Method and Security Modules for an Incident Deployment and Response System for Facilitating Access to Private Civil Security Resources

Information

  • Patent Application
  • 20070225995
  • Publication Number
    20070225995
  • Date Filed
    November 03, 2006
    18 years ago
  • Date Published
    September 27, 2007
    17 years ago
Abstract
A plurality of private civil security resources comprise, at least in part, civil security provisions, civil security facilities, and civil security provisions. Authorized beneficiaries are then provided with consideration-based access to this plurality of private civil security resources. A management system is used to manage at least the private civil security resources. Profiles of the authorized beneficiaries are at least electronically isolated from access by the management system at least while the management system is performing non-profile required tasks.
Description

BRIEF DESCRIPTION OF THE DRAWINGS

The above needs are at least partially met through provision of the method and security modules for an incident deployment and response system for facilitating access to private civil security resources described in the following detailed description, particularly when studied in conjunction with the drawings, wherein:



FIG. 1 comprises a flow diagram as configured in accordance with various embodiments of the invention;



FIG. 2 comprises a schematic block diagram view as configured in accordance with various embodiments of the invention;



FIG. 3 comprises a schematic block diagram as configured in accordance with various embodiments of the invention;



FIG. 4 comprises a schematic block diagram as configured in accordance with various embodiments of the invention;



FIG. 5 comprises a flow diagram as configured in accordance with various embodiments of the invention; and



FIG. 6 comprises a flow diagram as configured in accordance with various embodiments of the invention.


Claims
  • 1. A method comprising: providing a plurality of private civil security resources comprising, at least in part: civil security provisions;civil security facilities; andcivil security services;providing authorized beneficiaries with consideration-based access to the plurality of private civil security resources;managing at least the private civil security resources with a management system; andat least electronically isolating profiles of the authorized beneficiaries from access by the management system at least while the management system is performing non-profile required tasks.
  • 2. The method of claim 1 wherein the consideration-based access comprises at least one of: a time-limited right of access;an event-limited right of access;an inheritable right of access;a right of access predicated upon a series of periodic payments;a right of access predicated upon a one-time payment;an ownership-based right of access;a non-transferable right of access;a transferable right of access;a membership-based right of access;a fractional ownership-based right of access;a non-ownership-based right of access;an option-based right of access;a credit-based right of access.
  • 3. The method of claim 2 wherein providing authorized beneficiaries with consideration-based access to the plurality of private civil security resources further comprises conditioning the access upon at least one of: an authorized beneficiary's qualifications;an authorized beneficiary's measured intelligence;an authorized beneficiary's psychological test results;an authorized beneficiary's behavioral test results;an authorized beneficiary's race;an authorized beneficiary's nationality;an authorized beneficiary's citizenship;an authorized beneficiary's ancestry;an authorized beneficiary's sexual orientation;an authorized beneficiary's gender;an authorized beneficiary's age;an authorized beneficiary's height;an authorized beneficiary's weight;an authorized beneficiary's physical attributes;an authorized beneficiary's health;an authorized beneficiary's political agenda;an authorized beneficiary's educational background;an authorized beneficiary's professional title;an authorized beneficiary's financial backing;an authorized beneficiary's athletic ability;an authorized beneficiary's mechanical ability;an authorized beneficiary's skills;an authorized beneficiary's relationship to a third party entity with whom reciprocal relations regarding a provision of private civil security resources exist.
  • 4. The method of claim 1 wherein the civil security provisions comprise a plurality of resources as pertain to at least one of: a life-sustaining resource;breathable air;fluids;water;food;protective clothing;a shelter;a medical supply;a personal hygiene supply;an environmental threat abatement supply;a luxury item.
  • 5. The method of claim 1 wherein the civil security facilities comprise at least one of: a civil security shelter;a rally point at which the authorized beneficiaries can gather in response to a civilly-catastrophic event in order to receive the civil security services;a location where at least some of the authorized beneficiary's civil security provisions are available;a trans-shipment facility for at least some of the civil security provisions;a medical services facility.
