The present patent document relates generally to control systems for management and control of persons in protective custody, such as prisoner, or those with restraining orders in effect, and more particularly to a prisoner control system and method with improved protection of security personal and victims of domestic violence against attack.
Prior art system for tracking those on house arrest are known in the art. Such system include an ankle or wrist module with a global positioning system (“GPS”) receiver and transmitter, to allow authorities to locate the wearer of the module. Such systems have limited use in a prison setting or for use to protect victims of domestic violence from an attack by the wearer of the module.
Accordingly, there is a perceived need in the art for a prisoner tracking and control system that permits authorities and/or victims of domestic violence to halt an attack in progress or prevent an attack from occurring.
The prisoner control system and method described herein solves the problems of the prior art by providing a system for controlling prisoners using uniquely configured wearable devices. The system includes a first wearable device configured to be secured about an appendage of a person, and includes a GPS receiver module, an electroshock module and wireless receiver. A second wearable device is configured to be worn about an appendage of a person, and includes a GPS receiver module, a transmitter and activation switch. If the first wearable device is within a predefined radius of a second wearable device, activation of the activation switch causes the transmitter to send a signal to the receiver to activate the electroshock module. Additionally, the system may include a server that can selectively activate the electroshock module and display the location of the wearable devices on a map or floorplan.
A user wearing the second wearable device may activate an electroshock module on a subject wearing the first wearable device if the subject approaches within a pre-defined radius of the wearer. In this manner, user's that are security personnel or victim's of domestic violence may protect themselves against subjects that are prisoners and/or subject to restraining orders.
Various aspects of at least one embodiment are discussed below with reference to the accompanying figures, which are not necessarily drawn to scale, emphasis instead being placed upon illustrating the principles disclosed herein. The figures are included to provide an illustration and a further understanding of the various aspects and embodiments, and are incorporated in and constitute a part of this specification, but are not intended as a definition of the limits of any particular embodiment. The figures, together with the remainder of the specification, serve only to explain principles and operations of the described and claimed aspects and embodiments, but are not to be construed as limiting embodiments. In the figures, each identical or nearly identical component that is illustrated in various figures is represented by a like numeral. For purposes of clarity, not every component may be labeled in every figure.
The examples of the methods and systems discussed herein are not limited in application to the details of construction and the arrangement of components set forth in the following description or illustrated in the accompanying drawings. It will be understood to one of skill in the art that the methods and systems are capable of implementation in other embodiments and of being practiced or of being carried out in various ways. Examples of specific implementations are provided herein for illustrative purposes only and are not intended to be limiting. Also, the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting. Any references to examples, embodiments, components, elements or acts of the systems and methods herein referred to in the singular may also embrace embodiments including a plurality, and any references in plural to any embodiment, component, element or act herein may also embrace embodiments including only a singularity. References in the singular or plural form are not intended to limit the presently disclosed systems or methods, their components, acts, or elements. The use herein of “including,” “comprising,” “having,” “containing,” “involving,” and variations thereof is meant to encompass the items listed thereafter and equivalents thereof as well as additional items. References to “or” may be construed as inclusive so that any terms described using “or” may indicate any of a single, more than one, and all of the described terms.
As will be described in greater detail below, in some embodiments, the system for controlling prisoners includes a first wearable device, worn by a prisoner, and a second wearable device, worn by a security guard or a protected person, such as a victim of domestic violence. The first wearable device is configured to be secured about an appendage of a person, and including a GPS receiver module, an electroshock module and wireless receiver. The second wearable devices configured and arranged to be worn about an appendage of a person, and includes a GPS receiver module, a transmitter and activation switch. If the first wearable device is within a predefined radius of the second wearable device, activation of the activation switch causes the transmitter to send a signal to the receiver to activate the electroshock module on the first wearable device, giving a stunning shock to the subject, thereby deterring the subject from approaching the person wearing the first wearable device.
In other embodiments, the system may further include a server configured to receive a GPS location from the first and second wearable devices and indicate the locations of the first and second wearable device on a map or floorplan. Furthermore, the electroshock module of the first wearable device may be selectively activated by a user through the server, or automatically, such as through a predetermined entering a predetermined radius of the second wearable device.
In yet other embodiments, the system the server may be configured to receive a GPS location from the first and second wearable devices and calculate a distance between the first and second wearable device. The server may be further configured to transmit a signal to the first wearable device to activate the electroshock module of the first wearable device if the first wearable device is within a predefined radius of the second wearable device. The activation may occur automatically or selectively, such as depressing of an activation switch.
Referring to
In some embodiments the first section 18 of the wearable device includes a pair of electrodes 24 for the electroshock module. Alternatively, the electrodes 24 may protrude from the second section 20 or on another portion of an inner surface of the body 16, contacting the wearer's skin.
Referring to
A power source powers the components of the two configurations of the control module 28, 30 and includes enough capacity to operate for twenty-four hours, including operating the electroshock module at least twice for the first configuration. The power source may be recharged through a charging subsystem, which may include a motion-induced charging system, such as Faraday charging mechanism as well as conventional corded and wireless charging mechanisms, such as magnetic induction.
The body 16 of the wearable device 10 and/or control module 28, 30 may be sealed to prevent tampering and protect the control module 28, 30 from ingress of water or other fluids.
The storage may further include a unique identifier of the wearable device 10 and a unique identifier assigned to the subject 12 or user 14 of the wearable device 10.
Locking the double lock 22 activates the control module 28, 30 on the wearable device 10. Likewise, unlocking the double lock 22 disables the control module 28, 30, rendering the wearable device 10 inoperative.
