Language selection

Search

Patent 2614344 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2614344
(54) English Title: PORTABLE HANDHELD SECURITY DEVICE
(54) French Title: DISPOSITIF DE SECURITE PORTABLE A LA MAIN
Status: Dead
Bibliographic Data
(51) International Patent Classification (IPC):
  • G08B 1/08 (2006.01)
(72) Inventors :
  • TABANKIN, IRA (United States of America)
  • SUTTON, JOHN (United States of America)
(73) Owners :
  • TABANKIN, IRA (Not Available)
  • SUTTON, JOHN (Not Available)
(71) Applicants :
  • CATCHER, INC. (United States of America)
(74) Agent: OYEN WIGGS GREEN & MUTALA LLP
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 2005-07-29
(87) Open to Public Inspection: 2007-01-18
Availability of licence: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US2005/026812
(87) International Publication Number: WO2007/008217
(85) National Entry: 2008-01-07

(30) Application Priority Data:
Application No. Country/Territory Date
PCT/US05/24506 United States of America 2005-07-08

Abstracts

English Abstract




The present invention provides a portable handheld security device (10). The
security device comprises a central processing unit (12) in communication with
a memory storage device (14), a video display screen (18), at least one camera
(38), a transmitting device (26), a receiving device (28), an input device
(16), and a power supply. The security device (10) further comprises a device
for generating ultra wide band ground penetrating radar (34) and/or millimeter
wave radar for identifying objects of interest in closed containers. In
addition, the transmitting device (26) and the receiving device (28) are
ideally capable of selecting between available communication network signals,
determining which network signal is the best signal at a given time, and
automatically switching between the available signals to maintain optimum
reception and transmission quality. The input device (16) has a first set of
user-~interface controls (22) and a second set of user-interface controls
(24), wherein the sets of controls (22,24) are selectively operable by users
either independently or simultaneously.


French Abstract

La présente invention concerne un dispositif de sécurité portable à la main (10). Le dispositif de sécurité comprend une unité de traitement centrale (12) communiquant avec un dispositif d'enregistrement de mémoire (14), un écran d'affichage vidéo, au moins une caméra (38), un dispositif de transmission (26), un dispositif de réception (28), un dispositif d'entrée (16) et une alimentation électrique. Le dispositif de sécurité (10) comprend en outre un dispositif permettant de générer un radar pénétrant au sol à bande ultralarge (34) et/ou un radar à ondes millimétriques permettant d~identifier des objets intéressants dans des récipients clos. De plus, le dispositif de transmission (26) et le dispositif de réception (28) sont idéalement capables de choisir parmi les signaux de réseaux de communication disponibles, de déterminer quel signal de réseau est le meilleur à un temps donné, et de commuter automatiquement entre les signaux disponibles pour maintenir une qualité de réception et de transmission optimale. Le dispositif d'entrée (16) comporte un premier ensemble de commandes d~interface utilisateur (22) et un second ensemble de commandes d'interface utilisateur (24), les ensembles de commandes (22, 24) pouvant être actionnés sélectivement par des utilisateurs soit indépendamment soit simultanément.

Claims

Note: Claims are shown in the official language in which they were submitted.



CLAIMS
What is claimed is:

1. A portable handheld security device comprising:

a central processing unit in communication with a memory storage device, a
video
display screen, at least one camera, a transmitting device, a receiving
device, an input
device, a power supply, and a device for generating at least one type of radar
for locating
hidden objects, and producing images of the hidden objects on the video
display screen.
2. The security device of claim 1, wherein the security device can be used for
locating dense objects in luggage bags.

3. The security device of claim 1, wherein the security device can be used for
identifying objects of interest in closed containers.

4. The security device of claim 1, wherein the security device can be used for
locating hidden life forms.

5. The security device of claim 1, wherein the security device includes
digital full
motion video and still-screen image capture, recording, and processing.

6. The security device of claim 1, wherein the security device includes a
sound
producing device and a sound recording device.

19


7. The security device of claim 1, wherein the security device includes a
biometric
scanner.

8. The security device of claim 1, wherein the security device includes bar
code
reading capability.

9. The security device of claim 1, wherein the security device includes a
radio
frequency identification reader and interrogator.

10. The security device of claim 1, wherein the security device includes a
global
positioning system.

11. The security device of claim 1, wherein the video display screen is a
touch screen.
12. The security device of claim 1, wherein the video display screen supports
direct
free hand drawing input.

13. The security device of claim 1, wherein the security device comprises two
digital
cameras, at least one camera having the capability for capturing images in
infrared light.
14. The security device of claim 1, wherein the radar is ultra wide band
ground

penetrating radar.




15. The security device of claim 1, wherein the radar is millimeter wave
radar.

16. The security device of claim 1, wherein the radar is ultra wide band
ground
penetrating radar and millimeter wave radar.