  • 6. The method of claim 1 wherein the civil security services comprise at least one of: transportation away from a location that substantially lacks civil security;transportation to a civil security facility;civil security information for at least one of individual ones and any of the authorized beneficiaries;civil security information that comprises contingency instructions to guide the authorized beneficiary during a time of need when responding to a civilly-catastrophic event;civil security preparedness training;a long distance communications service that is configured and arranged to provide persistent communication services notwithstanding interaction of the long distance communication service with effects of a civilly-catastrophic event;a rescue service to retrieve selected beneficiaries from dangerous circumstances owing, at least in part, to a substantial lack of civil security;delivery of at least a portion of the civil security provisions;transport of dispossessed persons;physical security;medical services;post-civilly-catastrophic event social relationship facilitation;delivery of fuel;installation of independent utilities facilities.
  • 7. The method of claim 1 wherein the management system further comprises an information system that an authorized beneficiary can access to receive substantially real-time advice regarding near-term actions to take with respect to a given civilly-catastrophic event.
  • 8. The method of claim 1, further comprising: accepting consideration-based private civil security subscriptions from subscribers with respect to providing the consideration-based access to the plurality of private civil security resources.
  • 9. The method of claim 1 wherein providing authorized beneficiaries with consideration-based access to the plurality of private civil security resources comprises only providing access in association with a civilly-catastrophic event.
  • 10. The method of claim 1 wherein the management system manages deployment of the private civil security resources in response to an incident.
  • 11. The method of claim 1 wherein managing at least the private civil security resources with a management system further comprises providing instructions for performing at least one of: procuring;equipping;staffing;maintaining;allocating;deliveringpositioning;moving;organizing;prioritizing;inventorying;securing;protecting;rotating;building;detailing;instructing for use;
  • 12. The method of claim 1 wherein managing at least the private civil security resources with a management system further comprises providing instructions for performing at least one of: procuring;maintaining;allocating;delivering positioning;moving;organizing;prioritizing;inventorying;securing;protecting;rotating;making;instructing for use;
  • 13. The method of claim 1 wherein managing at least the private civil security resources with a management system further comprises providing instructions for performing at least one of: procuring;equipping;staffing;maintaining;allocating;deliveringpositioning;moving;organizing;prioritizing;inventorying;securing;protecting;rotating;building;detailing;instructing for use;
  • 14. The method of claim 1 wherein managing at least the private civil security resources with a management system further comprises managing at least one of: information regarding the characteristics of a civilly-catastrophic event;information regarding access to the private civil security resources;contingency instructions to guide the authorized beneficiary during a time of need when responding to a civilly-catastrophic event;civil security preparedness training.
  • 15. The method of claim 1 wherein the non-profile required tasks performed by the management system comprise at least one of: identifying characteristics of a civilly-catastrophic event;managing a business of at least one provider of the private civil security resources;managing personnel providing the private civil security resources;managing computer devices establishing the management system;managing communications with at least one of: authorized beneficiaries;another civil security resources provider;governmental authorities;providers of information regarding a civilly-catastrophic event;managing supplies by coordinating with at least one of: authorized beneficiaries;another civil security resources provider;governmental authorities;providers of information regarding a civilly-catastrophic event;managing equipment by coordinating with at least one of: authorized beneficiaries;another civil security resources provider;governmental authorities;providers of information regarding a civilly-catastrophic event;managing the civil security resources based on general statistics of the authorized beneficiaries.
  • 16. The method of claim 1, further comprising: providing access to the profiles of the authorized beneficiaries for the management system for at least one of: updating an existing profile of the profiles of the authorized beneficiaries;adding a new profile to the profiles of the authorized beneficiaries;managing the plurality of the civil security resources in association with a civilly-catastrophic event;training exercises with a particular authorized beneficiary.
  • 17. The method of claim 1, further comprising; providing access to the profiles of the authorized beneficiaries for the management system on at least one of:a substantially periodic basis;an as-needed basis.
  • 18. The method of claim 1 wherein at least electronically isolating profiles of the authorized beneficiaries comprises isolating at least a storage device storing the profiles of the authorized beneficiaries from all communication ports and interfaces providing access to the management system.
  • 19. The method of claim 18 wherein the storage device resides on the management system, and wherein the storage device is isolated by using at least one of: an access blocking program;a switch configured and arranged to substantially stop data flow on a data pathway connected to the storage device;a password.