In the second configuration, the activation switch is configured and arranged to cause the processor to transmit a signal to activate an electroshock module of another wearable device 10 within a predefined radius R of the user 14, such as 10 feet by way of example and not limitation. In some embodiments, activating the activation switch transmits the signal directly to the other wearable device 10. In other embodiments, the second configuration may also send a signal to the server, described further below.
Although the wearable device 10 is described as a handcuff to be worn on the wrist or forearm, it may also be on worn on other parts of the body, such as an ankle. The electric shocks emitted by the electroshock module of the first configuration are nonlethal, but strong enough to stun the subject, similar to a taser.
As shown in
In order to prevent inadvertent or unauthorized activations of electroshock modules, the control module 28, 30, with the processor, verifies the authenticity of an activation request received from a user's 14 wearable device or, as described further below, a server 32. In some embodiments, a lookup table containing wearable device identifiers of authorized wearable devices 10 or authorized users is maintained on the storage of the subject's 12 wearable device 10. In some embodiments, the request is verified by use of a secret code or PIN, which is matched against a code stored in a storage of the control module 28, 30. If the activation request is not verified as being authentic, the request, via the processor, is rejected. If the activation request is verified as being authentic, the control module 28, 30, via the processor, activates the electroshock module. The control module 28, 30, with the processor and transmitter/receiver module, communicates securely with the user's 14 wearable device 10 and/or server 32 to receive the device identifier and user identifier and/or secret code toe authenticate the activation request. Alternatively, these authentication credentials may be transmitted simultaneously with the activation request.
As noted above, the system may further include a server 32 where remote tracking and activation of wearable devices 10 may be initiated from. The server 32 may include one or more computers, virtual machines, and/or cloud servers accessible through a web browsing software or proprietary application. The server 32 receives GPS coordinate information transmitted periodically from wearable devices 10 being tracked by the system. The system can overlay the GPS information over maps 34 (
The server 32 may also issue commands to the wearable devices 10 being tracked by the system. Other requested actions may include requesting diagnostics, usage history, changing the authorized users and/or authorized devices, changing a secret code or PIN, updating firmware in the storage of the control module 28, 30, performing a system reset, and performing a system shutdown, for example and not by way of limitation.
As can be seen, the system and method described herein solves the problems of the prior art by providing a wearable device that includes an electroshock module, to be worn by and subject, and a wearable device, to be worn by a user, that permits the user to administer shocks to the subject if the subject enters a predefined radius of the user. This feature can enhance the safety of security officers and victims of domestic violence by deterring subjects from approaching.
Those skilled in the art will appreciate that the conception, upon which this disclosure is based, may readily be utilized as a basis for designing other products without departing from the spirit and scope of the invention as defined by the appended claims. Therefore, the claims are not to be limited to the specific examples depicted herein. For example, the features of one example disclosed above can be used with the features of another example. Furthermore, various modifications and rearrangements of the parts may be made without departing from the spirit and scope of the underlying inventive concept. For example, the geometric configurations disclosed herein may be altered depending upon the application, as may the material selection for the components. Thus, the details of these components as set forth in the above-described examples, should not limit the scope of the claims.
Number | Name | Date | Kind |
---|---|---|---|
6072396 | Gaukel | Jun 2000 | A |
6510380 | Curatolo et al. | Jan 2003 | B1 |
6800070 | Mazidji et al. | Oct 2004 | B2 |
6933851 | Hahne et al. | Aug 2005 | B2 |
6999295 | Watkins, III et al. | Feb 2006 | B2 |
7102870 | Nerheim | Sep 2006 | B2 |
7145762 | Nerheim | Dec 2006 | B2 |
7570476 | Nerheim | Aug 2009 | B2 |
7580237 | Nerheim | Aug 2009 | B2 |
7586732 | Myers | Sep 2009 | B2 |
7586733 | Nerheim | Sep 2009 | B2 |
7602598 | Nerheim | Oct 2009 | B2 |
7782592 | Nerheim | Aug 2010 | B2 |
7800885 | Brundula et al. | Sep 2010 | B2 |
7916446 | Nerheim | Mar 2011 | B2 |
8321124 | Curatolo et al. | Nov 2012 | B2 |
8514070 | Roper et al. | Aug 2013 | B2 |
8862378 | Curatolo et al. | Oct 2014 | B2 |
8879232 | Ziriax et al. | Nov 2014 | B2 |
9111433 | Curatolo et al. | Aug 2015 | B2 |
9386438 | Hymowitz | Jul 2016 | B2 |
10007962 | Brans | Jun 2018 | B2 |
20040092874 | Mazidji et al. | May 2004 | A1 |
20060092028 | Lerch et al. | May 2006 | A1 |
20060244613 | Myers | Nov 2006 | A1 |
20080057976 | Rae et al. | Mar 2008 | A1 |
20110248853 | Roper et al. | Oct 2011 | A1 |
20120298119 | Reese | Nov 2012 | A1 |
20130260785 | Shakespeare | Oct 2013 | A1 |
20140159905 | Thompson | Jun 2014 | A1 |
20140194084 | Noonan | Jul 2014 | A1 |
20170039833 | Baczuk et al. | Feb 2017 | A1 |
20170120932 | Szczerba et al. | May 2017 | A1 |
20170202180 | Yang | Jul 2017 | A1 |
20170221166 | Brans | Aug 2017 | A1 |
20180020786 | Fernandes Demetrio et al. | Jan 2018 | A1 |
20180178757 | Fernandes Demetrio | Jun 2018 | A1 |
Number | Date | Country |
---|---|---|
17188150.1 | Mar 2019 | EP |
2008018728 | Feb 2008 | WO |
2017050778 | Mar 2017 | WO |
2019048580 | Mar 2019 | WO |