17. A portable handheld security device comprising:

a central processing unit in communication with a memory storage device, a
video
display screen, at least one camera, a transmitting device, a receiving
device, an input
device, and a power supply; and

wherein the transmitting device and the receiving device are capable of
selecting
between available communication network signals, determining which network
signal is
the best signal at a given time, and automatically switching between the
available signals
to maintain optimum reception and transmission quality.


18. The security device of claim 17, wherein the security device includes a
security
lock-out system.


19. The security device of claim 17, wherein transmitting and receiving occurs
over
an internet connection.


20. The security device of claim 17, wherein the security device operates
whether or
not the transmitting device and receiving device are enabled.


21



21. The security device of claim 17, wherein said device satisfies testing
done in
accordance with Military Standard 810F.


22. A portable handheld security device comprising:

a central processing unit in communication with a memory storage device, a
video
display screen, at least one camera, a transmitting device, a receiving
device, a multi
frequency antenna, an input device, and a power supply; and

wherein the input device has a first set of user-interface controls and a
second set
of user-interface controls, and the first and second sets of user-interface
controls are
selectively operable by users either independently or simultaneously.


23. The security device of claim 22, wherein the video display screen is a
touch
screen.


24. The security device of claim 22, wherein the video display screen supports
direct
free hand drawing input.


25. A portable handheld security device comprising:

a central processing unit in communication with a memory storage device, a
video
display screen, at least one camera, a transmitting device, a receiving
device, an input
device, a power supply; and means for watermarking video and still images for
securely
documenting selected activities.


22



26. The security device of claim 25, wherein the transmitting device and the
receiving
device are capable of selecting between available communication network
signals,
determining which network signal is the best signal at a given time, and
automatically
switching between the available signals to maintain optimum reception and
transmission
quality.


27. The security device of claim 25, wherein the input device has a first set
of user-
interface controls and a second set of user-interface controls, and wherein
either the first
and/or the second set of user-interface controls is automatically activated
based on

conscious or unconscious user selection within a predetermined period of time.


28. The security device of claim 25, wherein the security device can be used
for
locating dense objects in luggage bags.


29 The security device of claim 25, wherein the security device can be used
for
identifying objects of interest in closed containers.


30. The security device of claim 25, wherein the security device can be used
for
locating hidden life forms.


31. The security device of claim 25, wherein the security device can be used
for
addressing a security breach.


23



32. The security device of claim 25, wherein the security device includes a
security
lock-out system.


33. The security device of claim 25, wherein transmitting and receiving occurs
over a
wireless device capable of operating over a plurality of wireless local area
networks.


34. The security device of claim 25, wherein transmitting and receiving occurs
over
an internet connection.


35. The security device of claim 25, wherein the security device operates
whether or
not the transmitting device and receiving device are enabled.


36. The security device of claim 25, wherein said device satisfies testing
done in
accordance with Military Standard 810F.


37. The security device of claim 25, further comprising at least one PCMCIA
port that
does not compromise the security device's compliance with Military Standard
810F.


38. The security device of claim 25, wherein the power supply is a battery
capable of
holding a charge for up to 8 hours.


24



39. The security device of claim 25, wherein the security device includes
digital full
motion video and still-screen image capture, recording, and processing with
watermarking.


40. The security device of claim 25, wherein the security device includes a
sound
producing device and a sound recording device.


41. The security device of claim 25, wherein the security device includes a
biometric
scanner.


42. The security device of claim 25, wherein the security device includes bar
code
reading capability.


43. The security device of claim 25, wherein the security device includes a
radio
frequency identification reader and interrogator.


44. The security device of claim 25, wherein the security device includes a
global
positioning system.


45. The security device of claim 25, wherein the security device includes a
mapping
system.





46. The security device of claim 25, wherein the video display screen is a
touch
screen.


47. The security device of claim 25, wherein the video display screen supports
direct
free hand drawing input.


48. The security device of claim 25, wherein the security device comprises two
digital
cameras, at least one camera having the capability for capturing images in
infrared light.

49. The security device of claim 25, wherein the radar is ultra wide band
ground
penetrating radar.


50. The security device of claim 25, wherein the radar is millimeter wave
radar.

51. The security device of claim 25, wherein the radar is ultra wide band
ground
penetrating radar and millimeter wave radar.


52. The security device of claim 25, wherein said device further includes a
forms
generator for selectively generating forms.


53. The security device of claim 25, further comprising means for detecting
hacking,
spoofing or scanning.


26



54. The security device of claim 25, further comprising an RFID interrogator
and
reader.


55. A portable handheld security device comprising:

a central processing unit in communication with a memory storage device, a
video
display screen, at least one camera, a transmitting device, a receiving
device, an input
device, a power supply; and an RFID interrogator and reader.


56. A security device according to claim 55, wherein said RFID interrogator
and
reader are used to track persons or objects carrying RFID tags.