  • 20. The method of claim 1 wherein managing at least private civil security resources with a management system comprises providing the management system with at least one of: a computer network;a mainframe computer;a server;a computer;a laptop computer;a portable computer;a hand-held computer;a personal data assistant;a telephone having a memory for storing data;an email transceiver device.
  • 21. The method of claim 1 wherein at least electronically isolating profiles of the authorized beneficiaries includes physically isolating at least one data storage device storing profiles of the authorized beneficiaries from the management system.
  • 22. The method of claim 21 wherein the at least one data storage device is part of at least one privacy module configured to be selectively detachable from the management system.
  • 23. The method of claim 22 wherein the at least one data storage device substantially forms the at least one privacy module.
  • 24. The method of claim 22 wherein the at least one privacy module is at least one of: a compact disc;an optically-based memory;a magneto-optically based memory;a magnetically based memory;a hard drive;a memory drive selectively receiving the data storage device;a magnetic tape;a thumb drive;a solid-state memory;a microchip;an integrated-circuit based memory.
  • 25. The method of claim 22 wherein the at least one privacy module is configured and arranged so that storing data is one of a plurality of purposes provided by the at least one privacy module.
  • 26. The method of claim 22 wherein the at least one privacy module is at least one of: a computer network having a plurality of computers being at least one of: physically;electronically detachable from each other;a mainframe computer;a server;a computer;a laptop computer;a portable computer;a hand-held computer;a personal data assistant;a telephone having a memory for storing data;an email transceiver device.
  • 27. The method of claim 26 wherein the at least one privacy module is the computer network, and wherein the profiles are stored on a plurality of databases on at least two of the plurality of computers.
  • 28. The method of claim 22 wherein the at least one privacy module and the management system each have at least one interface configured for connecting to each other, and wherein one interface is a dock for receiving the other interface.
  • 29. The method of claim 28 wherein the dock is at least one of manually and remotely operated for disconnecting the at least one privacy module from the management system.
  • 30. The method of claim 22 wherein physically isolating a data storage device comprises providing a detachable connection between the privacy module and the management system wherein the detachable connection comprises at least one of: a plug connection;a communication port;a serial port;a universal serial bus port;a parallel port;a line print terminal port;a wireless connection;an infrared-based connection;a digital-signal based connection;a digital-subscriber based connection;a telephone-based connection;a cellular network-based connection;a satellite network-based connection;a connection configured for being manually detached;a connection detachable by a switch;a connection detachable by operating a remote device wherein remote is relative to at least the connection and the management system.
  • 31. The method of claim 22 wherein physically isolating a data storage device comprises providing a library device configured and arranged for detachably connecting a selected one of the at least one privacy modules to the management system.
  • 32. The method of claim 22 wherein physically isolating at least one data storage device comprises providing at least one secure room for storing the at least one privacy module.
  • 33. The method of claim 32 wherein providing at least one secure room comprises permitting entry into the secure room to only personnel having a predetermined security clearance.
  • 34. The method of claim 32 wherein providing at least one secure room comprises identifying a person requesting entry into the at least one secure room by at least one of: a biometric;an identification card;a pass code;a password;a still image;a video image;a written authorization document;an electronic authorization document.
  • 35. The method of claim 32 wherein providing at least one secure room comprises providing at least one surveillance device configured for detecting unauthorized actions relating to the at least one secure room.
  • 36. The method of claim 35 wherein providing at least one surveillance device comprises providing at least one surveillance device for at least one of: lighting relating to the secure room;recording images relating to the secure room;providing a real-time image relating to the secure room;detecting motion relating to the secure room;detecting unauthorized electronic activity in the secure room;detecting unauthorized entry into the secure room;triggering an alarm relating to the secure room;establishing a barrier in response to an alarm relating the secure room;transmitting an indication of an unauthorized event relating to the secure room;placing computers in the secure room in an at least partially inoperable state;erasing profiles of the authorized beneficiaries stored in the secure room.
  • 37. The method of claim 36 wherein the surveillance device erases profile data stored in the secure room, and wherein back-up storage devices pre-stored with profiles are made accessible upon the erasing of the profiles of the authorized beneficiaries.
  • 38. The method of claim 32 wherein providing at least one secure room comprises providing at least one guard for restricting access to the at least one secure room.
