Movatterモバイル変換


[0]ホーム

URL:


US20150140962A1 - Secure witness or criminal participant location or position and time recording information apparatus, systems and method - Google Patents

Secure witness or criminal participant location or position and time recording information apparatus, systems and method
Download PDF

Info

Publication number
US20150140962A1
US20150140962A1US14/602,102US201514602102AUS2015140962A1US 20150140962 A1US20150140962 A1US 20150140962A1US 201514602102 AUS201514602102 AUS 201514602102AUS 2015140962 A1US2015140962 A1US 2015140962A1
Authority
US
United States
Prior art keywords
location
identifier
time
information
record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/602,102
Inventor
Michael MAPES
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Secure Sigint LLC
Original Assignee
Secure Sigint LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Secure Sigint LLCfiledCriticalSecure Sigint LLC
Priority to US14/602,102priorityCriticalpatent/US20150140962A1/en
Publication of US20150140962A1publicationCriticalpatent/US20150140962A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

An apparatus, system or method for use of encrypted or confidential location or position, time, and unique identifier information (LPTI Information) comprising mobile device encoded unique identifiers (UIs), to register the presence of one or more persons in a retail or service store or outlet, vehicle, financial, educational, governmental, transportation, shipping, cargo, residential, vacation, travel, power generation or distribution, water or food supply or storage, or data storage location or position, for use in identifying potential suspects, conspirators, participants or witnesses for criminal, regulated, tort, or prohibited activity for use by law enforcement or a court, and which information is kept encrypted until authorized access is granted to law enforcement or a court by issuance or a warrant or other appropriate legal authorization.

Description

Claims (19)

