The present invention relates to systems and methods of electronically monitoring and recording data and activity with respect to persons and, more particularly, to a system that monitors and records dynamic real-time data related to individuals, with particular application to travelers in the context of providing security.
It is known to provide personal identification and information storage processing systems which store data in electronic form and similarly process and transmit data with respect to individuals in many contexts of regulation and business. There are, for example, portable microprocessor devices including computers, “smart cards” with microchips, and electronically scanned labels or bar codes, light and radio sensors, and other technologies used to accomplish these purposes.
Typically, devices that store, process, and transmit data are linked in any one of a variety of ways to create a computer-based network that communicates with input and output devices to store and process data on individuals. For example, these networks include the Internet and World Wide Web and private networks. Transmission of data signals can be achieved via modem, cable, radio frequency (RF) transmission, or the like.
While there are numerous examples in business and society at large of systems and methods for obtaining, storing, and processing communication data using these known hardware and software technologies, there is no system currently existing for obtaining, managing, processing, and communicating data signals that effectively track people moving in and out of several countries. Moreover, there lacks any apparatus to effectively link such communication in real time among the various government agencies and authorities in a cooperative and useful manner.
Currently, the various state and local agencies in the Unites States have generated a series of different photographic identification cards which contain printed information, now including a person's photo. These most typically include driver's licenses issued by each of the 50 states and territories. Similarly, many states have requirements for obtaining firearm permits and likewise require an additional card which contains relevant information about the individual and which class of firearms the person is permitted to carry. Many companies likewise will issue photo identification cards for use in their respective businesses. These photo identifications contain printed material only in large part, that is, name, address, date of birth, eye color, etc., along with a picture. There are some identification cards used in industry, which contain more information such as a thumbprint or the like.
None of the systems currently in place for identifying people take advantage of new technologies which have been used to identify and track the shipment of goods, such as bar codes or the like, nor is there an effectively standardized and tamperproof identification system for individuals at present. This lack of unified approach to personal identification was sufficient in the past because most identification was used for simple operations such as identification to police officers during routine traffic stops, check cashing, and the like. Foreign governments have their own system of identification complete with security measures, which vary widely in their effectiveness. There is currently great controversy whether Mexican individuals in the United States can rely on their Mexican identification cards for similar identification purposes here in the United States.
The current problem is exacerbated by the vast numbers of people entering and exiting the United States with the current technologies used to create photo identification. There is simply no effective mechanism in place to allow for a systematic and substantially secure mechanism for identifying and tracking individuals as they move about the United States. As a result of the tremendous breach of Homeland security, which occurred on Sep. 11, 2001, and the ongoing hostilities on terrorists abroad, the current systems for identification are completely inadequate. Currently, the United States has revamped application procedures for visas for foreigners, applications for passports, as well as attempted to come up with some improved security measures for the creation of the documents. What is needed is a system that allows for the tracking of persons entering, traveling in, and exiting the United States so as to limit or prevent the opportunity for wide scale security breaches. Furthermore, a system is needed that facilitates the exchange of information between authorized users of the system.
In one aspect, the present invention is directed to an apparatus for use in providing for the secure and unique identification of persons. Such an apparatus includes a device for electromagnetically recording and storing data and identifying parameter values indicative of a specific individual. Preferably, the device is capable of receiving and storing data in a plurality of fields including an identifier field adapted to receive signals identifying a particular individual only from permitted sources and a travel field adapted to receive signals corresponding to data related to a sequence of travel.
In another aspect, the present invention is directed to a system for use in tracking and identifying individuals. Such a system includes an electromagnetic identification device that has a plurality of data fields, each of the data fields being adapted to receive signals which uniquely identify an individual; a writer for use in encoding the identification signals into the electromagnetic identification apparatus data fields; a controller for receiving signals uniquely identifying an individual and storing the individual identification signals in a master database storage apparatus; and a reader adapted to interrogate the unique individual identification signals stored on the electromagnetic identification apparatus and for communicating with the controller for comparing corresponding individual identification signals stored on the master database storage apparatus with signals received from the electromagnetic identification apparatus and generating an alarm signal should the comparison reveal a discrepancy.
