by name and age. If the chip 18 emitting trouble readings is determined as belonging to a minor the chip is red-flagged. The nxanber of occxirrences may be ten or twenty before the controller targets the individual for potential investigation. Chances are instances of child abuse where it exists may be diminished. Whatever the case, children discovered to be under severe stress must be appropriately dealt with. Their happiness and well being is a coπmon goal for all parents.

Claims

1. A secxirity system comprising: means for generating an interrogation signal; means for transmitting a general signal in response to an interrogation signal; means for transmitting an emergency signal in response to a physiological condition; means for receiving said emergency signal.
2. The secxirity system according to claim 1 wherein said emergency signal contains coordinate or location information.
3. The secxirity system according to claim 1 wherein said means for receiving said emergency signal comprises a relay station means.
4. The secxirity system according to claim 2 fxirther coπprising telescope means to image an area where an emergency signal is detected.
5. The secxirity system according to claim 4 wherein said telescope means comprises a plxirality of telescopes capable of imaging multitude areas substantially simultaneoxisly.
6. The security system according to claim 4 fxirther comprising means to store said images for fxirther reference.
7. The secxirity system according to claim 1 wherein said means for transmitting a general signal and an emergency signal comprises a chip with a transmitting xmit, a receiving means, a memory storage means, and a power soxirce.
8. The secxirity system according to claim 7 wherein said power source is rechargeable or replaceable.
9. The secxirity system according to claim 8 wherein said power soxirce includes a passive power source means.
10. The secxirity system according to claim 1 wherein said means for transmitting an emergency or general signal employs periodic pulse transmission.
11. The secxirity system according to claim 7 wherein said memory storage means comprises non-volatile memory means.
12. The secxirity system according to claim 7 wherein said chip includes means to monitor the physical state of a host and means to determine the normal ranges of various physiological parameters of said host.
13. The secxirity system according to claim 12 wherein said parameters inclxde pulse and blood pressxire.
14. The secxirity system according to claim 12 wherein said chip inclxides means to generate said emergency signal onlywhen said parameters are outside said normal range.
15. The secxirity system according to claim 14 wherein said chip inclxides means to verify where said parameters are outside said normal range prior to generating said emergency signal.
16. The secxirity system according to claim 1 wherein said means for transmitting a general signal inclxides means to prevent xmauthorized interrogation.
17. The security system according to claim 1 further comprising means to deactivate said means for generating an emergency signal.
18. The secxirity system according to claim 1 wherein said means for receiving said emergency signal coπprises a control system for prioritizing a plxirality of said emergency signals.
19. The secxirity system according to claim 18 wherein said control system inclxides means to monitor and search for interrupted general signals.
20. The secxirity system according to claim 14 wherein said memory storage means retains information of the various physiological parameters outside solid normal range.
21. The secxirity system according to claim 1 fxirther including a portable scanner means for locating the position of a general signal or an emergency signal.
22. The secxirity system according to claim 21 wherein said portable detection means further coπprises handwriting recognition means.
23. The secxirity system according claim 21 wherein said portable detection means fxirther comprises speech recognition means.
24. The secxirity system according to claim 22 wherein said handwriting recognition means includes a training system which analyzes sample writing.
25. The security system according to claim 24 wherein said handwriting recognition means inclxides a test system for testing the training system analysis of the sample writing.
26. The secxirity system according to claim 1 fxirther inclxiding registration means for detecting said general signal in authorized or xmauthorized areas.
27. The secxirity system according to claim 7 wherein said chip is iπplantable in a living host.
28. A security system comprising: an interrogator means inclxiding means for transmitting a signal, means for receiving a signal; means for attaching said interrogator means to an object or item; means for determining the position of an object or item to which said interrogator means is attached.
29. The secxirity system according to claim 28 fxirther inclxiding means for identifying a general signal in close proximity to said interrogator means.
30. The secxirity systemaccording to claim29 fxirther including memory means for storing in ormation from said general signal.
31. The secxirity system according to claim 28 fxirther inclxiding control means, responsive to said means for determining the position of an object or item, for controlling said means for transmitting a signal.
32. The secxirity system according to claim 30 wherein said memory storage means comprises non-volatile memory storage.
PCT/CA1994/000703 1994-12-23 1994-12-23 A personal gps security system WO1996020464A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU13768/95A AU1376895A (en) 1994-12-23 1994-12-23 A personal gps security system
PCT/CA1994/000703 WO1996020464A1 (en) 1994-12-23 1994-12-23 A personal gps security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CA1994/000703 WO1996020464A1 (en) 1994-12-23 1994-12-23 A personal gps security system

