The present patent document relates generally to control systems for management and control of persons in protective custody, such as prisoner, or those with restraining orders in effect, and more particularly to a prisoner control system and method with improved protection of security personal and victims of domestic violence against attack.
Prior art system for tracking those on house arrest are known in the art. Such system include an ankle or wrist module with a global positioning system (“GPS”) receiver and transmitter, to allow authorities to locate the wearer of the module. Such systems have limited use in a prison setting or for use to protect victims of domestic violence from an attack by the wearer of the module.
Accordingly, there is a perceived need in the art for a prisoner tracking and control system that permits authorities and/or victims of domestic violence to halt an attack in progress or prevent an attack from occurring.
An exemplary system, has a first wearable device configured and arranged to be worn by a first person. The first wearable device has a body having a lockable cuff for securing the first wearable device to the first person and a double lock, a control module, a GPS receiver module, and a wireless receiver. The double lock is configured to activate the control module when the double lock is locked and to disable the control module when the double lock is unlocked, the body further configured to protect the control module from ingress of fluids. The exemplary system has a second wearable device configured and arranged to be worn by a second person, the second wearable comprising a GPS receiver module, a transmitter and activation switch. The exemplary system has a server configured to receive a GPS location of each of the first wearable device and the second wearable device, the server further configured to indicate a first location of the first wearable device and a second location of the second wearable device on at least one of a map or a floorplan, the server accessible through at least one of a web browsing software or a proprietary application, wherein the server is further configured to calculate a distance between the first and second wearable devices. The exemplary system is configured to transmit a signal to at least one of the first wearable device or the second wearable device in response to a determining that the first and second wearable devices are within a first predefined radius. The control module comprises a storage having a unique identifier assigned to the first wearable device and a unique identifier assigned to the first person.
An exemplary method includes providing the system in the preceding paragraph, determining the first and second wearable devices are within the first predefined radius, and transmitting a signal to at least one of the first wearable device or the second wearable device.
Various aspects of at least one embodiment are discussed below with reference to the accompanying figures, which are not necessarily drawn to scale, emphasis instead being placed upon illustrating the principles disclosed herein. The figures are included to provide an illustration and a further understanding of the various aspects and embodiments, and are incorporated in and constitute a part of this specification, but are not intended as a definition of the limits of any particular embodiment. The figures, together with the remainder of the specification, serve only to explain principles and operations of the described and claimed aspects and embodiments, but are not to be construed as limiting embodiments. In the figures, each identical or nearly identical component that is illustrated in various figures is represented by a like numeral. For purposes of clarity, not every component may be labeled in every figure.
The examples of the methods and systems discussed herein are not limited in application to the details of construction and the arrangement of components set forth in the following description or illustrated in the accompanying drawings. It will be understood to one of skill in the art that the methods and systems are capable of implementation in other embodiments and of being practiced or of being carried out in various ways. Examples of specific implementations are provided herein for illustrative purposes only and are not intended to be limiting. Also, the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting. Any references to examples, embodiments, components, elements or acts of the systems and methods herein referred to in the singular may also embrace embodiments including a plurality, and any references in plural to any embodiment, component, element or act herein may also embrace embodiments including only a singularity. References in the singular or plural form are not intended to limit the presently disclosed systems or methods, their components, acts, or elements. The use herein of “including,” “comprising,” “having,” “containing,” “involving,” and variations thereof is meant to encompass the items listed thereafter and equivalents thereof as well as additional items. References to “or” may be construed as inclusive so that any terms described using “or” may indicate any of a single, more than one, and all of the described terms.
As will be described in greater detail below, in some embodiments, the system for controlling prisoners includes a first wearable device, worn by a prisoner, and a second wearable device, worn by a security guard or a protected person, such as a victim of domestic violence. The first wearable device is configured to be secured about an appendage of a person, and including a GPS receiver module, an electroshock module and wireless receiver. The second wearable devices configured and arranged to be worn about an appendage of a person, and includes a GPS receiver module, a transmitter and activation switch. If the first wearable device is within a predefined radius of the second wearable device, activation of the activation switch causes the transmitter to send a signal to the receiver to activate the electroshock module on the first wearable device, giving a stunning shock to the subject, thereby deterring the subject from approaching the person wearing the first wearable device.
In other embodiments, the system may further include a server configured to receive a GPS location from the first and second wearable devices and indicate the locations of the first and second wearable device on a map or floorplan. Furthermore, the electroshock module of the first wearable device may be selectively activated by a user through the server, or automatically, such as through a predetermined entering a predetermined radius of the second wearable device.
In yet other embodiments, the system the server may be configured to receive a GPS location from the first and second wearable devices and calculate a distance between the first and second wearable device. The server may be further configured to transmit a signal to the first wearable device to activate the electroshock module of the first wearable device if the first wearable device is within a predefined radius of the second wearable device. The activation may occur automatically or selectively, such as depressing of an activation switch.