The present invention is directed to a secure identification card for individuals and a system for using such a secure identification card. The card is especially adapted to be used with a system that allows for the tracking of individuals, specifically foreigners, entering the United States and allowing for the determination of status instantly by electronic communication in real time with a master database.
The present invention contemplates an integrated system of identification card(s), passports, visas, and similar identifying devices that are cooperative with a central system capable of being accessed by various government agencies including, but not limited to, the Federal Bureau of Investigation (FBI), the State Department, the Department of Defense, immigration authorities, customs personnel at ports of entry into the United States, state and local police departments, and the like.
One key aspect of the present invention is the use of identification card(s) for all persons in the United States. Such cards include visually ascertainable identifying information but may further include a digitized photograph, a biometric fingerprint, and coded information. In one embodiment, the coded information is electronically stored in a microchip that is embedded in the structure of the card itself. Furthermore, the coded information may be in a form having emitting and receiving capability or similar transmitting/receiving functions (e.g., by radio frequency (RF)) so as to facilitate the automatic reading of data programmed into the microchip in the card. In any embodiment, the digitized photograph allows the system to be used with facial recognition systems (facial printing). The biometric fingerprint allows for a quick resolution of an identity verification query via fingerprinting techniques and databases. The coded information is readable by a reader and is linked to a centralized database containing a record of the permanent information relating to the cardholder. The card is preferably made tamperproof by encasing the identification mechanisms (e.g., via lamination techniques), incorporating a holographic image into the card, and/or encrypting the coded information.
Another key aspect of the present invention is the use of the identification card as a “smart” passport for persons travelling in and out of the United States. As is used herein, the term “smart,” when used to describe the apparatuses of the present invention, is intended to mean that data can be written to, stored on, erased from and rewritten to, and retrieved from the apparatuses using applicable devices. Use of a smart passport incorporates “watch” technology that enables a government to track and monitor any smart passport holder in any readable environment and particularly as the smart passport holder moves into, through, or out of a secure area such as a border checkpoint, an airport, a shipping port, or even a monitored building or area. The card itself contains the relevant data, which is substantially the same as that stored on a master database.
Referring to
Referring now to
Each card 20a, 20b, and 20c preferably stores data that is unique to the holder of the card. Referring to
In one embodiment, the internal memory chip 30 of the card 20 typically comprises an EEPROM with 1,024 bits total memory. Byte boundary memory addressing and byte boundary memory lock are used. The communications platform used to receive data from the memory chip 30 is preferably an anti collision protocol binary tree-type, anti collision algorithm. In addition, the information programmed into the memory chip 30 can include global location numbers, the date and time of card activation, customs harmonizing codes, harmonizing code descriptions, and the like. Port entry and exit identification data can also be written to the cards as they pass through entry and exit ports, such data being comparable to corresponding data retained by Customs at the entry and exit ports for the purposes of verifying travel and system operation as necessary.
The card 20 may optionally include a signal device 32 that can be any suitable electromagnetic transceiver. In one embodiment, the signal device is an Intermec 915 MHz radio frequency identification (RFID) device, which has a passive operation and is EPC (electronic product code) and ISO (International Standards Organization) compliant. Such a device has a read range of up to about 13 feet and is mountable on an adhesive strip and can further double as a human readable label as well.
The card 20 with the RFID signal device 32 can be read by a reader 18. In the preferred embodiment, the reader has the capability to query and read the signal device 32 on each card 20 view data from cards, write card data, and clear and rewrite card data as applicable. Several readers 18 can communicate as part of a single network. The preferred system uses an Intermec ITRF91501 reader, which is a 915 MHz fixed reader and card writer having four (4) address antenna ports, an RS232 serial port, and the capability of reading an RFID signal device within twelve milliseconds and performing a verified write at an average of 31 milliseconds per byte per card. Such a device reads at a distance of about 3 meters with a single antenna.