57. A method for identifying objects of interest in closed containers, the
method
comprising:

providing a portable handheld security device having a central processing unit
in
communication with a memory storage device, a video display screen, an input
device, a
power supply and a device for generating ultra wide band ground penetrating
radar or
millimeter wave radar for locating hidden objects and producing images of the
hidden
objects on the video display screen;

holding the portable handheld security device over the closed container;
activating the device for generating radar;

displaying the image produced by the device for generating radar on the video
display screen; and

reviewing the image for objects of interest.

27



58. A method for locating hidden life forms, the method comprising:

providing a portable handheld security device having a central processing unit
in
communication with a memory storage device, a video display screen, at least
one camera
having infrared capability, an input device, and a power supply;

holding the portable handheld security device with the camera facing an area
in
which a life form may be hiding;

activating the camera's infrared capability;

scanning the area with the portable handheld security device to capture
infrared
images of the area with the camera;

displaying the infrared images on the video display screen; and

reviewing the infrared images for a heat signature produced by a life form.

59. A method for addressing a security breach, the method comprising:
transmitting a signal including images of an individual or item of interest;
providing at least one portable handheld security device having a central

processing unit, a memory storage device, a video display screen, a receiving
device, an
input device, and a power supply;

receiving the signal on each of the portable handheld security devices;
viewing the images on the portable handheld security devices; and
using the images to locate the individual or item of interest.


60. The method of claim 59, further comprising the steps of:

28



using the portable handheld security device to capture a video image of the
individual or item of interest; and

transmitting the video image to at least one receiving device to confirm the
identity of the individual or item of interest.


61. The method of claim 59, further comprising the steps of:

using the portable handheld security device to capture a still-screen image of
the
individual or item of interest; and

transmitting the still-screen image to at least one receiving devices confirm
the
identity of the individual or item of interest.


62. The method of claim 61, wherein at least one of the receiving devices
includes a
portable handheld security device.


63. A method for preventing compromise of a portable handheld security device,
the
method comprising:

providing a network system having a command and control center;
providing a portable handheld security device in communication with the
command and control center, the portable handheld security system having a
central
processing unit in communication with a memory storage device, at least one
camera, a
sound recording device, a transmitting device, a receiving device, an input
device, a
global positioning system, and a power supply;


29



providing means for logging in to the network system using the portable
handheld
security device;

applying a time limit to the means for logging in to the network system;
activating the camera for producing images, the sound recording device for
recording sounds, and global positioning system for locating the portable
handheld
security device if the time limit expires before the means for logging in to
the network
system are satisfied; and

transmitting the images produced by the camera, the sounds recorded by the
microphone, and the location of the security device determined using the
global
positioning system to the command and control center.


64. A method for tracking first responders with a portable handheld security
device,
the method comprising:

providing a portable handheld security device having a central processing unit
in
communication with a memory storage device, at least one camera, a display
screen, a
sound recording device, a transmitting device, a receiving device, a global
position
device, an input device, an RFID interrogator and reader, and a power supply;

providing first responders with RFID tags;

remotely reading information from said RFID tags with said portable handheld
security device; and

depicting the location of said first responders on said display screen of said

portable handheld security device based on information obtained from said RFID
tags.





65. A method for documenting questionable activities, the method comprising:
handheld security device having a central processing unit in communication
with

a memory storage device, at least one camera, a display screen, a sound
recording device,
a transmitting device, a receiving device, a global positioning device, a
clock; an input
device, a biometric sensor, and a power supply;

taking video or digital still images using said at least one camera, wherein
said
video or digital still images have a watermark added to the raw image prior to

compression;

identifying the location in which the video or digital still images are taken
using
said global positioning device; and

identifying the time at which the video or digital still images are taken
using said
clock.


66. A method according to claim 65, further comprising:

taking at least one fingerprint of a detained person using said biometric
sensor;
and

comparing said fingerprint to a fingerprint database.


67. A method according to claim 66, further comprising:
providing a forms generator;

creating a form using said forms generator and dropping said video or still
images,
said fingerprint, said location and said time data into said form; and

selectively distributing said form to interested persons.


31




68. A method of producing secure, unalterable digital video comprising the
steps
of:

using a camera to take raw digital video footage;

applying a watermark to said raw digital video footage while said raw digital
video footage is being taken; and

compressing the raw digital video footage to an acceptable video standard.


32

Description

Note: Descriptions are shown in the official language in which they were submitted.



CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
PORTABLE HANDHELD SECURITY DEVICE
BACKGROUND OF THE INVENTION

The present invention relates generally to security systems and more
particularly,
to methods and devices for carrying out security operations.

In today's world, there are many venues in which safety and security are key
concerns. Airports are a prime example. Security systems currently in use in
airports
include passenger and luggage screening at security check points to ensure
that
individuals or items posing a security risk are unable to board or otherwise
compromise
an airplane. Security is also a key concern at U.S. borders, where U.S.
Customs and

Border Patrol officials attempt to screen incoming cargo containers for items
that may
pose a national security risk.

Current airport security systems typically require large, stationary equipment
to
scan luggage and passengers for items posing a security risk. This process is
time
consuming, and does not afford much flexibility. Moreover, when a luggage bag
is

abandoned (forgotten or deliberately left behind) in the airport, there is
currently no good
method for airport security personnel to gather any information about the
contents of the
bag without opening the bag and physically inspecting its contents. Thus,
airport
personnel must often call for back up help or a bomb squad to handle the
abandoned bag
or move the bag to another location for x-ray and controlled physical
inspection. Another

problem is presented when an individual manages to pass through a security
check point
without being scanned or checked for identification. It is currently very
difficult to locate
the individual using existing security devices and systems because security
personnel on
1


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
the floor searching for the individual are often relying on a verbal
description, which can
be inaccurate, too broad or too narrow. If the individual is not apprehended,
under
current guidelines the airport must close the terminal and suspend flights
until a physical
search of the terminal has been completed.

Thus, there exists a need for more complete security systems and devices used
therein. The present invention relates to improvements over the security
systems and
devices described above, and to solutions to the problems raised or not solved
thereby.
SUMMARY OF THE INVENTION

The present invention provides a portable handheld security device. The
security
device preferably comprises a central processing unit in communication with a
memory
storage device, a video display screen readable in any lighting conditions, at
least one
camera, a transmitting device, a receiving device, an input device, a power
supply, and,
preferably, a device for generating radar signals for locating hidden objects,
such as
objects of interest in closed containers, and displaying images of the hidden
objects on the

video display screen. In addition, the transmitting device and the receiving
device are
ideally capable of selecting between available communication network signals,
determining which network signal is the best signal at a given time, and
automatically
switching between the available signals to maintain optimum reception and
transmission
quality. Further, the input device has a first set of user-interface controls
and a second set

of user-interface controls, wherein the first and second sets of user-
interface controls are
selectively operable by users either independently or simultaneously.

2


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
The security device further ideally includes a security lock out system,
digital full
motion video (between 22 and 30 frames per second) and still-screen image
capture both
watermarked for evidentiary purposes, recording, and processing capability, a
sound
producing device, a sound recording device, at least one type of biometric
scanner, bar

code reading capability, a passive or active radio frequency identification
reader and
interrogator, a global positioning system, a mapping system, a forms
generator, and two
digital cameras, at least one of which includes the capability for capturing
images in
infrared light. All of this is preferably maintained in a case sealed against
the
environment that is capable of satisfying testing done in accordance with
Military

Standard 801F. The security device of the present invention can be used for,
among other
things, locating dense objects in luggage bags, identifying objects of
interest in closed
containers, locating hidden life forms, verifying identities of suspects,
tracking responders
in chaotic situations, obtaining verifiable evidence of questionable
activities and
addressing a security breach. Methods for using the portable handheld security
device of

the present invention for the aforementioned purposes are also contemplated by
the
present invention. The present invention further contemplates a method for
preventing
compromise of a portable handheld security device.

Various other features, objects, and advantages of the present invention will
be
made apparent to those skilled in the art from the following detailed
description and
accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram illustrating a preferred embodiment of the apparatus
of
the present invention.

3


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
FIG. 2 is a front perspective view of a preferred embodiment of the apparatus
of
the present invention.

FIG. 3 is a rear perspective view of a preferred embodiment of the apparatus
of
the present invention.

FIG. 4 is a side view of a preferred embodiment of the apparatus of the
present
invention.

DETAILED DESCRIPTION OF THE INVENTION

Referring now to the drawings, the portable handheld security device 10 of the
present invention has a central processing unit 12 that is ideally a mobile
processing unit
such as an Intel Pentium mobile processor. The security device 10 also
includes a

memory storage device 14 in communication with the central processing unit 12.
The
memory storage device 14 ideally includes at least 1 gigabytes (GB) and 40 GB
of hard
drive space 15 as shown. The security device 10 also includes a power supply
(not
shown) preferably comprised of two battery packs in each side handle, for
powering the

security device 10 and all of its components. The battery packs are ideally
rechargeable
batteries that can each provide sufficient power to keep the device 10
operational for
several hours at a time on a single charge. The battery packs can also
preferably be "hot
swapped" without shutting the device down.

The security device 10 further includes an input device 16. The input device
16
ideally includes user-interface controls and touch screen technology for
manipulating the
security device 10 and inputting information into the security device 10. At
least a

4


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
portion of the user-interface controls of the input device 16 are preferably
auto-
ambidextrous in that there are two sets of user-interface controls 22 and 24,
as shown in
FIG. 2. The first set of user-interface controls 22 and the second set of user-
interface
controls 24 are selectively operable by users either independently or
simultaneously. In

other words, the user can select a single set of user-interface controls 22,
24, to
accommodate left or right-handed tendencies, and use that set of user-
interface controls
exclusively and independently of the other set of user-interface controls, or
the user can
select both sets of user-interface controls 22, 24, if the user is
ambidextrous, and use both
sets simultaneously. Preferably, the security device 10 can sense which set of
user-

interface controls 22, 24 has first been touched by a user and make that set
of user-
interface controls the primary set of user-interface controls, thereby
allowing the user,
consciously or unconsciously, to select a single set of controls to operate
independently
based on his or her left or right-handed tendencies. If both sets of controls
are touched by
a user within a predetermined time period such as 2 seconds, the security
device 10

allows both sets of controls 22, 24 to operate simultaneously so that a user
can use either
hand in the middle of an input or manipulation.

The security device 10 also includes a video display screen 18 in
communication
with the central processing unit 12. The video display screen is readable in
any lighting
conditions, including bright sunlight, it is ideally a 6.4" LCD screen that
supports touch

screen technology. Touch screen technology 19 allows a user to simply touch
the video
display screen 18 to input information or otherwise manipulate the security
device 10.
The video display screen 18 also preferably supports direct freehand drawing
input,

5


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
allowing a user to write or draw directly on the video display screen 18 to
input
information. For example, a user could draw a circle around an image displayed
on the
video display screen 18, and save the image, including the circle, for later
use or
distribution to others. Picture-in-picture display is preferably also
supported by the video

display screen. The video display screen 18 is also ideally readable in any
lighting
condition, including sunlight, to facilitate both indoor and outdoor use.

At least one camera 38 is also provided in communication with the central
processing unit 12 for providing video capability for the security device 10.
Ideally, the
security device 10 has two digital cameras 38 and can capture both still
images and full-

motion (between 22 and 30 frames per second) video images, and playback at 1-
90
frames per second. Panning, zooming, fast forward, reverse, normal play, and
pause
features are also preferably supported by the security device 10. At least one
of the
cameras 38 ideally can operate in infrared light, and at least one of the
cameras can
ideally operate in normal and low light. Pictures taken in normal, low and
infrared light

can either be mixed within the same full-motion video image, or the user can
switch
between the normal, low and infrared light modes as an image is being
captured. Each
camera ideally has a minimum of 1.8 mega pixels resolution, and up to 8 hours
of full-
motion video can ideally be stored in the security device 10. The video
capability of the
present invention preferably also includes at least a Motion Picture Experts
Group

(MPEG) encoder and decoder 58, 60.

Preferably at least one of the cameras 38 can also function as a bar code
reader 52.
The ability to have a portable handheld video and still camera that can also
be used to

6


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
read bar codes and UPC codes is a tremendous advantage over prior systems that
relied
on two or three devices to accomplish the same things.

The security device 10 also includes a transmitting device 26 and a receiving
device 28 in communication with the central processing unit 12. The
transmitting and
receiving devices 26, 28 can ideally securely transmit and receive information
using

wireless devices 30, such as radio frequency (RF) wireless network cards, or
wired
devices 32, such as ethernet cable connections. Many different wireless local
area
networks (WLANs) can be used with the security device 10, including without
limitation
802.11 a/b/g, 802.11 "super g," 802.15.3a, Global System for Mobile
Coinmunications

and General Packet Radio Service (GSM/GPRS), 3G, ultra wide band, BluetoothTM,
and
CDMA 1X. The security device 10 can also support 400/900 MHz and 5.8 GHz radio
for
voice and data transmission and receipt. Further, the security device 10,
using wireless
devices 30, is ideally capable of selecting between available communication
network
signals, determining which network signal is the best signal at a given time,
and

automatically switching between the available signals to maintain optimum
reception and
transmission quality. For example, the security device 10 ideally has
middleware that
measures the received signal strength of the various network cards and can
select the best
signal unless the user chooses to "lock in" a particular source. If the
security device 10
starts using an RF wireless network card and encounters interference, it can
seamlessly

switch to another wireless transmission mode without the user knowing a change
was
made. The security device 10 can also operate whether or not the transmitting
and
receiving devices 26, 28 are enabled. In other words, the security device 10
can also

7


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
operate as a stand alone unit. Preferably, when operating as a stand alone
unit, the
security device 10 continues to look for wireless or wired networks with which
it can
authenticate. If such a network is located, the security device 10 will
preferably exchange
pass codes and information with the corresponding network server to transition
from

stand alone to network operation.

The security device 10 further includes a device for producing ultra wide band
ground penetrating radar 34 and millimeter wave radar in communication with
the central
processing unit 12. Ideally, the security device 10 uses an ultra wide band
ground
penetrating radar unit that has been modified to work in a lower power smaller
scale

version or a millimeter wave radar. Traditional ultra wide band ground
penetrating radar
units are typically used to non-destructively examine the earth for items
buried
underground, such as pipes, tree roots, and archeological artifacts. Ground
penetrating
radar is also commonly used to examine the internal configuration of concrete
structures
such as bridges and roadways. The ultra wide band ground penetrating radar
unit 34 of

the present invention is intended to be used for locating and identifying
hidden objects,
such as items of interest in closed, non-metal containers. For example, the
ultra wide
band ground penetrating radar unit 34 could be used to non-destructively
examine the
contents of a piece of luggage at an airport. The millimeter wave radar can be
used to
non-destructively examine the contents of a cargo container coming into the
United States

through U.S. Customs and Border Patrol ports. Such examination provides an
efficient
way to'inspect the contents of the luggage or cargo container for items of
interest, such as
items that may pose a security risk. The ultra wide band ground penetrating
radar unit 34
8


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
can ideally operate within 5 meters from the container or other item being
examined, and
can ideally penetrate up to 10 meters into the container or other item. Other
RF sources,
such as the global positioning system 44 and the transmitting and receiving
devices 26,
28, are preferably unaffected by the operation of the ultra wide band ground
penetrating
radar unit 34.

The security device 10 preferably also includes a radio frequency
identification
(RFID) interrogator and reader 50. Such devices are generally passive in
nature.
However, by providing the present invention with both an interrogator and
reader 50, it is
possible to provide tracking of persons and materials equipped with
corresponding RFID
tags.

Many other devices and capabilities are also ideally included in the security
device 10 of the present invention. Audio capability, including a sound
producing device
40, such as speakers, and a sound recording device 42, such as a digital sound
recorder
including a microphone, is preferably included. A global positioning system
44, a

mapping system, a biometric scanner 48 including a National Institute of
Standards and
Technology (NIST) approved fmgerprint sensor, a BluetoothTM RF link for
headsets and
printers 51, bar code reading capability 52, four universal serial bus (USB)
ports 53, an
Ethernet port and a software authentication system are also preferably
provided in the
security device 10. In addition, the security device 10 is preferably a
complete personal

computer (PC) that runs on Microsoft XP operating system with pen based
extensions
and supports voice, data, video conferencing, email, Microsoft Office files,
any
software that operates under or over Microsoft XP operating system, forms
generation,

9


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
and document scanning. It should be understood, however, that the security
device 10 of
the present invention can be configured to run on any operating system
including Linux,
MacOS, Solaris and Unix.

All of the above-described features of the present invention are ideally
contained
in a lightweight, handheld housing 56 that is durable enough to satisfy
testing done in
accordance with Military Standard 801F, waterproof, and able to withstand
virtually all
weather conditions and climates with an operating temperature range of -30 to
+55
Celsius. However, the present invention preferably provides multiple ports
compliant
with the PCMCIA (Personal Computer Memory Card International Association)
standard

54 in a "blister pack" configuration 55 that does not compromise the integrity
of the
environmental sealing of the housing 56.

The entire security device 10 is also ideally very lightweight, preferably
between
2.5 and 4 pounds including the battery. The handheld, lightweight, wireless
security
device 10 can easily be carried and operated using one or both hands. The
security device

10 can be easily carried and used by personnel in, for example, transportation
security,
transportation operations, corporate security, education security, first
responder
organizations, government agencies, the Department of Defense and the
Department of
Homeland Security.

The security device of the present invention can be used in a number of ways
and
for a number of purposes, and thus the present invention also contemplates
various
methods of using the security device. For example, a method for identifying
objects of
interest in closed containers, such as but not limited to luggage bags at
airports or cargo



CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
containers at U.S. Customs and Border Patrol ports, is contemplated by the
present
invention, as well as a method for locating hidden life forms, such as
security-breaching
individuals or other suspects. Another significant method contemplated by the
present
invention is a method for addressing a security breach, such as but not
limited to a

security breach at an airport. The methods are further described using the
examples
below.

Example 1: Identifying Objects of Interest in Closed Containers. The ability
to
identify objects of interest in closed containers is an important security
issue. For
example, airport security personnel often find abandoned luggage bags. Because

abandoned luggage bags could contain items that pose very serious security
risks, such as
bombs, airport personnel must treat such luggage very carefully. Today,
airport personnel
have three options for handling the abandoned bag: pick up and move the bag,
call for
back-up help from inside or outside the airport, or call the bomb squad. With
any of
these current options, the airport personnel must make a decision without
first knowing
anything about the contents of the bag.

Using the security device of the present invention, however, the airport
personnel
could scan the bag with ultra wide band ground penetrating radar and, view the
images
produced by the radar in real-time to see if any objects of interest or
concern, particularly
dense objects, are present in the bag. If there are no dense objects, the
airport personnel

should be able to pick up the bag and move it to another location to be x-
rayed and
physically inspected. If there are dense objects, the airport personnel would
then know
they need to call for back up help or call the bomb squad because an object of
interest or
11


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
concern is in the bag. Once help arrives, the responding persons will be able
to see the
images produced by the radar, giving them additional information for deciding
how best
to proceed.

This same scenario could happen in other locations as well, including other

transportation centers, office buildings, trade and social conventions,
sporting events,
education venues, power plants and hospitals. Personnel at any of these
locations could
easily carry the security device of the present invention for use in similar
situations. This
use of the security device is also particularly useful for non-destructively
examining cargo
containers at U.S. Customs and Border Patrol ports for objects of interest or
concern.