Publications (1)

Publication Number Publication Date
WO1996020464A1 true WO1996020464A1 (en) 1996-07-04

Family

ID=4173039

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA1994/000703 WO1996020464A1 (en) 1994-12-23 1994-12-23 A personal gps security system

Country Status (2)

Country Link
AU (1) AU1376895A (en)
WO (1) WO1996020464A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2312066A (en) * 1996-04-10 1997-10-15 Draegerwerk Ag Emergency-reporting system for rescue operations
GB2374420A (en) * 2001-04-11 2002-10-16 James Koumis Personal locating system comprising a body function sensor, a GPS receiver and a transmitter
DE10128728C2 (en) * 2001-06-13 2003-10-23 Siemens Ag Arrangement for personal protection of information, in particular about violations of the law
GB2399204A (en) * 2003-02-17 2004-09-08 Kinderguard Ltd System for monitoring and tracking an individual
WO2005025418A1 (en) * 2003-09-15 2005-03-24 Nanyang Polytechnic A method and system for monitoring and locating an inactive individual
WO2005034432A1 (en) * 2003-10-03 2005-04-14 Koninklijke Philips Electronics N.V. Radio system with configurable links
WO2007090254A2 (en) * 2006-02-06 2007-08-16 Negy Samara Nehmi TRACKING SYSTEM OF HUMAN BElNGS, ANIMALS OR OBJECTS
US9230057B2 (en) 1998-09-01 2016-01-05 Izex Technologies, Inc. Remote monitoring of a patient

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2119552A (en) * 1982-04-27 1983-11-16 Carlos Tinoco Gutierrez Anti-theft and retrieval for vehicles
US4706689A (en) * 1985-10-30 1987-11-17 Daniel Man Implantable homing device
FR2620096A1 (en) * 1987-09-07 1989-03-10 Christian Amichot Search and pursuit device for stolen vehicles
US5135004A (en) * 1991-03-12 1992-08-04 Incontrol, Inc. Implantable myocardial ischemia monitor and related method
US5151684A (en) * 1991-04-12 1992-09-29 Johnsen Edward L Electronic inventory label and security apparatus
US5218344A (en) * 1991-07-31 1993-06-08 Ricketts James G Method and system for monitoring personnel
WO1993016452A1 (en) * 1992-02-06 1993-08-19 Simms Industries, Inc. Personal security system
WO1993017404A1 (en) * 1992-02-11 1993-09-02 Marks And Spencer P.L.C. Security system
DE9305831U1 (en) * 1993-04-20 1994-01-13 Titze Michael Device for the detection and location of emergency calls
DE9408119U1 (en) * 1994-05-17 1994-08-04 Freese Christian Alarm system for people at risk

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2119552A (en) * 1982-04-27 1983-11-16 Carlos Tinoco Gutierrez Anti-theft and retrieval for vehicles
US4706689A (en) * 1985-10-30 1987-11-17 Daniel Man Implantable homing device
FR2620096A1 (en) * 1987-09-07 1989-03-10 Christian Amichot Search and pursuit device for stolen vehicles
US5135004A (en) * 1991-03-12 1992-08-04 Incontrol, Inc. Implantable myocardial ischemia monitor and related method
US5151684A (en) * 1991-04-12 1992-09-29 Johnsen Edward L Electronic inventory label and security apparatus
US5218344A (en) * 1991-07-31 1993-06-08 Ricketts James G Method and system for monitoring personnel
WO1993016452A1 (en) * 1992-02-06 1993-08-19 Simms Industries, Inc. Personal security system
WO1993017404A1 (en) * 1992-02-11 1993-09-02 Marks And Spencer P.L.C. Security system
DE9305831U1 (en) * 1993-04-20 1994-01-13 Titze Michael Device for the detection and location of emergency calls
DE9408119U1 (en) * 1994-05-17 1994-08-04 Freese Christian Alarm system for people at risk