What is claimed is:
1. A method for collecting confidential or encrypted location or position/time/identifier information (LPTI Information) comprising a mobile unique identifier (UID), time, and location or position data, the LPTI Information representing or corresponding to the presence of a mobile device and associated person as a potential or suspected suspects, conspirators, participants or witnesses in criminal, regulated, tort, or prohibited activity in the relative vicinity of determined one or more installation points, the method comprising:
(a) assigning to one or more of an ID or a time information scanner a transmitter fixed identifier specific thereto;
(a) assigning to each of the ID or time information scanners a transmitter variable identifier which is specific to each ID or time information scanner and is a variable value, and
(b) storing: (i) the fixed and variable identifier data, and (ii) the communicated or associated location or position, time record and mobile device identification number information data from said one or more scanners, said information data representing or corresponding to the presence of a mobile device and associated person as a potential or suspected suspects, conspirators, participants or witnesses in criminal, regulated, tort, or prohibited activity in the relative vicinity thereof, using a storage device and the identifier and information data stored or accessed as encoded, encrypted or secured data, either separate from, including or associated with, the UID-Information management server, or a related server,
wherein the encrypted or confidential mobile device LPTI information data is decrypted and accessible by law enforcement or a court upon issuance of a warrant or upon legally accepted basis for access in the investigation, indictment, prosecution, conviction, or appeal of an alleged crime, tort, regulation violation, law violation, ordinance violation, or prohibited activity.
2. A method according toclaim 1, wherein said relative vicinity of said criminal, regulated, tort, or prohibited activity occurs in or near a retail, service, or business location or position or is associated with the use or operation of a vehicle.
3. A method according toclaim 1, wherein said relative vicinity of said criminal, regulated, tort, or prohibited activity occurs in or near a financial, educational, governmental, transportation, shipping, cargo, residential, business, vacation, travel, power generation or distribution, water or food supply or storage, or data storage location or position or is associated with the use or operation of a vehicle.
4. A method according toclaim 1, wherein the ID-time-location or position management server:
(i) assigns to the determined area a large area location or position identifier specific thereto associated with the mobile device ID-time scanner,
(ii) assigns to the determined scanner installation point a local location or position identifier specific thereto associated with the mobile device ID-time scanner,
(iii) assigns to the ID-time scanner a transmitter fixed identifier specific thereto,
(iv) assigns to the ID-time scanner a transmitter variable identifier which is specific to this ID or time information scanner and is a variable value, and
(v) stores the assigned large area identifier, local location or position identifier, transmitter identifier, and transmitter variable identifier, and communicated or associated location or position, time record and mobile device identification number information representing or corresponding to the presence of a mobile device and associated person as a potential or suspected suspects, conspirators, participants or witnesses in criminal, regulated, tort, or prohibited activity in the relative vicinity of the one or more scanners, and stored or accessed as encoded, encrypted or secured, into a storage device, either separate from, including or associated with the ID-time-location or position management server, or a related server.
6. A method ofclaim 1, wherein the ID or time information (ID-time) scanner:
(i) stores its own transmitter fixed identifier, its own transmitter variable identifier, and a large area location or position identifier assigned to an area in which an installation point of the transmitter itself is located, into a storage unit,
(ii) performs a transmitter variable identifier concealing process on the transmitter variable identifier to conceal the transmitter variable identifier stored therein, and
(iii) generates the ID or location or position identifier comprising the concealed variable identifier and the large area location or position identifier, and
(iv) transmits one or more of the above identifiers, optionally with location or position, time record and mobile device identification number information representing or corresponding to the presence of a mobile device and associated person as a potential or suspected suspects, conspirators, participants or witnesses in criminal, regulated, tort, or prohibited activity in the relative vicinity of the one or more scanners, to the ID-time-location or position management server and stored or accessed as encoded, encrypted or secured.
7. A method ofclaim 1, wherein the ID-time-location or position management server:
(i) stores into the storage device a transmitter activation identifier management table for managing a correlation among initial values of the transmitter fixed identifier and transmitter variable identifier of the ID or time information scanner and the large area location or position identifier and local location or position identifier of an installation point,
(ii) performs a concealing process on the transmitter variable identifier and stores into the storage device a transmitter identifier management table for managing a correlation among a generated concealed variable identifier and the large area location or position identifier and local location or position identifier of an installation point,
(iii) storing or stores into the storage device a location or position identifier management table for managing a correlation among the large area location or position identifier and local location or position identifier of an installation point and the location or position, time record and mobile device identification number information of the installation point,
(iv) extracts a concealed variable identifier from the ID or location or position identifier received from the ID or time information scanner, and
