CRIMINAL MANAGEMENT SYSTEMS, APPARATUS AND METHODS
TECHNICAL FIELD This invention relates to biometrics and, more particularly, to bio etric-based systems, apparatus and methods for managing and tracking criminals.
BACKGROUND ART When released from prison, some convicted criminals, especially sex offenders, must be registered as felons. While registration is indeed important for attempting to make the public aware of some of the worlds' most dangerous individuals, existing registration systems and methods are woefully incompetent and easily circumvented with fake identification and other relatively unsophisticated measures typically employed by even feeble-minded criminals. Thus, there is a need for new and improved systems, apparatus and methods for releasing criminals from custody and for managing and tracking released criminals .
DISCLOSURE OF THE INVENTION The invention proposes improved and various but related systems, apparatus and methods for releasing criminals from custody and for managing and tracking released criminals. In a particular embodiment, a system of the invention is comprised of clients having electronic access to a database of electronic documents. The electronic documents each contain registration data and a criminal history report of a criminal. The clients each have or are otherwise associated with apparatus for collecting sample registration data and
for generating electronic reports of collected sample registration data. The system further includes a search architecture responsive to inputs at the each of the clients for causing or initiating a search. The search architecture may comprise a computerized search architecture or a manually discharged search. In any event, each search comprises an accessing of the database, a comparison of collected sample registration data of an electronic report to the registration data of the electronic documents and at least one of permitting access to and an accessing of the criminal history report of one of the electronic documents if the collected sample registration data substantially matches the registration data of the one of the electronic documents. The registration data and the sample registration data each comprise, among potentially other things, biometric data of the same type. As a matter of providing teachings of exemplary systems, apparatus and methods for collecting biometric data and of identifying individuals with biometric data, incorporated herein by reference is PCT/US99/08120 entitled "Method, System and Apparatus for Biometric Identification."
Consistent with the foregoing, the invention also provides associated methods.
BRIEF DESCRIPTION OF THE DRAWINGS Referring to the drawings:
Fig. 1 is a highly schematic diagram of a networked computer environment; Fig. 2 is a diagram of a networked client interface;
Fig. 3 illustrates a criminal providing biometric data to custodial institution; and
Fig. 4 illustrates a criminal providing biometric data to local facility.
BEST MODES FOR CARRYING OUT THE INVENTION Ensuing embodiments of the invention comprise new and improved systems, apparatus and methods for releasing criminals from custody and for managing and tracking released criminals. The ensuing embodiments of the invention utilize a networked computer environment, and the following discussion deals primarily with the Internet and the world-wide-web. However, those conversant in the art will appreciate that the systems and methods set forth in this specification may be implemented in a generalized network environment. Turning to the drawings, Fig. 1 illustrates a highly schematic diagram of a networked computer environment 10 comprising clients 11 connected together through a network 12. Clients 11 include, among other things, personal computers that are configured to interact with network 12. Each personal computer normally includes or is otherwise associated with storage, processing apparatus, an appropriate software architecture, a monitor and input apparatus such as a keyboard, mouse or pointing device, a voice response architecture, etc. Network 12 comprises a generalized network or the Internet. Access to network 12 is normally made over telephone lines such as wired and/or wireless commercial information services or other similar communication systems. To ease the ensuing discussion, one of clients 11 bears the reference character 11' and is discussed below in connection therewith.
Regarding Fig. 2, client 11' includes or is otherwise connected to or associated with storage 20, which houses a database 21. Storage 20 comprises resident and/or central storage and contains software such as a commercially available browser application for facilitating network 12 access, and an operating system or platform and preferably one that is multi-tasking and responsive to inputs from client 11' for accessing and interacting with database 21 and with other local or remote networked components. By interacting with network 12, clients 11 can access database 21 by way of a site or portal 22. Server 23 facilitates the interface between clients 11 and database 21 in a conventional manner and perhaps even between client 11' and database 21 in a particular embodiment should storage 20 be totally or at least partially centrally located. Those of ordinary skill will appreciate that the invention may incorporate a potentially vast number of servers for providing client access to site 22. Should network 12 comprise a local or generalized network, clients 11 may access site 22 with a generalized network application format. Should network 12 comprise the Internet, site 22 may be publicly accessible (i.e., a publicly accessible web site) with a HyperText Transfer Protocol request from any client with a commercially available web browser or, perhaps, within an encrypted virtual private network.