Alternatively, the reader 18 may be an Intermec IP3 portable reader used by personnel at a remote location. Referring now to
At any time, an authorized user (having a unique user identifier or password and meeting established security requirements) can read a file from the card 20 using the reader 18 to ascertain the data programmed on the card 20.
In a preferred embodiment of the present invention, the read file can be copied or transferred to a computer or other control device (e.g., a laptop computer, a desktop computer, or a personal digital assistant (PDA)). Information from the card 20 may be generated, displayed, printed, or transmitted to a central computer for processing. Under a control mechanism (e.g., software), the information from the card 20 can be compared to other information such as results obtained from a facial scan of the card holder to determine if the card holder is the same person that the card 20 was issued to. Reports indicating the accuracy of the data or a breach of security may be printed and/or displayed.
The system 10, as described above with reference to
The electronic apparatuses of the system described above are capable of inputting, processing, storing, and transmitting data pertaining to the identification of individuals and linking such data to various terminals via the execution of various algorithms. The data may also be adapted to be cross-referenced with existing databases to provide functions that track individuals at discrete points during travel.
The devices of the system may also be adapted to provide a system for the continuous tracking of individuals. More specifically, by incorporating the RFID signal devices into clothing, bracelets, necklaces, or the like, it is possible to determine movement by continuously polling the RFID device. Such a continuous tracking system may be especially useful in tracking suspected or known criminals or terrorists. It may also be useful in monitoring a prison population. In any scenario, the tracking of individuals may be with or without the knowledge of the individual.
In any use of the system, there is provided for a non-intrusive, remote, wireless monitoring of the locations and movements of individuals. Intermittent polling of the signal device of the system (e.g., the reading of cards) allows the position of an individual to be ascertained at given points for security purposes and further allows for the transfer of relevant information to the proper parties for any purpose. Continuous polling of the signal device of the system allows for the real-time or near-real-time surveillance of an individual, which may be useful in predicting the undesirable congregating of individuals and for making assessments as to the need for police or military action. Preferably, the transmission of the data is integrated via satellite, GPRS (general packet radio service), or cellular applications to provide the real-time or near-real-time analysis.
For non-passport carrying U.S. citizens, the smart passport that incorporates the technology as described herein serves as a national identification card. Functionally, this card is identical to a smart passport issued to a foreigner entering the United States. In the United States, the smart passport for an American citizen preparing for travel abroad, as well as others in this country not doing so, is linked directly to that traveler's social security number and will become the primary means of identification for that traveler when traveling in or returning to the United States.
As a United States citizen preparing for travel abroad applies for and receives the new smart passport, a record is created in a centralized computer system containing the large master database with this printed information. This individual record contains all the typical passport information including, but not limited to, background check, biometric fingerprint, digitized photograph, and itinerary of travel. In certain instances, it can be linked to carrier data sources (e.g., airlines or maritime carriers) and to an RF signal device contained on the card. This database is accessible by authorized government officials at appropriate levels of read only or read-write to preserve the integrity of the information.
Information in this database can be upgraded as necessary. For example, when the individual acquires drivers' license, that information is recorded. If that individual then either receives a motorcycle endorsement or commercial drivers' license, similarly that information likewise is coded into the computer system for storage.
The smart passport would be a document which is also obtained by aliens coming into the United States, including both resident aliens, those having a “green card” and work permit here in the United States, as well as those simply here on business or vacation travel. As the alien traveler enters the country and proceeds through immigration, the smart passport is scanned. The customs officials have full access to the traveler's pertinent background then available on the smart passport. As part of the entry process, the alien traveler enters a thumbprint on a biometric plate. The biometric print obtained at the point of entry is compared to the one stored on the database to ensure that the individual entering the country is indeed the individual that applied for and received that smart passport.
Travelers must declare a length of stay at Immigration as evidenced by a return travel ticket and linkage to a carrier database. This allows again Custom Officials to verify in real time the date and expected port of departure. As the individual completes the stay and leaves via airport, seaport, or border crossing, the corresponding information and thumb print is again taken to verify the person exiting the United States is in fact that person holding the smart passport. This information is provided to the master database. There are algorithms executed by the central computer system which on a periodic basis, every day, every week, etc., will poll the database to confirm that individuals supposedly leaving the United States on that day did in fact do so.