Example II: Locating Hidden Life Forms. Locating hidden life forms can also be
an important security measure. For instance, a suspect may try hiding from his
pursuers
behind a wall or around a corner of a building where traditional surveillance
equipment
cannot see him. The security device of the present invention, however, will be
able to see
the hiding suspect using the infrared capability of at least one of its
cameras. With a

camera in infrared mode, the user can scan an area in which a suspect may be
hiding and
capture infrared images of the area. If a suspect, or any other life form, is
present, the
infrared image will produce an indicative heat signature. Thus, if a suspect
was hiding
around a corner, the infrared camera image of the corner area would show a
heat

signature indicating that a life form was near the corner. This feature of the
security
device could be used in any situation wherein locating hidden individuals or
other life
forms is desired.

12


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
Example III: Addressing a Security Breach. Being able to adequately address a
security breach is an essential function of security personnel in all secured
venues. For
example, almost every day in an airport someplace in the world, someone
breaches the
airport security system by walking through a security checkpoint without
stopping.

Today, when such a security breach happens, the breaching individual's picture
is usually
captured by a security camera. When airport security personnel realize a
breach has
occurred, they typically send a message to the rest of the security personnel
in the airport,
usually by sounding a chime or flashing selected lights in the airport, to
alert them of the
breach. The security command and control center then describes the breaching
individual

to all of the security staff, usually by two-way radio. Some locations in the
airport,
however, may not be able to adequately receive the two-way radio signal and
thus some
security personnel could miss the description entirely. In addition, the
verbal description,
as opposed to a visual description or actual photograph, of the breaching
individual may
not be accurate or may be too broad or too narrow, making it difficult for
airport security
to locate and apprehend the breaching individual. If the breaching individual
is not

apprehended, the Federal Aviation Administration and/or the Transportation
Safety
Administration require that the airport terminal be cleared so that a physical
search can be
performed. This procedure can close an airport terminal for several hours,
costing
hundreds of millions of dollars in lost revenues and delaying hundreds of
flights.

If the airport security personnel carried security devices according to the
present
invention, however, it would be much easier to quickly locate and apprehend
the
breaching individual. For instance, the picture from the security camera could
be sent

13


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
' it ~d'- =....U II...lt ~~,3E .='' Itn,~. ii,i= ti..i: r.. :rn..:
'from the security commandand control center to the security devices carried
by all
security personnel. Thus, all security personnel would be able to see an
actual picture of
the breaching individual, instead of relying on a verbal description. The
video feeds from
the security camera could also be sent directly to the security devices
carried by all

security personnel, so that security personnel could view breaching
individual's picture
taken at any location, not just from the security command and control center.
Further,
once the security personnel find an individual who appears to be the person in
the picture,
the security personnel could take a photograph using the security device and
send the
picture to the command and control center and/or to other personnel carrying
security

devices and confirm that they have located the correct individual. Using the
security
device's biometric scanner, the security personnel could also ask the
individual to provide
a fingerprint, which the security device could then send to an NIST server to
verify that
the individual is who he or she claims to be.

Example IV: Documenting Questionable Activities. In situations involving

potential criminal conduct, it is one thing to capture the person(s) involved
in the activity.
It is yet another to obtain a conviction in a court of law. One of the reasons
for such
difficulty revolves around the nature of evidence. In the vast majority of
situations,
evidence is in the form of "old-fashioned" human testimony or video or still
pictures that

are subject to attack on the grounds of authenticity (e.g., digital images can
be altered by
persons with access to relatively simple software in a substantially
untraceable manner).
There is also the question of verifiable identity of the alleged perpetrator.
Using the
present invention, security and law enforcement personnel have the ability to
take

14


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
verifiable digital video and still pictures of questionable conduct, make
positive
identifications, and generate appropriate paperwork on the fly.

If a user of the present invention notices a person engaging in questionable
activity, a digital still image can be taken of the person so engaged. When
the image is

taken using the present invention, a watermark is added to the picture. The
watermark is
added to the raw image and before the typical compression algorithm is applied
(e.g., to
compress the picture into jpg, tif or gif format). The provision of the
watermark on the
still image renders the image unalterable and useful as evidence in a court of
law.

Without a watermark, digital images are susceptible of manipulation using such
software
programs as Photoshop. As a result, it is often difficult to rely on ordinary
digital images
as evidence in a court of law.

If the conduct being monitored is active in nature, the ability to take a
video may
be beneficial. When a digital video is taken with the present invention, a
watermark is
also added. Raw digital footage preferably in the H263 standard is taken with
one of the

cameras of the present invention. While this raw footage is being taken, a
watermark is
applied. Thereafter, the video is compressed, preferably into mpeg format.
This
approach is a significant improvement over prior art watermarking systems
which applied
the watermark during or after compression. Such "during and after
watermarking"
provides a measure of security and reliability, but lacks the absolute
security and

reliability of the present approach. As with still images, the presence of the
watermark
renders the video unalterable, and by virtue of the manner of its application,
virtually
unassailable in a court of law.



CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
In addition to being able to capture questionable activity with admissible
video
and/or still images, a variety of other verifications and documentation can be
undertaken.
Using the built in GPS system, the location of the questionable activity can
be precisely
identified and recorded along with the exact time of the activity. Persons who
are

questioned or otherwise detained, can be instantly fingerprinted using the
biometric
scanner and those fingerprints compared to an on-board database of authorized
personnel
or a remote database accessible wirelessly via the internet or other network.

Using a built in forms generator, the fmgerprints, digital still image,
location and
time data and the like, can all be dropped into pre-existing or newly created
forms. Such
forms make the preparation of arrest and incident reports simple and easy to
accomplish.

It also makes it more likely that relevant information about questionable
persons and
activities will be quickly circulated among those persons who can provide
background or
other information about the questionable persons or activities.

Example VI: Tracking First Responders. One of the difficulties in law

enforcement and disaster situations is keeping track of the deployment of
firefighters,
police officers, bomb squads and the like. If someone gets hurt, trapped or is
lost, time
become critical. The present invention provides active RFID capability to
enable the
tracking of persons and objects in such situations. For example, each
firefighter and
police officer can be given an RFID tag with a unique code. Weapons,
explosives and

rescue equipment can be given similar tags. In a situation where it is
believed that harm
will befall one or more persons (e.g., a portion of a building is about to
collapse), the
present invention permits a user to identify and locate each tagged person or
piece of

16


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
~[ - L-n" :r . u.:. .-... .u.... .......
equipment so as to warn them of specific danger or to mount a rescue in the
event they
are unable to return to safety. This is accomplished by using the active RFID
to locate
and identify the persons or things and show them graphically or otherwise on
the screen
of the handheld device.

The active RFID system of the present invention can also be used to
surreptitiously track luggage or other items of interest. Small RFID tags can
be placed on
the item and its location monitored via the handheld device of the present
invention.
Thus, if a piece of tagged luggage ends up somewhere it shouldn't, that fact
can be
immediately noted and its travel history traced back.

The present invention further contemplates a method for preventing compromise
of the security device using a security lock out system. Preventing compromise
of the
device is an important function of the device because it helps ensure that the
device can
only be used by those authorized to use it. Ideally, the command and control
center for
the security personnel at a secured venue would provide an authorized
individual with a

time limit for logging into or authenticating with the security device. If the
time limit
expires before the authorized individual logs in or authenticates, the display
screen on the
security device ideally turns black and an innocuous message such as, "please
standby"
appears. The microphone, sound recording device, cameras, and global
positioning
system or other location sensor are ideally activated so that the security
command and

control center can locate the security device, as well as see and hear
everything the
security device records so that if the device is taken by a person with
nefarious intent,
their activities could be monitored without their knowledge.

17


CA 02614344 2008-01-07
WO 2007/008217 PCT/US2005/026812
Using software that is part of the present invention, administrators of the
network
with which the present invention is used, as well as individuals using the
handheld device
can determine when efforts are made to spoof, scan or hack into the device or
network.
This detection system provides two principal options when an attack of this
nature is

detected. The first, option is to identify the attack and stop it. However, if
the attack
appears to come from a known or suspected source, the software can, in turn,
spoof the
attacker such that the attacker thinks he is accessing the real system. In
such cases,
disinformation can be provided to mislead or otherwise compromise the
attacker.

While the invention has been described with reference to preferred
embodiments,
it is to be understood that the invention is not intended to be limited to the
specific
embodiments set forth above. It is recognized that those skilled in the art
will appreciate
certain substitutions, alterations, modifications, and omissions may be made
without
parting from the spirit or intent of the invention. Accordingly, the foregoing
description
is meant to be exemplary only, the invention is to be taken as including all
reasonable

equivalents to the subject matter of the invention, and should not limit the
scope of the
invention.

18

Representative Drawing

Sorry, the representative drawing for patent document number 2614344 was not found.

Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date Unavailable
(86) PCT Filing Date 2005-07-29
(87) PCT Publication Date 2007-01-18
(85) National Entry 2008-01-07
Dead Application 2010-07-29

Abandonment History

Abandonment Date Reason Reinstatement Date
2009-07-29 FAILURE TO PAY APPLICATION MAINTENANCE FEE

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Application Fee $400.00 2008-01-07
Maintenance Fee - Application - New Act 2 2007-07-30 $100.00 2008-01-07
Maintenance Fee - Application - New Act 3 2008-07-29 $100.00 2008-01-07
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
TABANKIN, IRA
SUTTON, JOHN
Past Owners on Record
None
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Cover Page 2008-03-31 1 39
Abstract 2008-01-07 1 63
Claims 2008-01-07 14 398
Drawings 2008-01-07 4 11
Description 2008-01-07 18 805
Correspondence 2008-03-27 1 26
PCT 2008-01-07 2 94
Assignment 2008-01-07 2 96