The invention utilizes biometric data of a portion of the human anatomy or function for biometrically identifying and tracking criminals, and associated apparatus for collecting biometric data and encoding the biometric data into a code that can be stored as an accessible and searchable electronic document in a
computerized database, such as database 21. Biometric data or measurements can include fingerprint or finger imaging, hand geometry, facial recognition, iris patterns or scan, retina patterns, signature verification, vein identification, or other measurement (s) of an anatomical function such as signature or voice recognition or voice print, etc.
Various biometric data or measurements and methods of collecting the measurements or data are disclosed in Biometric Digest, a publication that is published monthly by Biometric Digest, a division of Rogers and Associates, LLC, P.O. Box 510047, St. Louis, Missouri 63151-0047 USA and in U.S. patent number 5,897,989, filed on 23 July 1996 and entitled "Method, Apparatus and System for Anonymous Verification of Infectious Status of Humans," said patent being incorporated by reference herein. The code of the biometric data, therefore, relates to a measurable function or anatomic aspect of a human subject as a means of identification. Thus, after biometric data is collected as the present invention provides, it is encoded into biometric code and then stored as an electronic document or report in a database of a computer or other storage device. Encoding typically takes place during or substantially contemporaneously with the process of obtaining biometric data.
Looking to Fig. 3, client 11' is located at a prison 25, penitentiary, jail or other place of confinement or forcible restraint or review of criminals or prisoners, such as judicial court. As previously intimated, client 11' includes a computer 30 having an associated monitor 31 and input apparatus 32 among potentially other conventional computerized accessories.
Computer 30 is connected to or is otherwise adapted to receive data from and communicate with apparatus 33 for collecting biometric data. The operation of apparatus
33 is controlled, at least in part, by an operator 34 operating and entering commands into computer 30.
In accordance with the invention, Fig. 3 illustrates a criminal 35 positioned opposite operator 34. Criminal 35 is to be released from custody after having been imprisoned, jailed, sentenced or otherwise held in custody at a prison, penitentiary, jail, juvenile facility, court etc. Prior to being released, however, criminal 35 must be registered so that he can be managed and tracked after his release. To register criminal 35, operator 34 operates computer 30 and activates apparatus 33 and takes biometric data or a biometric reading from criminal 35, encodes the biometric data into a biometric code and stores the biometric code into database 21 as an electronic document 36 as shown in Fig. 2. The taking and encoding of the biometric data and the subsequent storing of the biometric code into database 21 as electronic document 36 can be performed in response to manual commands or performed or managed by computer 30 in a series of automated and computerized process steps. In terms of this disclosure, the biometric code of electronic document 36 is considered registration data of that particular criminal. By operating computer 30, operator
34 may also either access a previously created and stored criminal history report of the criminal or create a criminal history report of the criminal and then include the criminal history report in electronic document 36, and associate or link the criminal history report with the biometric code of the criminal. The
criminal history report provides various information about the criminal including, for instance, the criminal's name, age, sex, height, weight, hair and eye color, and perhaps other features of the criminal's physical appearance, social security number, a photograph of the criminal, the criminal history of the criminal including, for instance, the number of crimes committed and the types of crimes, convictions, whether the criminal is a registered sex offender, the place and duration of any imprisonment, etc. The registration process is essentially complete after electronic document 36 is created and stored in database 21. This registration process is repeated for each criminal prior to release from custody, and it is envisioned that database 21 will house a potentially vast number of electronic documents. As the number of electronic documents becomes increasingly large, database 21 may be configured as a plurality of separate, yet related and mutually or individually accessible databases. Site 22 can be arranged to govern database 21 access and search and retrieval functions as will be discussed shortly. It will be understood that a potentially vast number of clients 11 can be located at various prisons, penitentiaries, jails, juvenile facilities, courts, etc., and linked to database 21 for allowing them to register released criminals into database 21.
Criminal 35 is released from custody after registration. Looking to Fig. 4, shown is one of clients 11 that, for ease of discussion and clarity, is denoted with the reference character 11''. In this embodiment, client 11'' is located at a business entity or concern 40, which, like many of clients 11, may comprise a day care center for children, a school, a
bank or mortgage company, a restaurant, a hotel, a church, a bakery, a law office, a meat packing plant, a grocery store or other type of business concern, a court, a law enforcement precinct or department, etc. As previously intimated, client 11'' includes a computer
41 having an associated monitor 42 and input apparatus
43. Computer 41 is connected to or is otherwise adapted to receive data from and communicate with apparatus 44 for collecting biometric data. The operation of apparatus 44 is controlled, at least in part, by an operator 45 operating and entering commands into computer 41. In this regard, the operational and organizational framework of computer 41 and apparatus 44 is substantially similar to that of computer 30 and apparatus 33 as previously discussed in connection with Figs. 2 and 3, and this is generally the case with all clients 11.
Figure 4 illustrates criminal 35 positioned opposite operator 45. In this embodiment of the invention, criminal 35 is seeking employment with entity 40. To determine whether to hire criminal 35, the invention provides that he must first be screened. The screening process is important, for it gives entity 40 the ability to determine whether criminal 35 is in fact a criminal and, if so, to determine whether criminal 35 is fit to be hired. So in Fig. 4, operator 45 is screening criminal 35 to determine whether criminal 35 has a criminal record and is otherwise fit to be hired as an employee. It may be assumed that operator 45 knows nothing about criminal 35. Prior to being hired, operator 45 activates apparatus 44 and takes sample biometric data or a sample biometric reading from criminal 35, encodes the sample biometric data into a
sample biometric code, and stores the sample biometric code into resident storage as an electronic report of sample registration data. The biometric data may be of one or more types. The taking and encoding of the sample biometric data and the subsequent storing of the sample biometric code as electronic report can be manually performed, performed by interacting with and entering commands into a computer in response to an interactive software program, or performed automatically in a series of computerized process steps. Computer 41 normally generates the electronic report.
A comparison is then made between the sample registration data and the registration data housed by a potentially vast number of electronic documents of database 21. The type(s) of biometric data collected at prison 25 and the type(s) of biometric data collected at entity 40 must be the same for a comparison to be made. Accordingly, it is to be understood that biometric data collected from criminal 35 at prison 25 is the same type of biometric data collected from criminal 35 at entity 40, and this understanding may be established by prison 25 officials beforehand. The biometric data can, in this regard, be taken from one anatomical feature or function or a plurality of anatomical features or functions. To make the comparison, client 11'' accesses site 22 and a search of database 21 is conducted. In one embodiment, site 22 is equipped with a search architecture or program 46, which is stored in database 21 or elsewhere. In response to operator 44 inputs commands and interaction with the organizational architecture of site 22, search architecture 46 can be initiated or otherwise launched for causing search architecture 46 to access database 21 and compare
collected sample registration data of the electronic report to the registration data of one specific electronic document or a selected plurality of or all of the electronic documents. If, as a result of this comparison, the sample registration data substantially matches the registration data of, for instance, one of the electronic documents, search architecture 46 then one or more of a)permits client 11'' access to the criminal history report of the one of the electronic documents, b) causes client 11'' to access the criminal history report of the one of the electronic documents, c) displays the criminal history report of the one of the electronic documents (which may also include a photograph of the criminal), and d) causes a criminal notification report to be generated and sent to one or more and even all of clients 11. By permitting or causing client 11'' to access the criminal history report or by displaying the criminal history report for operator 45 to view on monitor 42, operator 45 is capable of learning the criminal history of criminal 35 for determining whether to hire criminal 35 as an employee. If there is no substantial match between the collected registration data and the registration data housed in database 21, then operator 45 may reasonably conclude that the job applicant is either not a criminal or an unregistered criminal. The ability of entity 40 to learn of the criminal past of criminal 35 is very important and serves the public notification goal of this invention, namely, keeping the public and business proprietor informed of registered criminals and of their whereabouts, and especially courts and law enforcement personnel .
It will be understood that if a criminal or subject provides personal identification data and a sample of biometric data, a search can be directed toward that criminal's or subject's specific electronic document for the purpose of making a comparison of the collected sample biometric data and the biometric data of the electronic document for biometrically verifying the criminal's or subject's identity. This is a one-to-one verification or search. A search of collected sample biometric data against a plurality of electronic documents is a one-to-many search. Another search configuration is a layered biometric search architecture. In this scenario, an initial search is carried out that searches and locates a group of substantially matching electronic documents based on one type of biometric data. After the initial search is complete, a second search is carried out that searches for a single electronic document among the group based on another type of biometric data. The invention contemplates any suitable number of multiple layered biometrically-based searches and search architectures.
The generation and sending of the criminal notification report is carried out by search architecture 46, by the computerized architecture of site 22 or elsewhere. The criminal notification report includes the criminal history found from the search, an identification of the criminal, and the date, time and location at which the criminal attempted to find employment. This function of providing clients 11 this information is very important and, again, serves the public notification and criminal-tracking goal of this invention, namely, keeping the public informed of
registered criminals and their whereabouts and activities and attempts to find employment.
The embodiments set forth in this specification can be implemented by clients 11 for any number of reasons, not just verifying suitability for employment but for biometrically identifying litigants before or contemporaneously with a court appearance or judicial proceeding, before selling an individual a gun or a car, before approving a loan, etc. The invention has been described above with reference to one or more preferred embodiments. However, those skilled in the art will recognize that changes and modifications may be made in the described embodiments without departing from the nature and scope of the invention. For instance, other applications of the invention include recognition of previously registered offenders by mobile law enforcement units via radio frequency from mobile biometric collection stations and recognition of previously registered methadone addicts by methadone clinics. For methadone addicts, the invention contemplates various problems including the problem of falsification of identity by addicts and failure of the addicts to adhere to an ongoing treatment program. Each clinic is envisioned to have both biometric recognition and enrollment functions and photographic capabilities so that updated files are correlated in the central database of the system including the date and time of clinic attendance, medication dosage, a photograph of the patient at each clinic visit and other relevant medical data.
As a matter of example, it is envisioned that an electronically collected sample of biometric related data, such as a digital image of a fingerprint or
photograph, can be sent electronically to a site, such as site 22, where personnel can access the biometric data in order to conduct a manual search or a semi- automated search, which are search techniques commonly used by the United States Federal Bureau of Investigation. This is useful for allowing, for instance, electronically received samples of fingerprints to be compared to hardcopy records of inked fingerprints. Furthermore, it is also envisioned that courts will use the invention to collect sample registration data (i.e., biometric data and other identifying information) to verify the identity of the litigants that are under arrest or detention, and to access electronically records relating to the litigants including previous DNA testing and previous or current court records.
Many jurisdictions have a requirement for a sheriff's card or a work card. In this situation, the prospective worker must visit the sheriff's office and be fingerprinted and give personal data including name, social security number, etc. The present invention is envisioned to be used during the sheriff's or work card registration so that any prior criminal record may be accessed in a search, such as one-to-one, i.e. input name of criminal with biometric match.
Various state and local agencies can comprise ones of clients 11 in accordance with this disclosure, such as various law enforcement agencies and departments such as the department of motor vehicles, etc. In this regard, whenever a criminal gets a new driver' s license or moves from place to place and registers with law enforcement, the identity of the criminal can be biometrically verified or ascertained and database 21
can be updated with any new information after the electronic document of that criminal is found from a search.
Various changes and modifications to one or more of the embodiments herein chosen for purposes of illustration will readily occur to those skilled in the art. For instance, the search carried with search architecture 46 as discussed above can be effected manually by search personnel that manage site 22. After receiving collected sample biometric data in this regard, the search personnel may conduct the search with the aid of a computerized database and/or hardcopy records of previously collected biometric data, such as photograph and fingerprint data. Accordingly, search architecture 46 can be manually discharged in response to client inputs of submitting sample biometric data accompanied by a search request, which causes the search personnel to access database 21 and compare collected sample registration data of an electronic report to the registration data and for then one or more of a) notifying the client that there where no matches and, if there was a substantial match, b) permitting client access to the criminal history report of the one of the electronic documents, c) causing the client to access the criminal history report of the one of the electronic documents, d) displaying the criminal history report of the one of the electronic documents, and e) causing a criminal notification report to be generated and sent to one or more and even all of the clients of the networked system. This embodiment of a search is essentially an electronic submission of sample biometric data followed by a manual search as opposed to an automated search as previously discussed. It should also be understood that
hardcopies of biometric data, such as fingerprint data, can be digitized for effecting a computerized or electronic biometric data search and comparison event.
To the extent that such modifications and variations do not depart from the spirit of the invention, they are intended to be included within the scope thereof, which is assessed only by a fair interpretation of the following claims.