(v) converts the received ID or location or position identifier into the large area location or position identifier and the local location or position identifier of an installation point, with the extracted identifier as a secured, encrypted or encoded key.
8. A method ofclaim 1, wherein the converted of the large area location or position identifiers, local location or position identifiers, location or position, time record and mobile device identification number information are provided or communicated to the server, and stored or accessed as encoded, encrypted or secured data, and the secured data is converted or accessible with an encryption key with reference to the location or position identifier management table, which secured data information is stored or accessed as encoded, encrypted or secured data comprising location or position, time record and mobile device identification number information representing or corresponding to the presence of a mobile device and associated person as a potential or suspected suspects, conspirators, participants or witnesses in criminal, regulated, tort, or prohibited activity in the relative vicinity of the one or more said scanners.
9. A method according toclaim 8, wherein the secured data is recorded or stored on at least one scanner, location or position identifier, server or storage device.
10. A method according toclaim 1, wherein the step of generating the ID or location or position identifier comprises the steps of:
(i) calculating on a computer a top hash value from each element of the second hash information sequence;
(ii) calculating on a computer the extracted hash value combined with a large area location or position identifier stored therein and generating the ID or location or position identifier;
(iii) repeatedly transmitting using an electronic transmitter the generated ID or location or position identifier a determined first number of times at a determined first time interval;
(iv) calculating on a computer a next hash value of the second hash information sequence and
(vi) repeating steps (i) to (iv) to generate and transmit the ID or location or position identifier as described above, wherein the ID number is generated, accessed, stored or provided in an encoded, encrypted or secured form that is accessible to law enforcement or a court when authorized to do so, such as under a warrant or other legal basis.
11. An apparatus for recording and encrypting location or position, time record and mobile device identification number information, comprising
a. one or more of a mobile device ID-time scanner installed at one or more installation points and optionally transmitting a specific ID or location or position variable or fixed identifiers; and
b. an ID-time-location or position management server receiving the transmitted ID, time, or location or position identifier and converting the same into location or position, time record and mobile device identification number information representing or corresponding to the presence of a mobile device and associated person(s) as a potential or suspected suspects, conspirators, participants or witnesses in criminal, regulated, tort, or prohibited activity in the relative vicinity of one or more installation points,
wherein the encrypted or confidential mobile device LPTI information data is decrypted and accessible by law enforcement or a court upon issuance of a warrant or upon legally accepted basis for access in the investigation, indictment, prosecution, conviction, or appeal of an alleged crime, tort, regulation violation, law violation, ordinance violation, or prohibited activity.
12. An apparatus according toclaim 11, wherein said apparatus manages location or position, time record and mobile device identification number that are provided, recorded, accessed, or stored in an encrypted, secured, or encoded form) information in an area having a determined extent where installation points for one or a plurality of ID or time information scanners are set, the location or position, time record and mobile device identification number information system comprising:
(i) the ID or time information scanner being installed at the each set installation point and transmitting a specific ID or location or position identifier;
(ii) a mobile communication terminal provided with a location or position function including an ID or location or position identifier receiving unit configured to receive the transmitted ID or location or position identifier,
(iii) a program execution unit configured to execute a client program of a location or position, time record and mobile device identification number information application, and
(iv) a wired or wireless communication unit for mobile communications; and
(v) a mobile communication server including a wireless communication unit for mobile communication with the mobile communication terminal, and a network communication unit configured to communicate with a network;
(vi) an application server including a network communication unit configured to communicate with the network and a program execution unit configured to execute a server program of a location or position, time record and mobile device identification number information application; and
(vii) a ID-time-location or position management server including a network communication unit configured to communicate with the network for receiving the transmitted ID or location or position identifier via the mobile communication terminal provided with a location or position function and the mobile communication server, and
(viii) an ID or time information scanner identifier decoding processing unit configured to convert the received ID or location or position identifier into location or position, time record and mobile device identification number information representing the determined installation point,
wherein the ID-time-location or position management server stores, accesses, communicates, or stores the mobile ID information in an encrypted, secure or encoded form that is accessible by law enforcement or a court upon issuance of a warrant or upon legally accepted basis for access in the investigation, indictment, prosecution, conviction, or appeal of an alleged crime.
13. A method according toclaim 1, further comprising a location or position charge process comprising the steps of:
(i) searching the charge information management table, with the large area location or position identifier extracted through the conversion and decoding, the transmitter fixed identification number, the mobile communication company identification number, and the service company identification number as a search key, if the mobile terminal location or position request is received and converted and decoded into location or position, time record and mobile device identification number information, and one selected from