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2312066A (en) * 1996-04-10 1997-10-15 Draegerwerk Ag Emergency-reporting system for rescue operations
GB2312066B (en) * 1996-04-10 1998-02-18 Draegerwerk Ag Emergency-reporting system for rescue operations
US9230057B2 (en) 1998-09-01 2016-01-05 Izex Technologies, Inc. Remote monitoring of a patient
GB2374420A (en) * 2001-04-11 2002-10-16 James Koumis Personal locating system comprising a body function sensor, a GPS receiver and a transmitter
DE10128728C2 (en) * 2001-06-13 2003-10-23 Siemens Ag Arrangement for personal protection of information, in particular about violations of the law
GB2399204A (en) * 2003-02-17 2004-09-08 Kinderguard Ltd System for monitoring and tracking an individual
GB2399204B (en) * 2003-02-17 2005-02-02 Kinderguard Ltd A tracking and monitoring apparatus and system
WO2005025418A1 (en) * 2003-09-15 2005-03-24 Nanyang Polytechnic A method and system for monitoring and locating an inactive individual
US8724608B2 (en) 2003-10-03 2014-05-13 Koninklijke Philips N.V. Radio system with configurable links
TWI450533B (en) * 2003-10-03 2014-08-21 Koninkl Philips Electronics Nv Radio system with configurable links
US9001813B2 (en) 2003-10-03 2015-04-07 Koninklijke Philips N.V. Radio system with configurable links
WO2005034432A1 (en) * 2003-10-03 2005-04-14 Koninklijke Philips Electronics N.V. Radio system with configurable links
WO2007090254A3 (en) * 2006-02-06 2008-12-11 Samara Nehmi Nagy TRACKING SYSTEM OF HUMAN BElNGS, ANIMALS OR OBJECTS
JP2009528714A (en) * 2006-02-06 2009-08-06 サマラ ネフミ ナギー Human, animal or object tracking system
US7898425B2 (en) 2006-02-06 2011-03-01 Samara Nehmi Nagy Tracking system of human beings, animals or objects
WO2007090254A2 (en) * 2006-02-06 2007-08-16 Negy Samara Nehmi TRACKING SYSTEM OF HUMAN BElNGS, ANIMALS OR OBJECTS

Also Published As

Publication number Publication date
AU1376895A (en) 1996-07-19

Similar Documents

Publication Publication Date Title
KR101269285B1 (en) Proximity locator system
US5218344A (en) Method and system for monitoring personnel
US7180420B2 (en) System and method using triangulation with RF/LF and infrared devices for tracking objects
US9311586B2 (en) Apparatus and method for locating, tracking, controlling and recognizing tagged objects using active RFID technology
US4837568A (en) Remote access personnel identification and tracking system
US6218945B1 (en) Augmented monitoring system
US6774782B2 (en) Radio frequency personnel alerting security system and method
US20050262751A1 (en) Method and apparatus for detecting and identifying firearms
US20120242816A1 (en) Recognition system for firearms
US11308744B1 (en) Wrist-wearable tracking and monitoring device
US20080218335A1 (en) Rfid based proximity sensor and alert system for fugitives, sex offenders, missing soldiers and the like
US7557712B2 (en) Systems and method for monitoring equipment
US20140118140A1 (en) Methods and systems for requesting the aid of security volunteers using a security network
US20120154148A1 (en) System and method for tracking people
US10716052B2 (en) Proximity-based communication system applied to earthquake detection
WO2012129368A1 (en) Apparatus and method for locating, tracking, controlling and recognizing tagged objects using active rfid technology
US20190324151A1 (en) System and Method for Radio and Wireless Measurements, Tracking and Reporting
US20080036612A1 (en) System and Method for Tracking, Locating, and Identifying Known Sex Offenders
US20220084386A1 (en) Find Me FM
Hilhorst et al. Security guidelines for field researchers in complex, remote and hazardous places
WO1996020464A1 (en) A personal gps security system
KR20140114346A (en) System and method for alerting and tracking with improved confidentiality
EP3109839B1 (en) Method of implementing gps based extended chime and special escort mode in security panel
WO2018167349A2 (en) Autonomous private safety system capable of providing passive and active services and combatting gender violence
AU2021105326A4 (en) Method for Internet of Things (IoT) sensors and GPS based system for child health monitoring and movement tracking

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AM AT AU BB BG BR BY CA CH CN CZ DE DK ES FI GB GE HU JP KE KG KP KR KZ LK LT LU LV MD MG MN MW NL NO NZ PL PT RO RU SD SE SI SK TJ TT UA US UZ VN

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): KE MW SD SZ AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA