TWI307583B - Portable handheld security apparatus - Google Patents

Portable handheld security apparatus Download PDF

Info

Publication number
TWI307583B
TWI307583B TW094126196A TW94126196A TWI307583B TW I307583 B TWI307583 B TW I307583B TW 094126196 A TW094126196 A TW 094126196A TW 94126196 A TW94126196 A TW 94126196A TW I307583 B TWI307583 B TW I307583B
Authority
TW
Taiwan
Prior art keywords
security
security device
image
radar
camera
Prior art date
Application number
TW094126196A
Other languages
Chinese (zh)
Other versions
TW200703108A (en
Inventor
Ira J Tabankin
John Sutton
Original Assignee
Catcher Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Catcher Inc filed Critical Catcher Inc
Publication of TW200703108A publication Critical patent/TW200703108A/en
Application granted granted Critical
Publication of TWI307583B publication Critical patent/TWI307583B/en

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/02Systems using reflection of radio waves, e.g. primary radar systems; Analogous systems
    • G01S13/0209Systems with very large relative bandwidth, i.e. larger than 10 %, e.g. baseband, pulse, carrier-free, ultrawideband
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/885Radar or analogous systems specially adapted for specific applications for ground probing

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)
  • Radar Systems Or Details Thereof (AREA)

Description

,1307583 九、發明說明: 【發明所屬之技術領域】 本發明大體而言係關於保全系統,且更特定言之係關於 進行保全操作之方法及裝置。 【先前技術】</ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; [Prior Art]

在當今之世界,存在其中安全及保全為關鍵考慮因素之 許多地點。機場為主要實例。當前用於機場之保全系統包 括保全檢查點處之乘客及行李審查以確保引起保全風險之 個體或物品不能夠上飛機或危及飛機之安全。保全在美國 邊境處亦為關鍵考慮因素,其中美國海關及邊境巡邏官員 試圖審查進入之貨箱中可能引起全國保全風險之物品。 當前機場保全系統通常要求較大之固定設備以掃描行李 及乘客之引起保全風險的物品。此過程為耗時的,且不招 供較多彈性。此外,當一行李袋被丢棄(忘記或故意遺留 在機場時,當前機場保全人Μ良好之方法用於在不打開 該行李袋並實體地檢測其内容的情況下收集關於該行李袋 之内容的任何資訊。因此’機場人員必須經常呼叫後援幫 助或-防爆小組(bomb squad)以處理所吾棄之行李袋或將 該仃李袋移至另一場所進行χ射線及受控實體檢測。當一 個體在未經用於識別m檢㈣情況 檢査點時’出現另-問題。因為搜尋該個雜之地面= =二賴於不準確之口頭描述(其為不精確的,太廣泛 二! ’故當前使用現有保全裝置及系統難以對該個 灯疋立#該個體不能夠理解,則在當前準則下機場 103896-951218.doc J307583 -卜 至已完成該終端之實體搜尋 必須封閉終端並暫停航班 為止。 存在對在其中使用之更 需要。本發明係關料上述保 j全⑽及裝置的 於對產生之問題或藉此未解決之置之改良,且關 【發明内容】 &lt; 問相解決方案。In today's world, there are many locations where safety and security are key considerations. The airport is the main example. The current security system for airports includes a passenger and baggage review at the security checkpoint to ensure that individuals or items that pose a risk of preservation are not able to board or endanger the aircraft. Preservation is also a key consideration at the US border, with US Customs and Border Patrol officials attempting to review items in the incoming containers that may pose a national security risk. Current airport security systems typically require larger fixtures to scan for baggage and passengers' items that pose a risk of preservation. This process is time consuming and does not provide more flexibility. In addition, when a duffel bag is discarded (forgotten or intentionally left at the airport, the current airport security person is good at collecting the contents of the duffel bag without opening the duffel bag and physically detecting its contents) Any information. Therefore, 'airport personnel must often call back-up help or - bomb squad to handle the abandoned duffel bag or move the bag to another location for X-ray and controlled entity testing. A body does not have a problem when it is not used to identify the m check (4) checkpoint. Because searching for the miscellaneous ground == depends on the inaccurate verbal description (which is inaccurate, too broad two! ' Therefore, it is difficult to use the existing security device and system. It is difficult for the individual to understand. Under the current guidelines, the airport 103896-951218.doc J307583 - to the entity search that has completed the terminal must close the terminal and suspend the flight. There is a need for the use therein. The present invention relates to the above-mentioned problem of the production of the device and the improvement of the device, and the improvement is Ming content] &lt; Q-phase solution.

供一種可攜式手持保全裝置。該保全裝 包3一與一記憶體儲存器件進行通信之中央處理單元、 :任何光照條件中可讀之視訊顯示幕、至少一攝影機二 傳輸/接收器件、一輸入器件、-電源,及較佳一器件, 其用於產生用於定位隱藏物件(諸如在封閉容器中之感興 趣的物件)之雷達訊號並在該視訊顯示幕上顯示該等障藏 物件之影像。此外’該傳輸/接收器件理想地能夠在‘用 之通信網路訊號之間進行選擇、判定在—給定時間哪—網 路訊號為最佳訊號,及在該等可用訊號之間進行自動切換 以維持最佳接收及傳輸品質。另外,該輸入器件具有第j 組使用者介面控制及第二組使用者介面控制’其中該第_ 組使用者介面控制及該第二組使用者介面控制可單獨或同 時由使用者進行選擇性地操作。 該保全裝置進一步理想地包括一保全封鎖系統(security lock out system)、數位全動態視訊(每秒22訊框與3〇訊框之 間)及靜態螢幕影像捕獲(兩者皆為證據之目的而被水印)、 記錄及處理能力、發聲器件、錄音器件、至少一類型之生 物掃描儀、條碼讀取能力、被動或主動式射頻識別讀取器 103896-951218.doc 1307583 .A訊問器、全球定位系統、映射系統、表格產生器及兩個 數位攝影機’其中至少一者包括以紅外光捕獲影像之能 • 力。此全部較佳地維持在一相對於環境而密封之外殼中, ' 丨能夠滿足根據軍事標準卿所進行❹m。本發明之保 、 全裝置可用於定位行李袋中之密集物件(dense object)、識 別封閉容器中感興趣之物件、定位隱藏之生命形式'驗證 嫌疑者之身份、在混亂情形中追蹤回應機、獲得可疑活動 • 4可驗證之證據’及處理保全違反。本發明亦涵蓋為上述 目的而使用本發明之可攜式手持保全裝置的方法。本發明 進一步涵蓋一防止危及可攜式手持保全裝置之方法。 熟習此項技術者自以下詳細描述及隨附圖式將明顯看出 本發明之各種其它特徵、目標及優點。 ' 【實施方式】 、 現^看附圖,本發明之可攜式手持保全裝置1G具有中央 處理單元12’其理想地為行動處理單元,諸如inw® • 二entlum订動處理器。保全裝置1〇亦包括一與該中央處理 單元12進行通仏之記憶體儲存器件14。該記憶體儲存器件 14理想地包括如圖所示之至少Hg)十億位元組㈣)及⑽仙 , t硬碟機空間15。保全裝置1〇亦包括一較佳於每一側手柄 . &amp;含兩個電池組的電源(未圖示),其用於為保全裝置1〇及 ”所有組件供電。該等電池組理想地為可再充電電池,每 7電池在一次充電之後可提供充分之電力以保持裝置忉 可操作若干小時。該等電池組在不關閉裝置的情況下亦可 較佳為&quot;熱交換的&quot;。For a portable handheld security device. The security package 3 is a central processing unit for communicating with a memory storage device: a video display screen readable in any illumination condition, at least one camera 2 transmission/reception device, an input device, a power supply, and preferably A device for generating radar signals for locating hidden objects, such as objects of interest in a closed container, and displaying images of the obstacles on the video display. In addition, the transmitting/receiving device is ideally capable of selecting between the communication network signals used, determining at which time the network signal is the best signal, and automatically switching between the available signals. To maintain optimal reception and transmission quality. In addition, the input device has a jth group user interface control and a second group of user interface controls, wherein the first group of user interface controls and the second group of user interface controls are individually or simultaneously selectable by the user Operation. The security device further desirably includes a security lock out system, digital full-motion video (between 22 frames and 3 frames per second), and static screen image capture (both for evidence purposes) Watermarked), recording and processing capabilities, sounding devices, recording devices, at least one type of biometric scanner, bar code reading capability, passive or active RFID readers 103896-951218.doc 1307583 .A interrogator, global positioning At least one of the system, mapping system, table generator, and two digital cameras includes the ability to capture images with infrared light. All of this is preferably maintained in an enclosure that is sealed against the environment, and ' ' can satisfy ❹m according to military standards. The security device of the present invention can be used to locate a dense object in a duffel bag, identify an object of interest in the closed container, locate a hidden life form, verify the identity of the suspect, track the responder in a chaotic situation, Acquire suspicious activity • 4 verifiable evidence 'and handle preservation violations. The present invention also encompasses a method of using the portable handheld security device of the present invention for the above purposes. The invention further encompasses a method of preventing a portable handheld security device from being compromised. Various other features, objects, and advantages of the invention will be apparent from [Embodiment] Referring now to the drawings, the portable hand-held security device 1G of the present invention has a central processing unit 12' which is ideally a mobile processing unit such as an inw® • two entlum-tapping processor. The security device 1 also includes a memory storage device 14 that is in communication with the central processing unit 12. The memory storage device 14 desirably includes at least Hg) billions of bits (four) as shown and (10) cents, t hard disk space 15. The security device 1 also includes a power supply (not shown) that preferably has two battery packs for powering the security device 1" and "all components." For a rechargeable battery, each 7 battery can provide sufficient power after one charge to keep the device 若干 for several hours. The battery packs may also preferably be &quot;heat exchange&quot; without shutting down the device. .

103896-951218.doc 1307583 保全裝置ίο進一步包括輸入器件16。輸入器件16理想地 包括用於操縱保全裝置10及將資訊輸入保全裝置1〇中之使 用者介面控制及觸碰螢幕技術。如圖2所示,輸入器件16 之使用者介面控制之至少一部分較佳為自動兩手皆可靈活 操作(auto-ambidextrous)的,該自動兩手皆可靈活操作在 於,存在兩組使用者介面控制22及24。第一組使用者介面 控制22及第二組使用者介面控制24可單獨或同時由使用者 進行選擇性操作。換言之,使用者可選擇單一組使用者介 面控制22、24以適應左手或右手傾向,且獨立於另一組使 用者介面控制專門地使用該組使用者介面控制,或者若該 使用者係兩手皆可靈活操作的,則該使用者可選擇兩組使 用者介面控制22、24’並同時使用兩組。較佳地,保全裝 置1〇可感應使用者介面控制22、24中之哪一組先被使用者 觸碰並使該組使用者介面控制作為主要使用者介面控制 組’藉此允許使用者有意識或無意識地基於其(他或她)左 手或右手傾向而選擇單一組控制進行獨立操作。若兩组控 制在諸如2秒之預定時期内皆被使用者觸碰,則保全裝置 10允許料操作兩組㈣22、24以致制者可在輸入或操 縱中使用任一手。 保全裝置Π)亦包括-與中央處理單元㈣行通信之視訊 =㈣。該視訊顯示幕在包括明亮陽光之任何光照條件 ”、可凟的’其理想地為支持觸碰螢幕技術之“,,㈣ ^觸ί螢幕技術19允許使用者簡單地觸碰視訊顯示幕U 輸入貝訊或操縱保全裝置10。視訊顯示幕18亦較佳地支 103896-951218.doc103896-951218.doc 1307583 Security device ίο further includes an input device 16. The input device 16 desirably includes a user interface control and touch screen technique for manipulating the security device 10 and for entering information into the security device. As shown in FIG. 2, at least a portion of the user interface control of the input device 16 is preferably auto-ambidextrous, both of which are flexible in operation, and there are two sets of user interface controls 22 And 24. The first set of user interface controls 22 and the second set of user interface controls 24 can be selectively operated by the user individually or simultaneously. In other words, the user can select a single set of user interface controls 22, 24 to accommodate left or right handedness, and specifically use the set of user interface controls independently of another set of user interface controls, or if the user is both hands For flexible operation, the user can select two sets of user interface controls 22, 24' and use two groups at the same time. Preferably, the security device 1 感应 can sense which of the user interface controls 22, 24 is touched by the user first and the user interface interface is controlled as the primary user interface control group. A single group of controls is selected for independent operation based on its (his or her) left or right hand tendency, either consciously or unconsciously. If the two sets of controls are touched by the user for a predetermined period of time, such as 2 seconds, the security device 10 allows the two sets of (4) 22, 24 to operate so that either hand can be used in the input or manipulation. The security device Π) also includes - video communication with the central processing unit (4) = (4). The video display screen is in any lighting condition including bright sunlight, "the ideal one is to support the touch screen technology", (4) ^ Touch screen technology 19 allows the user to simply touch the video display screen U input Beixun or operate the security device 10. The video display screen 18 is also preferably supported 103896-951218.doc

9- ί S 1307583 持直接徒手繪圖輸入,從而允許使用者在視訊顯示幕18上 直接寫或繪圖以輸入資訊。舉例而言,使用者可在顯示於 視訊顯示幕18上之影像周圍繪製一圓,並為稍後之使用或 - 分配至其它使用者而儲存包括該圓之該影像。子母畫面顯 , 不(PlCtUre_ln_picture disPlay)較佳亦藉由該視訊顯示幕支 持。視訊顯不幕18在包括日光之任何光照條件中亦為可讀 的’以促進室内與室外中之使用。 亦提供與中央處理單元12通信之至少-攝影機38,其用 於提供保全裝置10之視訊能力。理想地,保全裝置具有 兩個數位攝影機38且可捕獲靜態影像及全動態(每秒2i訊 框與3〇訊框之間)視訊影像,且以每秒I至90訊框進行播 放。搖攝(panning)、變焦、快進、倒退、正常播放及暫停 ' 肖徵亦較佳藉由保全裝置10支持。攝影機38中至少-者理 、 。地可在紅外光中操作,攝影機中至少-者理想地可在 正常光及微光中操作。在正常光、微光及紅外光中所拍之 • *片可混合於相同之全動態視訊影像内,或使用者可在捕 獲影料在正常光模式、微光模式與紅外光模式之間進行 切換。每—攝影機理想地具有⑽萬像素解析度之最小 . I ’且尚達8小時之全動態視訊可理想地儲存於保全裝置 - 1G中本發明之視訊能力較佳亦包括至少-動畫專業團體 (MPEG)編碼器58及解碼器6〇。 且較,地’攝影機38中至少—者亦可充當條碼讀取器Μ。 具有可攜式手持視訊及為亦可用於讀取條碼及UPC碼之靜 ^攝景/機的能力係—優於依賴兩個或三個器件以完成相同 103896-951218.doc9- ί S 1307583 Direct hand drawing input, allowing the user to write or draw directly on the video display 18 to enter information. For example, the user can draw a circle around the image displayed on the video display screen 18 and store the image including the circle for later use or distribution to other users. The picture of the mother and the child is displayed, and not (PlCtUre_ln_picture disPlay) is preferably supported by the video display screen. Video display 18 is also readable in any lighting condition including daylight to promote use in both indoor and outdoor use. At least a camera 38 in communication with the central processing unit 12 is also provided for providing the video capabilities of the security device 10. Ideally, the security device has two digital cameras 38 and can capture still images and full dynamic (between 2i frames and 3 frames per second) video images, and play at I to 90 frames per second. Panning, zoom, fast forward, reverse, normal play and pause ' Xiao Zheng is also better supported by the security device 10. At least the camera 38 is in the sense of . The ground can be operated in infrared light, and at least one of the cameras is ideally operable in normal light and low light. The images taken in normal light, low light and infrared light can be mixed in the same full-motion video image, or the user can capture the shadow between normal light mode, low light mode and infrared light mode. Switch. Each camera is ideally capable of having a minimum resolution of (10) megapixels. I' and 8 hours of full dynamic video is ideally stored in the security device - 1G. The video capabilities of the present invention preferably also include at least - an animation professional body ( MPEG) Encoder 58 and Decoder 6〇. Moreover, at least one of the cameras 38 can also function as a bar code reader. The ability to have portable handheld video and static camera/machine that can also be used to read bar codes and UPC codes - better than relying on two or three devices to accomplish the same 103896-951218.doc

I 1307583 事件之先前系統的巨大優點。 . 保全裝置10亦包括與中央處理單元12通信之傳輸/接收 器件26及傳輸/接收器件28。傳輸/接收器件26及傳輸/接收 器件28可理想地使用諸如射頻(RF)無線網路卡之無線器件 30或諸如以太網路電纜連接之有線器件32安全地傳輸及接 收資訊。許多不同之無線區域網路(WLAN)可與保全裝置 10 —起使用’其包括(但不限於)8〇2 lla/b/g、8〇2 u &quot;super g&quot;、802.15.3a、全球行動通信系統,及通用封包無 &gt; 線電服務(GSM/GPRS)、3G、超寬頻、Bluet00thTM(藍 芽),及CDMA IX。保全裝置1〇亦可支持用於語音及資料 傳輸及接收之400/900 MHz及5·8 GHz之無線電。另外,保 全裝置10使用無線器件30理想地能夠在可用之通信網路訊 號之間進行選擇、判定在一給定時間哪一網路訊號為最佳 訊號,及在該4可用訊號之間進行自動切換以維持最佳接 收及傳輸品質。舉例而言,保全裝置1〇理想地具有中介軟 . 體(middleware),其量測各種網路卡之所接收訊號強度且 除非使用者選擇&quot;鎖定&quot;一特定源否則其可選擇最佳訊號。 若保全裝置10開始使用RF無線網路卡且遭遇干擾,則其可 在使用者未知已進行一改變的情況下無縫地切換至另一無 線傳輸模式。無論傳輸/接收器件26及傳輸/接收器件28被 啓用與否,保全裝置10亦可操作。換言之,保全裝置1〇亦 可作為單機單元進行操作。較佳地,當保全裝置1〇作為單 機單元進行操作時,其繼續尋找其可鑑認之無線或有線網 路。若此網路已定位,則保全裝置1〇將較佳地與相應網路 103896-951218.doc -11- 1307583 伺服器交換通關密碼(pass⑺㈣及資訊以自單機轉變至網 路操作。 保全裝置1G進—步包括—用於產㈣中央處理單元12通 信之超寬頻透地雷達34及/或毫米波雷達的器件… 地,保全裝置H)使用一已經修改以在較低電力較小版型 (SCaleVerSi°n)h作之超寬頻透地雷達單元或使用毫米波 雷達。傳統之超寬頻透地雷達單元通常用於無破壞地檢查 地面從而檢查埋藏於地下之物品,諸如管道、樹根及考古 學人工製品。超寬頻透地雷達通常亦用於檢查諸如橋及道 路之混凝土結構之内部組態。本發明之超寬頻透地雷達單 7034係用以定位及識別隱藏之物件,諸如封閉、非金屬容 器中之感興趣的物品。舉例而言,超寬頻透地雷達單元34 可用於在機場無破壞地檢查一件行李之内容。毫米波雷達 可用於無破壞地檢查經由美國海關及邊境巡邏埠而進入美 國之貨箱的内容。此檢查提供一有效方式以檢測行李或貨 箱中之内容以檢測感興趣之物品,諸如可引起保全風險之 物品。超寬頻透地雷達單元34可理想地在距經檢查之貨箱 或其它物品5米内操作,且可理想地穿透該貨箱或其它物 品多達10米。諸如全球定位系統44及傳輸/接收器件26及 傳輸/接收器件28之其它处源較佳不受超寬頻透地雷達單 元34之操作的影響。 保全裝置H)較佳亦包括射頻識別(Rfid)訊問器及讀取器 5〇。此等器件實質上通常為被動的。然而,藉由向本發明 提供訊問器及讀取器5〇,可提供對配備有相應a·標鐵之 I03896-951218.doc 1307583 人及材料的追蹤。 本發明之保全裝置1 〇亦理想地包括許多其它器件及能 力。較佳包括音訊能力,其包括諸如揚聲器之發聲器件40 及諸如包括麥克風之數位錄音器的錄音器件42。保全裝置 1〇中亦較佳提供全球定位系統44、映射系統、包括國家標 準與技術研究所(NIST)認可之指紋感應器的生物掃描儀 48、用於磁頭組及印表機之Bluet〇〇th™ RF鍵路5 1、條碼 讀取能力52、4個通用串列匯流排(USB)埠53、以太網路埠 及軟體鑑認系統。此外,保全裝置1〇較佳為完整之個人電 腦(PC) ’其運行於具有筆式(pen_based)擴展之Microsoft® χΡ作業系統上且支持語音、資料、視訊會議、電子郵件、I 1307583 The great advantages of the previous system of events. The security device 10 also includes a transmission/reception device 26 and a transmission/reception device 28 in communication with the central processing unit 12. The transmit/receive device 26 and the transmit/receive device 28 desirably securely transmit and receive information using a wireless device 30 such as a radio frequency (RF) wireless network card or a wired device 32 such as an Ethernet cable connection. Many different wireless local area networks (WLANs) can be used with the security device 10's including (but not limited to) 8〇2 lla/b/g, 8〇2 u &quot;super g&quot;, 802.15.3a, global Mobile communication systems, and general packet no &gt; line services (GSM/GPRS), 3G, ultra-wideband, Bluet00thTM (Bluetooth), and CDMA IX. The security device 1 also supports radios for 400/900 MHz and 5·8 GHz for voice and data transmission and reception. In addition, the security device 10, using the wireless device 30, is ideally capable of selecting between available communication network signals, determining which network signal is the best signal at a given time, and automatically between the 4 available signals. Switch to maintain optimal reception and transmission quality. For example, the security device 1 〇 ideally has intermediate software, which measures the received signal strength of various network cards and can select the best unless the user selects &quot;lock&quot; Signal. If the security device 10 begins to use the RF wireless network card and encounters interference, it can seamlessly switch to another wireless transmission mode if the user does not know that a change has been made. The security device 10 can also operate regardless of whether the transmission/reception device 26 and the transmission/reception device 28 are enabled or not. In other words, the security device 1 can also operate as a stand-alone unit. Preferably, when the security device 1 operates as a stand-alone unit, it continues to look for its identifiable wireless or wired network. If the network is already located, the security device 1 will preferably exchange the passcode (pass(7)(4) and information with the corresponding network 103896-951218.doc -11- 1307583 server to switch from the single machine to the network operation. Security device 1G The further steps include - the device for producing (4) ultra-wideband transmissive radar 34 and/or millimeter wave radar for communication by the central processing unit 12. Ground, security device H) using a modified version to be used in a lower power version ( SCaleVerSi°n)h is an ultra-wideband ground-penetrating radar unit or uses a millimeter-wave radar. Traditional ultra-wideband transflective radar units are commonly used to inspect the ground without damage to inspect items buried in the ground, such as pipes, roots and archaeological artifacts. Ultra-wideband ground-penetrating radars are also commonly used to check the internal configuration of concrete structures such as bridges and roads. The Ultra Wide Frequency Transmitting Radar Single 7034 of the present invention is used to locate and identify hidden objects, such as items of interest in closed, non-metallic containers. For example, the ultra-wideband transmissive radar unit 34 can be used to check the contents of a piece of baggage at the airport without damage. The millimeter-wave radar can be used to non-destructively inspect the contents of a container that enters the United States through US Customs and Border Patrol. This check provides an efficient way to detect the contents of the baggage or container to detect items of interest, such as items that can pose a risk of preservation. The ultra-wideband transmissive radar unit 34 is desirably operated within 5 meters of the inspected cargo box or other item and desirably penetrates the container or other item up to 10 meters. Other sources such as global positioning system 44 and transmission/reception device 26 and transmission/reception device 28 are preferably unaffected by the operation of ultra-wideband transmissive radar unit 34. The security device H) preferably also includes a radio frequency identification (Rfid) interrogator and a reader. These devices are generally passive in nature. However, by providing the interrogator and reader 5 of the present invention, tracking of I03896-951218.doc 1307583 persons and materials equipped with corresponding a. The security device 1 of the present invention also desirably includes many other devices and capabilities. Preferably, audio capabilities are included, including sound producing device 40 such as a speaker and recording device 42 such as a digital sound recorder including a microphone. The global positioning system 44, the mapping system, the biometric scanner 48 including the fingerprint sensor approved by the National Institute of Standards and Technology (NIST), and the Bluet〇〇 for the head group and the printer are also preferably provided in the security device. thTM RF Key 5 1 , Barcode Read Capability 52, 4 Universal Serial Bus (USB) 埠 53, Ethernet Router and Software Authentication System. In addition, the security device, preferably a complete personal computer (PC), operates on a pen-based extended Microsoft® operating system and supports voice, data, video conferencing, email,

Microsoft Office®標案、在Microsoft® XP作業系統下或在Microsoft Office® standard, under Microsoft® XP operating system or at

Microsoft® χρ作業系統上操作的任何軟體、表格產生及文 獻掃描。然而,應瞭解,本發明之保全裝置1〇可經組態以 運行於包括Linux、MacOS、Solaris及Unix之任何作業系 統上。 本發明之所有上述特徵理想地包含於較輕之手持外殼% 中,其足夠耐用以滿足根據軍事標準8〇1所進行之測試, 其為防水的且實際上能夠經受攝氏-30度至攝氏+50度之作 業温度範圍内的所有天氣條件及氣候。然而,本發明較佳 在不危及外殼56之環境密封完整性之&quot;發泡包裝&quot;組態55中 提供順應PCMCIA(個人電腦記憶體卡國際協會)標準M的 多個埠。 整個保全裝置1G亦理想地極輕,在包括電池的情況下較Any software, form generation, and document scanning performed on the Microsoft® 作业ρ operating system. However, it should be understood that the security device of the present invention can be configured to run on any operating system including Linux, MacOS, Solaris, and Unix. All of the above features of the present invention are desirably included in the lighter hand held casing %, which is sufficiently durable to meet the test according to Military Standard 8.1, which is waterproof and can withstand -30 degrees Celsius to Celsius + All weather conditions and climate within the operating temperature range of 50 degrees. However, the present invention preferably provides a plurality of ports conforming to the PCMCIA (Personal Computer Memory Card International Association) standard M in a &quot;foaming package&quot; configuration 55 that does not compromise the environmental sealing integrity of the outer casing 56. The entire security device 1G is also ideally extremely light, in the case of batteries

103896-951218.doc •13- 1307583 佳在2.5碎與4碎之間。使用一或兩個手可容易地載運及操 作手持式較輕無線保全裝置I可由(例如)運輸保全、運 輸作業、企業保全、教育保全、第一回應機組織、政府機 構、國防部及國土保全部中之人員容易地載運及使用保全 裝置10。 可以衆多方式使用本發明之保全裝置並將其用於衆多目 的,f因此本發明亦涵蓋使用該保全裝置之各種方法。舉 例=D,本發明涵蓋—用於識別封閉容器(諸如(但不限於) 機场處之订李袋或美國海關及邊境巡邏璋之貨箱)中感興 趣之物件的方法’以及一用於定位隱藏之生命形式(諸如 達反保,之個體或其它嫌疑者)的方法。本發明所涵蓋之 2顯著方法係-用於處理保全違反(諸如(但不限於)機場 處之保全違反)的方法。使用以下實例進-步描述該等方 法。 ^例厂識別封閉容器中感興趣之物件。識別封閉容器 中感興趣之物件的能. 的忐力係一重要保全問題。舉例而古,機 =全人員經常發現丢棄之行李袋。因為所丢棄行㈣可 L諸如炸彈之引起極為嚴重之保全風險的物品,故機場 人員必須極為小心地對待此行李。如今,機場人員具有三 個選擇來處理去棄之行李袋:撿起並移動該袋、自機場内 職機場外部呼叫後援幫助,或呼叫防爆小組。就= 前選擇中任一者而t,拖+日,„ 芘此等田 袋MM h °機%人貝必須在首先不知道關於該 衣之内谷之任何事件的情況下作出決定。 '、、、而使用本發明之保全裝置,機場人員可以超寬頻透 103896-951218.doc -14· 1307583 地雷達來掃描該袋並實時觀看該雷達所產生之影像以查看 δ亥袋中是否存在任何感興趣或關心之物件,尤指密集物 件。若不存在密集物件,則機場人員應能夠撿起該袋並將 其移至另一場所以進行乂射線及實體檢測。若存在密集物 件’則因為袋中存在感興趣或關心之物件,故機場人員接 著將知道其需要呼叫後援幫助或呼叫防爆小組。一旦後援 幫助到達,回應者將能夠查看雷達所產生之影像,從而給 予他們額外之資訊以決定如何最佳地繼續進行。 此相同之情況可能發生在其它場所,該等場所包括其它 運輸中心、辦公大樓、貿易及社會會議、體育事件、教育 地點、電廠及醫院。位於此等場所中任何場所之人員可容 易地載運用於類似情形中之本發明的保全裝置。對保全裝 置之此使用亦尤其適用於在美國海關及邊境巡邏埠處無破 壞地檢查貨箱中感興趣或關心之物件。 實例II:定位隱藏之生命形式。定位隱藏之生命形式亦 可為一重要保全措施。舉例而言,嫌疑者可試圖在大樓之 牆後面或拐角處(其中傳統監視設備不能查看到他)來躲藏 他的追蹤者。然而,本發明之保全裝置將能夠使用其至少 一攝影機之紅外能力查看到所隱藏之嫌疑者。使用者使用 紅外模式之攝影機可掃描其中嫌疑者可隱藏之區域並捕獲 該區域之紅外影像。若存在嫌疑者或任何其它生命形式, 則該紅外影像將產生一指示性的熱訊號。因此,若嫌疑者 隱藏於拐角處,則拐角區域之紅外攝影機影像將展示一熱 訊號,其指示一生命形式位於該拐角附近。此保全裝置特 103896-951218.doc -15- 1307583 t 徵可用於其中需要定位隱藏之個體或其它生命形式的任何 ' 情形。 實例III :處理保全違反。能夠充分處理保全違反係所 有保全地點中之保全人員的基本職能。舉例而言,幾乎每 天在世界上某地之機場,某人藉由不停留地穿過保全檢查 點而違反機場保全系統。如今,當此保全違反發生時,違 反個體之圖片通常被保全攝影機捕獲。當機場保全人員意 識到已發生違反時,他們通常發送(通常藉由在機場發出 &gt; 鍾鳴或閃爍選定之光)一訊息至機場中剩餘之保全人員以 向他們警示該違反。保全指令及控制中心接著通常藉由雙 向無線電而向所有保全人員描述該違反個體。然而,機場 中之一些場所可能不能夠充分接收雙向無線電訊號,且因 .此一些保全人員可能全部錯過該描述。此外,與視覺描述 或實際照片相反,對違反個體之口頭描述可能不精確或可 能太廣泛或太狹窄,從而使得機場保全難以定位及瞭解該 I 違反個體。若未瞭解該違反個體,則聯邦飛航管理局 (Federal Aviation Administration)及 / 或運輸安全局 (Transportation Safety Administration)要求清除機場終端以 .致可執行實體搜尋。此程序可將機場終端關閉若干小時, 其耗費上百萬美元之損失之稅收並延遲上百個航班。 然而,若機場保全人員載運根據本發明之保全裝置,則 快速定位及瞭解違反個體將容易得多。舉例而言,來自保 全攝影機之圖片可自保全指令及控制中心發送至由所有保 全人員載運之保全裝置。因此,所有保全人員將能夠查看 103896-951218.doc -16- 1307583 違反個體之真實圖片,而非依賴於口頭描述。亦可將反饋 自保全攝影機之視訊直接發送至由所有保全人員載運之保 全裝置以致保全人員可觀看在任何場所所拍之違反個體 的圖片,而非僅來自保全指令及控制中心。另外,一旦保 全人員發現一看起來像圖片中之人的個體,該保全人員可 使用保全裝置拍照並將該圖片發送至指令及控制中心及/ 或發送至载運保全裝置之其它人員,並確認他們已定位正 確之個體。使用保全裝置之生物掃描儀,保全人員亦可要 求該個體提供一指紋,保全裝置接著可將該指紋發送至 NIST伺服器以驗證該個體為他或她所自稱的人。 實例1V :證明可疑活動。在涉及潛在犯罪行為之情形 中,捕獲該活動中所涉及之人(多個人)為一事件。在法庭 獲得定罪為另一事件。用於此困難之一原因圍繞證據之本 質。在大多數情形中,證據係以確實性為理由(例如,數 位影像可能被人以大體上不可追蹤之方式存取相對簡單之 軟體而改變)而經受攻擊之&quot;過時&quot;之人證或視訊或靜態圖片 的形式。亦存在聲稱犯罪者之可驗證之身份的問題。使用 本發明’保全及法律強制人員具有獲取可疑行為之可可驗 證數位視訊及靜態圖片、進行肯定識別,及快速產生適當 文書工作的能力。 右本發明之使用者注意到一從事可疑活動之人,則可獲 取該所從事之人的數位靜態影像。當使用本發明獲取該影 像時,一水印被增加至圖片。該水印係增加至原始影像且 在應用典型壓縮演算法(例如,將圖片壓縮為jpg、Hf或gif 103896-951218.do. -17- .1307583 #式)之前°在靜態影像上提供該水印使得影像為不可改 變的且適用於作為法庭上之證據。若無水印,則數位影像 易於受到使用如Photosh〇P之此等軟體程式所進行之操作 的影響。因此,通常難以依賴普通之數位影像作為法庭上 ' 之證據。 若經監視之行為實質上為活動的,則獲取視訊之能力可 為有益的。當使用本發明獲取數位視訊時,亦增加一水 % 印。使用本發明之一攝影機來獲取較佳在H263標準中之原 始數位連續鏡頭(footage)e當獲取此連續鏡頭時,施加一 水印。此後,將該視訊較佳壓縮gmpeg格式。此方法為在 壓縮期間或壓縮之後施加水印之先前技術水印系統上之顯 著改良。此&quot;在水印期間或水印之後&quot;提供保全及可靠性之 • 量測,但缺乏本方法之絕對保全及可靠性。如同靜態影 • 像,該水印之存在使得視訊為不可改變的,且由於其應用 之方式’其在法庭上實際上為無懈可擊的。 • 除了能夠使用可允許之視訊及/或靜態影像捕獲可疑活 動之外,可採取各種其它驗證及證明。使用内建式Gps系 統,可疑活動之場所可與該活動之準確時間一起被精確地 ' 識別及記錄。可使用生物掃描儀立即對可疑或扣留之人進 - 行採指紋,且將彼等指紋與經授權人員之電路板上資料庫 進行比較或經由網際網路或其它網路與可無線存取之遠端 資料庫進行比較β 使用内建式表格產生器可將指紋、數位靜態影像、場所 及時間資料及其類似物全部記入預先存在或新建立之表格 103896-951218.doc •18- l3〇7583 中。此等表格使得可簡單及容易地完成逮捕及事件報告。 其亦使得關於可疑人物及活動之相關資訊更可能在可提供 關於該等可冑人物《活動之背#或其它資訊的I等人 間快速傳播。 實例VI :追蹤第一回應機。在法律強制及災難性情形中 之一困難在於保持對消防人員、警務人員、防爆小組及其 類似物之佈署的追蹤。若有人受傷、被困或失蹤,則時間 變得較為關鍵。本發明提供主動2RFID能力以使得在此等 情形中能夠保持對人物及物件之追蹤。舉例而言,每一消 防人員及警務人員可給定有一具有唯一碼之RFID標籤。武 器、炸藥及援救設備可給定有類似標籤。在其中咸信傷空 將降臨到一或多個人之情形(例如,大樓之一部分即將倒 塌)中,本發明允許使用者識別及定位每一經標記之人或 每一件經標記之設備,以便向他們警告特定之危險或在他 們不能返回安全地之事件中安裝援救。此係藉由使用主動 RFID以定位及識別人或物,且以圖表向其展示或在手持裝 置之榮幕上進行展不而完成。 本發明之主動RFID系統亦可用於秘密追蹤感興趣之行李 或其它物品。可將小RFID標蕺置放於經由本發明之手持裝 置監控之物品及其場所上。因此,若一件經標記之行李停 止於其不應停止之某處,則該事實可立即被注意到且將追 蹤回其行進歷史。 本發明進一步涵蓋一用於使用保全封鎖系統而防止危及 保全裝置之方法。防止危及裝置係裝置之一重要功能,此 103896-951218.doc •19- 1307583 係由於其幫助確保了該裝置僅可由經授權使用其之彼等人 使用。理想地,在保全地點處之保全人員指令及控制中心 將提供一具有記錄或鑑認保全裝置之時限的經授權個體。 若該時限在該經授權之個體記錄或鑑認之前終止,則保全 裝置上之顯示幕理想地變黑且出現一諸如&quot;請等待&quot;之無害 訊息。麥克風、錄音器件、攝影機及全球定位系統或其它 場所感應器係理想地啓動以致保全指令及控制中心可定位 保全裝置,以及查看並聽到保全裝置所記錄之任何事,以 使得若該裝置由具有邪惡意圖之人獲取時,則可在他們不 知道之情況下監控其活動。 使用作為本發明之一部分的軟體,同本發明一起使用之 網路的管理員以及使用手持裝置之個體可判定何時進行欺 騙、掃描或侵入裝置或網路的努力。當偵測到此性質之攻 擊時’此偵測系統提供兩個主要選擇。第一選擇為識別攻 擊並使其停止。然而’若該攻擊看起來來自已知或嫌疑 ,源、’則軟體接著可㈣攻擊相致該攻擊者認為其正存取 真實系統。在此等狀況下,可提供假資訊以誤導或危及該 攻擊者。 儘管已參看較佳實施例描述了本發明,但應瞭解,本發 月並非用以限於上述之特定實施例。應認識到熟習此項技 術者將瞭解,在不偏離本發明之精神或意圖的情況下可進 行某些替代、變化、修改及省略。因此,前文之描述意味 著僅為例示性的,應將本發明理解為包括本發明之主題的 所有適當等效物’且不應限制本發明之範嘴。 103896-951218.doc -20 - !3〇7583 【圖式簡單說明】 圖1為說明本發明之設備之—較佳實施例的方塊圖 圖2為本發明之設備之一較佳實施例的前視圖。 圖3為本發明之設備之一較佳實施例的後視圖。 圖4為本發明之設備之一較佳實施例的侧視圖。 【主要元件符號說明】 10 可攜式手持保全裝置 12 中央處理單元 14 記憶體儲存器件 15 硬碟機空間 16 輸入器件 18 視訊顯示幕 19 觸碰螢幕技術 22 第一組使用者介面控制 24 第一組使用者介面控制 26 傳輸/接收器件 28 傳輸/接收器件 30 無線器件 32 有線器件 34 超寬頻透地雷達單元 38 攝影機 40 發聲器件 42 錄音器件 44 全球定位系統 103896-951218.doc •21- V1307583 50 訊問器及讀取器 51 Bluetooth™ RF鍵路 52 條碼讀取器 53 USB埠 54 PCMCIA標準 55 ”發泡包裝”組態 56 外殼 58 MPEG編碼器 60 MPEG解碼器 103896-951218.doc -22-103896-951218.doc • 13- 1307583 Good between 2.5 and 4 broken. Easily carry and operate handheld lighter wireless security devices using one or two hands. I can, for example, transport security, transportation operations, corporate security, education preservation, first responder organizations, government agencies, the Department of Defense, and homeland security All of the personnel can easily carry and use the security device 10. The security device of the present invention can be used in a wide variety of ways and used for a variety of purposes, and thus the present invention also encompasses various methods of using the security device. Example = D, the present invention encompasses - a method for identifying objects of interest in a closed container such as, but not limited to, a bag at an airport or a container for US Customs and Border Patrol, and one for A method of locating hidden life forms (such as anti-insurance, individuals or other suspects). The 2 significant methods covered by the present invention are methods for handling preservation violations such as, but not limited to, security violations at airports. These methods are described step by step using the following examples. ^ The factory identifies objects of interest in the closed container. Identifying the energy of an object of interest in a closed container is an important preservation issue. For example, the old machine, the whole person often found the discarded duffel bag. Because the discarded line (4) can be used for items such as bombs that pose a very serious risk of preservation, airport personnel must treat the baggage with great care. Today, airport personnel have three options to dispose of the duffel bag: pick up and move the bag, call back help from the airport's internal airport, or call the explosion-proof team. = = before the choice and t, drag + day, „ 芘 田 田 田 MM MM % % % % % % 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 必须 % 必须 必须By using the security device of the present invention, the airport personnel can scan the bag with an ultra-wide frequency transmission 103896-951218.doc -14·1307583 ground radar and view the image generated by the radar in real time to see if there is any feeling in the δHai bag. An object of interest or concern, especially a dense object. If there are no dense objects, the airport personnel should be able to pick up the bag and move it to another location for ray and physical inspection. If there are dense objects, then because of the bag There are objects of interest or concern, so the airport personnel will then know that they need to call back to help or call the explosion-proof team. Once the backup help arrives, the respondent will be able to view the images produced by the radar, giving them additional information to decide how best The continuation of this situation may occur in other locations, including other transportation centers, office buildings, trade and social meetings. Sports events, educational locations, power plants, and hospitals. Personnel located at any location in such locations can easily carry the security device for the present invention in a similar situation. This use of the security device is also particularly applicable to US Customs and Borders. The patrol is inspecting the objects of interest or concern in the container without damage. Example II: Positioning hidden life forms. Positioning hidden life forms can also be an important preservation measure. For example, suspects can try to build in the building. Behind the wall or at the corner (where traditional surveillance equipment cannot see him) to hide his followers. However, the security device of the present invention will be able to view the hidden suspects using the infrared capabilities of at least one of its cameras. The infrared mode camera scans the area where the suspect can hide and captures the infrared image of the area. If there is a suspect or any other life form, the infrared image will generate an indicative thermal signal. Therefore, if the suspect is hidden At the corner, the infrared camera image in the corner area will display a thermal signal, which means A life form is shown near the corner. This security device 103896-951218.doc -15- 1307583 t can be used for any situation where it is necessary to locate hidden individuals or other life forms. Example III: handling preservation violations. Handling security breaches the basic functions of security personnel in all security locations. For example, almost every day at an airport in the world, someone violates the airport security system by not passing through the security checkpoint. When this security violation occurs, the image of the individual violation is usually captured by the security camera. When the airport security personnel realize that a violation has occurred, they usually send a message (usually by sending an > chime or flashing selected light at the airport) to The remaining security personnel in the airport are to alert them to the violation. The security order and control center then typically describes the violation individual to all security personnel by two-way radio. However, some locations in the airport may not be able to adequately receive two-way radio signals, and because some of these security personnel may have missed the description. Furthermore, contrary to visual descriptions or actual photographs, verbal descriptions of violations of individuals may be inaccurate or may be too broad or too narrow, making it difficult to locate and understand that the I violates the individual. If the individual is not known, the Federal Aviation Administration and/or the Transportation Safety Administration require the removal of the airport terminal to enable an entity search. This procedure shuts down the airport terminal for several hours, which costs millions of dollars in lost taxes and delays hundreds of flights. However, if the airport security personnel carry the security device in accordance with the present invention, it will be much easier to quickly locate and understand the violation of the individual. For example, a picture from a security camera can be sent from a security order and control center to a security device that is carried by all security personnel. Therefore, all security personnel will be able to view 103896-951218.doc -16- 1307583 in violation of the actual picture of the individual, rather than relying on the verbal description. Feedback from the self-contained camera can also be sent directly to the security device carried by all security personnel so that the security personnel can view images of individual violations taken at any location, not just the security order and control center. In addition, once the security personnel finds an individual who looks like a person in the picture, the security personnel can take a picture with the security device and send the picture to the command and control center and/or to other personnel carrying the security device and confirm They have positioned the right individual. Using the biometric scanner of the security device, the security personnel may also require the individual to provide a fingerprint, which the security device can then send to the NIST server to verify that the individual is the person he or she claims to be. Example 1V: Proving suspicious activity. In the case of a potential criminal act, capturing the person (multiple persons) involved in the activity is an event. The conviction was obtained in court for another incident. One reason for this difficulty revolves around the nature of the evidence. In most cases, the evidence is based on the authenticity (for example, a digital image may be altered by a relatively unobtrusive way to access a relatively simple piece of software) and is subject to an attacked &quot;outdated&quot; Video or still picture. There is also the issue of claiming the verifiable identity of the perpetrator. The use of the present invention 'security and legal enforcement personnel has the ability to obtain suspicious behavior of cocoa to verify digital video and still pictures, to perform positive identification, and to quickly generate appropriate paperwork. The user of the present invention, on the other hand, notices that a person who is engaged in suspicious activity obtains a digital still image of the person he is engaged in. When the image is acquired using the present invention, a watermark is added to the picture. The watermark is added to the original image and is provided on the still image before applying a typical compression algorithm (eg, compressing the image to jpg, Hf, or gif 103896-951218.do. -17-.1307583 #) The image is immutable and is suitable for use as evidence in court. Without a watermark, digital images are susceptible to operations performed using such software programs as Photosh〇P. Therefore, it is often difficult to rely on ordinary digital images as evidence in court. The ability to acquire video can be beneficial if the monitored behavior is substantially active. When digital video is acquired using the present invention, a water mark is also added. A camera of the present invention is used to obtain an original digital footage that is preferably in the H263 standard. When the continuous lens is acquired, a watermark is applied. Thereafter, the video is preferably compressed in the gmpeg format. This method is a significant improvement over prior art watermarking systems that apply watermarks during or after compression. This &quot;provides security and reliability during the watermark or after the watermark, but lacks the absolute preservation and reliability of this method. Like a static image, the presence of the watermark makes the video unchangeable, and because of the way it is applied, it is virtually impeccable in court. • In addition to being able to capture suspicious activity using permissible video and/or still images, various other verifications and certifications are available. With the built-in Gps system, locations of suspicious activity can be accurately 'identified and recorded along with the exact time of the event. Biometric scanners can be used to immediately fingerprint suspected or detained persons and compare their fingerprints to the authorized personnel's on-board database or via the Internet or other networks with wireless access. Remote database for comparison β Use the built-in form generator to record all fingerprints, digital still images, location and time data and their analogues into pre-existing or newly created forms 103896-951218.doc •18- l3〇7583 in. These forms make it easy and easy to complete arrests and incident reports. It also makes it possible for information about suspicious people and activities to be more likely to spread quickly among I, who can provide information about such awkward characters, activities, or other information. Example VI: Tracking the first responder. One of the difficulties in legally mandated and catastrophic situations is the maintenance of tracking of the deployment of firefighters, police officers, explosion-proof panels and their analogues. If someone is injured, trapped or missing, time becomes more critical. The present invention provides active 2 RFID capabilities to enable tracking of people and objects in such situations. For example, each firefighter and police officer can be given an RFID tag with a unique code. Weapons, explosives and rescue equipment can be given similar labels. In the case where it is said that one or more people will fall to one or more people (for example, one of the buildings is about to collapse), the present invention allows the user to identify and locate each marked person or each marked device in order to They warn of specific dangers or install rescues in the event that they cannot return to safety. This is accomplished by using active RFID to locate and identify people or objects and present them on a chart or on the glory of a handheld device. The active RFID system of the present invention can also be used to secretly track baggage or other items of interest. Small RFID tags can be placed on items and their locations monitored by the handheld device of the present invention. Thus, if a marked baggage is stopped somewhere it should not stop, the fact can be immediately noticed and will be traced back to its travel history. The invention further encompasses a method for preventing the use of a security lockout system to compromise a security device. To prevent the jeopardization of one of the important functions of the device, this 103896-951218.doc • 19-1307583 is because it helps to ensure that the device can only be used by those who are authorized to use it. Ideally, the security personnel order and control center at the security location will provide an authorized individual with a time limit for recording or authenticating the security device. If the time limit is terminated before the authorized individual records or authenticates, the display screen on the security device desirably turns black and a harmless message such as &quot;Please wait&quot; appears. Microphones, recording devices, cameras, and global positioning systems or other location sensors are ideally activated so that the command and control center can locate the security device and view and hear anything recorded by the security device so that if the device is evil When the intended person gets it, they can monitor their activity without their knowledge. Using software as part of the present invention, the administrator of the network used with the present invention and the individual using the handheld device can determine when to engage in fraud, scanning or intrusion into the device or network. This detection system provides two main options when an attack of this nature is detected. The first choice is to identify the attack and stop it. However, if the attack appears to be from a known or suspected source, then the software can then (4) attack the attacker who believes that it is accessing the real system. In such cases, false information may be provided to mislead or endanger the attacker. Although the present invention has been described with reference to the preferred embodiments, it should be understood that the present invention is not limited to the specific embodiments described above. It will be appreciated that those skilled in the art will appreciate that certain substitutions, changes, modifications and omissions may be made without departing from the spirit and scope of the invention. Accordingly, the description of the present invention is intended to be illustrative, and the invention is intended to be BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram showing a preferred embodiment of the apparatus of the present invention. FIG. 2 is a front view of a preferred embodiment of the apparatus of the present invention. view. Figure 3 is a rear elevational view of a preferred embodiment of the apparatus of the present invention. Figure 4 is a side elevational view of a preferred embodiment of the apparatus of the present invention. [Main component symbol description] 10 Portable handheld security device 12 Central processing unit 14 Memory storage device 15 Hard disk space 16 Input device 18 Video display screen 19 Touch screen technology 22 First group user interface control 24 First Group user interface control 26 Transmitting/receiving device 28 Transmitting/receiving device 30 Wireless device 32 Wired device 34 Ultra-wideband transmissive radar unit 38 Camera 40 Sounding device 42 Recording device 44 Global Positioning System 103896-951218.doc • 21- V1307583 50 Interrogator and Reader 51 BluetoothTM RF Key 52 Barcode Reader 53 USB埠54 PCMCIA Standard 55 “Foam Package” Configuration 56 Enclosure 58 MPEG Encoder 60 MPEG Decoder 103896-951218.doc -22-

Claims (1)

】3〇7蠢财1加96號專利申請案 中文申請專利範圍替換本(96年η月) 十、申請專利範園: 1. 一種可攜式手持保全裝置,包含: 輸入益件’用以操作該保全裝置或輪人資訊至該保 全裝置; 一記憶體儲存器件,用以儲存資訊; :少-攝影機,用以提供該保全裝置之視訊能力; 事輸/接收益件,用以在可用之通信網路訊號之 選擇; 雷達器件’用以定位隱藏物件及產生該隱藏物件之 …μ顯不孩隱臧物件之該影像;及 中央處理單元,其與該記憶體儲存器件、該視訊薄 雷達機、該傳輸/接收11件、該輸人11件以及驾 雷f&quot;件進行通信,以執行該保全運作。 離視:項1之保全裝置’其中該保全裝置包括數仅全ί 態1訊及靜態營幕影像捕獲、記錄及處理。 ' 3. 如叫求項1之保令驻里 件及-錄音器件/,其中該保全裳置包括—發聲i 4. 如吻求項i之保全裝置 描儀。 〒这保王攻置包括-生物击 5. 6. 如請求項1之保全裝置 能力。 如請求項1之保全裴置 別讀取器及訊問器。 其中該保全裝置包括條碼讀取 其中該保全裝置包括1頻識 103896-961105.doc 1307583 7·如請求Jg , 頁1之保全裝置,复中 位系統。 〃、中該保全裝置包括-全球定 8 ·如請求項1 幕。 ’、置,其中該視訊顯示幕為— 9.如清求項1之保全 手緣圖輪心、、、巾該視訊顯示幕支持 1 〇.如請求項1 攝影機,?小_ m旦/ U •二私 ( 夕—攝衫機具有以紅外光捕 之保全裝置,其中該命洁哭^^必 地雷達D f °亥田達器件為-超寬頻透 12.如請求項1之保全 觸碰螢 直接徒 之保全裝置,其中該保全裝 少一摄马攙曰4 L 3兩個數位 η·如請求項卜一 有以紅外光捕獲影像之能力 達。 褒置’其中該雷達器件為 米波雷 13.如請求項1之保全裝置,其中 該雷達器件為超寬頻透地 雷達及毫米波雷達。 14·種可攜式手持保全裝置,包含·· 一輸入器件,用以操作該保全裝置或輸入資 全裝置; 訊至該保 一記憶體儲存器件,用以儲存資訊; 一攝影機,用以提供該保全裝置之視訊能力; 傳輪/接收器件,用以在可用之通信網路信號之間進 行選擇; 一雷達器件,用以定位隱藏物件及產生該隱藏物件之 影像;· 一視訊顯示幕,用以顯示該隱藏物件之該影像;及 103896-961105.doc 1307583 _中央處理單元,其與該記憶體儲存器件、該視訊顯 不幕、該攝影機、該傳輸/接收器件、該輸入器件及該雷 達器件進行通信,以執行該保全運作, 15. -中該傳輸/接收n件進―步能夠判定在—給定時間時 哪一個網路訊號為最佳訊號,及在該等可用之訊號之間 進行自動切換韓持最佳接收及傳輸品質。 士 π求項14之保全裝置,其中該保全裝置包括一保全封 ’其包含: 輸入器件’用以操作該保全裝置或輸入資訊 全裝置; 16. 如請求項14之保全裝置, 網路連接上。 17. 如請求項14之保全裝置, 器件,該保全裝置皆運作 18·如請求項14之保全裝置, 810F所進行之測試。 19.種可攜式手持保全裝置 其中傳輸及接收發生在一網際 其中無論是否啓用該傳輸/接收 〇 其中該裝置滿足根據軍事標準 一 §己憶體儲存器件,用以儲存資訊; 一攝影機’用以提供該保全裝置之視訊能力,· 間進 一傳輸/接收器件,用以在可用之通信網路信號之 行選擇; 取义 之 影「象雷達器件’用以定位隱藏物件及產生該隱藏物件 及 一視訊顯示幕,用以顯示該隱藏物件之該影像; 103896-961105.doc 1307583 一中央處理單元’其與該記憶體儲存器件、該視訊顯 示幕、該攝影機、該傳輪/接收器件'—輪入器件及該雷 達器件進行通信,以執行該保全運作, 其中該輸入器件具有一第一組使用者介面控制及一第 ,組使用者介面控制,且該第一組使用者介面控制及該 第二組使用者介面控制可單獨或同時由使用者進行選擇 性操作。 2〇·如請求項19之保全裝置,其中該視訊顯示幕為一觸碰螢 幕。 21.如請求項19之保全裝置,其中該視訊顯示幕支持直接徒 手繪圖輸入。 22_ —種可攜式手持保全裝置,其包含·· 入^人器件,用以操作該保全I置或輸人資訊至該保 全裝置; ’用以儲存資訊;】3〇7 stupid wealth 1 plus 96 patent application Chinese patent application scope replacement (96 years η month) X. Application for patent garden: 1. A portable handheld security device, including: Operating the security device or wheeler information to the security device; a memory storage device for storing information; a camera-less device for providing video capabilities of the security device; The selection of the communication network signal; the radar device 'is used to locate the hidden object and the hidden object ... the image of the hidden object; and the central processing unit, the memory storage device, the video thin The radar machine, the transmission/reception of 11 pieces, the input of 11 pieces, and the driving and f&quot; pieces communicate to perform the security operation. Deviation: Item 1's security device', where the security device includes only a full number of messages and static scene capture, recording and processing. 3. 3. For the protection of the item 1 and the - recording device /, the security of the singer includes - vocal i 4. Such as the protection of the item i. 〒 This Guardian attack includes - Biohit 5. 6. As requested in Item 1, the security device capability. If the protection of claim 1 is set, the reader and the interrogator are set. Wherein the security device includes a bar code reading, wherein the security device includes 1 frequency identification 103896-961105.doc 1307583 7 · such as requesting Jg, page 1 security device, complex median system. 〃, 中中保全装置 includes - Globally 8 · as requested. ', set, where the video display screen is - 9. If the protection of item 1 is complete, the hand wheel, the wheel, the video display screen support 1 〇. If the request item 1 camera,? Small _ m dan / U • two private ( 夕 摄 摄 具有 具有 具有 具有 具有 具有 具有 具有 具有 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 摄 红外Item 1's security touches the firefly directly to protect the device, in which the security is less than one camera. 4 L 3 two digits η · If the request item has the ability to capture images with infrared light. The radar device is Mipolei 13. The security device of claim 1, wherein the radar device is an ultra-wideband transmissive radar and a millimeter wave radar. 14. A portable handheld security device, including an input device, To operate the security device or input the full device; to the security memory storage device for storing information; a camera for providing the video recording capability of the security device; and a transmitting/receiving device for being available Selecting between communication network signals; a radar device for locating hidden objects and generating an image of the hidden object; a video display screen for displaying the image of the hidden object; and 103896-961105.doc 1307583 _ a central processing unit that communicates with the memory storage device, the video display, the camera, the transmission/reception device, the input device, and the radar device to perform the security operation, 15. - the transmission/ Receiving n pieces of steps can determine which network signal is the best signal at a given time, and automatically switch between the available signals to achieve the best reception and transmission quality. The security device, wherein the security device comprises a security device comprising: an input device for operating the security device or inputting a full device; 16. the security device of claim 14 is connected to the network. The security device of item 14, the device, and the security device are all operated. 18. The security device of claim 14 is tested by 810F. 19. A portable handheld security device in which transmission and reception occur on an internet connection, whether enabled or not. The transmission/reception device wherein the device satisfies a military standard according to a military standard for storing information; a camera 'to provide the security The video capability of the device, • a transmission/reception device for selecting the line of available communication network signals; the image of the image “like radar device” for locating hidden objects and generating the hidden object and a video display screen For displaying the image of the hidden object; 103896-961105.doc 1307583 a central processing unit 'and the memory storage device, the video display screen, the camera, the transmission/receiving device' - the wheeled device and The radar device communicates to perform the security operation, wherein the input device has a first set of user interface controls and a first, user interface control, and the first set of user interface controls and the second set of uses The interface control can be selectively operated by the user individually or simultaneously. 2. The security device of claim 19, wherein the video display screen is a touch screen. 21. The security device of claim 19, wherein the video display screen supports direct hand drawing input. 22_ - a portable handheld security device, comprising: a user device for operating the security I or input information to the security device; 'for storing information; 一記憶體儲存器件 至少一攝影機,用 —傳輸/接收器件, 行選擇; 以提供該保全裝置之視訊能力; 用以在可用之通信網路信號之間進 一雷達器件 影像; 用以定位隱藏物件及產生該隱藏物件之 一視訊顯示篇_,EB„ 用以顯示該隱藏物件之該影像;及 干軍元’其與該記憶體儲存器件、該視訊顯 不幕、该攝影機、却 器件進行#,^ 收11件、該輸人11件該雷達 ° ^執行該保全運作,·及 103896-961105.doc 1307583 ;為視訊及靜態影像印水印以安全地證明所選活動 之構件。 23.如睛^項22之保全|置’其中該傳輸/接收器件進一步能 夠判,在一給定時間時哪一個網路訊號為最佳訊號,及 等可用訊號之間進行自動切換以維持最佳接收及傳 輸品質。 24. 如請求項22之保全裝置,其中該輸入器件具有—第一組 使用者介面控制及—第:組使用者介面控制,且其中該 第一組使用者介面控制及/或該第二組使用者介面控制係 基於-預定時期内之使用者選擇而自動啓動。 25 如請求項22之保全裝置,其中該保全裝置包括—保全封 鎖系統。a memory storage device having at least one camera, a transmission/reception device, and a line selection; to provide video capabilities of the security device; to input a radar device image between available communication network signals; to locate hidden objects and Generating a video display of the hidden object _, EB „ is used to display the image of the hidden object; and the dry military element 'and the memory storage device, the video is not displayed, the camera, but the device is carried out #, ^ Receive 11 pieces, the input 11 pieces of the radar ° ^ perform the security operation, and 103896-961105.doc 1307583; watermark for video and still images to securely prove the components of the selected activity. The security of item 22 is set to "where the transmission/reception device is further capable of determining which network signal is the best signal at a given time, and automatically switching between available signals to maintain optimal reception and transmission quality. 24. The security device of claim 22, wherein the input device has a first set of user interface controls and a: group user interface control, and wherein A set of user interface controls and / or the second set of user interface control is based on - a user selection within a predetermined period automatically start the security device 25, such as a request item 22, wherein the security device comprises - blockade preservation system. 如請求項22之保全裝置’其中傳輸及接收發生於一能夠 在複數個無線區域網絡上運作之無線器件上。 如請求項22之保全裝置,其中傳輸及接收發生在一網際 網路連接上。 28. 如請求項22之保全裝置,其中無論是否啓用該傳輸/接收 Is件’該保全震置皆運作。 29. 如請求項22之保全裝置,其中該裝置滿足根據軍事標準 8 1 0F所進行之測試。 30·如請求項22之保全裝置,其進一步包含至少—pcMciA 埠,該至少一 PCMCIA埠並不危及該保全裝置與軍事標 準810F的順應性。 3 1 ·如請求項22之保全裝置,其進一步包含一電源,其申該 103896-961105.doc 1307583 電源為一能夠保持一多達8小時之電荷的電池。 32,如請求項22之保全裝置,其中該保全裝置包括數位全動 悲視訊及靜態螢幕影像捕獲、記錄及以水印進行的處 理。 如請求項22之保全裝置 攝影機具有以紅外光捕獲影像之能力。 其中該雷達器件為超寬頻透地 3 3 .如凊求項22之保全裝置 件及一錄音器件。 34. 如凊求項22之保全裝置 描儀。 35. 如睛求項22之保全裝置 能力。 3 6 ·如請求項22之保全裝置 別讀取器及訊問器。 37_如凊求項22之保全裝置 位系統。 3 8 ·如清求項2 2之保全裝置 統。 39.如請求項22之保全裝置 幕。 4〇.如請求項22之保全農置 徒手繪圖輸入。 41. 攝影機,至少 4 2.如請求項2 2之保全裝置 雷達。 其中該保全裝置包括一發聲器 其中該保全裝置包括一生物掃 其中該保全裝置包括條碼讀取 其中該保全裝置包括一射頻識 其中該保全裝置包括一全球定 其中5亥保全裝置包括一映射系 其中該視訊顯示幕為一觸碰螢 其中該視訊顯示螢幕支持直接 其中該保全裝置包含兩個數位 103896-961105.doc 1307583 43.如請求項22之保全裝置,其中該雷達器件為毫米波雷 達。 田 44·如請求項22之保全裝置,其中該雷達器件為超寬頻透地 雷達及毫米波雷達。 45·如請求項22之保全裝置,其中該裝置進一步包括—用於 選擇性產生表格之表格產生器。 ; 46.如請求項22之保全裝置,進一步包含用於偵測侵入、欺 編或掃描之構件。 7·如明求項22之保全裝置’進一步包含一 rfid訊問器 取器。 ° 饥-種用於識別封閉容器中感興趣之物件的方法該方法 包含: 存器件進行通信之中央處理單元、—視訊顯示幕、一輸 器件|源’及一用於產生用以定位隱藏物件之超 寬頻透地雷達或宅米波雷達及在該視訊顯示幕上產生該 等隱藏物件之影像的器件; 在該封閉容器上固持該可攜式保全裝置; 啓動該用於產生雷達之器件; 在該視訊顯示幕上顯示藉 稽由5亥用於產生雷達之器件而 產生的該景》像;及 觀看感興趣之物件之該影像。 49· 一種用於定位隱藏 提供了u ”夕式的方法’該方法包含: 緹供一可攜式手持保全裝 置其具有一與一記憶體儲 103896-961105.docThe security device of claim 22 wherein transmission and reception occurs on a wireless device capable of operating over a plurality of wireless area networks. The security device of claim 22, wherein the transmission and reception occur on an internet connection. 28. The security device of claim 22, wherein the security is operational regardless of whether the transmission/reception Is enabled. 29. The security device of claim 22, wherein the device satisfies a test conducted in accordance with military standard 810F. 30. The security device of claim 22, further comprising at least - pcMciA 埠, the at least one PCMCIA 埠 does not compromise the compliance of the security device with the military standard 810F. 3 1 . The security device of claim 22, further comprising a power source, wherein the power source is a battery capable of maintaining a charge of up to 8 hours. 32. The security device of claim 22, wherein the security device comprises digital full-motion sneak video and static screen image capture, recording, and processing with a watermark. The security device of claim 22 has the ability to capture images with infrared light. The radar device is ultra-wideband transmissive 3 3 , such as the security device of claim 22 and a recording device. 34. For the protection device of item 22. 35. If you are looking for the ability to secure the device. 3 6 • The security device of claim 22 is a reader and interrogator. 37_If the request is 22, the security device is a bit system. 3 8 · The security device of the item 2 2 is cleared. 39. The security device of claim 22. 4〇. As requested in item 22, the conservative farmer's hand drawing input. 41. Camera, at least 4 2. As requested in item 2 2, the security device radar. Wherein the security device comprises a sounder, wherein the security device comprises a biological scan, wherein the security device comprises a barcode reading, wherein the security device comprises a radio frequency identification, wherein the security device comprises a global device, wherein the security device comprises a mapping system The video display screen is a touch firefly, wherein the video display screen supports directly. The security device includes two digits 103896-961105.doc 1307583. 43. The security device of claim 22, wherein the radar device is a millimeter wave radar. Field 44. The security device of claim 22, wherein the radar device is an ultra-wideband transmissive radar and a millimeter wave radar. 45. The security device of claim 22, wherein the device further comprises - a table generator for selectively generating a form. 46. The security device of claim 22, further comprising means for detecting intrusion, deception, or scanning. 7. The security device of claim 22 further includes an rfid interrogator. ° hunger - a method for identifying objects of interest in a closed container. The method comprises: a central processing unit for communicating devices, a video display screen, a transmission device, a source, and a device for generating hidden objects. An ultra-wideband transmissive radar or a home meter wave radar and a device for generating an image of the hidden object on the video display screen; holding the portable security device on the closed container; and starting the device for generating a radar; Displaying the image of the scene generated by the device used to generate the radar by 5 hai on the video display screen; and viewing the image of the object of interest. 49. A method for locating and hiding provides a u-style method. The method comprises: 缇 for a portable handheld security device having one and one memory storage 103896-961105.doc 51. 使用該可攜式手持保全裝置來捕獲該感 物品之一視訊影像;及 1307583 存器件進行通信之中央處理單元、一視訊顯示幕、具有 紅外能力之至少一攝影機、一輸入器件及一電源; 固持a亥可攜式保全裝置使該攝影機面向一其中可隱藏 一生命形式之區域; 啓用該攝影機之紅外能力; 以該可攜式手持保全裝置掃描該區域以藉由該攝影機 捕獲該區域之紅外影像; 在該視訊顯示幕上顯示該等紅外影像;及 觀看該等紅外影像以觀看一自-生命形式而產生之熱 訊號。 5〇. 一種用於處理一保全違反之方法,該方法包含: 傳輸一包括一感興趣之個體或物品之影像的訊號; η提供至少-可攜式手持保全裝置,其具有一中央處理 單兀、-記憶體儲存器件、一視訊顯示幕、一接收器 件、一輸入器件及一電源; η 在該等可攜式手持保全裝置中每-者上接收該訊號 在該等可攜式手持保全裝置上觀看該等影像;及 使用該等影像以定位該感興趣之個體或物品。 如請求項5〇之方法,進-步包含以下步驟: 興趣之個體或 52. 將該視訊影像傳輸至至少 之個體或物品的身份。 如請求項50之方法,進一步 一接收器件以確定該感興趣 包含以下步驟: 103896-961105.doc 1307583 使用該可攜式丰姓 丁#保全裝置來捕獲該感興趣之個體或 物品之一靜態螢幕影像;及 將該靜態螢幕影德 像傳輸至至少一接收器件以確定該感 興趣之個體或物品的該身份。 ‘ 士 °月求項52之方法,其中該等接收II件中至少-者包括 可搞式手持保全裝置。 54· —種用於防止一可擇々# # 揭式手持保全裝置妥協之方法,該方 法包含: 提七、具有#a令及控制中心之網路系統; 提供與该指令及控制中心進行通信之可攜式手持保 全裝置’該可攜式手持保全系統具有一與一記憶體儲存 器件進行通信之中央處理單元、至少—攝影機、—錄音 器件、一傳輸/接收器件、一銓 生 曰 及-電源; 輸入器件、一全球定位系統 提供用於使用該可攜式手持保全裝置來記錄該網路夺 統之構件; 糸 施加—時限至該用於記錄該網路系統之構件; 啓動該用於產生影像之攝影機、該用於記錄聲音 音器件,及該用於在該時限於滿足制於記錄該二_ 統之構件之前終止時定位該可攜式保全裝 ’、 系統;及 王竦疋位 將藉由該攝影機產生之料影像、藉由麥克風以 該等聲音及使用該全球定位“判定之該保全^錄^ 所傳輸至該指令及控制中心。 之每 103896-961105.doc Γ307583 55· 一種使用一可攜式手持保全t 王衣直迫蹤弟一回應機之方 法,該方法包含: 提供—可攜式手持保全裝置,i呈古 ^^ 置其具有—與一記憶體儲 子》件進行通信之中央處理單元、至少_攝影機、一顯 :幕、-錄音器件、-傳輸/接收器件、—全球定位器 ^ 、—輸入器件、一 RFID訊問器及讀取器,以及一電 源;51. The portable handheld security device is used to capture a video image of the sensing object; and the 1307583 memory processing central processing unit, a video display screen, at least one camera having infrared capability, an input device, and a power source Holding a portable portable security device to face the camera in an area in which a life form can be hidden; enabling the infrared capability of the camera; scanning the area with the portable handheld security device to capture the area by the camera Infrared image; displaying the infrared images on the video display screen; and viewing the infrared images to view a heat signal generated by a self-life form. 5. A method for processing a security violation, the method comprising: transmitting a signal comprising an image of an individual or item of interest; η providing at least a portable handheld security device having a central processing unit a memory storage device, a video display screen, a receiving device, an input device, and a power source; η receiving the signal in each of the portable handheld security devices in the portable handheld security device Viewing the images on; and using the images to locate the individual or item of interest. In the method of claim 5, the step further comprises the steps of: an individual of interest or 52. transmitting the video image to at least the identity of the individual or item. The method of claim 50, further receiving the device to determine that the interest comprises the following steps: 103896-961105.doc 1307583 using the portable Feng Ding Ding security device to capture a static screen of the individual or item of interest And transmitting the static screen image to at least one receiving device to determine the identity of the individual or item of interest. The method of claim </ RTI> wherein at least one of the receiving components comprises a portable handheld security device. 54. A method for preventing compromise of a removable handheld device, the method comprising: providing a network system having a #a command and a control center; providing communication with the command and control center Portable portable security device The portable handheld security system has a central processing unit that communicates with a memory storage device, at least a camera, a recording device, a transmission/reception device, a health and/or a power supply; an input device, a global positioning system providing means for recording the network using the portable handheld security device; 糸 applying - a time limit to the means for recording the network system; An image-generating camera, the sound-recording device for recording, and the means for locating the portable security device, system; and the king position when the time limit is terminated before the member for recording the second system is terminated. Transmitting to the instruction by the image generated by the camera, by the microphone, and by using the global positioning "determined" System Center. Each 103896-961105.doc Γ 307583 55· A method of using a portable handheld security t Wang clothing to force a brother to respond to the machine, the method includes: providing - portable handheld security device, i Chenggu ^^ has a central processing unit that communicates with a memory bank, at least _ camera, a display: a screen, a recording device, a transmission/reception device, a global locator ^, an input device, An RFID interrogator and reader, and a power source; 提供具有RFID標籤之第一回應機; 使用該可攜式手持保全裝晋德迪ό ν &amp; 厂丁丨衮罝還鳊地自該等Rfid標籤讀 取資訊;及 基於獲得自該等RFID標籤之眘邙 你紙您育訊而在该可攜式手持保 全裝置之該顯不幕上描繪該第一回應機的場所。 56. —種用於證明可疑活動之方法,該方法包含: 手持保全裝置,其具有一與一記憶體館存器件進行通 信之中央處理單元、至少—攝影機、—顯示幕、一錄音 器件、一傳輸/接收器件、一全球定位器件、—時鐘、一 輸入器件、一生物掃描儀及一電源; 使用該至少-攝影機獲取視訊或數位靜態影像,其中 該視訊或數位靜態影像具有一在壓縮之前增加至該始原 影像的水印; ' 識別其中使用該全球定位器件獲取該等視訊或數位靜 態影像之場所;及 識別使用該時鐘獲取該等視訊或數位靜態影像時的 間。 f 103896-961105.doc -10- 1307583 57_如請求項56之方法,進一步包含·· 使用該生物感應器獲取一被扣留之人的至少—指紋 將該指紋與一指紋資料庫進行比較。 58·如請求項57之方法,進一步包含: 提供—表格產生器; 使用該表格產生器建立—表格並將該等視訊或靜· 像、該指紋、該場所及該時間資料記人該表格中;: 選擇性地分配該表格至感興趣之人。 , 103896-961105.docProviding a first responder with an RFID tag; using the portable hand-held security package 晋 ό ν ν 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取Be careful with your paper and describe the location of the first responder on the obscurity of the portable handheld security device. 56. A method for proving suspicious activity, the method comprising: a handheld security device having a central processing unit in communication with a memory library device, at least a camera, a display screen, a recording device, and a a transmission/receiving device, a global positioning device, a clock, an input device, a biological scanner, and a power source; using the at least-camera to acquire a video or digital still image, wherein the video or digital still image has an increase before compression a watermark to the original image; 'identifying a location in which the global positioning device is used to acquire the video or digital still image; and identifying the time when the video or digital still image is acquired using the clock. f 103896-961105.doc -10- 1307583 57_ The method of claim 56, further comprising: using the biosensor to obtain at least a fingerprint of a detained person to compare the fingerprint with a fingerprint database. 58. The method of claim 57, further comprising: providing a form generator; using the form generator to create a form and recording the video or still image, the fingerprint, the location, and the time data in the form ;: Select this form to the person you are interested in. , 103896-961105.doc
TW094126196A 2005-07-08 2005-08-02 Portable handheld security apparatus TWI307583B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2005/024506 WO2007008204A1 (en) 2005-07-08 2005-07-08 Portable handheld security device

Publications (2)

Publication Number Publication Date
TW200703108A TW200703108A (en) 2007-01-16
TWI307583B true TWI307583B (en) 2009-03-11

Family

ID=37637444

Family Applications (1)

Application Number Title Priority Date Filing Date
TW094126196A TWI307583B (en) 2005-07-08 2005-08-02 Portable handheld security apparatus

Country Status (8)

Country Link
EP (2) EP1908034A1 (en)
JP (2) JP2009500742A (en)
AR (2) AR050375A1 (en)
AU (2) AU2005334258A1 (en)
CA (1) CA2614344A1 (en)
IL (2) IL188625A0 (en)
TW (1) TWI307583B (en)
WO (2) WO2007008204A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI476625B (en) * 2011-02-22 2015-03-11 Htc Corp Data security management systems and methods

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102009054950A1 (en) * 2009-12-18 2011-06-22 Hilti Aktiengesellschaft handheld instrument
WO2013009280A2 (en) * 2011-07-11 2013-01-17 Maxwell Ryan Lee Method of cryptology to authenticate, deny, and disinform
US20170323543A1 (en) * 2014-04-08 2017-11-09 Lawrence F Glaser Video image verification system utilizing integrated wireless router and wire-based communications
JP6394504B2 (en) * 2014-06-13 2018-09-26 株式会社デンソーウェーブ RFID reader
US10254398B2 (en) 2016-04-28 2019-04-09 Fluke Corporation Manipulation of 3-D RF imagery and on-wall marking of detected structure
US10564116B2 (en) 2016-04-28 2020-02-18 Fluke Corporation Optical image capture with position registration and RF in-wall composite image
US10209357B2 (en) 2016-04-28 2019-02-19 Fluke Corporation RF in-wall image registration using position indicating markers
US10571591B2 (en) 2016-04-28 2020-02-25 Fluke Corporation RF in-wall image registration using optically-sensed markers
US10585203B2 (en) 2016-04-28 2020-03-10 Fluke Corporation RF in-wall image visualization
US10302793B2 (en) 2016-08-04 2019-05-28 Fluke Corporation Blending and display of RF in wall imagery with data from other sensors
TWI579729B (en) * 2016-11-11 2017-04-21 南開科技大學 Server login authentication system and method thereof
US10444344B2 (en) 2016-12-19 2019-10-15 Fluke Corporation Optical sensor-based position sensing of a radio frequency imaging device
CN209784532U (en) * 2018-03-30 2019-12-13 清华大学 Safety inspection system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6359582B1 (en) * 1996-09-18 2002-03-19 The Macaleese Companies, Inc. Concealed weapons detection system
US6720905B2 (en) * 2002-08-28 2004-04-13 Personnel Protection Technologies Llc Methods and apparatus for detecting concealed weapons
JP2004159146A (en) * 2002-11-07 2004-06-03 Nippon Telegr & Teleph Corp <Ntt> Communication network and packet transfer device
EP1575320B1 (en) * 2002-12-19 2016-11-23 Fujitsu Limited Mobile node
US7109859B2 (en) * 2002-12-23 2006-09-19 Gentag, Inc. Method and apparatus for wide area surveillance of a terrorist or personal threat
US6806821B2 (en) * 2003-03-12 2004-10-19 Itt Manufacturing Enterprises, Inc. Apparatus and method for rapid detection of objects with time domain impulsive signals
KR101124961B1 (en) * 2003-11-13 2012-03-27 커머스가드 에이비 Method and System For Monitoring Containers To Maintain the Security Thereof
DE102004007315A1 (en) * 2004-02-14 2005-08-25 Robert Bosch Gmbh Short-range radar unit for detecting objects in a medium, e.g. for detecting reinforcement bars or electrical wiring buried in a wall, has one or more additional sensors, e.g. inductive, capacitive, photometric or infrared

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI476625B (en) * 2011-02-22 2015-03-11 Htc Corp Data security management systems and methods

Also Published As

Publication number Publication date
EP1929449A1 (en) 2008-06-11
AR055102A1 (en) 2007-08-08
AU2005334258A1 (en) 2007-01-18
AU2005334203A1 (en) 2007-01-18
CA2614344A1 (en) 2007-01-18
IL188625A0 (en) 2008-04-13
JP2009500743A (en) 2009-01-08
AR050375A1 (en) 2006-10-18
JP2009500742A (en) 2009-01-08
TW200703108A (en) 2007-01-16
WO2007008204A1 (en) 2007-01-18
WO2007008217A1 (en) 2007-01-18
IL188623A0 (en) 2008-04-13
EP1908034A1 (en) 2008-04-09

Similar Documents

Publication Publication Date Title
TWI307583B (en) Portable handheld security apparatus
US7209035B2 (en) Portable handheld security device
US20230421733A1 (en) System for automatically triggering a recording
US9411997B1 (en) Systems and methods for tracking subjects
Levinson-Waldman Hiding in Plain Sight: A Fourth Amendment Framework for Analyzing Government Surveillance in Public
KR101202221B1 (en) Systems and methods for incident recording
CA2485504C (en) Portable security platform
US8130774B2 (en) Object tracking method and system
US20120242816A1 (en) Recognition system for firearms
JP2008294921A (en) Security monitoring system, security monitoring method, and information processing terminal
US20100033572A1 (en) Ticket-holder security checkpoint system for deterring terrorist attacks
JP5757048B2 (en) Security camera system characterized by having information disclosure means to inform owner and person who can view images
WO2023121963A1 (en) Access management system
Gerdes et al. A proposed approach for monitoring nuclear warhead dismantlement
JP2008197790A (en) Asset monitoring system and asset monitoring server
US20210368141A1 (en) System and method for multi-sensor threat detection platform
Matuszek CCTV systems–technological and legal aspects. The present and the prospects for future
KR101055335B1 (en) Intelligent object monitoring system based on GIs
Carter Facing Reality: Benefits and Challenges of Facial Recognition Technology for the NYPD
Lake Is Wide-Area Persistent Surveillance by State and Local Governments Constitutional?
Horak et al. The feasibility of mobile computing for on-site inspection.
Akinola Assessing the Menace of Vandalism of Library Resources: Evolving Technological Solutions
Dawson et al. A Report on Camera Surveillance in Canada Part Two
From INTERNET CRIME
JP2005228238A (en) Security support system and security support method