a. creating a charge information record wherein the number of times of location or position of the charge information record is incremented by one, and writing back the charge information record to the charge information management table, if there is a charge information record matching the search key; OR
b. creating the charge information record, and setting the number of times of location or position of the created charge information record to one and storing the created charge information record into the charge information management table, if there is a charge information record matching the search key;
(ii) reading each record of the charge information management table at a determined time interval;
(iii) for the each large area location or position identifier, summing a total of the number of times of location or position of the read record to calculate the number of times of location or position for each large area location or position, and applying a determined charge function to the calculated number of times of location or position and transmitting a location or position charge request for an area owner;
(iv) for the each mobile communication company identifier, summing a total of the number of times of location or position of the read record to calculate the number of times of location or position for each mobile communication company, and applying a determined charge function to the calculated number of times of location or position and transmitting a location or position charge request for a mobile communication company; and
(v) for the each application service company identifier, summing a total of the number of times of location or position of the read record to calculate the number of times of location or position for each application service company, and applying a determined charge function to the calculated number of times of location or position, and transmitting a location or position charge request for a service company.
14. A method according toclaim 1, wherein the ID-time-location or position management server
(i) stores, for the each mobile communication terminal, a mobile communication terminal identifier management table for storing a result of a transmitter identifier decoding process, which is performed in response to a mobile terminal location or position request transmitted by the mobile communication terminal, into the storage device,
(ii) stores a record comprising a mobile communication terminal identifier, a mobile communication company identifier, a large area location or position identifier, a local location or position identifier, the location or position request occurrence time, a transmitter fixed identifier, and location or position, time record and mobile device identification number information into the mobile communication terminal identifier management table, and
(iii) each time the ID-time-location or position management server receives the mobile terminal location or position request and starts a transmitter identifier decoding process, with reference to the mobile communication terminal identifier management table, and with the identifier of a mobile communication terminal which transmitted the location or position request, as a search key, the ID-time-location or position management server then:
a. obtains a decoding result of a mobile terminal location or position request, which the communication terminal issues immediately before, as search result, and extracts the location or position request occurrence time of the immediately preceding location or position request and the location or position, time record and mobile device identification number information, and
b. compares the location or position occurrence time, which is a result of the decoding process of the received new location or position request, with the location or position, time record and mobile device identification number information, and, if a change in the location or position, time record and mobile device identification number information, the change being equal to or greater than a determined distance, is detected with a determined time difference, then with regard to an ID or time information scanner which transmitted a concealed variable identifier included in the received new location or position request, the ID-time-location or position management server invalidates a record in the transmitter identifier management table in which the ID or time information scanner is registered.
15. A method according toclaim 3, wherein said financial location or position is selected from an automated teller machine, a bank, a lending company, a check cashing company, a credit union, an investment company, or financing company.
16. A method according toclaim 3, wherein said residential location or position is selected from a home, rental property, a vacation home, a condominium, an apartment, a townhouse,
17. A method according toclaim 3, wherein said transportation location or position is selected from an airport, a train station, a bus station, a subway station, a taxi or limousine station or stand, a shipping or cargo port or dock, a trucking or railway stop or distribution center, or a cargo stop, port or distribution center.
18. A method according toclaim 3, wherein said educational location or position is selected from a primary school, a secondary school, a college, a university, a vocational school, a health services school or university, a computer training school, a retail or services school.
19. A method according toclaim 3, wherein said method is provided at a business or residential location or position using a wireless or Ethernet internet connection provided by a cable, satellite, telephone, TV, wireless, or fiber optic product, service, or security system provider.
20. A method according toclaim 18, wherein said security system provider provides security services to an occupant, owner or leasee at said residential or business location or position.
US14/602,1022011-12-242015-01-21Secure witness or criminal participant location or position and time recording information apparatus, systems and methodAbandonedUS20150140962A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/602,102US20150140962A1 (en)2011-12-242015-01-21Secure witness or criminal participant location or position and time recording information apparatus, systems and method