  • 39. The method of claim 32 wherein providing at least one secure room comprises providing data from the at least one privacy module by at least one of: detachably forming a plug connection in the at least one secure room;providing a switch activator disposed in the secure room;providing a modem activator in the secure room;providing a wireless data transmission activator in the secure room;providing a download to hard copy of profiles in the secure room;providing a download to a data storage device being removable from the secure room;moving the privacy module out of the secure room.
  • 40. The method of claim 21 further comprising: providing at least one storage device storing back-up data comprising at least one of:profile data;data other than profile data;both profile and non-profile data.
  • 41. The method of claim 40 wherein the at least one storage device storing back-up data is disposed at least at one of: a same location as a location holding the at least one storage device storing profile data;a different location that is other than the location holding the at least one storage device storing profile data,wherein the location of the at least one storage device holding back-up data has at least one mechanism to protect against unauthorized access into the back-up data.
  • 42. The method of claim 1 wherein at least electronically isolating profiles of the authorized beneficiaries further comprises monitoring a connection providing access to the profiles while the profiles are accessible to the management system for detecting unauthorized access to the profiles.
  • 43. The method of claim 42 wherein the connection is monitored by at least one of: electronically;software configured to automatically indicate unauthorized access;a user;physically watching a device forming the connection.
  • 44. The method of claim 1 wherein at least electronically isolating profiles of the authorized beneficiaries further comprises providing a paper record in a location having devices to secure the location from unauthorized access to the paper record and for recording at least one of: profiles; records relating to access to the profiles; non-profile related records.
  • 45. The method of claim 1 wherein at least electronically isolating profiles of the authorized beneficiaries further comprises: receiving profile data of the profiles of the authorized beneficiaries while a private database for storing the profile data is detached from the management system;encrypting the profile data;storing the profile data on at least one non-private database accessible by the management system until the private database is electronically connected to the management system.
  • 46. The method of claim 45 wherein at least electronically isolating profiles of the authorized beneficiaries further comprises activating an alert to indicate profile data is present on the at least one non-private database.
  • 47. The method of claim 45 wherein at least electronically isolating profiles of the authorized beneficiaries further comprises erasing the profile data from the at least one non-private database once the profile data is copied to the private database.
  • 48. The method of claim 45 wherein at least electronically isolating profiles of the authorized beneficiaries further comprises: determining when the profile data is a new profile;assigning a code to at least one authorized beneficiary associated with the new profile; andstoring the code on the at least one non-private database.
  • 49. The method of claim 48 wherein at least electronically isolating profiles of the authorized beneficiaries further comprises: storing a table of codes and correspondence to profile data on the private database.
  • 50. The method of claim 48 wherein the code comprises at least one of: a predetermined number of symbols including randomly selected numbers and letters;a number representing a chronological order by which the authorized beneficiaries at least one of: obtained a promise for access to the civil security resources;became a member of an entity providing the civil security resources;logged into the management system a first time;submitted a profile to the management system;a symbol representing a type of agreement an authorized beneficiary has with a provider of the civil security resources;a symbol representing a location of the authorized beneficiary;a symbol representing a type of civil security resource to be provided to an authorized beneficiary;a symbol representing a way in which a civil security resource is to be provided to an authorized beneficiary.
  • 51. The method of claim 1 wherein the profiles of the authorized beneficiaries comprise at least one of: a legal name;a nickname;a general description including at least one of: weight;height;physical attribute;gender;age;hair color;hair style;skin color;marks on the skin;eye wear;disability;tattoo;race;nationality;citizenship;ancestry;sexual orientation.
  • 52. The method of claim 1 wherein the profiles of the authorized beneficiaries comprise at least one of: an indication of other authorized beneficiaries relating to the authorized beneficiary of the profile;a family member;an heir;an executor of an authorized beneficiary's estate;a political agenda;a group to which the authorized beneficiary belongs;a pet;an educational background;a profession;a financial condition;a phone number;an address;a personal identification number.
  • 53. The method of claim 1 wherein the profiles of the authorized beneficiaries comprise at least one of: an authorized beneficiary's measured intelligence;an authorized beneficiary's psychological test results;an authorized beneficiary's behavioral test results;health;athletic ability;mechanical ability;skills;medication being taken;a medical condition;a psychological condition;a dietary preference a dietary restriction.
  • 54. The method of claim 1 wherein the profiles of the authorized beneficiaries comprise at least one of: a description of civil security resources accessible to the authorized beneficiary;a reason an authorized beneficiary is denied access to a civil security resource;a financial record relating to access to the civil security resources;a preference relating to a civil security provision;a preference relating to a civil security service;a preference relating to a civil security facility.
  • 55. The method of claim 1 wherein at least electronically isolating profiles of the authorized beneficiaries further comprises: upon indication of at least an imminently threatened civilly-catastrophic event, establishing actions to be taken for non-profile required tasks in association with the civilly-catastrophic event;electronically connecting a private database holding profile data of the authorized beneficiaries to the management system;establishing actions to be taken based, at least in part, on the profile data of the authorized beneficiaries.
  • 56. The method of claim 55 wherein at least electronically isolating profiles of the authorized beneficiaries further comprises at least one of: activating an alert requesting the management system be at least electronically connected to the private database;automatically electronically connecting the management system to the private database.
  • 57. The method of claim 55 wherein at least electronically isolating profiles of the authorized beneficiaries further comprises: detecting a stand-down event;detaching the private database from the management system after indication of the stand-down event.
  • 58. The method of claim 57 wherein the stand-down event is at least one of: an announcement by authorities relating to a condition of a civilly-catastrophic event;a conclusion based on threat assessment data relating to the civilly-catastrophic event;a conclusion based on sensor data indicating an end of the civilly-catastrophic event;a conclusion based on real-time observations indicating an end of the civilly-catastrophic event;a conclusion based on a predicted end of the civilly-catastrophic event;an indication of an imminent end of the civilly-catastrophic event;an indication of an end of civil upheaval that is at least substantially caused by the civilly-catastrophic event.
  • 59. A method comprising: providing a plurality of private civil security resources comprising, at least in part: civil security provisions;civil security facilities; andcivil security services;providing authorized beneficiaries with consideration-based access to the plurality of private civil security resources;receiving profiles of authorized beneficiaries;assigning one of a plurality of security clearance levels to personnel of at least one provider of the plurality of private civil security resources for restricting access to the profiles of authorized beneficiaries.
  • 60. The method of claim 59 wherein the security clearance levels are assigned on a need-to-know basis.
  • 61. The method of claim 59 wherein assigning one of a plurality of security clearance levels comprises providing personnel of the at least one provider that perform non-profile required tasks substantially no access to the profiles of authorized beneficiaries.
  • 62. The method of claim 59 wherein assigning one of a plurality of security clearance levels comprises providing personnel of the at least one provider that perform tasks for a certain type of civil security resource only profile data of authorized beneficiaries related to the certain type of civil security resource.
  • 63. The method of claim 59 wherein assigning one of a plurality of security clearance levels comprises providing only a code that uniquely relates to a given authorized beneficiary in lieu of other identifying information to facilitate particular profile-related tasks as carried out by the personnel.
  • 64. The method of claim 63 wherein, when the particular profile-related tasks comprise at least one of: delivering objects to authorized beneficiaries; andtransporting authorized beneficiaries;further providing to the personnel addresses as correspond to the authorized beneficiaries.
  • 65. The method of claim 63 wherein, when the particular profile-related tasks comprises at least stocking the private civil security provisions for an indicated authorized beneficiary, further providing to the personnel a list of provisions as correspond to the indicated authorized beneficiary.
  • 66. The method of claim 63 wherein, when the particular profile-related tasks comprises at least maintaining the private civil security facilities, further providing to the personnel a facility-related preference list of the authorized beneficiaries.
  • 67. The method of claim 63 wherein, when the particular profile-related tasks comprises identifying an indicated authorized beneficiary, further providing to the personnel identification information related to the indicated authorized beneficiary.
  • 68. The method of claim 63 wherein, when the particular profile-related tasks relate to a particular authorized beneficiary for coordinating all civil security resources for the particular authorized beneficiary, further providing to the personnel all of the profile data only for the particular authorized beneficiaries assigned to the personnel.
  • 69. The method of claim 63 wherein, when the particular profile-related tasks comprises coordination of a plurality of the civil security resources and multiple authorized beneficiaries, further comprises providing access to substantially all profile date of the authorized beneficiaries to the personnel.