Often time travelers, especially business travelers, may have a change in plans required them to stay an additional length of time. Typically the traveler makes changes with the carrier to affect the same. The present system requires that the airlines, when such a change on a foreign traveler is made, send an electronic notice to the master passport system to allow for an update of the traveler database.
Other embodiments of the present invention allow for seamless communication with private data networks such as are operated by banks, credit card companies, car rental companies, cell phones, etc., as is appropriate to enable for an electronic computerized inspection of the person's activities here in the United States. For example, a suspect individual can be identified by the person's point of entry and subsequent commercial transactions, car rentals, airline tickets and the like, in the United States. This would enable the authorities to quickly track an individual's prior movement in the Unites States to identify suspects or clear certain individuals.
The smart passport system provided by the present invention can be implemented in phases. The first phase would be the incorporation of an RF signal device with the cards. This will allow immigration to immediately track individuals and will alert officials if the traveler does not leave as scheduled. The signal device would be attached using a non-removable sticker on the passport in place of the stamp that countries currently use. The sticker would house the RF signal device.
The second phase would be the implementation of smart passports in other countries. These would replace all the current passports with the signal device enabled smart passport with the digitized photograph and biometric thumbprint. This transition can be implemented over time to ease the cost and allow whatever problems found in implementation to be corrected.
As noted hereinabove, the present invention also has implications for the credit card industry as well. As is well known, credit card misuse and fraud is an enormous problem in this country with approximately 2.5 billion dollars per year being attributed to fraudulent purchases.
In the companion applications filed concurrently and referenced above and owned by the assignee of the present invention, there are disclosed and claimed systems and methods for use in cargo tracking as well as security tracking within institutions. The systems and methods of the present invention can be dovetailed with these other systems to provide security on a full spectrum of people, goods, and institutions throughout the United States.
The smart passport as it would pertain to Americans would include information as listed above as well as other identifying information such as a thumbprint. The smart passport ID card would be issued to new parents and the data pertaining to their newborn would be entered onto a master database. Such data would include name, date of birth, hospital, parental names and addresses, social security number, as well as any other identifying information. Similarly, the ID card can be updated to include the name of schools and addresses that the person attends. University record, graduation dates, and other school information can also be embedded in the card database. As the person ages and begins new endeavors, relevant information can be updated. For example, when the person obtains a drivers license, joins a military service, obtains gun permits and the like, all this information can be updated for either presentation on the card or at least back in the system master database.
Referring to
Ideally, all countries would issue a smart ID in accordance herewith. In the absence thereof, a traveler would have to be detained at a checkpoint or border when entering a country utilizing the present invention while a smart ID and profile is created. A traveler entering an airport checkpoint with a smart ID would initiate a check-in process 50. In the check-in process 50, the traveler checks-in at a check-in step 52 and provides (preferably by scanning his card) a biometric fingerprint in a fingerprint step 54. The traveler may also or additionally submit to a facial recognition test in a face-scanning step 56. The data obtained at the checkpoint (“real time data”) is compared to the corresponding airline database data in a check step 58 and/or to data that was entered at the place and time of issuance of the smart ID, and to the corresponding data that is contained in the storage of the smart ID. The data is confirmed in a confirmation step 60. Additionally, the facial recognition data is compared to other data that may have been entered through other means or that is linked to another network, such as a list of individuals known to be a security risk for whom data is available for comparison. Such comparisons ensure that the traveler has represented his or her true identity. From the fingerprint step 54, a query 62 makes a comparison. From the face-scanning step 56, a query 64 makes another comparison. If either comparison reveals that the traveler is on a list of people to be detained, or if the information is not a match and falsifying is suspected, the system that reads and compares the data will automatically issue an alert in an alert step 66. Security can then detain the traveler on that basis. If no such alert is indicated, the procedure continues by running various additional checks, if desired, in a continuation step 70. Such additional checks include, but are not limited to, intelligence watches from law enforcement or other authorized governmental agencies.