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US201161580205P2011-12-242011-12-24
US201261600650P2012-02-192012-02-19
US13/525,201US8971932B2 (en)2011-12-242012-06-15Secure witness or criminal participant location or position and time recording information apparatus, systemts and methods
US14/602,102US20150140962A1 (en)2011-12-242015-01-21Secure witness or criminal participant location or position and time recording information apparatus, systems and method

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US13/525,201ContinuationUS8971932B2 (en)2011-12-242012-06-15Secure witness or criminal participant location or position and time recording information apparatus, systemts and methods

Publications (1)

Publication NumberPublication Date
US20150140962A1true US20150140962A1 (en)2015-05-21

Family

ID=48655058

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US13/525,201Expired - Fee RelatedUS8971932B2 (en)2011-12-242012-06-15Secure witness or criminal participant location or position and time recording information apparatus, systemts and methods
US14/602,102AbandonedUS20150140962A1 (en)2011-12-242015-01-21Secure witness or criminal participant location or position and time recording information apparatus, systems and method

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US13/525,201Expired - Fee RelatedUS8971932B2 (en)2011-12-242012-06-15Secure witness or criminal participant location or position and time recording information apparatus, systemts and methods

Country Status (1)

CountryLink
US (2)US8971932B2 (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106254070A (en)*2016-09-182016-12-21华南理工大学A kind of in DNP system based on device id and the encryption method of time
US9710777B1 (en)2012-07-242017-07-18Ports America Group, Inc.Systems and methods involving features of terminal operation including user interface and/or other features
US9923950B1 (en)2012-07-242018-03-20Ports America Group, Inc.Systems and methods involving features of terminal operation including TOS-agnostic and/or other features
US20180302742A1 (en)*2017-04-142018-10-18Sysmex CorporationPosition management method, position management system, position management program and mobile communication apparatus
US10373167B2 (en)2016-06-302019-08-06Square, Inc.Logical validation of devices against fraud
US10409984B1 (en)2012-06-152019-09-10Square, Inc.Hierarchical data security measures for a mobile device
US10496993B1 (en)2017-02-152019-12-03Square, Inc.DNS-based device geolocation
US10546302B2 (en)2016-06-302020-01-28Square, Inc.Logical validation of devices against fraud and tampering
US10552308B1 (en)2017-06-232020-02-04Square, Inc.Analyzing attributes of memory mappings to identify processes running on a device
US20200045539A1 (en)*2015-06-292020-02-06Here Global B.V.Supporting a versioning of parameters
US10715536B2 (en)2017-12-292020-07-14Square, Inc.Logical validation of devices against fraud and tampering
US10733594B1 (en)*2015-05-112020-08-04Square, Inc.Data security measures for mobile devices
US11361630B1 (en)2020-11-202022-06-14Bank Of America CorporationIdentifying and logging mobile devices posing security threats
US11494762B1 (en)2018-09-262022-11-08Block, Inc.Device driver for contactless payments
US11507958B1 (en)2018-09-262022-11-22Block, Inc.Trust-based security for transaction payments
US11882452B2 (en)2020-11-202024-01-23Bank Of America CorporationMonitoring for security threats associated with mobile devices that have been identified and logged
US12229622B1 (en)2023-02-032025-02-18Block, Inc.Extended reality tags in an extended reality platform
US12355783B2 (en)2017-01-012025-07-08Block, Inc.Logical validation of devices against fraud and tampering

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8285310B1 (en)2008-01-032012-10-09At&T Intellectual Property I, L.P.Personal wireless coverage map
DE102012201786A1 (en)*2012-02-072013-08-08Siemens Ag Österreich Method for outputting user-specific information content in a means of transport
US9143971B2 (en)*2012-04-232015-09-22Lg Electronics Inc.Apparatus and method for estimating a location of a mobile station in a wireless local area network
US20140149541A1 (en)*2012-05-082014-05-29Peter OlsonModular Law Enforcement Public Communication Tool
US20130346420A1 (en)*2012-06-222013-12-26Polaris Wireless, Inc.Method And System For Identifying Aberrant Wireless Behavior
JP2014064198A (en)*2012-09-212014-04-10Ricoh Co LtdReceiving system, position management system, and receiving method
US8875255B1 (en)*2012-09-282014-10-28Emc CorporationPreventing user enumeration by an authentication server
US9524500B2 (en)*2012-11-132016-12-20Apple Inc.Transferring assets
US9843475B2 (en)*2012-12-092017-12-12Connectwise, Inc.Systems and methods for configuring a managed device using an image
US20140279542A1 (en)*2013-03-152014-09-18Independence Bancshares, Inc.Mobile currency messaging systems
US9998863B2 (en)2013-08-192018-06-12Estimote Polska Sp. Z O. O.System and method for providing content using beacon systems
CN105637550A (en)*2013-08-192016-06-01埃斯蒂莫特公司Wireless beacon and methods
US9565527B1 (en)*2013-12-192017-02-07Securus Technologies, Inc.Location-based services for exigent circumstances
US20150287304A1 (en)*2014-04-072015-10-08Southern Imperial, Inc.Identification Capturing Security Gate
US9779268B1 (en)*2014-06-032017-10-03Pure Storage, Inc.Utilizing a non-repeating identifier to encrypt data
US20160018236A1 (en)*2014-07-172016-01-21Zen-Tinel, Inc.Electronic substitute bus driver system
US9633493B2 (en)*2014-08-252017-04-25Accenture Global Services LimitedSecure short-distance-based communication and validation system for zone-based validation
US9514589B2 (en)2014-08-252016-12-06Accenture Global Services LimitedSecure short-distance-based communication and access control system
US9589402B2 (en)2014-08-252017-03-07Accenture Global Services LimitedRestricted area access control system
US10009745B2 (en)2014-08-252018-06-26Accenture Global Services LimitedValidation in secure short-distance-based communication and enforcement system according to visual objects
US9922294B2 (en)2014-08-252018-03-20Accenture Global Services LimitedSecure short-distance-based communication and enforcement system
US9608999B2 (en)2014-12-022017-03-28Accenture Global Services LimitedSmart beacon data security
US10074224B2 (en)*2015-04-202018-09-11Gate Labs Inc.Access management system
US10136250B2 (en)2015-09-022018-11-20Estimote Polska Sp. Z O. O.System and method for lower power data routing
US11533584B2 (en)*2015-09-162022-12-20Ivani, LLCBlockchain systems and methods for confirming presence
EP3176990B1 (en)*2015-12-012021-04-28France BrevetsLocation based trusted computing nodes in a cloud computing architecture
US10028087B2 (en)*2016-04-042018-07-17Ricoh Company, Ltd.Locating and tracking missing or relocated devices
US10074225B2 (en)2016-04-182018-09-11Accenture Global Solutions LimitedValidation in secure short-distance-based communication and enforcement system according to visual object flow
EP3273424B1 (en)*2016-07-212019-03-13The Boeing CompanySystem and method of aircraft surveillance and tracking
US20180033109A1 (en)*2016-07-262018-02-01International Business Machines CorporationUsing public safety data to manage a criminal event response
US10671733B2 (en)2017-05-192020-06-02International Business Machines CorporationPolicy enforcement via peer devices using a blockchain
JP6711341B2 (en)*2017-10-302020-06-17カシオ計算機株式会社 Attendance attendance registration device, attendance attendance registration method and program
US10880672B2 (en)*2018-01-292020-12-29International Business Machines CorporationEvidence management system and method
JP7418355B2 (en)*2018-05-172024-01-19エコラボ ユーエスエー インコーポレイティド SYSTEMS, METHODS AND COMPUTER-READABLE MEDIA AND USE OF THE SYSTEM FOR TRACKING FOOD SAFETY RISKS AND HYGIENE COMPLIANCE
US10523685B1 (en)2018-08-222019-12-31Estimote Polska Sp z o.o.System and method for verifying device security
US10852441B2 (en)2018-08-242020-12-01Estimote Polska Sp z o.o.Method and system for asset management
CN110858424B (en)*2018-08-242022-02-18深圳市神州云海智能科技有限公司Anti-theft method and device for lottery robot and lottery robot
CN112789667B (en)*2018-10-082023-02-28昕诺飞控股有限公司System and method for identifying and tracking targets
CN110300388B (en)*2019-05-202020-06-23清华大学 A power control method and device for a maritime communication system
CN112653994B (en)*2019-09-262023-07-21中国移动通信集团重庆有限公司 Historical location management method, device and computing device
FR3103339B1 (en)*2019-11-142022-12-30Thales Sa METHOD AND SYSTEM FOR LOCATION AND SATELLITE COMMUNICATION OF A GROUND-FIXED RADIO-ELECTRIC TERMINAL USING AT LEAST ONE TRAVELING SATELLITE
US11790735B2 (en)2021-08-102023-10-17Bank Of America CorporationModular device mesh network for associated device integration
US11711698B2 (en)2021-08-102023-07-25Bank Of America CorporationRemote device linkage for secure communications
US11720295B2 (en)2021-08-102023-08-08Bank Of America CorporationSystem and method for transforming entity device to a multi-functional device via a remote communication link

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020131768A1 (en)*2001-03-192002-09-19Gammenthaler Robert SIn-car digital video recording with MPEG-4 compression for police cruisers and other vehicles
US20060036864A1 (en)*1999-12-282006-02-16Parulski Kenneth ADigital camera with image authentication
US20100265068A1 (en)*2001-12-282010-10-21Private Pallet Security Systems, LlcSystem for maintaining security of evidence throughout chain of custody