  • 70. The method of claim 59, further comprising: providing access to data on an incident deployment and response system configured and arranged for managing the civil security resources, and wherein access is provided according to the security clearance level.
  • 71. The method of claim 70, further comprising: storing profile data of the authorized beneficiaries on a privacy module at least electronically detachable from the incident deployment and response system; andproviding access to the privacy module depending on the security clearance level.
  • 72. An isolatable privacy module for detachable connection to an incident deployment and response system, the isolatable privacy module comprising: a data storage device;an interface configured and arranged for providing access to data on the data storage device and for being detachably connected to the incident deployment and response system; andprofiles stored on the data storage device and being of authorized beneficiaries of consideration-based and civilly-catastrophic event-based access to private civil security resources.
  • 73. The isolatable privacy module of claim 72 further being configured and arranged so that a data security module restricts access to the profiles while the privacy module is connected to the incident deployment and response system.
  • 74. The isolatable privacy module of claim 72 wherein a substantially sole purpose of the privacy module is to store data.
  • 75. The isolatable privacy module of claim 72 further comprising at least one of: a compact disc;an optically-based memory;a magneto-optically based memory;a magnetically based memory;a hard drive;a memory drive selectively receiving the storage device;a magnetic tape;a thumb drive;a solid-state memory;a microchip;an integrated-circuit based memory.
  • 76. The isolatable privacy module of claim 72 being configured and arranged so that storing data is one of a plurality of purposes provided by the privacy module.
  • 77. The isolatable privacy module of claim 72 further comprising at least one of: a computer network having a plurality of computers being at least one of:electronically; physically detachable from each other;a mainframe computer;a server;a computer;a laptop computer;a portable computer;a hand-held computer;a personal data assistant;a telephone having a memory for storing data;an email transceiver device.
  • 78. The isolatable privacy module of claim 77 wherein the isolatable privacy module is the computer network, and wherein the profiles are stored on a plurality of databases on at least two of the plurality of computers.
  • 79. The isolatable privacy module of claim 72 wherein the incident deployment and response system further comprises at least one of: a computer network;a mainframe computer;a server;a computer;a laptop computer;a portable computer;a hand-held computer;a personal data assistant;a telephone having a memory for storing data;an email transceiver device.
  • 80. The isolatable privacy module of claim 72, further comprising: at least one interface, and wherein the incident deployment and response system has at least one interface, and wherein one interface of one of the privacy module and incident deployment and response system is a dock for receiving the interface on the other of the privacy module and the incident deployment and response system.
  • 81. The isolatable privacy module of claim 72, further comprising an interface for forming a detachable connection with the incident deployment and response system having at least one of: a plug connection;a communication port;a serial port;a universal serial bus port;a parallel port;a line print terminal port;a wireless connection;an infrared-based connection;a digital-signal based connection;a digital-subscriber based connection;a telephone-based connection;a cellular network-based connection;a satellite network-based connection;a connection configured for being manually detached;a connection detachable by a switch;a connection detachable by operating a remote device wherein remote is relative to at least the connection and the management system.
  • 82. An incident deployment and response system, comprising: an interface for detachably electronically connecting to a private database storing profiles of authorized beneficiaries having consideration-based and civilly-catastrophic event-based access to at least one private civil security resource;a non-private database configured for storing the profiles of authorized beneficiaries until the private database is accessible; anda data security module for restricting access to the profiles of authorized beneficiaries.
  • 83. The incident deployment and response system of claim 82 wherein the data security module is configured for restricting access to both the non-private database and the private database.
  • 84. The incident deployment and response system of claim 82 wherein the data security module is configured for restricting access to the profiles based on a security clearance level of a user.
  • 85. The incident deployment and response system of claim 82 where the data security module is configured for indicating to a user that the profiles reside on the non-private database.
  • 86. The incident deployment and response system of claim 82 wherein the data security module is configured for indicating to a user that processes performed by the incident deployment and response system require access to the private database.
  • 87. The incident deployment and response system of claim 82 wherein the data security module is configured for encrypting the profiles of authorized beneficiaries.
  • 88. The incident deployment and response system of claim 82 wherein the data security module is configured for assigning a code corresponding to each authorized beneficiary and used for coordinating civil security resources accessible to the authorized beneficiary.
  • 89. A management system, comprising: at least one module configured for at least managing a plurality of private civil security resources comprising, at least in part: civil security provisions;civil security facilities; andcivil security services,wherein the at least one module comprises at least one profile module configured for at least managing profiles of authorized beneficiaries with consideration-based access to the plurality of private civil security resources.
  • 90. The management system of claim 89 wherein the at least one module has at least one of: the same module managing both resources and profiles;different modules managing resources and profiles.
  • 91. The management system of claim 89 further comprising: at least one security module configured for at least electronically isolating the profiles of the authorized beneficiaries from access by the management system at least while the management system is performing non-profile required tasks.
  • 92. The management system of claim 91 wherein the at least one security module comprises at least one privacy module having a database for storing the profiles and being physically detachable from the management system.
  • 93. The management system of claim 89 wherein the at least one module is configured to establish actions related to the private civil security resources based on information associated with a civilly-catastrophic event.
Provisional Applications (15)
Number Date Country
60820628 Jul 2006 US
60823806 Aug 2006 US
60825524 Sep 2006 US
60825976 Sep 2006 US
60826491 Sep 2006 US
60827591 Sep 2006 US
60827820 Oct 2006 US
60827828 Oct 2006 US
60828341 Oct 2006 US
60828342 Oct 2006 US
60829447 Oct 2006 US
60829779 Oct 2006 US
60862398 Oct 2006 US
60863469 Oct 2006 US
60863481 Oct 2006 US
Continuation in Parts (42)
Number Date Country
Parent 11384037 Mar 2006 US
Child 11556520 US
Parent 11394350 Mar 2006 US
Child 11384037 US
Parent 11279333 Apr 2006 US
Child 11394350 US
Parent 11379929 Apr 2006 US
Child 11279333 US
Parent 11381247 May 2006 US
Child 11379929 US
Parent 11381257 May 2006 US
Child 11381247 US
Parent 11381265 May 2006 US
Child 11381257 US
Parent 11381277 May 2006 US
Child 11381265 US
Parent 11383022 May 2006 US
Child 11381277 US
Parent 11420594 May 2006 US
Child 11383022 US
Parent 11421694 Jun 2006 US
Child 11420594 US
Parent 11423594 Jun 2006 US
Child 11421694 US
Parent 11425043 Jun 2006 US
Child 11423594 US
Parent 11426231 Jun 2006 US
Child 11425043 US
Parent 11456472 Jul 2006 US
Child 11426231 US
Parent 11461605 Aug 2006 US
Child 11456472 US
Parent 11461624 Aug 2006 US
Child 11461605 US
Parent 11462795 Aug 2006 US
Child 11461624 US
Parent 11462845 Aug 2006 US
Child 11462795 US
Parent 11464751 Aug 2006 US
Child 11462845 US
Parent 11464764 Aug 2006 US
Child 11464751 US
Parent 11464775 Aug 2006 US
Child 11464764 US
Parent 11464788 Aug 2006 US
Child 11464775 US
Parent 11464799 Aug 2006 US
Child 11464788 US
Parent 11465063 Aug 2006 US
Child 11464799 US
Parent 11466727 Aug 2006 US
Child 11465063 US
Parent 11466953 Aug 2006 US
Child 11466727 US
Parent 11470156 Sep 2006 US
Child 11466953 US
Parent 11531651 Sep 2006 US
Child 11470156 US
Parent 11532461 Sep 2006 US
Child 11531651 US
Parent 11535021 Sep 2006 US
Child 11532461 US
Parent 11535282 Sep 2006 US
Child 11535021 US
Parent 11537469 Sep 2006 US
Child 11535282 US
Parent 11539798 Oct 2006 US
Child 11537469 US
Parent 11539861 Oct 2006 US
Child 11539798 US
Parent 11548191 Oct 2006 US
Child 11539861 US
Parent 11549874 Oct 2006 US
Child 11548191 US
Parent 11550594 Oct 2006 US
Child 11549874 US
Parent 11551083 Oct 2006 US
Child 11550594 US
Parent 11554452 Oct 2006 US
Child 11551083 US
Parent 11555589 Nov 2006 US
Child 11554452 US
Parent 11555896 Nov 2006 US
Child 11555589 US