At this point in the process, the smart ID downloaded at the checkpoint can be used to access data for airline ticketing and itinerary confirmation in an access step 72. In the access step 72, if a government agency or other authority wishes to monitor the activities of a traveler including whether or not the traveler leaves the country at the time and place indicated in the itinerary, it may do so. If not, an alert can be automatically activated. From the access step 72, fingerprint data and other data are merged and compiled in a compilation step 74.
In addition, with reference to
A query 100 is executed, and if any of the above-mentioned comparisons are indicative of a programmed alert event, the system automatically alerts authorities in an alert step 102, and the traveler can be detained. If not, the data is compiled in a compilation step 104, a threat/risk analysis step 106 may be executed, and a query 108 may be made as to whether the traveler is a threat or security risk. If the traveler is deemed to be a threat or risk, the alert step 102 is re-executed. If not, the traveler can proceed through a security step 110. The smart ID is scanned through a metal detector station in a detection step 112, the biometric fingerprint is taken in a fingerprint scanning step 114, and a query 116 is made to confirm the identity of the traveler. If the traveler's identity is not confirmed, the traveler is detained and authorities are alerted in an alert step 122. If the identity is valid, the traveler proceeds to a gate in a proceed step 124. In the proceed step 124, the fingerprint and smart ID are re-scanned, a query 126 is executed to determine if the ID is valid. If the ID is not valid, the traveler is detained and authorities are alerted in the alert step 122. If the ID is valid, then the traveler boards the vessel in a boarding step 128.
As alluded to above, the system of the present invention is capable of monitoring visitors to a country, specifically foreigners entering and exiting the United States, through the smart ID card carried by the visitor. Importantly, the system of the present invention is capable of determining both when an individual has overstayed his or her allotted time in the United States, and when an individual has left the nation's borders earlier than expected. This functionality is important, as no known systems contemplate any action in the absence of a signal from, or detection of, the smart ID card once the visitor has already entered the United States. The fact that the present system is capable of taking action by generating an alert in the absence of a signal from the smart ID card, indicating that the individual has overstayed his or her allotted time, allows a geographic area of virtually unlimited area to be monitored.
In this embodiment, when an individual arrives in a country or other defined geographic area, information pertaining to the individual and the individual's stay may be written to and stored as signals on the smart ID card and in a database in communication with a controller or host computer. The database may be located at the port of entry as part of a network of databases in communication with one another, or may be a remote database. The information pertaining to the individual's stay may include entry date and port of entry and scheduled exit date and port of exit.
After entering through a port, logging information on the smart ID card and with the database, the individual may then move about the country. At any given time, the controller may compare the list of individuals that were detected by airport, marine port, border crossing, etc. readers as leaving the country, with the list stored in the master database of individuals scheduled to exit the country or geographic area. For example, it is a frequent occurrence that foreign leaders, sometimes hostile, are allowed to enter the United States for a period of time to attend conferences, speak on issues, or meet with other leaders. Moreover, persons of interests or potential terrorists on terrorist watch lists are sometimes allowed to enter the country for a limited time. It is crucial in these situations that these individuals are closely monitored. In such instances, the individual may, for example, be allowed to visit the United States on Monday thru Wednesday. As the individual arrives on U.S. soil via an airport or other port, his entry and exit data (location and date of entry and location and date of scheduled exit) are logged on his smart ID card and in the master database. At the end of each day, or at any other preprogrammed time or when prompted by an authorized user, the controller may compare the list of individuals that were detected by the port readers as leaving the country with the stored list of individuals scheduled to leave the country. If any discrepancy is detected, and alarm or notification may be automatically generated.