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5266944A (en)*1991-06-261993-11-30Bodyguard Technologies, Inc.Electronic system and method for monitoring abusers for compliance with a protective order
US5461390A (en)*1994-05-271995-10-24At&T Ipm Corp.Locator device useful for house arrest and stalker detection
US5577100A (en)1995-01-301996-11-19Telemac Cellular CorporationMobile phone with internal accounting
US5721733A (en)*1995-10-131998-02-24General Wireless Communications, Inc.Wireless network access scheme
US5982281A (en)*1998-05-021999-11-09Pro Tech Monitoring, Inc.Offender and victim collision avoidance and advanced warning system
US5959533A (en)*1997-05-271999-09-28Pro Tech Monitoring, Inc.Tamper detection for body worn transmitter
US6912230B1 (en)1999-02-052005-06-28TecoreMulti-protocol wireless communication apparatus and method
GB9909590D0 (en)1999-04-261999-06-23Telepathic Ind LtdMechanism for securing reliable evidence from computers and listening devices
US7117374B2 (en)2000-03-242006-10-03Intermec Ip CorpApparatus and method for gathering and utilizing data
EP1461897A4 (en)2001-12-042007-05-02Conceptm Company LtdSystem and method for facilitating electronic financial transactions using a mobile telecommunication device
ITTO20020100A1 (en)2002-02-062003-08-06Telecom Italia Lab Spa SYSTEM FOR THE IDENTITY MANAGEMENT OF MOBILE STATIONS IN ROAMINGFRA RADIOMOBILE NETWORKS.
AU2003264914A1 (en)2002-07-132004-02-02Roger HumbelAuthorisation, regulation, characterisation, localisation, locking and theft security system (here also referred to as lock-loop dss)
US7221928B2 (en)*2003-10-012007-05-22Laird Mark DMobile emergency notification system
US7181493B2 (en)*2003-12-232007-02-20Unisys CorporationPlatform independent model-based framework for exchanging information in the justice system
US8014776B2 (en)*2004-02-182011-09-06Telefonaktiebolaget Lm Ericsson (Publ)Unlicensed-radio access networks in a mobile communications system
US20070279219A1 (en)*2006-06-052007-12-06Warriner Gerald EElectronic proximity alarm device
US9712956B2 (en)2007-09-282017-07-18Oracle America, Inc.System and method to determine a location associated with an internet phone

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060036864A1 (en)*1999-12-282006-02-16Parulski Kenneth ADigital camera with image authentication
US20020131768A1 (en)*2001-03-192002-09-19Gammenthaler Robert SIn-car digital video recording with MPEG-4 compression for police cruisers and other vehicles
US20100265068A1 (en)*2001-12-282010-10-21Private Pallet Security Systems, LlcSystem for maintaining security of evidence throughout chain of custody