Referring to
In some embodiments the first section 18 of the wearable device includes a pair of electrodes 24 for the electroshock module. Alternatively, the electrodes 24 may protrude from the second section 20 or on another portion of an inner surface of the body 16, contacting the wearer's skin.
Referring to
A power source powers the components of the two configurations of the control module 28, 30 and includes enough capacity to operate for twenty-four hours, including operating the electroshock module at least twice for the first configuration. The power source may be recharged through a charging subsystem, which may include a motion-induced charging system, such as Faraday charging mechanism as well as conventional corded and wireless charging mechanisms, such as magnetic induction.
The body 16 of the wearable device 10 and/or control module 28, 30 may be sealed to prevent tampering and protect the control module 28, 30 from ingress of water or other fluids.
The storage may further include a unique identifier of the wearable device 10 and a unique identifier assigned to the subject 12 or user 14 of the wearable device 10.
Locking the double lock 22 activates the control module 28, 30 on the wearable device 10. Likewise, unlocking the double lock 22 disables the control module 28, 30, rendering the wearable device 10 inoperative.
In the second configuration, the activation switch is configured and arranged to cause the processor to transmit a signal to activate an electroshock module of another wearable device 10 within a predefined radius R of the user 14, such as 10 feet by way of example and not limitation. In some embodiments, activating the activation switch transmits the signal directly to the other wearable device 10. In other embodiments, the second configuration may also send a signal to the server, described further below.
Although the wearable device 10 is described as a handcuff to be worn on the wrist or forearm, it may also be on worn on other parts of the body, such as an ankle. The electric shocks emitted by the electroshock module of the first configuration are nonlethal, but strong enough to stun the subject, similar to a taser.
As shown in
In order to prevent inadvertent or unauthorized activations of electroshock modules, the control module 28, 30, with the processor, verifies the authenticity of an activation request received from a user's 14 wearable device or, as described further below, a server 32. In some embodiments, a lookup table containing wearable device identifiers of authorized wearable devices 10 or authorized users is maintained on the storage of the subject's 12 wearable device 10. In some embodiments, the request is verified by use of a secret code or PIN, which is matched against a code stored in a storage of the control module 28, 30. If the activation request is not verified as being authentic, the request, via the processor, is rejected. If the activation request is verified as being authentic, the control module 28, 30, via the processor, activates the electroshock module. The control module 28, 30, with the processor and transmitter/receiver module, communicates securely with the user's 14 wearable device 10 and/or server 32 to receive the device identifier and user identifier and/or secret code toe authenticate the activation request. Alternatively, these authentication credentials may be transmitted simultaneously with the activation request.
As noted above, the system may further include a server 32 where remote tracking and activation of wearable devices 10 may be initiated from. The server 32 may include one or more computers, virtual machines, and/or cloud servers accessible through a web browsing software or proprietary application. The server 32 receives GPS coordinate information transmitted periodically from wearable devices 10 being tracked by the system. The system can overlay the GPS information over maps 34 (
The server 32 may also issue commands to the wearable devices 10 being tracked by the system. Other requested actions may include requesting diagnostics, usage history, changing the authorized users and/or authorized devices, changing a secret code or PIN, updating firmware in the storage of the control module 28, 30, performing a system reset, and performing a system shutdown, for example and not by way of limitation.
As can be seen, the system and method described herein solves the problems of the prior art by providing a wearable device that includes an electroshock module, to be worn by and subject, and a wearable device, to be worn by a user, that permits the user to administer shocks to the subject if the subject enters a predefined radius of the user. This feature can enhance the safety of security officers and victims of domestic violence by deterring subjects from approaching.
Those skilled in the art will appreciate that the conception, upon which this disclosure is based, may readily be utilized as a basis for designing other products without departing from the spirit and scope of the invention as defined by the appended claims. Therefore, the claims are not to be limited to the specific examples depicted herein. For example, the features of one example disclosed above can be used with the features of another example. Furthermore, various modifications and rearrangements of the parts may be made without departing from the spirit and scope of the underlying inventive concept. For example, the geometric configurations disclosed herein may be altered depending upon the application, as may the material selection for the components. Thus, the details of these components as set forth in the above-described examples, should not limit the scope of the claims.
This application is a U.S. National Application Filed Under 35 U.S.C. 371 and claims priority to PCT/US2019/055389 filed Oct. 9, 2019 and entitled “PRISONER CONTROL DEVICE, SYSTEM, AND METHOD,” which claims priority to U.S. patent application Ser. No. 16/235,944 filed Dec. 28, 2018, and entitled “PRISONER CONTROL DEVICE, SYSTEM, AND METHOD”, the entire disclosures of which are hereby incorporated by reference for all proper purposes.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2019/055389 | 10/9/2019 | WO | 00 |
Number | Date | Country | |
---|---|---|---|
Parent | 16235944 | Dec 2018 | US |
Child | 17418929 | US |