As noted above, the discrepancy may be that an individual previously entered into the database and scheduled to exit on a certain date was not detected by any reader (and logged in the database) as leaving the country on that date. In this case, the system of the present invention recognizes that the individual has, without authorization, overstayed his or her allotted time in the country without having received any signal from the smart ID card carried by the individual. That is, no second contact with an area reader is required for the system of the present invention to determine that an individual has overstayed his or her allotted time in the country. The only signal required to monitor an individual for length of stay is the initial logging of the entry and exit deadline data stored at entry. The fact that no signal is required from the smart ID card, i.e., only lack of contact with the readers is required, to detect the overstaying of an individual allows the potential area to be monitored to be virtually unlimited. Such a range is simply not possible with, nor contemplated by, known readers. Thus, with the present system, when the controller polls the database on the date that an individual is scheduled to leave, but does not find the individual listed in the database (i.e., none of the readers located at exit ports detected the smart ID carried by the individual), the controller interprets this to mean that the individual has overstayed his scheduled departure time.
Another scenario that may reveal a discrepancy may be when an individual departs the country or geographic area early. In this case, the list of departed individuals on a given date, i.e., those individuals detected by area readers (airport, seaport and the like) as leaving the country, is compared with the list of individuals expected or scheduled to leave on such date. Such comparison may reveal an extra individual not on that day's list, indicating that such individual is leaving the country earlier than expected. As with case of individuals overstaying their allotted time, an alarm or notification may be generated when such a discrepancy is detected. The controller may also be programmed to generate an alert or notification if the individual is detected as leaving at the scheduled time, but not at the scheduled location, which may warrant investigation depending on the particular circumstances. The above scenarios are best illustrated by
As will be readily appreciated, the controller may be programmed to poll the database on a periodic basis, such as every week, every day, every hour, etc. depending on the level of preciseness in visitor status desired. Moreover, the controller may be programmed to generate an alert or notification if any discrepancies are detected, such as a visitor departing early or a visitor overstaying his or her scheduled stay. This alert may be the sounding of an audible alarm, e.g., through a computer's speakers, a visual alert displayed on a screen, an email or other electronic message sent to a computer on a broader network, or any other known method of alert or notification known in the art.
As noted above, the centralized database and computer system may also be linked to carrier data sources (e.g., airlines or marine carriers) and to the RF signal device contained on the smart ID card. Often times, visitors may have a change in plans requiring them to stay an additional length of time or a shorter length of time. Typically the visitor makes changes with the carrier to affect the same. With the present invention, the airline or other carrier system may be in communication with the controller or master database to allow for the sending of a notification to the smart ID card and/or the database to update the exit date and/or exit location data previously stored.
Referring now to
When a citizen returns from international travel, as outlined in
As shown in
Referring now to
In
The flow diagram of
The flow diagram of
The flow diagram of
Although this invention has been shown and described with respect to the detailed embodiments thereof, it will be understood by those of skill in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. For example, “individuals” as used herein is defined expansively beyond humans to include anything, which is capable of unique identification. In addition, modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from the essential scope thereof. Therefore, it is intended that the invention not be limited to the particular embodiments disclosed in the above detailed description, but that the invention will include all embodiments falling within the scope of the appended claims.
This application is a continuation-in-part of U.S. application Ser. No. 10/871,267, filed on Jun. 17, 2004, entitled “Electronic Security System for Monitoring and Recording Activity and Data Relating to Persons” (Attorney Docket No. 5264-0002-1) which claims the benefit of U.S. Provisional Application No. 60/479,127, filed Jun. 17, 2003, entitled “Electronic Security System For Monitoring and Recording Activity and Data Relating to Persons and Goods”; and further relates to an issued patent entitled “Electronic Security System For Monitoring and Recording Activity and Data Relating to Cargo” (U.S. Pat. No. 7,012,529; Attorney Docket No. 5264-0002-2); and further relates to a co-pending application entitled “Electronic Security System For Monitoring and Recording Activity and Data Relating to Institutions and Clients Thereof” (Attorney Docket No. 5264-0002-3), all of the fore-mentioned applications and patents being hereby incorporated by reference in their entireties.
Number | Date | Country | |
---|---|---|---|
60479127 | Jun 2003 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10871267 | Jun 2004 | US |
Child | 12473030 | US |