Cited By (26)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10409984B1 (en)2012-06-152019-09-10Square, Inc.Hierarchical data security measures for a mobile device
US9710777B1 (en)2012-07-242017-07-18Ports America Group, Inc.Systems and methods involving features of terminal operation including user interface and/or other features
US9923950B1 (en)2012-07-242018-03-20Ports America Group, Inc.Systems and methods involving features of terminal operation including TOS-agnostic and/or other features
US9978034B1 (en)*2012-07-242018-05-22Ports America Group, Inc.Systems and methods involving features of terminal operation
US10733594B1 (en)*2015-05-112020-08-04Square, Inc.Data security measures for mobile devices
US10694375B2 (en)*2015-06-292020-06-23Here Global B.V.Supporting a versioning of parameters
US20200045539A1 (en)*2015-06-292020-02-06Here Global B.V.Supporting a versioning of parameters
US11373194B2 (en)2016-06-302022-06-28Block, Inc.Logical validation of devices against fraud and tampering
US10546302B2 (en)2016-06-302020-01-28Square, Inc.Logical validation of devices against fraud and tampering
US10373167B2 (en)2016-06-302019-08-06Square, Inc.Logical validation of devices against fraud
US12067582B2 (en)2016-06-302024-08-20Block, Inc.Logical validation of devices against fraud and tampering
US11663612B2 (en)2016-06-302023-05-30Block, Inc.Logical validation of devices against fraud and tampering
CN106254070A (en)*2016-09-182016-12-21华南理工大学A kind of in DNP system based on device id and the encryption method of time
US12355783B2 (en)2017-01-012025-07-08Block, Inc.Logical validation of devices against fraud and tampering
US10496993B1 (en)2017-02-152019-12-03Square, Inc.DNS-based device geolocation
US10623886B2 (en)*2017-04-142020-04-14Sysmex CorporationPosition management method, position management system, and position management program providing position information to server using mobile communication apparatus carried by user in vehicle
US20180302742A1 (en)*2017-04-142018-10-18Sysmex CorporationPosition management method, position management system, position management program and mobile communication apparatus
US10552308B1 (en)2017-06-232020-02-04Square, Inc.Analyzing attributes of memory mappings to identify processes running on a device
US11374949B2 (en)2017-12-292022-06-28Block, Inc.Logical validation of devices against fraud and tampering
US10715536B2 (en)2017-12-292020-07-14Square, Inc.Logical validation of devices against fraud and tampering
US11494762B1 (en)2018-09-262022-11-08Block, Inc.Device driver for contactless payments
US11507958B1 (en)2018-09-262022-11-22Block, Inc.Trust-based security for transaction payments
US12002040B2 (en)2018-09-262024-06-04Block, Inc.Device driver for contactless payments
US11361630B1 (en)2020-11-202022-06-14Bank Of America CorporationIdentifying and logging mobile devices posing security threats
US11882452B2 (en)2020-11-202024-01-23Bank Of America CorporationMonitoring for security threats associated with mobile devices that have been identified and logged
US12229622B1 (en)2023-02-032025-02-18Block, Inc.Extended reality tags in an extended reality platform

Also Published As

Publication numberPublication date
US20130165157A1 (en)2013-06-27
US8971932B2 (en)2015-03-03

Similar Documents

PublicationPublication DateTitle
US8971932B2 (en)Secure witness or criminal participant location or position and time recording information apparatus, systemts and methods
DaviesRe-engineering the right to privacy: how privacy has been transformed from a right to a commodity
D'SouzaTerrorist financing, money laundering, and tax evasion: Examining the performance of financial intelligence units
Amoore2 Governing by identity 1
BjeloperaOrganized crme: An evolving challenge for us law enforcement
WO2012067640A4 (en)Methods and systems for secured global applications using customer-controlled instant-response anti-fraud/anti-identity theft devices with or without nfc component
SempereThe European security industry. A research agenda
Borrion et al.Threat detection: a framework for security architects and designers of metropolitan rail systems
Donner et al.Supply chain security guide
DempseyPrivacy issues with the use of smart cards
KoliousisA conceptual framework that monitors port facility access through integrated Port Community Systems and improves port and terminal security performance
Belshaw et al.Stolen at the pump: an empirical analysis of risk factors on gas pump skimmer fraud attacks
PainterIssues in homeland security policy for the 113th Congress
Painter et al.Selected homeland security issues in the 116th congress
SempereA survey of the European security market
Middlemiss et al.US interagency law enforcement cooperation since September 11, 2001: Improvements and results
OlleyTransnational policing and organised crime
Whitelaw et al.Policing disorder: Calgary Transit peace officers and the Alberta law enforcement framework
PhilpottUnderstanding the Department of Homeland Security
KerlikowskeNational Southwest Border Counternarcotics Strategy
Greiper et al.Beyond aviation: the emerging ground transportation security market
KoleExamination of Security Measures for the Protection of Petrol Stations: An Analysis of Case Studies in Gauteng
Sarre et al.Trends and Issues in Corporate Security Practice and Regulation in Australia
Ahokas et al.Assuring Supply Chain Continuity in Industrial Supply Chains and Complying with Authorised Economical Operator AEO Europe Final Version
Donath et al.Homeland security and the trucking industry

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp