WO2000051360A1 - Equipement de suivi et de surveillance pour applications de securite - Google Patents

Equipement de suivi et de surveillance pour applications de securite Download PDF

Info

Publication number
WO2000051360A1
WO2000051360A1 PCT/US2000/004737 US0004737W WO0051360A1 WO 2000051360 A1 WO2000051360 A1 WO 2000051360A1 US 0004737 W US0004737 W US 0004737W WO 0051360 A1 WO0051360 A1 WO 0051360A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
pfn
equipment
real
vehicle
Prior art date
Application number
PCT/US2000/004737
Other languages
English (en)
Inventor
Richard C. Walker
Original Assignee
Kline & Walker, Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kline & Walker, Llc filed Critical Kline & Walker, Llc
Priority to AU32439/00A priority Critical patent/AU3243900A/en
Publication of WO2000051360A1 publication Critical patent/WO2000051360A1/fr

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/01Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
    • B60R25/04Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on the propulsion system, e.g. engine or drive motor
    • B60R25/042Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on the propulsion system, e.g. engine or drive motor operating on the fuel supply
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/01Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
    • B60R25/08Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on brakes or brake systems
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/10Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
    • B60R25/102Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/30Detection related to theft or to other events relevant to anti-theft systems
    • B60R25/33Detection related to theft or to other events relevant to anti-theft systems of global position, e.g. by providing GPS coordinates
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/20Communication devices for vehicle anti-theft devices
    • B60R2325/205Mobile phones
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/30Vehicles applying the vehicle anti-theft devices
    • B60R2325/304Boats
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60WCONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
    • B60W2556/00Input parameters relating to data
    • B60W2556/45External transmission of data to or from the vehicle
    • B60W2556/50External transmission of data to or from the vehicle of positioning data, e.g. GPS [Global Positioning System] data

Definitions

  • PFN and connectables has been configured to allow for the rapid conversions of Commercial Off the Shelf Equipment (COTS) products to handle hostile environments e.g. harsh chemicals, rough service, tampering, life-threatening substances, e.g., radiation, medical, industrial wastes and toxins and the many needed national defense applications for a more extreme protected electrical environmental package against, e.g., Microwaves, or any Electromagnetic Fields (EMFs) generated from conventional blasts and/or nuclear weapons and/or weapon grade magnetrons designed to disrupt solid state circuitry, etc.
  • COTS Commercial Off the Shelf Equipment
  • EMFs Electromagnetic Fields
  • This application has been developed to continue the normal commercial and governmental uses of the protected accountable remote and automated control system on all equipment known as the Primary Focal Node or PFN.
  • the standard PFN always provided a monitoring system and/or network to record and report on aggressive remote and automated control as well as provide more accountability and versatility to any security system with more control options.
  • the major purpose of this application was to create a universal standard protected interface platform that will benefit the present developing remote control and robotics in everyday life and also provide for the quick accountable conversions for national emergencies, military operations and extremely aggressive security options. To allow for the control and management of these devices and systems by the proper authorized government agencies charged with Public Safety and National Security in a cost effective manner.
  • the Primary Focal Node is a Protected electrical interface system of all electrical components on a host piece of equipment, but it specifically provides communication and computer controllers with two local levels of memory storage in a physically protected encasement to provide accountable remote and automated control and data management.
  • This standard PFN ⁇ TRAC ⁇ FACT ⁇ DES ⁇ CEW management system has been enhanced m this application for higher security functions and has a plurality of responsibilities including surveillance, remote control in hazardous environments, and a remote monitoring system to include a network of, on, in, out, and off board devices working together with people through software and hardware interfaced components to provide security services and make machines and their actions accountable through safe, secure communication and control devices in real, and/or very near real, time.
  • TRAC stands for Trusted Remote Activity Controller.
  • the invention as always, is designed to account and provide for various levels of remote control for all machines, vehicles and equipment functions, as well as, alter them to be suitable for certain environmental conditions.
  • the invention or device employs the Protected Primary Focal Node (PFN) on every piece of equipment, mobile and or stationary, and outfits the PFN with sensors and A/V equipment to report on the physical state of any designated secure area and its equipment components, as well as, remotely control the same equipment either locally or at any progressive level of monitoring and remote control network to extend to and/or include a worldwide capability, with any number of security terminals if so desired.
  • PFN Protected Primary Focal Node
  • PGP as might be required to complete these accountable operations locally, regionally and around the globe m as secure a manner as warranted both governmentally and/or commercially.
  • the PFNs must be able to specifically provide reliable remote control function in these high security and destructive environments.
  • the PFNs will be physically constructed to handle highly specialized environments, for unusual rough service applications and even be armored for ordinance protection, as well as, shielded from radioactive environments, electromagnetic fields, bio and medical waste and/or harsh chemical environments, extreme temperatures, etc.
  • the PFNs must also be able to transmit and/or store their data in secured communication protocols like the Data Encrypted Standard (DES) for government purposes involving high security; and in Pretty Good
  • DES Data Encrypted Standard
  • PGP Pretty Good Privacy
  • These DES functions are performed by specialized chip sets that have physical separation within the chip to process the sensitive data and are in place on both ends of any transmission/reception process at any level if need be, e.g. on the host equipment and local, regional and/or worldwide monitoring and remote control terminals.
  • the physically modular and programmable PFNs on all normally manufactured equipment will be designed to accept government DES chip sets for easy government conversion of universal products and Commercial Off The Shelf Products (COTS), to be used in high security control tasks such as (PGP) with special FACT access.
  • COTS Commercial Off The Shelf Products
  • the PFN is described as a hardware device that is called a Protected Primary Focal Node that ultimately can be placed almost everywhere for remote monitoring, management and control to include any vehicle, machine or piece of equipment.
  • a Protected Primary Focal Node that ultimately can be placed almost everywhere for remote monitoring, management and control to include any vehicle, machine or piece of equipment.
  • it has been designed to monitor accountably from a secure local environment, and provide aggressive remote control capability to equipment in any physical environment.
  • This will include any and all actions of machines, and/or man, for the purpose of acquiring specific data on conditions, actions, and/or functions, and to record this data on location, as well as, report back this same data conversely to any appropriately concerned individuals, and/or the public m general through wireless and wired communications to computer networks and data storage systems.
  • This can be a closed circuit monitoring and remote control system, e.g.
  • IP Internet Protocol
  • IP Internet Protocol
  • COTS Commercial Off The Shelf
  • TRAC Trusted Remote Activity Controller and it is, for the most part, the programmable and modular software necessary to provide accountability to aggressive remote control for society.
  • the fact is that the Federal Access and Control Technology that provides authorized government, local, national, and global real-time powers to control vehicles and equipment for use in the safest manner to preserve human life, tranquillity, the environment and social stability.
  • the objective of this technology is to provide a secure communication and data management system initially in the PFN (the protected primary focal node) with TRAC / FACT system a most unique and ideal software modality, that can be used as a universal program and/or a standard, to format accountability for aggressive remote control.
  • the technology will seek endorsement by the insurance industry to provide trusted accountability in the liability assessments and rate assignments for aggressive automated and remote control m any and all such man and machine shared control scenarios. Automobiles and highway travel and its safety will be a major focus of course, but this technology is planned to provide this secured trusted analytical data tool for every mechanized ,automated and/or remote controlled insurable action and/or function
  • the total goal of this application is to also receive approval and certification for the payment industry and their software products, processes, and protocols.
  • the TRAC/FACT system and software will be programmable and modular and be deployed as software and firmware m all types of hardware. It will also employ and be capable of processing analog and digital signals and/or any and all data streams, encoded and/or encrypted signals including; all data, audio and video signals as well as telemetry for man and machine operation and environmental monitoring, along with any other application specific data streams determined as necessary.
  • This application is providing this proprietary firmware and/or software system so that it can track any electrical signal received and or processed by this Protected PFN technology and/or any of its devices as well as, track and record any application specific reactions to the signals by any host equipment, personnel, environmental condition change; and also, continue the accountability functions for offboard tracking, through the management and storage of data handled through the PFN ⁇ TRAC monitoring and/or remote control system and/or Network.
  • the remote control accountable software for tracking will require personnel Identification (PINS and/or fingerprint or pupil ID), Electronic Serial Numbers (ESN), from the transmission equipment used, GPS, land line numbers etc., and/or any other locating system coordinates. There will be time and date data as well for every appropriate command that results in any application specific reaction performed by the host machine via a PFN, and/or due to any remote control command. This will always be standard operational data acquisition necessary to perform any credible remote and/or automated function completed with a PFN. Basically the TRAC system m the PFN is a modular system that will authorize and authenticate commands and activities for aggressive automated and remote control with local and remote redundant memory systems. This is how this technology plans to provide trusted accountability for insurance and governmental backing.
  • the manufactured commercial products employing this technology's PFN and/or TRAC system's innovation will be responsible for obtaining certification in their design, construction and use by the governing bodies as well as provide FACT access and control protocols for public safety and national security reasons.
  • the FACT system is still completely accountable for any and all that are using it whether they are ,c ⁇ v ⁇ l servants, high government officials or regular citizens.
  • the mass of all data collected in real time for a temporary memory shall be controlled by being erased m this re-writeable memory and not stored in the permanent memories (local) if deemed unessential by application specific onboard firmware and/or software criterion, and not reported redundantly to any remote location unless countermanded by the offboard monitoring and control systems that authenticate as valid for this activity.
  • TRAC Trusted Remote Activity Controller
  • This figure is the software that provides a Trusted Activity Controller the TRAC system of software and software embedded hard ware or firmware and/or microprocessors FACT chips individually assigned and incorporated as identifying circuits and mini processing centers to insure accountable remote control tracking integrity as a system and for any and all individually directed activities no matter the origin of order and/or purpose.
  • TRAC Trusted Remote Activity Controller has easy technical capability for any and all of humanity. However, all forms of human governance will have to be responsible in determining how to best use this accountable technology.
  • the protected containment has many various different applications so specific configurations have been deliberately avoided . Therefore, this number two drawing of the high security PFN'S wall is shown ,as well as, how they will be altered to complete their specific tasks for every application and will be ultimately determined by a standards.
  • This system can also have its physical wall structure customized for specific high security applications.
  • This figure shows three drawers which are a continuation of 2D as a possible arrangement of components for this multi interface system for electrical components.
  • Two F is the first of two figures showing a proprietary electronic heat seal system to insure there has been no tampering with the protected PFN are for legal evidence.
  • This drawing is of the simplest one-way communication PFN and these basic electronics have already been prototyped used and proven from and for the other related applications. Basically with the one-way communications systems data storage is on board the host in the PFN at two separate locations and require physical retrieval of the data. This device in its most basic form will not report back to any remote control and monitoring system, but can be sent messages, which will activate preprogrammed responses.
  • Figure 5 This an illustration of the simplest two-way communication systems and the necessary security devices to condition the signal with encryption for high security protocols. It is basically another flow chart showing the data from the remote control and monitoring network as well as all the data and control signals to the data storage and the peripherals through the many possible processor options. This is the same as figure 4 , however it is in two directions with the remote control and monitoring system and there by creates three accountable levels of data storage on and off the host piece of equipment. Two levels on the equipment and at least one remotely stored copy of any pertinent data.
  • FIG. 7 Illustrates the many varied high security purposes of the installation secure area system depicted in figure 7. It shows some of the governmental uses, and commercial applications for a secure installation , that are hazardous and can be enhanced by unmanned operational functions e.g. oil , gas and chemical plants, medical waste and sewage facilities, nuclear substance use, and nuclear waste storage and a multitude of other science , energy technologies as well as monetary processing either in hard currency or credit - debit data.
  • unmanned operational functions e.g. oil , gas and chemical plants, medical waste and sewage facilities, nuclear substance use, and nuclear waste storage and a multitude of other science , energy technologies as well as monetary processing either in hard currency or credit - debit data.
  • Figure 10 Is a continuation of the list of allocated frequencies from figure 9.
  • This illustration details how the FACT chips work inside the PFN/TRAC system to be an accountable and well organized use of electrical devices on each and every piece of equipment.
  • the individual chips in each component or device identifies the component to be recognized by the National registry after the initial data is processed by the PFNYTRACYFACT computer programming when it is connected to the uni-buss either in the protected containment of a PFN or some input output port.
  • Figure 21 This diagram is more desc ⁇ ptive of the software functions of management and control commands. It shows basic driver and/or owner notification functions and those that could be completed without notification as per constitutional law to be written and legislated extending court order wire tap and phone taps being extended to use of this security function m the PFN/TRAC system and incorporated into FACT software protocols.
  • Figure 22 is a diagram of the system that allows parolees back into society by tracking their movements.
  • the invention provides for at least three levels of accountability in its most sophisticated functions, two on board and at least one in a remote location.
  • the invention has always claimed to provide a secure physical environment for the electronic components and devices, but in this application the PFN's are specifically designed to protect any of their transmitted signals by first conditioning them by encryption, so only the authorized personnel and terminals can decipher their encryption's and gam access to the data.
  • This security protocol is also carried all the way though the system and will therefore easily marry into any existing system, which requires these same Protocols DES and PGP, which stand for the government Data Encrypted Standard and the commercial versions Pretty Good Protection.
  • the monitoring and control systems for high security application will most probably be closed circuit with an individual set of government allocated frequencies, and specialized hardware firmware and software (Government ⁇ DES systems).
  • Government ⁇ DES systems specialized hardware firmware and software
  • PGP pretty good protection
  • inexpensive monitoring can be provided in near real time with only marginally diminished security in any direct PFN transmissions to the World Wide Web (WWW) phone node servers and their inexpensive gateways and/or any networking from the local computer terminal to a WWW server phone node.
  • WWW World Wide Web
  • This option for many small and medium commercial operations will be provided more economical possibilities for their semi-sensitive or less secure needs to monitor current events at isolated installations globally in any specific installation.
  • the other security measures are limited access to a web site or controlling access by special identification measures, e.g., pm numbers and synchronized timed personal access number cards.
  • special identification measures e.g., pm numbers and synchronized timed personal access number cards.
  • any response telemetry data generated from the action to a remote command is recorded and stored for an application specific time period and then either entered into the permanent PFN record storage or delete for space.
  • any and all installation PFNs that are working in concert (net worked together) to achieve a remote control action will also establish their telemetry records in the same manner providing a multitude in many layers of accountability header provided with the appropriate FACT, ESN , MIN, VLN or necessary FACT manufacture data and nay activity application data that is programmed into the firmware or software.
  • TRAC accountable modular and programmable software termed TRAC that autho ⁇ zes and authenticates commands from wireless and land line telephone and/or RF equipment and/or light transmission technologies to remotely activate and confirm automated controls and functions through its PFN processors controllers and/or computers
  • TRAC processes this data in a secure manner it stores it in a protected storage on board a piece of equipment in this technology's PFN on location and in the two-way transmission PFNs it reports back to at least one remote location to achieve at least a third redundant memory storage.
  • the reality of the invention is proven m the feasibility prototypes of the earlier related patent products. However, the need for governmental and commercial collaboration is essential to the entire FACT system ' s Reality
  • This TRAC system was designed to distribute communicated commands to their appropriate application specific preprogrammed protocols, while authenticating the authorizations and preserving and accountable record on both sides of the remote control communication cute ⁇ o and through out any redundant transmissions or data storage.
  • the TRAC system of software has been designed to develop a Trusted Remote Activity Controller for all of societies needs regarding accountability and liability as well as to preserve and/organize secure modalities to manage and control automated equipment, and financial legal transactions.
  • the invention's security uses are endless, because of the great inventory of possible COTS components, and devices that can be integrated and interfaced.
  • the designed universal plug and play versatility has been deliberately developed to combine and work with all other pieces of equipment and systems where ever possible. This has always been another goal of the invention from its inception.
  • To provide a practical focal point that is a universal physical platform to support a versatile electrical interface for responsible remote control for every piece of equipment, machine , vehicle and environmental need to increase public safety ,nat ⁇ onal security, to provide just and fair monetary exchange and respect for each individual in a society.
  • Accountability for the use of equipment and Data acquisition is the best way to achieve and assure these things and it must be built right into the interface and protected as well by backed up remote traceable memories.
  • the invention has been designed to provide civilization with the tools and capability to provide secure organization and informational data for this most natural and appropriate human knowledge quest and assist in obtaining an optimal growth in these directions for civilization's development , while maintaining fairness and/order for all individuals to develop in their individual existence in using these extended freedoms and tools responsibly and respectfully und pain of the law for any misconduct. But this invention's implementation and any societies use of the invention is and always will be in their hands and have to be responsibly shouldered by all of the individuals of any society that uses it.
  • FIGURE 1 A first figure.
  • FIG. 1 is an illustration showing the monitoring and control system and a PFN enclosure with its characteristic communication options, processor and computer capability and its accountable data storage systems ,as well as, its elecfrical interface connector to connect with a host machine.
  • FACT is introduced as the Federal Access and Control Technology that will be running in all remote control capable systems governmental and civilian. It is an encrypted operational data system software that will allow for accountable access to all such systems and under proper court authorization allow for undetectable monitoring and control of any and all equipment.
  • TRAC Trusted Remote Activity Controller
  • base operating software system operating m all PFNs the base hardware components and systems running these programs of which TRAC & FACT are only two of them. The components in figure one as numbered are as follows.
  • Number 300 shows all three levels of a possible network of off board computers in which the local computer is the standard gate way, but not the only control terminal and it is not a necessity that the control communications even go through the local terminal.
  • the local computer is the standard gate way, but not the only control terminal and it is not a necessity that the control communications even go through the local terminal.
  • ENNLN and or (ESN SN) or MIN protocols and personal ID devices properties and qualities detailed in all the earlier related patent application for the spider eyes program, coupled with the on board data storage devices numbered 105-106-107 in this drawing .
  • the offboard report back data storage provide total accountability for remote control activity which can be established through the entire system from all of the offboard monitoring and control systems to each individual peripheral system attached to a PFN numbered 200-204 in this number one drawing and most especially with the incorporation of TRAC and FACT soft ware programs.
  • the multi numbering is for the different styles of security and protective packaging of PFNs and data storage devices and systems, which are all detailed m great length in the earlier related filings.
  • 100 is a wireless phone, either cellular, digital ,satelhte or even cordless either as represented as a hand held COTS device that has an interface modem and/or cable to connect it up with one of the five computers detailed in the preceding related application or as an IC chip set integrated circuit and or interfaced with any of the onboard processors, programmable controllers or computer boards either by edge connectors or direct hard wi ⁇ ng or IEEE couplers.
  • 100 can also be PCMCIA card or "Complete Card” TM Cell phone card with antenna. (This system will be first utilized m all prototypes including high security.
  • 102 is any other RF frequency that can be used to send and/or receive either a guarded or unguarded signal, to a PFN device.
  • the following frequencies are listed m an Allocation table as figures 9 and 10 of this application as they are known today The list is in no way to be considered the only frequencies that this invention claims and in fact any and all wireless communications and hard wired communications are claimed to fall withm the nature and scope of the invention when they are used in an accountable and/or protected interface for remote control.
  • stamp I and stamp II and 104 refers to all five of the 100 Euro-board mini computers named in the preceding application with their varying degrees of capabilities. And also in this formal application there will be a complete set of drawings detailing the prototypes to make them more resistant to EMFs and other damage from radiation for the high security and hazardous or hostile environments.
  • 105 -106-107 is the on board data storage components of the PFN. However, there is only 2 levels of memory or data storage generally planned for in the PFN. One is a re-writeable memory recording predefined data unique to equipment and or personnel. The second is priority data which is stored in a non- volatile and protected memory (determined by application specific protocols). And number 108 up in the 300 block of computers networked together illustrates at least one remote storage out of the PFN. And this will be a redundant storage of the same application specific protocol data stored permanently on board. This provides three last minute comparable records which are all timed and dated for analysis and accountability.
  • the number 105 generally refers to embedded hardware, firmware , EEprom, and/or flash memories and 106 refers to hard drives and 107 to writeable CD and MO disks as detailed m the earlier applications .
  • These can be part of a integrated or interfaced circuit with any of the processors and/or mini computers and/or stand as separate components interfaced through hard wires and/or physical connectors, which also has been thoroughly detailed m the earlier applications.
  • Teen of these data storage components can function as re-writeable data storage or as permanent storage.
  • 108 is the offboard storage and it is also detailed in earlier applications but it is safe to say that all data stored for these high security applications will have specific systems and protocols to manage any stored data.
  • TRACS and FACT will be detailed through out this patent application as an exemplary software protocol for handling this data on and off the board.
  • FIGURE 1A A first figure.
  • the Trusted Remote Activity Controller provides all local vehicle or device control and event storage relative to PFN (Primary Focal Node) operation. It interfaces to any RF telemetry link, which may consist of a one or two-way paging system. More sophisticated links could be used such as digital cellular or PCS (Personal Communication System).
  • a Remote Management System (which may be as simple as a single page, or as complex as a controlling PC or Server) initiates a TRAC function, such as an automated slow, stop and secure sequence or involves robotics including guidance systems more and varied speed control and/or any accountable aggressive remote and automated function.
  • the signal or paging command is received securely via encryption) and decoded by the TRAC.
  • a local display or audio speaker may provide local status of the TRAC function being executed, with appropriate progress tones, voice queues or displays to provide a local operator feedback relative to the progress of the function
  • System Function Data This is termed the System Function Data.
  • Interim progress of the sequence, activity or function may be optionally transmitted back to the remote management system through a 2-way phone or paging link. This may occur as the function is executing or may be programmed to occur after completion of the sequence.
  • local, redundant storage of the event is always contained withm the PFN for subsequent or simultaneous retrieval of event information and proof for accountability purposes.
  • the PFN enclosure and TRAC monitoring of tamper sensors guarantee the information has not been compromised.
  • unique sealing systems further provide tamper detection.
  • Other types of information along with the System Function Data may be stored m the TRAC Local Event Storage Memory.
  • This auxiliary information may include digital or analog data not directly related to the function being monitored and executed, but important for evaluation and determination of liability, collection of evidence or environmental data. Examples of these include road condition information or surveillance audio and/or video.
  • TRAC implementation may be accomplished in many ways, depending on space or funding constraints and level of integration required for the system.
  • a PC based system may be in the form of a desktop system, laptop or embedded system (PC 104) with a dedicated DOS or Windows based TRAC program, consisting of machine language, Basic, C, C++, Visual Basic, Visual C or C++, or other high level language which accomplishes the TRAC function through software confrol.
  • SUC System Under Confrol
  • PC compatible Modems or Cell phone interfaces provide the interface to the Remote Management System (RMS) SUC and RMS interfaces may be in the form of ISA, PCI, PCMCIA, VME, Compact PCI, Future Buss, or other commercial interfaces compatible with the PC- based system used by present technology.
  • RMS Remote Management System
  • TRAC may consist of dedicated state machine controller implementations in which TRAC functions are executed through embedded firmware. These implementations may incorporate multi-chip solutions using EPROM or EEPROM interfaced to Arithmetic Logic Units (ALU), I/O ports and discrete memory elements a basis for FACT
  • microprocessor and ever expanding memory circuits and devices are emerging. They may also be microprocessor or microcomputer based. A large variety of board level products are commercially available for such an implementation. Single chip or high density implementations might consist of Field Programmable Gate Array (FPGA) or Application Specific Integrated Circuit (ASIC) based devices.
  • FPGA Field Programmable Gate Array
  • ASIC Application Specific Integrated Circuit
  • Display, Video and Audio (Auxiliary Data) for the TRAC can be in many forms and types. These may range from analog systems, m which tape or other magnetic media store the analog signal, to digital systems m which data is stored on hard disks, EEPROM or RAM. Data format may be modulated through FM or AM, compressed, packetized or otherwise encoded for reduced bandwidth or for transmission over the Internet (packet audio and video). And even modulated over power connectors to save space and individual material component use.
  • Figure 1 A is to show a software diagram that can perform remote and automated controlled functions and also authenticate their performance. It is also a precursor or base operational system to operate more controlling management system in a socially responsible and accountable manner.
  • any structure designed to protect the electronic integrity of any interface and performs the described functions of a PFN as well as, provides protection for any of its essential peripherals to increase performance, longevity, durability or to increase reliable service, and/or to better perform accountable remote control like protecting a system like the PFN/TRAC system in any environment or from tampering fall withm the nature and scope of this invention and all of the above related filings. This is and always has been a major attribute of this technology. To be either universally, and/or generally and/or specifically construct for the purpose of protection against any rough service environments and/or vandalism or tampering.
  • This center as already detailed in earlier filings and can or will be composed of either fiber glass products, gypsum, fire gels (from diapers), solid smoke silica, mica, asbestos, or asbestos replacement products , Teflon and/or high temperature plastics e.g. polysulphone, all of which would either be adhered to 201 and 202 or merely sandwiched between the two walls.
  • solid smoke e.g. polysulphone
  • this center area 200 being a somewhat flexible fill insulation area between generally two solid structures a wire screen mesh , net, grid, or grill of metal properly spaced and constructed from metal products possibly copper, lead, etc. will be placed to block even more EMF ⁇ EMW and/or various forms of radiation in special nuclear applications etc. To achieve an additional radiation screen.
  • the mesh can be pressed or impregnated into this insulating composite section in the center of these two walls to add greater protection for the electronic products housed mside the PFN.
  • This center can and will be designed to provide a soft seal when mated with another section of a PFN wall that will be resistant to the normal elements and harsh chemicals when end sections of 201s are butted up to other 201s end edge sections e.g. corners (the same for 202s) to provide another surface to seal upon, e.g , welding resms, glues
  • Manufacturing can also reduce cost by making three concentric boxes or containers of any application specific PFN shape,.
  • a non flammable glue adhesive or solvent for the insulation section would be applied to the center section and the larger 201 box would have its inner surface chemically etched or conditioned to receive the pliable adhesive.
  • box 202 on the smallest box would have its surface prepared in the same way to receive the adhesive (if the surfaces are metal products).
  • the protected cable access hole will be positioned to allow the trapped air to escape upon assembly of all three box sections. This leaves only one side to be installed with mating beveled edges which are both glued and sealed, e.g., welded This last side or plate will contain the access panel with locking mechanism and hardware (physically and/or electrically controlled in most cases with special seals).
  • this wall will be made of hardened metal products (described withm) that resists physical penetration as a primary consideration. It also could be coated and/or covered on either side, and/or even be replaced by a penetration resistant plastic like Kevlar or other projectile and sharps resistant plastics Teflon, nylon ,and, vinyl etc. (especially when the PFN is employed m exposed electrical service application with high current.
  • a penetration resistant plastic like Kevlar or other projectile and sharps resistant plastics Teflon, nylon ,and, vinyl etc.
  • this exterior wall in some applications will be constructed out of stainless steel and/or coated with corrosion resistant coatings or made out of plastic and given special textures or wire webs, grids or grills, that can also help trap EMF/EMW waves and/or radiation so as to block their penetration into the electronics housed withm the PFN and/or any peripherals, if so determined by an application to require this type of protection.
  • any and all of these technical variations can be employed, with the consideration of the tradeoffs . Which are almost certainly to be cost vs. desired and/or necessary practical protection.
  • the inner wall which can and will be constructed of various different materials as already named in the last outer wall description, if so determined necessary by application specific c ⁇ te ⁇ on for any specific PFN application. It may as well be constructed of hardened steel thermally tempered to increase carbon content m the molecular bonds or a metal alloy composite product may be utilized with, titanium, tungsten depleted uranium etc. (this is the same for all hardened metal applications for the outer wall as well).
  • the inner wall could also be completely constructed of solid lead to create a final protective inner seal against radiation . Or a composite plastic already listed for the 200 and 201 parts with a EMF/EMW wave and radiation screen as already described for 200 and/or 201 parts.
  • the thickness of the entire wall which is once again application specific and will vary as a general rule , but also as a general rule the different PFNS will be designed to be as universal as possible in shape, size and structural composition.
  • the individual walls 201 and 202 may vary in thickness as well as the necessary thickness of insulation . All of these considerations will be application specific. For example in the automobile industry and normal civilian use the protective structuring can be scaled back to a standard that does not require the kind of protections detailed for high security to meet an acceptable standard. This will be true for all applications. They will individually have to be structured to meet the requirements of the application.
  • the PFN will also be structured to be actually part of the host equipment physical structure m some security scenarios and m this case the system would have to be secluded and require limited and/or controlled access if it were to have the appropriate military value It would be structured to assert final control over a piece of equipment but its influence would be undetectable and/or camouflaged to a large extent and above all extremely difficult to access or terminate, (these systems are reserved for special disclosure and development)
  • the PFN will be used to house and protect the host programmable controller (HPC) m the drawings 4-5-6 next to the mini computer contained m the PFN .
  • HPC host programmable controller
  • These functions will ultimately in many cases be integrated with the obvious advantage being consolidation of the vital functional controls of the equipment integrated with partial or the whole data storage, remote control technology with the necessary security components all m one secure spot in a plug and play modular or card form and operated by TRAC software. Which can be physically displaced for an immediate disablement and total secured piece of equipment if so desired. But only by authorized and authenticated entry if this is a feature or capability so desired. Of course any portion of these electrical components can be given this same plug and play capability if so desired. Because this Protected
  • PFNXTRAC system & structure which is a protected physical elecfrical interface center of such wide base use and application ranging from high security, hazardous environments and military applications to standard civilian use a third standards effort will also be necessary involving agencies like NEMA, DOT, DOD, Highway Safety, and professional organizations like CEMA, ITS, and manufactures to decide on the application specific PFN containment wall structures that will be manufactured and/or added to any and all equipment to provide legal physically protected areas to monitor, authenticate, record and perform remote control for each of the varied applications. All the base components ,elements and their properties and qualities are addressed in this application and the related applications.
  • the PFNs the PFNs them selves can be also exchanged to meet either more or less demanding environmental and application demands; e.g., The government purchases a standard automobile that is going to be used in a high security installation or hostile environment like an Act In this case the PFN structure will be explosion proof containment and un-penetrable by projectiles and EMFs etc.
  • 2A01 is a manual lock for the PFN and these can be at any quality desired. It also has an electrical connection to be use in arming the device.
  • 2A02 is the memory storage in this case audio recordings and a flash memory of operational data (Sony's memory stick 8meg a bites a piece).
  • 2A03 is using a stamp processor as the controller 2A05 is employing OCR systems however Motorola has many COTS products that can hook up with direct connections and all are covered m the related patents. In fact this entire system has been well detailed in all the related patents. Originally this drawing appeared in the PCT/US97/121516, and in that PCT application the wall structure was desc ⁇ bed as one solid plate of Abrasion Resistant steel.
  • Figure 2B Displays two variations on the billing box accrediting system and the credit card devices and phone devices that have been innovated for these purposes.
  • the billing box was designed to be an add on unit or after market device to collect a fee for use of a vehicle, e.g. rental cars, taxi cabs, buses, etc.
  • Part 2B01 is either a standard credit card, ID card or any other information card that one wishes to use to enter information to the billing box (PFN).
  • PPN billing box
  • this device is not just designed for the regular magnetic strip cards as has been described earlier, but is designed to stay current with the more sophisticated cards, as well as evolve with other recognition systems e.g. finger print and voice and pupil identification systems.
  • TRAC can run the Bank card/Stock Exchange Transaction products and algorithms via the commercial 128/64 bit Encryption or web transaction products . And/or utilize the COTS banking products and protocols like NCR systems for ATMs. These transactions will be provided memory storage for personal accounting and verification to the financial institutions as proof of payment.
  • PFN's will be every where and all those with ID systems PIN number and key pads, finger prints and other forms of personal identifications will allow for any personal payment, authentication, and/or verification of transaction virtually anywhere.
  • Part 2B02 is a cell phone handset configured with a forced card reader slot and sensing head to accept the card in the track or slot and extract the stored card data on the magnetic strip to produce an electrical signal that provides encrypted encoded data to a converter circuit that has a processor chip with a firmware algorithm that can compare and prepare the data into discernible language equivalents. Or after the card reader prepares a signal one of the PFN mini computers will process the signal and/or encrypted and encoded data through software programs running in the TRAC software e.g. CEW Commercial Economic Web transaction products either proprietary , Governmental, and/or Commercial Off the Shelf products either past and/or present or any newly developed algorithm with higher security With the use of the cell phone handset configured with the card reader and slot the lower bill box could be configured with out a key pad.
  • CEW Commercial Economic Web transaction products either proprietary , Governmental, and/or Commercial Off the Shelf products either past and/or present or any newly developed algorithm with higher security
  • Part 2B03 is a standard key pad that can be used to communicate with the bill box when connected and interfaced with any the invention's computer and supported with the proper interfaces and software and/or firm ware.
  • Part 2B04 is a multi-bus bar connector universal with 29 contacts so that it can support any system/device entered into the bill box.
  • the other short pigtail is part number 2B05, of which there may be 5 to 10 m quantity or more, that can easily slide back and forth to allow many varied positions for the different devices and the space they require.
  • the PFNYTRAC system is this control center interface with total accountability for any and all electronics on a host piece of equipment, whether it would be a vehicle, a piece of stationary equipment or any machinery, and/or an environmental sensing system, which would and/or could provide the appropriate data to any and all m the approp ⁇ ate manner to develop public trust, while simultaneously protecting individual anonymity and/or p ⁇ vacy m an accountable responsible manner with and through the qualified appropriate authorities in such a manner, that the legitimate legal tort system could illustrate and use this properly gathered accountable evidence of any and all real-time activities to either properly defend or prosecute on an incident and/or individual as fairly and respectfully as possible and needed.
  • Part 2B07 is a mouse ball that one can use to run window type graphic programs either displayed in the unit display 2B08 and/or any larger display withm the field of view for the driver, either LCD vacuum tubes e.g. VGA flat screen, or the new hologram wind screen m the newer cars (e.g., Pontiac Grand Prix).
  • Part 2B08 is the unit display
  • part 2B09 is an emergency power pack
  • part 2B10 is the secure bill box. The structure of the box has been described m the best mode of carrying out the invention in all related patent applications.
  • This particular device has been designed specifically to be an accountable interface for electrical communications to perform robotics, and/or aggressive remote confrol; and to provide accurate and responsible data both in anonymous and accountable formats for the public m real time through Internet links and web pages as part of a massive Machine Messaging Network (MMN) which through the PFN phone ,RF and paging Gateway nodes connect with the (WWW) either through private networks or commercial networks , public or private web page gateways (big or small) to web as Internet providers and commercial servers.
  • MSN massive Machine Messaging Network
  • TRAC is designed to handle 128 /68 bit. This is sufficient for present requirements but the invention is designed to stay current and incorporate any newer technology that can handle greater data and process it and maintain it in an accountable manner incorporating the necessary security standards and all standards as the aim and goal of the invention to maintain a secure and protected primary focal node.
  • FIGURE 2C Shows a picture of a dash board m a traditional sedan.
  • the PFN Just right of the steering wheel is the PFN and it is depicted as a box with a personal computer slid all the way out of the containment with the lid or screen display opened so that the driver could use the computer screen with a GPS system like DeLorme running to receive automated directions to an address she/he was unfamiliar with.
  • a cellular phone that has its phone modem connector coupled to the heal of the phone and directly to the right is a second communication device a pager that is also coupled to an optical scanner m this case as was described m the first patent.
  • the lock up 2C004 m the center can house permanent invention computers and storage records plus GPS and any communication devices that are desired on the vehicle all the time.
  • This lock up section is only accessible by authorized personnel in the most ideal situation and hopefully mandated by law.
  • This section would house the PFN invention computers and in the place of an on board personal computer their would be an LCD screen that could display map graphics if need be, through the on board computer systems.
  • the square boarder with circles inside is the walls of the PFN case.
  • 2C001 is the outer metal case plate which can be up to
  • 2C002 is the inner metal plate up to a 1/8" thick and it is made of the same AR plate.
  • 2C003 is an insulating product and there is two that are being used to construct the prototypes. One is "solid smoke” a product developed for the space shuttle and “Geobond” a gypsum product. None of these products or specifications should be considered the only way to create a secure PFN containment to fulfill any part of the nature and scope of this invention. The thickness of 2C003 the insulating section would not exceed 3/8". 2C004 represents one kind of lock cylinder like those used in safety deposit boxes, however, not made of a soft metal like brass.
  • 2C004 is displaying the bottom compartments access panel swung open on a piano hinge part number 2C006. So the view is displaying the back of the panel so bars can be seen and that is why they are depicted as solid lines. Behind 2C004 lies the secured section which is represented with dotted circles because they are located in back of the bottom access panel in the open position. If the center section is the designated section to handle or store the legal storage elecfrical components it will not have an electric lock release or it will be disconnected to only allow for the proper authorities to remove this data or component parts. 2C005 is the bottom access door in the closed position and that is why the bars are depicted in dotted lines.
  • 2C006 is a piano hinge and is a part on each of the three sections as a point of articulation for the panel door.
  • 2C007 is the standard glove box that can either be used or discontinued to allow for other rerouted accessories: HVAC vent, duct work, plenums or blowers motors, etc.
  • 2C008 is the SIR compartment which is the sudden impact restraint or the Air bag. With on board distance sensing for front and rear as well as even side surveillance of the environment any impending impact would be sensed and automatically withdraw any opened draws in use into the containment which would allow the aesthetic skin panel/drink holding table to spring return to a closed position.
  • 2C010 is the pager as earlier described with an OCR scanner on the front however any interface and connector system could be employed in the PFN. Also Motorola pager processor "Create a link" could be utilized here and even as an effective processor in the center section that is closed for the ultimate secure service functions as another COTS computer communication combination for the inventions confrol center.
  • 2C011 is the standard cell phone with a connector modem, which will be wired through the trays to any of the on board computers to receive and transmit data to any system in the PFN or connected to it.
  • 2C012 is a specialized tray connector made by or for the personal laptop computer that will provide all or any of the desired physical connections to interface the computer to the host vehicle or any other peripherals or to net work it with any other primary computers.
  • the holding and securing tray will then couple to the sliding either motorized or powered by vacuum.
  • the elecfrical connections to be functional here it will have a controlled flex cable to 2D 103 the central buss channel or channeled or race way where it will route wiring up and down inside the containment.
  • Figure 2D shows two more structural detailed views of the secure box or PFN in the Dash.
  • the top view is of the back of the box cut off so the components can be viewed.
  • the top shelf is showing a laptop with all its varied connections that have a performed shelf designed to supply the necessary connections directly to the laptop connectors.
  • This same tube works as an antenna galley and channel to house the control buss of wires to the out side of the secured and protected PFN .
  • These wires are protected in a armored flex cable like the one described in the first patent for the protected beeper.
  • the bottom box illustrated in figure 2D is showing the lock access panel doors with a piano hinge 2C06 for this sturdy structure.
  • This 1/8" thick access door is made out of stainless steel and numbered 2D 10 in figure 2D.
  • the access doors 2D 10 can be opened in three different ways, one with a key in two places as displayed in figure 2D, another as described in figure 2C with the throw bars out to the electric solenoid catch mechanisms and there by finally opened by electric solenoid release triggered from the inside program software of the inventions on board controllers which is reliably energized by the emergency batteries mside the PFN; including the electrically confrolled and activated proprietary seal detailed m figure 2F and 2 G of this patent application.
  • the two key systems would also have the same solenoid lock release system electrically.
  • These access doors automated locks and tamper proof seals are finally covered by an upholstered and padded dash plate / drmk holding table numbered 2D07 which is illustrated m the down and open position and appears as the end view of this dash plate / drmk table .
  • the front is molded and formed to create a uniform appearance to the dash board and through a ribbon connector can provide connect-abihty to any and all necessary switches for manual electronic controls as a compliment to verbal commands to control audio sound levels atmospheric temperature augmentation lighting and/or driver assist systems to greater enhance safety .luxury and security.
  • This aesthetic dash front may be constructed by covering the compartment panels with cushioning and traditional interior upholstery coverings like foam and vmyl and not having the drmk top dash panel
  • 2D01 represents a molded rubber gasket that is grooved to accept the dash control plate(w/ ribbon connector)and/or /drink table in the closed position.
  • 2D02 is the two sided lock placement cylinders if this type of lock system is employed.
  • 2D11 depicts the electric latch plate and solenoid assembly that receives the lock bolts from the keyed cylinders.
  • 2D05 is another piano swing hmge for the table / dash cover plate.
  • 2D04 is a coiled spring that returns the dash plate when all the drawers and/or trays are retracted.
  • 2D06 is a shelf roller that can be slid into any number of slots in many places of 2C01 the inner wall of the box .
  • These slots will either accept a tee ended fastener that supports these shelf casters or rollers or it will allow a compartment plate or separating partition wall to be slid down the slot.
  • These compartment shelves or rollers can be moved or exchanged to create any number of configurations, however, the trays will be standardized to certain sizes that will be customized by the manufactures to accommodate their products.
  • These separating plates have lock blocks that have drillings with 10/32" screws that will thread into tapped receiving holes in 2C01 the inner wall. 2D08 in one of these partitions. 2D06 the rollers have a screw that can be tightened to clamp the tee device against the inner wall skin- part 2C01. 2C12 is the personal lap top in the top shelf..
  • 2D09 are more trays that ride on the rollers. These trays presently are designed to either be half the size of the PFN or to go all the way across the containment. This is not the only design for the movable trays and adjustable flat compartments and should not be considered so, but this design is being proto-typed presently. Any protected containment or interface that is structured to coordinate and confrol remote functions on a machine all fall within the nature and scope of the invention.
  • FIGURE 2E Is only one suggested example of many possible commercial tray component layouts and integration's for the PFN/TRAC/FACT/CEW /MMN/WWW and in no way should it limit the claims of this inventions PFN to any secure protected accountable electrical interface structure on vehicles machines and/or equipment
  • Figure 2E tray modality is a plug and play component design, which claims a total physical and elecfrical protected interface for all electrical components as well as accountability and integrity checks to insure inventory of the systems components. This inventory integrity check is accomplished through a role call dialog with each components FACT chip and the PFN computer. The running TRAC/FACT program on start up will seek out all components at last shut down and handshake with the components
  • This figure depicts 3 possible drawers configurations for a possible application of the secure box and/or the PFN systems.
  • the top draw houses the laptop computer 2C012, the bottom draw houses the power pack batteries 2E01 and 2E02, the transformer 2E13 and the inverter 2E03 along with power supplies that are varied power taps 2E17 for the COTS products housed in the PFN.
  • the center drawer houses all the essentials to complete the necessary function for the PFN. It has a GPS 2E16, A
  • the top drawer 2C012 is showing the multiple fittings that would be molded into the tray and not visible as a end view but instead shown here as a top view. In most cases the manufacture would not have to outfit a tray and probably would not do so for all the possible connections for the laptop. However they are shown here and mentioned as all being possible. Reading from left to right the first connection would be for 14.vdc as a power input for the computer and is supplied by the bottom shelf tray from part 2E14. On the top shelf again the next round circle to the right of the DC power connector icon the PS2 mouse or keyboard connection for an external mouse or GPS 2E16 connection in some cases. The next comport is a 9 pm serial port and the following one is a 9 hole additional monitor port.
  • the infrared communication port and the very next one is a parallel p ⁇ nter port 25 hole LPT1 port and the last one on the left is the a USB communication port and most likely the one that will be used with any peripheral hook ups in the box , however any of these connections might be used for any number of interface connections and it is possible that a laptop manufacture or secondary provider for the trays may outfit any and/or all the communication ports with a service connector in the tray Ideally the placement into the tray or cartridge that is affixed to the rollers and rolls it self or is placed on a shelf and does so . In any case the fray or cartridge for any peripheral will instantly plug up to the laptop or other device when placed and secured m it.
  • the middle shelf or power tray as designed for this prototype will have two batteries one a 12vdc part number 2E02 and a 6vdc part no. 2E01 and these two batteries are wired in series to create 18 volts, which are wired into the primary windings of the transformer 2E13 that provides multiple current level taps or solid state regulated chip circuits to energize all the varied COTS products m the PFN.
  • These prototype voltages are 1.5 vdc, 3.vdc, 6 vdc, 7.5 vdc, 9vdc, 12 vdc, 14.5 vdc.
  • 2E03 receives its power from a 120 vac circuit that is created from the host vehicles 12vdc supply of 6 amps and the PFN battery pack energizing an inverter of 250 watts 2E03, which also supplies 120vac to a plug prt.#2E14 m the front stainless steel access plate for other devices that people might need 120 volts AC, e.g., small heating blanket, coffee pot and/or hair dryer.
  • This scanning interface is only one example most all the of these COTS devices have their own interfaces to allow them to communicate with any onboard computer they are connected to, e.g., serial or TTL, etc. And any of the IC components would be all part of a circuit if it was in the secure lock up as a mandated circuit function by law.
  • 1206 is a connector for a cellular phone, and on the back of the tray are a number of different sockets for data transfer cables to the 503 wire race or cable channel that goes from top to bottom in the containment.
  • FIGURE 2F Along with many other secure sealing mechanisms this technology provides an additional security feature for the PFN secure on board memory as well as, any other necessary electronic parts e.g. communication equipment processors, memory locating equipment and emergency power to complete all PFN operations.
  • Figure 2F is utilizing one thousand series numbers m all related patents because it uses the trickster circuits relay systems to activate the heater wire to release the seal to physically enter the safe box memory containment section of any PFN
  • the trickster circuits are a unique proprietary micro relay signal system that generate a specific signal via a micro processor and com link to inexpensively create an artificial signal that triggers a specifically desired response from a preexisting control system and its standard circuitry.
  • 2F10 25 is the security relay switch and can be a silicon relay with a gate lead 2F 1033 or a standard mechanical relay where 2F1033 would be one of the leads to a primary coil the other terminal would be connected to the opposite pole in this circuit.
  • 2F1026 is a wire or thin piece of conductible metal covered in a substance that will melt when heated to 300 degrees F or something less (application specific) the prototypes will use a product call polysulphone which is a heat resistant plastic.
  • JF1027 is the plastic well anchors for the seal with galleys to accept the liquid plastic during an authorized installation of clean memory and the removal of a un-tampered memory component. They are positioned structurally around the access door and are stamped with an registered ID number for legitimate access to this compartment.
  • 2F1034 is the negative terminal and can be provided a contact terminal or wire to ground in the automotive applications.
  • 2F1035 is the positive lead and it too can be provided a terminal or wired to a fused positive lead with the appropriate hard wiring and fuse amperage.
  • 1030 is the negative power lead and 2F1029 is the positive power lead.
  • 2F1031 is the processor and can send the appropriate signal to the gate circuit out fitted with a 2F1003 trickster circuit that is resisted to a set signal, or the processor can energize the other side of a mechanical relay 1025 and there by turn on the current and melt the plastic seal.
  • 2F1032 can be used to send the correct electrical signal to switch the security relay 2F1025 and its resisted trickster circuit also energizing the seal system separate of the processor in the event the processor has been compromised.
  • 2G1036 is the physical lock throws through the side of the PFN. These can be operated physically and/or electrically if so desired.
  • 2G1037 is the key slot cylinder and this cylinder can be constructed like the new ignition cylinders and outfitted to read a resister chip in the key to activate the SR or switch part 2G1025 in figure 2G and melt the seal the seal 2F1026 that goes around the entire access door and passes through the SA anchor seals.
  • SGI 038 is the secure box itself So there will not be any misunderstanding the PFN box can provide interfacing protection and security to a lot of electrical components and personal property items , however the memory storage and any circuits responsible for TRAC routing or PFN/TRAC completed operations will be provided the highest level of security and protection. These components or linked devices will be electrically secured and physically secured in the certified or sanctioned area with locks and seal to protect the memory at a level that can be used as legal evidence and to insure a tamper proof environment as much as possible to maintain credibility for the data stored in memory.
  • the PFN computers can query any receiving unit for specific addressed FACT commands given to its PFN ESN or the host equipment's ESN to all legitimate law enforcement and the proper authorities many communicative avenues for long and short range simultaneous control of a suspect car or out of confrol vehicle or piece of equipment
  • PFN structure shape and size will be governed to some extent by the hardware employed.
  • Some exterior containment might be the same for one and two-way pagers and the same for many of the solid and/or integrated circuit evolution's and combinations.
  • the containment will house the standardized TRACVFACT Software m a processor and/or any and all accompanying IC chip sets for pager cellular phone, RF circuits, and GPS. And/or interface any current COTS communication products or devices through the modalities detailed throughout all this technology's related patent applications. This versatility will be replaced with universal interfaces, components and structures as a progressive accountable focal node for all automated and remote control functions as are created for these specific applications and in the areas on mobile management, home management, commercial management, and control security technology.
  • the drawing also illustrates monitoring, remote control and/or management systems from the local level to the global level.
  • This figure is utilized in other related applications 202 and 300.
  • the 300 network displayed at the top of the figure three is the basis and structure forl 100 and 1200 series monitoring and confrol systems.
  • This networking can support this technology's "green eyes” and “spider eyes programs” at varying levels of public involvement and acceptance with varying levels of security, either as part of the Internet or m part as isolated networks interfaced and protected behind fire walls from general view on the Web if so desired.
  • the data and its use will be determined by the public, its governing bodies, processes and agencies to set the appropriate rules, regulations, laws, specifications, codes and standards, for any Internet and/or world wide web engagement and the equipment use.
  • this machine messaging network MMN interfaced with the web WWW and utilizing the detailed communication systems of phone nodes, modems RF equipment interfaced with gateway computers can provide all the secure connectability for servers and providers to commercially full fill all the above detailed primary and sub programs desired to be run in a PFN TRAC ⁇ FACT ⁇ CEW software programs in a module form or m any manner prescribed by any and all governing laws, rules and regulations to insure accountable remote and automated confrol and/or management.
  • In the top local section 108 or 1208 in the 300 patent application is one remote storage but a plurality of memory storage is possible and probable in many applications throughout any of the networking.
  • the figure also shows all the qualities and peripherals, as well as, the security systems for conditioning any two-way transmissions.
  • the two directional dotted line on the right represents two-way transmissions and has the letters DES on the left side which is an abbreviation for Data Encryption Standard and PGP on the right which is an abbreviation for Pretty Good Protection.
  • DES is a protected government technology that has specific hardware, for high security data.
  • the software or embedded firmware for the government is handled strictly and provided through the government for their high secu ⁇ ty applications.
  • This invention would of course be capable of employing this DES security system protocol on all of its one or two-way transmissions between devices, e.g., PFN's TRAC ⁇ FACT ⁇ CEW system computers terminals and/or gateways, their wireless and/or any land line communications to PFNs as deemed necessary or standardized. Or to other networked terminals and/or any data storage systems that were approved for this type of security system by the government or its authorized agencies, the Justice department FBI or any national security agencies the Secret Service ,CIA and DOD etc.
  • This technology has been designed to provide more organized confrol and accountability to humanities equipment, machinery and vehicles for the optimal management of the equipment to increase public safety, national security while improving the quality of life for the individual with the respect for their privacy.
  • This requires accountability for the collection and use of PFN TRACVFACT data and/or any other parallel remote control and monitoring technologies.
  • the use of these technologies have to have the best temper proof measures and the strictest criminal and civil penalties for any miss use or abuse of data; either when it is collected or dispersed in a reckless and/or negligent manner.
  • PGP is the commercial versions of encrypted data. And as explained earlier there is a great number of such systems that can afford reasonably good protection for many security programs. Some of these are just software down loads and can be part of the software in a PFN TRAC ⁇ CEW system and capable of running an encryption program piggy backed through other servers signal conditioning software. As detailed earlier the primary programs software will delineate restricted data from unrest ⁇ cted data if so desired and this capability exists for DES with hardware chip sets and embedded software or firmware, as well as, solely performed by software programs .
  • both ends of the transmission must be equipped to electronically cipher and decipher through a encryption and de- encryption key program no mater which technology is used and m what form of hardware , hardware embedded software firmware, or solely software added to any existing hardware either in the processor or computer section of a PFN , its modem circuitry, and/or as part of any of its communication devices circuits and/or any remote monitoring control management and storage system responsive to any PFN TRAC unit. ** These security protocols for the highest security have to be maintained in every transmission including throughout the 300 network for wireless and land wired systems and this is why the phase
  • Standard Security Protocols (with arrows) parallels the horizontal 300 network labeled world — local — and sectional. Sectional represents states, regions, or areas more geographically located or electronically designated.
  • the basic reason the encryption protocols are only shown on the two-way transmission PFNs is, because, they could be broadcasting secure installation video and other sensitive telemetry data from a e.g. compound or installation. It may not be as necessary to protect one-way directional remote control communications in all security applications or in many of the management applications, because, there will be less of them transmitting data back and thus more difficult to figure out their purpose or instructional command codes. However, in the highest of security applications signal encryption may be required as well, for one-way command level remote control , and therefore is shown as a possibility m drawing 4 number 403 .
  • 301 is the two-way communication device with the DES and the PGP systems on each side showing the options of encryption and the small arrow to the right of PGP points to the right block as a 2 stage memory on board the two-way PFN, which are parts numbered 105-107 in figure one.
  • Number 302 is a line list of possible accountable functions for full remote control and remote monitored robotics. At least one variation of this two-way PFN will completely support all of these functions including any special sensors, e.g GPS or locating equipment, identification systems environmental sensors, audio video systems, all machine controls and will monitor all machine sensors.
  • 301 memory storage are shown here as a plurality of local memory. One a current running loop of application specific determined length and content. And the other local memory a application specific incident based or event storage.
  • This second data storage is permanent and housed in a protected area with special authorization necessary to physically and/or electronically to access the data.
  • the proprietary design also, provides either a redundant storage of this same incident or event data in at least one remote location or a limited message flag (for the data limited two-way pager systems) to be sent to an appropriate authorized monitoring E-mail address, or computer network or RF receiving node. While these memories are detailed m a plurality for local and remote locations this is merely done to provide these options for any standards effort that can be applied to the application specific protocols and areas
  • 303 points to the simple one-way receiver PFN.
  • the dotted line coming down from the top depicts the one-way communication for one-way remote control of equipment.
  • 303 also can support the same two stage local memory storage. With this one-way system, there is no wireless remote storage, without the physical removal of the data or through local physical connections. There is no report back function in real time if the one-way system is the only for of communication.
  • the one-way system can also support the same processor capacity to do all the same functions as the more sophisticated two-way PFN, but is limited in remote control by not having a real time monitoring in a remote location to guide tasks by video.
  • the 303 one-way system must have its data recovered physically through a secure download communication port.
  • This interface communication port can, also, be in place on the two-way PFNs if so desired.
  • remote confrol functions can be preprogrammed and/or guided and/or confirmed through other two-way PFNs on location that can video the one-way PFN systems host and/or report on other telemetry data about the one-way PFN that warrants specific remote commands. So by teaming one and two-way PFNs one can provide a complete remote control system for the one-way PFN. Total accountability is still provided in two levels m the one-way PFN (re-w ⁇ teable and permanent) .
  • an extendible and retractable connector either hydraulic, air or electrically activated and controlled can connect the one-way PFN to any of the communication ports on same equipped two-way PFN to report back any pertinent data that needs near real time consideration.
  • an extendible and retractable connector either hydraulic, air or electrically activated and controlled can connect the one-way PFN to any of the communication ports on same equipped two-way PFN to report back any pertinent data that needs near real time consideration.
  • only one two-way PFN mobile device could recover data from all the inexpensive one-way PFNs and report it back to the remote monitoring and remote control system.
  • This mobile two-way PFN could also accompany any one-way PFN to give report back data for real time remote control of the one-way PFN equipped machine whether it was stationary or mobile one-way PFN.
  • 304 Illustrates all the same functions that are listed for the two-way PFN and states that it has only a physical retrieval accountability for any data stored.
  • 305 is a block at the bottom of the page and its functions can be performed by both the one and two-way PFNs.
  • 305 is any special sensors section that will be gathering application specific data for these any applications e.g. environfnent, radiation counters that transduce the number of Rads or particle strikes into an electronic signal for the processor software to evaluate through compare lists set up for an application specific PFN or as burned in firmware on simple device where a simple PFNs is set up as to sense an environment. If this PFN is at an installation or in a remote location it will be powered by solar cells to recharge its batteries.
  • special sensors will be many different applications specific sensors that send an elecfrical signal to applications specific software programs in the PFNs .
  • the TRAC system will be programmed special to handle specific functions for specialized sensing, e.g., like hydraulic weight sensors. Many of these peripheral devices and sensors exist as COTS products and there are flexible software products that can be easily adapted to support these applications.
  • Another 305 special sensor is the nose.
  • This sensor which is a sensor that can identify odors 2000 times more accurately than the human nose and is capable of discriminating substances and matter at a molecular and even atomic level.
  • This sensor already designed to deliver unique electronic signals for its application specific software compare list library of known substances will serve well m high security applications to identify biological and chemical toxins explosives e.g. potassium nitrates etc., and leaks m regular chemical containers in any commercial or governmental installations airports.
  • a mobile PFN TRAC system preferably a two-way PFN on a host machine full accountable robotics can be provided for most any hazardous environment and/or contraband search task.
  • the PFNs could operate electrically controlled weapons in unmanned equipment that was damaged or unmanned either due to the loss of life or to prevent the loss of life by using the machinery and equipment through remote control and or full robotics ( based on the level of PFN computers and onboard programming).
  • the options are vast and varied to improve security and safety for all facets of remote control protocols.
  • audio recordings would be m a native language which can be remotely sent as precursors to any physical intervention .
  • a persuasive protocol e.g., water cannon, tear gas , rubber bullets and all the way to a final lethal weapon activation as a last resort to save lives and preserve a peace accord).
  • PFN armored machines and/or equipment would be all terrain like tanks, track vehicles, hum Vs wheeled vehicles, hovercrafts, etc.
  • the FAA could more readily organize and develop the car-plane technology with this invention .
  • the PFN will be invaluable in consolidating the accountable black box, communication systems and locating equipment all m one concise system that is easily tailored for monitoring and controlling an ever increasing numbers of these car planes in the future.
  • the PFN TRAC system is an ideal system to organize and initiate this effort for present travel and the next millennium .
  • the PFN capability to down load instructions from the out side e.g. a control center for air traffic could confrol a plane from a remote location coordinating the air crafts actions and sensing its environment and the air ports position and condition and provide the best glide path or course of action in real time aggressive controls e.g the auto pilot controls for any inexperience or compromised pilot through to safely land any aircraft either with human operational assistance or completely by computer control.
  • FIGURE 3A This figure is self explanatory in the properties of the most generally used communication devices m the PFN/TRAC system. However a brief review of the cart can help to better understand the use of the devices and guide their use in application and standards consideration.
  • the left side column is the communication devices themselves.
  • LD LIMITED DISTANCE Across the top are activities performed by the PFN such as Audio Video data athe ⁇ ng, machine activity controls and telemetry, personal or operator telemetry, environmental telemetry.
  • activities performed by the PFN such as Audio Video data athe ⁇ ng, machine activity controls and telemetry, personal or operator telemetry, environmental telemetry.
  • This chart can be referred to when reading and reviewing figures Three Four Five and Six with all the different types of communications detailed. This chart will quickly provide the basic on board record and report back properties and data storage options that can be expected from any particular type of PFN by the communication devices they are employing.
  • This drawing is of the simplest one-way communication PFN and these basic electronics have already been prototype used and proven from and for the other related patent applications.
  • This device in its most basic form will not report back to any remote control and monito ⁇ ng system, but can be sent messages, which will activate preprogrammed responses.
  • This is the basic encryption of a one-way PFN, but, as was earlier desc ⁇ bed m figure 3 these units when used m concert with the other two-way PFNs can transfer their data and thereby have the two-way PFN report the data to a remote location. It also should be noted that this can also be accomplished though a land line comport available to a one-way mobile PFNs (provided it is outfitted with the proper DET data encrypted terminal as part of the land line connection or a one-way
  • 300 block of boxes is the world wide sectional and local network gate ways to send data to the one-way PFNs as indicated by the thm dotted arrow passing between the wireless transmission box and the security level 403 DES ⁇ PGP box.
  • the question mark in the 403 box is there because it is optional security for one-way transmissions into a secure installation as was discussed earlier.
  • PFN containment is a series of boxes which are all components of the PFN. These components described here are all individual COTS products that can be interfaced as separate devices or IC COTS components integrated and connected or hard wired together or as combinations of devices and IC components to provide the hardware to support TRAC software.
  • the invention has its own proprietary configurations that are detailed in many different modalities throughout all the related filings. And the invention's PFNs and TRAC remote confrol system is capable of interfacing with many other already existing components and systems to enhance any remote control product with greater accountability, secu ⁇ ty and management.
  • This invention was and always has been expressly designed in this manner to provide a secure physical platform and electrical interface to focus, organize and help standardize remote confrol functions for all equipment in every application.
  • the TRAC software protocols are designed to continue this security and provide accountability to the system from the PFN to any network the system it is interfaced with .
  • the invention's TRAC programs can be stand alone products or a set of interfaced devices which can be married to any existing system (modular) and add to both creating a better set of products and/or better remote control, management and monitoring systems.
  • To the right 400 is the standard pager as one of the one-way receivers and this circuitry is detailed in the first patent.
  • 401 another one-way option receiver could be any type of radio receiver on any frequency and all the frequencies are listed in the 60-108 related patent and also here as figures 9 and 10.
  • 402 is a combination of communication and processor functions integrated and combined into one system and a specific COTS product made by Motorola Corporation, called "Create a Link, and is one product that serves as a prime example of the inventions versatile application in utilizing other technologies as part of the protected interface and accountable data storage components rather than this proprietary pager technology and parallax mini computer if so desired.
  • the TRAC protocol would be programmed into the Motorola software or firmware to authorize software commands, authenticate remote control activity and store it in the appropriate storage. And for certain applications this might be part of an ideal configuration for some application specific PFN's if the functions did not require great amounts of report back data to remote locations.
  • the mini computer box directly below, the COTS receiver processor (Create a link) or comparable device is for the traditional PFN computers either the Basic stamp computers I, II or the planned Euro- boards 188 , 386 and 486 or even those with Pentium processors, that were described m PCT application No. PCT US99/00919 (202).
  • the choices of computer processors is once again application specific with the 386 or higher processor being necessary to support better quality video applications with reasonable speed, smoothness, and quality, for digital applications, However, snapshot video applications can be achieved with smaller and less capable processors.
  • the first prototypes are planned for analog video systems and simple processors to prove feasibility and the digital systems will accompany the more sophisticated minicomputers and special TRAC programming This can lower video and audio cost for these applications but, will be more costly in the processor system in the beginning.
  • These first video systems will document cabin activities and external activities, and then evolve as an intricate guidance tool for automated and remote control guidance To use video to aggressively remotely control a vehicle and/or drive it through automated activity controls it will require extra sensors as to steering parts position speed and the activity confrols on the acceleration and braking functions to effectively and remotely control a machine in real time . And other criterion is video quality and properties especially for the report back function which will determine the capability and speed of the vehicles that can be managed through remote control operations.
  • the on board communication systems e.g.
  • the Mini computer box To the right of the Mini computer box is the little box GPS number 407 and it is the global positioning system or it can be any type of locating equipment either a separate hand held device interfaced with cables or as an integrated chip set circuit hardwired into the computer or processor, or as merely a chip set. Or it might well be a cellular phone triangulation tracking system. All of which can also be in the form of IC cards with edge connectors that plug into the Euro-board 100 mini computers detailed in the related patent application as mentioned above and incorporated herein by reference. These would be the hardware components to run the TRAC programmable authorization and authentication as well as, operate and manage the record storage and provide hot geographic coordinates and time synchronization data or confirmation for the local TRAC module clock.
  • the HPC box to the left of the mini computer box is the Host machines Programmable
  • Computer or control circuit and/or processor This can be the only computer in the secure interface or it can be interfaced with other control circuits or processors either proprietary and/or other COTS products which are coupled m the secure interface and made a more reliable , accountable monitoring and remote control device termed a PFN which stands for (protected ) Primary Focal Node.
  • the PFN is designed specifically with versatility to provide a physical platform with a universal elecfrical set of plug and play interfaces and accountable TRACYFACT software to develop a logical organization and manageability for remote control and robotics to meet societies legal needs for all these related technologies and their combined functions.
  • This focal point (PFN) on each piece of equipment housing and linking all electrical control circuits with host peripherals and sensors to offboard monito ⁇ ng and remote controls provide the organization, security and accountability through TRAC software and memory storage for society to meet insurance and security concerns for the use of aggressive remote control and robotics. And above all the PFN and TRAC gives organization and structure to write a Standard to for remote control and robotics applications for all possibilities and applications.
  • the PFN TRACYFACT system combines and focuses communication control circuits and data storage in one safe and secure accountable local location so that DOD, DOT HIGHWAY SAFETY AGENCIES, FAA, FCC, FBI, CIA, LAW ENFORCEMENT PROFESSIONAL ORGANIZATIONS, E.G.
  • IEEE AND THE MANY INDUSTRY STANDARDS AND WATCH DOG GROUPS can form a standards effort with the major auto manufactures and equipment and machine manufactures m every possible area.
  • the invention has been expressly designed to help create a responsible organized modality to this emerging area of merging technologies and help to marry it well to societies laws and needs.
  • the host equipment interface which would be merely a multi-pm interface connector from the box if the HPC is contained with m the PFN.
  • the lower blocks below 404 is the sensory or telemetry data gathered on the machine and/or operator, and the box to the right represents the functional control of devices or accessories on the host equipment. With these two functions combined the Equipment operation can be achieve through remote confrol and monitoring all as part of an entire network.
  • PFN the secure and accountable TRAC and/or FACT and/or CEW interface and applications. 405 Points out that these data storage components and in fact all the PFN devices and components are detailed extensively in PCT/US99/00919 (202). However the planned universal prototypes in the security area will be detailed presently as to the proprietary devices components and system functions excluding application specific configurations (soft ware) TRAC for Trusted Remote
  • TRAC the programmable and modular software and varies in structure and format based on the different hardware implementations weather it is COTS based, PC, Programmable Controller (Stamp); Or if it is custom, logic Sequencer, micro processor, FPGA (field
  • TRAC Interfaces/Software will have algorithms for BANK/Stock Exchange Transaction— FACTVCEW Products . And many of these will be supported pre-existing COTS products running through the protected primary focal nodes TRAC software.
  • PAGSSS software which has numerous variations but basically it is the proprietary automated guidance slowing stopping and securing of a vehicle through remote control as an evolution of PASSS.
  • Other software specifications include the use of a Commercial: 128/64 bit Encryption for web transactions. And for high security in government and military applications: DES the (Data Encrypted Standard).
  • the interfaces and connectors are named extensively in the related patents however , presently the Automobile industry is planning to start a standardization effort for electrical connect-ability of accessories.
  • This standardization effort has been the focus for all the related patent applications starting from the real time stop and control box with accountability through the further development of the PFN and this invention looks forward to participating in any effort to develop H-Rel universal electrical connectors, and can offer the actuators, sensor protocols, signal levels in the aggressive automated and remote control devices to reach deeper into a standards effort in this area.
  • the PFN has been created as an accountable organizational interface for all a host piece of equipment's electrical devices, audio sound, video, recording, memory storage processors, computers and communication systems.
  • the PFN TRAC system can support on and offboard security control and management for all PFN interfaced equipment This is an important quality to any standard proposed for the auto industry along with accountability and physical protection. Just the organizational platform has tremendous value to any such standards effort for electronic in the auto industry This technology will be constructing prototypes with these interfaces anyway and a collaborative effort is always welcome when ever possible. Telephony is another industry interface with Digital Cellular, PCS, 56K modem, Pager
  • FIGURE 5 shows RF signal and light transmission equipment so listed in figure nine and ten of this application and/or detailed in earlier related applications.
  • the off board can be as simple as an application specific Email or warning flag detailing the PFN TRAC systems ESN electronic serial number to a privately owned or personal E-mail address or it can provide its data to any number of more extensive memory record systems for any specified event or incident as might be mandated as a standard operation or function legislated by law or developed to standardize accountable real-time remote and automated confrols or system management functions.
  • any of the two-way pagers can be sent messages, which will activate preprogrammed responses as is the case with one-way paging.
  • PFN two-way paging protocol
  • PFN two-way paging protocol
  • transmitters and/or land line Data Encrypted Terminals or (DETs) can transfer more of their secu ⁇ ty data efficiently to a remote location
  • DETs land line Data Encrypted Terminals
  • preprogramming in the PFN computer can send a series of 20 character messages to a remote location, where the monitoring software can reconstruct the whole message.
  • Another option is multi-paging devices that can be combined to send a large data message with different carrier frequencies for each paging device. This would increase the difficulty m intercepting the entire signal or message being reported. (Motorola's Reflex two-way paging protocols are being referenced here for all of these options basically, the ERMES products are still under development.)
  • these two-way PFNs can also accomplish data transfer though regular land line comport connections where ever available provided the PFN is already out fitted with DES chips or PGP software for its wireless transmission capabilities, (if not, it will have to send its data through a local DET comport which will probably be hard wired to the local monitor and remote confrol station or network gateway). All one and two-way PFN's processors and/or mini computers will be capable of generating dial up phone tones to connect to a phone node if so desired and deliver direct communication from the computer to any hardwired monitoring center. And of course if land line connections are available for HS and MS secu ⁇ ty they will have the necessary sending and receiving equipment and TRAC/FACT and/or CEW software systems and programs to handle the encrypted signal.
  • PFN containment is a series of boxes, which are all components of the PFN and housed withm the containment. These components are all individual COTS products that can be interfaced as separate devices or IC- COTS components integrated and connected and/or hard wired together to form combinations of devices and IC components.
  • the invention has its own proprietary components and configurations that are detailed as many different modalities throughout all the related filings. And the invention's PFNs and remote confrol system is capable of interfacing with many other already existing components and systems to enhance any remote control product and/or security system in many ways.
  • the invention was and always has been expressly designed in this manner to provide a secure physical platform and elecfrical interface to focus, organize and help standardize these functions for all remote controlled equipment for every application.
  • the invention can be a stand alone device and/or system of any size (or a set of interfaced devices systems and networks) or it can be married to any existing system and add to both by creating a better set of products capabilities and remote confrols in any monito ⁇ ng system as well as provide accountability through the TRAC/FACT and CEW software programs.
  • 501 another two-way optional transceiver, which could be any type of radio transceiver on any frequency and most all the frequencies are listed on figures 9 and 10. However, the allocated and dedicated frequencies are designated and many of them are shown on the allocation chart. These of course would be the ones used for the Government and other high level security protocols however as has been stated the pager and wireless phones can be commercial grade frequencies accompanied with encryption technology for security. For this reason other low cost public airway can be utilized with these same security protocols.
  • 502 is a combination of communication and processor functions integrated and combined into one system and is a specific COTS product made by Motorola Corporation, called "Create a link II".
  • the Mini computer box To the right of the Mini computer box is the little GPS box number 507 and it is the global positioning system or it can be any type of locating equipment Lorands, cellular t ⁇ angulation, LoJack etc. either as separate hand held devices interfaced with cables or as a integrated circuit hardwired into the computer or processor , or merely a chip set as has been described in a related patent application. The last two of which can also be in the form of cards with edge connectors that plug into the Euro- board 100 mini computers detailed in a related patent application as mentioned above and incorporated herein by reference.
  • the HPC box to the left of the mini computer box is the Host machines Programmable
  • Computer or control circuit and/or processor This can be the only computer in the secure interface or it can be interfaced with other confrol circuits or processors either proprietary and/or other COTS products which are coupled m the secure interface and made a more reliable , accountable monitoring and remote confrol device termed a PFN which stands for (protected ) Primary Focal Node.
  • the PFN is designed specifically with versatility to provide a physical platform with a universal electrical set of interfaces to develop logical organization and manageability for remote confrol and robotics to meet societies legal needs for all these related technologies and their combined functions.
  • This focal point (PFN) on each piece of equipment housing and linking all electrical confrol circuits with host pe ⁇ pherals and sensors to offboard monitoring and remote controls provide the organization, security and accountability to justify to society and meet insurance and security concerns for the use of aggressive remote confrol and robotics .
  • PFN/TRAC/FACT/CEW system gives structure and/organization to write a Standard (for remote control and robotics applications by focusing communication control circuits and accountable data storage into one safe and secure location .
  • the invention has been expressly designed to help create a responsible organized modality to this emerging area of merging technologies and help to marry it well to societies laws and secu ⁇ ty needs.
  • the host equipment interface which would be merely an interface connector from the box if the HPC is contained with in the PFN .
  • the lower blocks below 504 is the sensory or telemetry data gathered on the machine and/or operator, and the box to the right represents the functional activity confrols of devices or accessories on the host equipment. With these two functions combined the Equipment operation can be achieve through remote control and monitoring all as part of an entire network
  • the center of the page and specifically the lower center there is three boxes displaying the two levels of on board memory storage with three accompanying numbers 105 , 106, 107 These numbers are used to delineate the different types of memory storage devices and not the actual number of devices employed in any specific PFN system.
  • TRAC the programmable and modular software and varies in structure and format based on the different hardware implementations weather it is COTS based, PC, Programmable Controller (Stamp); Or if it is custom, logic Sequencer, micro processor, FPGA (Field Programmer Gate Array) or a custom gate array. Even though these are not all displayed in the three figures m this application all of these hardware options will probably run some form of TRAC software m some application and therefore should be included as hardware implementations for this technologies PFN//TRAC/FACT/CEW.
  • TRAC Interfaces/Software will have algorithms for BANK/Stock Exchange Transaction Products. Many of these will be supported COTS products and through the primary TRAC/CEW software protocols. There will be other accountable programs for remotely piloted vehicles RPV, and this technologies prop ⁇ etary PASSS software for the automated slow stop and securing of a vehicle in a stationary position These will all be part of or have a FACT component to confrol these functions by the appropriate authorities in an accountable manner. And the PAGSSS software which has numerous variations but basically it is the prop ⁇ etary automated guidance slowing stopping and securing of a vehicle through remote control as an evolution of PASSS will also be responsive to Federal Access
  • This most sophisticated machine messaging PFN is being proto-typed to support and report every data signal sensed and provide any aggressive remote control for any devices by previously described proprietary technology and/or versatile interfacing with other technologies.
  • the cost will be proportionate to the level of sophistication and the amount of hardware, firmware, software, and pe ⁇ pherals required or desired .
  • Even the least expensive one-way PFNs can be ordered to activate or deactivate as well as control varied performance of what ever they are connected to. So the system cost can be greatly reduce by using the less expensive (page type) one and two-way PFNs where sophisticated real time video systems to monitor and record are not required form the remote control unit itself.
  • PFNs can still be utilized to wage an aggressive response where all friendly life has been removed from an environment, installation, machinery and/or vehicle if the extreme need exists to take radical action.
  • Any standard or specially installed accessory can be remotely controlled. From terminating the use of a piece of equipment by standard means, to energizing airbags on a te ⁇ o ⁇ st, to totally terminating a piece of equipment in a hostile situation through extraordinary means (by PFN detonations or explosives etc.).
  • the shepherd or watch dog unit can supply visual data to any remote monitor and control terminal.
  • This system can and should be armored and capable to support aggressive weapons e.g. surface high current capacitor shock equipment systems, laser and electro-magnetic wave weapons microwaves , sleeping agents, tear gas , water cannons , pepper spray, tazzor gun, net mortars, rubber bullets and convention automated machine gun, cannon and explosives for the extreme security scenarios.
  • aggressive weapons e.g. surface high current capacitor shock equipment systems, laser and electro-magnetic wave weapons microwaves , sleeping agents, tear gas , water cannons , pepper spray, tazzor gun, net mortars, rubber bullets and convention automated machine gun, cannon and explosives for the extreme security scenarios.
  • the host platform will dictate some of the conditions and restrictions to support any of these devices as well as any real need for any of these aggressive protective defense devices.
  • Identification systems can be employed to recognize f ⁇ endly's when they arrive and can take orders directly form them on location if need be. This can be accomplished through any and all forms of the short range communication systems already described that can even differentiate friendly from aggressors during a security incident or emergency with the technology already described throughout all the related patents e.g IrDA, and/or limited RF transmission devices other light transmissions and the phone system or any other RF transmitter (which will be personally coded device communicators limiting access by finger print or one of the many other Id systems previously detailed).
  • the PFN/TRAC system on any piece of equipment machine and/or vehicle will have a protected connector section that specifically provides the circuitry for these specialized secu ⁇ ty devices and protocols for the extreme aggressive protection and retaliation packages and options needed .
  • These devices will m many cases be part of regularly needed host equipment and naturally camouflaged and incorporated into their structures their appearance will be a natural and peaceful one, while harboring a great capability to provide varied levels of aggressive security with the least amount of friendly personnel in harms way.
  • This system for high security automated aggressive response will be known as the (“Trojan Horse defense System) (THS)
  • THS Trojan Horse defense System
  • TRAC /FACT/DES systems of course would have special considerations and guidelines set up for governmental and national security agencies, as well as, world organizations involved many of the most extreme PFN utilization's like TRAC's FACT/DES/ THS would be legislated policy and developed under the strictest security protocols.
  • the invention is merely the organizational platform to physically secure and electrically secure and/organize the appropriate components to provide the means to incorporate the public safety and national and world security options.
  • the Protected PFN data storage would support any reported record to justify any such decisions and their should be well-established procedural protocols for these security scenarios for, e.g., embassies, military installations, nuclear facilities, and any special security risks or treaty refereemg etc
  • PFN TRAC/FACT/THS system for any rapid deployment need. All the components are and will be proven and in most cases COTS products are in use presently. . Basically with this more sophisticated two-way communications there is once again data storage on board the host machine in the PFN at two separate locations, that can also be physically retrieved . However, these PFNs and TRAC software will have full report back capability on their own for every data stream to any desired remote confrol and monitoring system. And they are also capable of retrieving data from any less capable PFN as earlier mentioned and reporting their data back to the monitoring and control centers. This is accomplished through physical connections or IrDA communication ports and/or light or RF transmissions as has been detailed throughout the related patents.
  • PFN/TRAC Protected Primary Focal Node
  • the more sophisticated PFN has been chosen to elaborate on the High security activity controls in general but this does not mean that these extreme aggressive controls are not available on the less sophisticated one and two-way paging or RF or short range cordless phone communication systems. This may very well be the case and especially when used in concert with one or two sophisticated PFN systems or other security surveillance systems.
  • TRAC's FACT program that will carry some high level security control encrypted Commands to allow the proper authorities to control any and all equipment, machinery, and vehicles m a state of emergency. This of course will be determined by the public and its governing bodies and agencies.
  • the Protected Primary Focal Node/Trusted Remote Activity Controller/ Federal Access and Control Technology or PFN TRAC FACT system is designed to be accountable to all parties using and effected by machine use and its impacts.
  • Accountable Aggressive Remote and Automated Control scenarios and real-time control security functions is just two of the many real-time management task performed in an accountable manner by the PFN/TRAC/FACT/CEW system.
  • PFN containment is a series of boxes which are all components of the PFN. These components are all individual COTS products that can be interfaced as separate devices or IC COTS components integrated and connected or hard wired together or as combinations of devices and IC components.
  • the invention has its own proprietary configurations that are detailed in many different modalities throughout all the related filings.
  • the invention's PFNs and remote control system is capable of interfacing with many other already existing components and systems to enhance any remote control product and/or security system m many ways.
  • This invention was and always has been expressly designed in this manner to provide a secure physical platform and electrical interface to focus, organize and help standardize these functions for all equipment m every application.
  • the invention can be a stand alone system or a set of interfaced devices or it can be married to any existing system and add to both to create a better set of products and remote control or management and monitoring system.
  • 601 another two-way transceiver option could be any type of radio frequency unit on any frequency and all the frequencies are listed on figures 9 and 10.
  • the government has a multitude of special application frequencies that might be a requirement for any application specific use, so this is always going to be an option m any PFN for any uses but most especially for high security applications 602 can be a combination of communication and processor functions integrated consolidated and combined into one system and/or a specific COTS like the simplified switching device "Create a link" but more sophisticated and capable.
  • PCMCIA Card is a product that combines the Cellular phone technology and modem into one device with antenna for lap top computers to function m a wireless environment for phone data connections.
  • This particular COTS product has been singled out as one system that will be utilized m the secu ⁇ ty PFN prototypes and is mentioned here and will be totally detailed in the formal application
  • m the DES security mode the modem section will have to be modified to accommodate the DES chip set. or this function of encryption will be accomplished in the mini computer through down loaded modular software which will also be able to accommodate any DES chip sets and/or m the case of PGP encryption run any of the necessary software.
  • TRAC/FACT In many cases or applications of CEW commercial banking companies e.g. NCR, etc.
  • the PFNYTRACYFACT system will be structured to support all COTS software and all COTS software must provide for FACT identification e.g. ESN and special access to their programs and hardware or firmware to be used commercially as part of a standard to be developed on operating regulation in remote control and data management applications systems.
  • the COTS Transceiver processor option is for the traditional PFN computers either the Basic stamp computers I, II or the Euro boards 188 , 386 and 486 or even those with Pentium processors, that were described in an earlier patent application.
  • the choices of computer processors is once again application specific with the 386 or higher processor being necessary to support full digital video applications with reasonable speed, smoothness, and quality.
  • the other criterion that will give good video quality and properties for the report back function is the on board communication systems e.g. cellular or wireless phones and any other capable RF transmission equipment on board the host equipment and confrolled through the PFN.
  • This system is the shepherd or watch dog to better provide visuals for any of the less capable PFN units that have limited or restricted report back or video quality due to data size, band width, and transmission time capability especially in transmissions from the two-way paging system "Create a Link II" ( a Motorola Reflex protocol) or as is the case with the one-way (Pager) receiver as it is configured in figure 4 which has a total lack of any wireless report back functions m and of itself .
  • To the right of the Mini computer box is the little box GPS number 607 and it is the global positioning system or it can be any type of locating equipment either a separate hand held device interface with cables or as a integrated circuit hardwired into the computer or processor , or merely a chip set.
  • the PFN s can help wage an aggressive war, when and if that choice is unavoidable. Or bring a hostile event to an early closure with the least amount of lives lost.
  • the accurate locating systems consolidated in the PFN /TRAC hardware and software systems provide accurate geographic and time and date data for the everyday situations of machine use that can be authenticated as evidence grade data with the ESN from the resident PFN and host piece of equipment ESN along with all active device ESN in a command string header for contact and response.
  • the HPC box to the left of the mini computer box is the Host machines Programmable Computer or confrol circuit and/or processor.
  • This can be the only computer m the secure interface or it can be interfaced with other control circuits or processors either proprietary and/or other COTS products which are coupled in the secure mterface(s) and made a more reliable, accountable monitoring and remote confrol device termed a PFN which stands for (protected) Primary Focal Node.
  • the PFNYTRAC system is designed specifically with versatility and universality, to provide a physical platform, with a universal set of electrical connections and interfaces which are ideally standardized as much as possible.
  • TRAC authorization and authentication software controlling the local and remote event memory storage functions; to develop a logical organization and manageability for remote confrol and robotics to meet societies legal requirements and social needs for all the related technologies and their combined functions
  • This focal point (PFN) and TRAC software on each piece of equipment housing and linking all electrical control circuits with the host peripherals and sensors to offboard monitoring and remote controls provide the organization, security and accountability through the TRAC system, to justify to society and meet insurance and security concerns for the use of aggressive remote control and robotics m any scenario.
  • the lower blocks below 604 is the sensory or telemetry data gathered on the machine and/or operator, and the box to the ⁇ ght represents the functional confrol devices, or the activity confrol of devices and/or accessories on the host equipment, which will be standard automated controls for the machine and operator for the most part unless there is an application specific need.
  • any electrically controlled defense devices can be remotely controlled not only by this sophisticated PFN, but even by the simplest PFNs, while viewed by the sophisticated PFN or surveillance video cam and controlled remotely. And with these two functions combined any and all equipment operation is achieve through remote control and monitoring all as part of an entire local network that gives greater security options.
  • This provides tremendous back up and force to any security system with constant alternatives to regain control and stability m a threatened security environment and/or situation with the least risk to all life, which will always be proportionate to the skilled personnel, controllable equipment available, circumstances and the choices they make, which what ever they are; they can always be accountable ones in local memory and in the system's network.
  • TRAC the programmable and modular software and varies in structure and format based on the different hardware implementations weather it is COTS based, PC, Programmable Controller (Stamp); Or if it is custom, logic Sequencer, micro processor, FPGA (field Programmer Gate Array) or a custom gate array.
  • TRAC/FACT software Even though these are not all displayed in the three figures in this application all of these hardware options will probably run some form of TRAC/FACT software at least in some application and therefore should be included as hardware implementations or firmware implementations or even any form of modular software for this technologies PFN/ TRAC systems including FACT, CEW, THS or any of the application specific software systems Home, Commercial, Confrol high, medium and/or general security and/or mobile control and management for either surface, land/or sea or air and space.
  • This invention has been develop to organize and coordinate an accountable electrical interface for every type of electronic equipment used on any type of equipment and provide a tracking service to confrol any illegal unlawful, unauthorized and/or dangerous use, misuse or abuse of equipment and/or to help thwart any criminal or negative impact on society, its economy, the environment and/or any of societies infrastructures. This is accomplished through the TRAC/FACT system of identity tracking that will require legislated law rules and regulations to be applied to this great innovative technology's National part, component, device and equipment Registry that can eliminate theft, misuse of property and make any and all components fully accountable for their actions in remote and automated confrol scenarios but also their impact on others and the environment.
  • this invention looks forward to participating in any standards effort to develop H-Rel universal electrical connectors, and can offer actuators, sensor protocols, security FACT chip signal systems for use in aggressive automated and remote control devices which can reach deeper into a standards effort in this area to develop this National Registry detailed m figures 16, 17, 18, 19, 20, 21 &, 22.
  • This technology will be constructing prototypes with these interfaces anyway and a collaborative effort is always welcome when ever possible.
  • Telephony is another industry interface with Digital Cellular, PCS, and 56K modem, Pager Technology as well as the varied RF signal and light transmission equipment. Which are configured to run all the PFN/TRAC/FACT/CEW and/or the high security programs like THS with DES chip insertion.
  • TRAC/FACT/DES accountability aspect will serve well to properly use automated and remote controlled force in real-time anywhere in the world and fairly review that use thereby keeping it at the correct level and help and to present the truth in any conflict area to aid in resolving mis-trust and paranoia and separate it from real threats and fear .
  • PASSS Small Stop and Secure all vehicles and or equipment
  • PGASSS second generation Guide Slow Stop and Secure
  • PFNYTRAC can provide objective records in a constitutional manner for all, disputes it will become much more clear and easier to resolve disputes, and open the road for civilization to share confrol of all machinery with other individuals and automated control systems.
  • the PFNYTRAC system can provide the means to value operation and system use as well as individual failures of man and the equipment, and m many cases provide fail safe systems as well or a least detect when a system has failed and become unpredictable and unaccountable.
  • This invention is an ideal way to usher in the shared control scenarios of man and machine in the future in a sane and fair manner.
  • the use and the laws governing any abuse will be determined by the people and their duly elected governing bodies and appropriate government agencies police systems civilly and armed forces globally. Policy will be determined by the appropriate levels of governing organization for the strategic and/or defense use deployment and protocols of the PFNYTRACYFACTYDES systems with COTS products around the world.
  • the invention can help manage and/or control and witness altercations and disputes to provide fair and correct review and accountability for the events and actions taken . And this invention could of course be coupled with world organizations and all involved countries to determine application and use whenever conceivable and possible.
  • FIGURE 6A This figure six was used to explain the total social impact and growth of this technology and figure 6a will show how the invention stays current with the future developments and still provides all the properties and qualities, while the technologies merge and consolidate together. This is done to leave no doubt in anyone skilled in the arts that the total impact and development of the invention has been visualized and is thoroughly detailed for its full technical nature, scope and value but also, for its total use impact on humanity and the environment for the present and long into the future.
  • FIGURE 6A
  • 6A1 is any and/or all telephony technology from land lines to cellular, wireless and/or satellite .
  • 6A2 is any and all radio frequency equipment both receiver, transmitters, and/or any combination transceivers that are interfaced m and through the PFN.
  • 6A1 an 6Aw ⁇ ll be combined and interfaced as is the case with some phone radio system e.g. like NEXTEL products and Motorola has other radio and telephony combinations including pager activities. So it is obvious that these will combine into one personalized communication center and that this multi device will be a functional interfaced component in this invention The PFN/TRAC/FACT/CEW.
  • This hardware connectable structure is termed the multi-bus Comm Link. It will support a universal plug and play capacity of standard varied connections as has been desc ⁇ bed in PCT related applications for backward engineering and will also provide digital confrol signals modulated on the power line by the super modem to the individual devices and components which will be individually addressed by the PFN programming through their individual FACT identity chips and then given the appropriate data ESN/LOT#FCC spec or any other product control and ID data.
  • the super modem also supports the uni-bus internal link in the same manner. This is not per/se a new Modem or modem design standard. But the integration in the PFN first level converting circuits to be incorporated and handle application programs from the host machines application specific activity controls and sensors. It will allow for standard connectables with special adapters and also provide for a control signal which is a modulated digital signal sent out on the power lead to individual activity controls, sensors, operator telemetry and to handle Audio and video digital signals..
  • the super modem 6A(UTU) is a universal transposing unit and will be able to handle analog to digital conversion, digital to analog conversion, all encoding, decoding and encryption processors either in its firmware or in its installed software running in the mini-computer section.
  • This modem section can m the future be integrated directly into the communication devices and/or combined with the mini-computer section or they might well all be integrated together in hardware and accompanied with the FACT mam processor software (that is system or component failure sensitive with memory storage to confirm functional reliability and emergency power supply and charger circuit as one single protected and sealed protected PFN integrated circuit. If so this is still withm the nature and scope of the invention and its purpose. Also fiber optics as was detailed in an earlier PCT patent application and may be used to carry confrol and monitoring signals. In this case the appropriate sensor and converter would be part of the super modem interface and any responsive peripheral circuitry.
  • Multi-Bus Comm Link there will be a universal antenna buss properly shielded grounded and/or filtered to provide lower or no noise. Or this universal antenna will be run separately.
  • 6A PFN Core will incorporate 6A1 through 6A4 with memory storage 105 through 106 in one self contained protected containment and integrated circuit with a uni-bus internal interface connector link for any and all past present and future accessories desired.
  • 6A4 and 6A5 illustrate this present interface capability. It should be well understood through this figure that any consolidation and/or combination of communication technology, computing, or controlling processors and memory storage that is used to monitor manage and confrol man and machine interaction and individual activities from a protected environment and provides accountability falls with in the nature and scope of this invention.
  • the gate 700 is the gate into the secured or fenced in area with a PFN which will receive a signal from any vehicle ⁇ equipment entering the restricted area.
  • the signal will contain ESNVTN and or SR numbers or any specific identification information for any vehicle and/or equipment being brought into the compound Also any personal identification and/or fingerprint and/or PIN verification will also be a requirement for any accompanying personnel. If the proper identification is authenticated for an authorized entry the PFN will activate any gate motors and permit entry , even in a un-manned setting if the environment is uninhabitable for humans or is part of a desired automated an or secu ⁇ ty protocol.
  • 701 all the way up in the upper left hand corner of the figure shows a guard or observation tower that could also house the local computer monitoring and control terminal like the one represented m the drawing by the little picture of a man at a computer terminal 300L.m the lowers left hand corner.
  • Just down from 701 is some frees just out side the perimeter fence and this is another PFN which can be application specifically designed to do a number of functions.
  • 702 shows either satellite reception and/or transmission capability from some security compounds and/or government installations using high secu ⁇ ty DES and DET systems for direct satellite networking. These are special frequencies and if a necessity they would be the radio communication systems in the secure PFNs or they would use short range transceivers to the local monitoring gateway computer terminal and rely on a repeater function of the gateway to send the satellite the signal.
  • 703 in the top middle of the drawing is a phone to indicate that the monitoring and remote confrol system is also hooked to land lines .
  • These land lines in the high security application will be Data Encryption Terminal (DET) in which chip sets will be in the gateway computer modem and/or terminal hardwiring to send sensitive data encrypted and also on any computers networked with the it.
  • DET Data Encryption Terminal
  • PFNs one on any back up oil burning super heater or boiler for steam generation and the on the nuclear concrete steam generator and containment exhaust. These can be placed in areas that are difficult to access and rely on secure wireless communication and/or be used as back up to any pre-existing sensing system already in place to monitor exhaust gasses, toxins and/or pollutants. They can be used to activate vales as primary or secondary backups to hardware systems. And of course any hardwiring system would greatly benefit by the secure containment and multiple accountable data storage.
  • the smoke stack applications for PFN monitoring are only suggested possibilities the PFNs can be structured and set up to monitor and control and functions , the equipment, personnel and environment.
  • 704 shows a video camera that is part of the perimeter security or surveillance system and is either hardwired directly to the local gateway computer system and/or confrolled through the wires. Or it is reliant on wireless systems with the correct, level of a encryption technology (DES, PGP) to restrict any general access to the sensitive video images being broadcast from any interior secure areas m the installation or compound. 704 video camera can also be mobile as already described and claimed through out all the related patent applications. Most of the remote confrol mobile equipment will be outfitted with video cameras to keep accountable visual records on any and all remote and automated functions with the more sophisticated 2 way radio and cellular phone configurations in (fig 6) capable of reporting these encrypted signals back to at least one remote location thereby providing this same data to any network configuration if so desired.
  • DES level of a encryption technology
  • PFNs could be all that is needed for the confrols of any electronic camera guidance control of servo motors and their relays and/or any solid state electronic switch systems and/or mini processors being utilized as the control circuit.; if the standard land line communication system and or mam power was discontinued due to any difficulty or elevated expense in providing a particular camera in a specific location with these necessary component services to energize it and provide a communication path way. This could be done as a back up consideration or as the most optimum modality due to expense and environment.
  • a chest or locker which represents a secure containment and/or vault that will be housed in a underground pit or secure structure to store dangerous substances, e.g., radioactive products, by-products, and waste, Bio and medical products and waste, chemical products and waste, etc.
  • dangerous substances e.g., radioactive products, by-products, and waste, Bio and medical products and waste, chemical products and waste, etc.
  • radioactive warning sign There is around the locker a radioactive warning sign but there is also a bottle that is being used to represent the primary container for any of these toxic substances that would be stored in the special containment locker.
  • the bottle could be medical, bio, chemical, and/or nuclear waste (As being developed by Westmghouse and others (theses special glass containers are to secure nuclear waste in storage.)
  • the beaker just above the box represents a sensor or set of sensors and in this case of either chemical and/or bio sensor array with a PFN attached to it..
  • These application specific sensor a ⁇ ays would be placed in the soil surrounding the containment and/or positioned to sense the surrounding atmosphere and/or submerged in any area ground water supplies, e.g., aquifer, lakes, streams, rivers, bays oceans, etc.
  • They will be sensing devices and/or device arrays capable of recognizing, delineating, discriminating and quantifying specific and different substances and the amount and/or strength and/or any concentration and/or contamination and transduce this data into an electronic signal which then will or could be encrypted, generally modulated and transmitted over a PFNs communication frequencies and devices m the more sophisticated 2-way systems (figure 6, but also possible in (figure 5) the less sophisticated two-way page protocols, e.g., REFLEX TM); and/or merely stored in the data storage section of the simplest one-way PFNs for physical retrieval by a person or another automated robotics mobile device with PFN confrol and the earlier mentioned connectable data extractor and extension coupling innovation and/or interface for data transfer and retransmission to at least one remote gateway and any accompanying network system .
  • FIG. 7 Illustrates the many varied high security purposes of the installation secure area system depicted in figure 7. It shows some of the governmental uses, and commercial applications for a secure installation , that are hazardous and can be enhanced by unmanned operational functions, e.g., oil, gas and chemical plants, medical waste and sewage facilities, nuclear substance use, and nuclear waste storage and a multitude of other science , energy technologies as well as monetary processing either in hard cu ⁇ ency or credit - debit data
  • Figure 8 shows the same physical installation compound , but this could be any type of installation and employ any number of different type of physical barriers and electronic protection and monitoring devices and systems that can be part of any preexisting security system or controlled though all the varied PFNs in a networked system.
  • 800 is a block of many of the high security government buildings structures installations and government agencies . e.g. military, political institutions, government branches and embassies.
  • 801 represents financial and monetary operations and institutions, which can range from Fort Knox , the mint installations to banking operations armored vehicle tracking and travel path with time and place records in three places in real time along with real time audio, video monitoring of the entire operation.
  • monitoring and remote control network can be set up locally regionally or sectional and world wide if so desired and have any and all capabilities to monitor and confrol as determined by the company wishes or security protocols necessary to properly protect, the installation and its purpose as well as the would from any inherent dangers it possesses to the community.
  • FIGURE 10 Is the first page of two pages listing the allocation of frequencies and naming what they are being used for these frequencies change from time to time but are being listed here to demonstrate that the invent can and always has been able to utilize any frequency receivers and transceivers m a PFN However, as has always been maintained some digital and specifically those that are full video applications require enough band with or a conditioning of the digital signal through co-pandmg or compressing and decompressing through a chipset processor on both ends of the transmission in some case.
  • the Trusted Remote Activity Controller provides all local vehicle or device confrol and event storage relative to PFN protected (Primary Focal Node) operation. It interfaces to an RF telemetry link, which may consist of a one or two-way paging system. More sophisticated links could be used such as digital cellular or PCS (Personal Communication System).
  • a Remote Management System (which may be as simple as a single page, or as complex as a controlling PC or Server) initiates a TRAC function, such as an automated slow, stop and secure sequence.
  • a local display or audio speaker may provide local status of the TRAC function being executed, with appropriate progress tones, voice queues or displays to provide a local operator feedback relative to the progress of the function.
  • All Activity confrols are initiated by the TRAC and monitored by the TRAC from start to finish. This is accomplished through feedback sensors.
  • Feedback Sensors may be electrical, mechanical, fiber optic, mfra red or other technologies. Since the function being performed requires a high level of accountability and trust that the sequence was in fact executed properly, every step of the process is monitored through appropriate feedback sensors to attain the reliability and trust required.
  • This positive feedback in the TRAC is the key feature which distinguishes the TRAC from other electronic or software controllers; making it a fully" trusted" system for the task being accomplished. Additionally, all events and status relative to the function are recorded locally in the Local Event Storage Memory. This is termed the System Function Data.
  • the level of redundancy in storage of System Function Data and the level of additional feedback and checking required m order to verify the Activity or function was accomplished properly, is directly related to verification requirements. These requirements may be regulated and approved by local or federal law, law enforcement or insurance agencies, World Bank, EPA, ICC, SEC or other regulatory agencies.
  • Interim progress of the sequence, activity or function may be optionally transmitted back to the remote management system through a 2-way phone or paging link This may occur as the function is executing or may be programmed to occur after completion of the sequence.
  • local, redundant storage of the event is always contained withm the PFN for subsequent or simultaneous retrieval of event information and proof for accountability purposes.
  • the PFN enclosure and TRAC monitoring of tamper sensors guarantee the information has not been compromised.
  • Other types of information along with the System Function Data may be stored in the TRAC Local Event Storage Memory.
  • This auxiliary information may include digital or analog data not directly related to the function being monitored and executed, but important for evaluation and determination of liability, collection of evidence or environmental data. Examples of these include road condition information or surveillance audio and/or video.
  • TRAC implementation may be accomplished in many ways, depending on space or funding constraints and level of integration required for the system.
  • a PC-based system may be in the form of a desktop system, laptop or embedded system (PC 104) with a dedicated DOS or Windows based TRAC program, consisting of machine language, Basic, C, C++, Visual Basic, Visual C or C++, or other high level language which accomplishes the TRAC function through software confrol.
  • Interfaces to the System Under Confrol (SUC) may be accomplished through appropriate I/O cards, either analog or digital.
  • PC compatible Modems or Cell phone interfaces provide the interface to the Remote Management System (RMS).
  • SUC and RMS interfaces may be m the form of ISA, PCI, PCMCIA,
  • TRAC Compact PCI, Future Buss, or other commercial interfaces compatible with the PC-based system used.
  • More compact and custom implementations of the TRAC may consist of dedicated state machine controller implementations in which TRAC functions are executed through embedded firmware. These implementations may incorporate multi-chip solutions using EPROM or EEPROM interfaced to Arithmetic Logic Units (ALU), I/O ports and discrete memory elements. They may also be microprocessor or microcomputer based. A large variety of board level products are commercially available for such an implementation.
  • ALU Arithmetic Logic Units
  • Display, Video and Audio (Auxiliary Data) for the TRAC can be in many forms and types. These may range from analog systems, in which tape or other magnetic media store the analog signal, to digital systems in which data is stored on hard disks, EEPROM or RAM. Data format may be modulated through FM or AM, compressed, packetized or otherwise encoded for reduced bandwidth or for transmission over the Internet (packet audio and video).
  • TRAC is a more detailed description of this technology's prop ⁇ etary programs interfaced in the programmable and modular TRAC, for mobile management, commercial management, home management and the control security technology applications detailed throughout the related patent applications.
  • ASS Application Specific Software programs
  • This software is programmable and modular.
  • the TRAC software can be in the form of hardware with embedded software or firmware, or it can be modular software running m processors controllers and/or computers.
  • the Software / Algorithms will accommodate Bank and stock exchange Transaction products, which will be supported by this technology's FTP Financial Transaction Program. This program will do as much as possible to support run and route any COTS products best suited to the owner of the host equipment and their choice of commercial servers, but eventually all programs will meet certain securities exchange and banking standards.
  • This technology plans to utilize Commercial: 128/64 bit Encryption for Web Transactions with the present proprietary software program to support and interface most of the secure commercial exchange products with all the pretty good protection PGP software COTS products available today. This is labeled Commercial Encrypted for the Web. CEW. These transactions might be used for service billing for privately managed credit card account service companies etc. dealing with a specific clientele and their equipment.
  • This system could provide inexpensive direct billing to personal and company E-mail addresses, rather than going through a large bank card programs with all their expensive costs.
  • bank card companies would utilize the financial transaction products FTP product constructed to provide the adequate security protocols for a secure track able transaction record including identification for equipment and personnel, as well as, time date and location of any transaction. (Finger prints and pupil recognition hardware cameras and sensors, etc. would be employed along with the accompanying software algorithms to document and authorize as well as, authenticate any transaction. However, initially the key pad or any interfaced phone number pad will be utilized to provide personal identification numbers PIN numbers for the transactions).
  • FACT is the federally authorized control technology protocol and/or standard. This program will take priority over all running programs on any PFN equipped piece of machinery equipment and/or vehicle. It will be used by law enforcement and authorized government agencies for national security and public management and or crowd confrol m exfreme cases such as, a declared state of marshal law. It will be a priority system over all host equipment functions including financial transactions to insure fair and stable pricing m providing necessities in a ravaged and/or compromised area The financial record can be reviewed later to determine any improprieties exploitation, and/or profiteering that occurred and is so prevalent in these kinds of circumstances.
  • FACT will also be responsive to special reserved RF radio signals for police and official government access as well as be responsive to specific coded and encrypted messages sent and received on any frequencies. This is to allow immediate individual communication and confrol of a vehicle and immediate communication and confrol of all vehicles and equipment m an emergency.
  • a standards committee will address the specific protocols for the utilization of this function and law, rules and regulations will spell out the guidelines. And with TRAC in a secure encasement with local memory and remote redundant memory at a triage level if not totally accommodated; accountability and analysis of any such event will be made easier and more instructive for any future events.
  • FACT program will be accessible by the police, law enforcement, and/or traffic enforcement system and police remote control command tools, that are capable of locally identifying a vehicle and controlling a shut down of that vehicle m the manner well detailed m the related applications for this technology's proprietary "spider eyes program" or for any smart car and/or interactive highway programs.
  • law has to be legislated and rules and regulations made and well understood as to the manner of engagement and the procedures to use these devices and systems to preserve respect for the legal rights of the individual as public safety is being served and provided.
  • the laws are clear and exist today. Only the rules governing the use of this technology have to reflect the true intent and provide accountable record for the law.
  • FACT will have varying degrees of security protocols all the way up to and including DES data encrypted standard at certain levels for any and all equipment if so determined necessary in the legislative process. And this technology provides for the use of such broad government management and confrol through a modular modality to be deployed physically in chips and/or activated as preprogrammed software in any processor, for special situations as authorized and agreed upon by the appropriate governing bodies for domestic civil situations and/or world peace to insure fair treatment and management m these hostile situations.
  • FACT has been designed to be set up and governed by the United States democratic process as a master control standard for this technology's machine messaging network and to include the world wide web to comprise an MMN on the WWW.
  • each stable nation state would posses their own encrypted control code for national security and also have their own security protocols for any sensitive data processed by a PFN through TRAC software system and/or communicated on the MMNWWW .
  • hostile areas of civil unrest the same world organizations could address and mediate with any warring parties in the same manner they do today to negotiate a peace settlement .
  • the PFN TRAC system can be installed and/or activated in any and all equipment to help in the processes of nation building to insure fair exchange between the warring parties and to insure any aid efforts are guaranteed to be utilized in the fashion intended. Also the management and confrol systems can serve to better follow the actual behaviors of the agreed upon hostels with out interfering or intervening or introducing any other new groups (Troops, etc.) or societies directly into a localized conflict.
  • the PFN TRAC system can be given a progressive array of tools to help safe guard any agreed upon peace.
  • This technology can give audio instructions in the appropriate language and repeat or site the agreed upon terms when they are violated. This accomplished by the monitoring of improprieties with the hostile parties and/or persons.
  • the technology will record incidents on location and in the remote monitoring and control center. It can then aggressively intervene from the authorized monitoring and confrol centers with varied levels of deterrents all the way up to full lethal weapon deployment and use. All these actions are tracked and stored in memory systems both on board the PFN and redundantly m a plurality of remote locations. Accessory deterrent systems
  • FACT, CEW, FTP are all the primary programs that are a part of TRAC's secure communication links to any remote management and memory storage computer gateway or node that can network with any host machines ASS sub-programming modules.
  • This primary programmable TRAC module software will prioritize communication from the comm. links as determined by the standardization efforts for accountable remote confrol as per application specific protocols and real life social economic and environmental circumstances in real time. Local memory storage and time are both kept as part of the TRAC programmable Module as well as, the application specific programs for management and confrol of society and its equipment.
  • the Mobile Management would have application specific programs for remote piloting of a vehicle. (RPV). And most especially this technology's proprietary PASSS program, which stands for proprietary automated slow,_stop and secure the vehicle. And the secondary modality of the this proprietary automated shut down PAGSSS_prop ⁇ etary automated jjuide, slow_stop and secure. This of course can in part be accomplished through remote control if so desired.
  • M-ASMP stands for mobile application specific management program. This is any number of basic programs that are now completed by OEM PCMs that will be monitoring vehicle sensors and operating activity confrols, as well as, accessory sensors and additional controlled devices made accountable through an interfaced
  • TRAC equipped processor m a PFN TRAC equipped processor m a PFN.
  • C-ASMP Commercial Application Specific Management program
  • C-ASMP is designed to provide specific service data and remote analysis functions, as well as, confrol any machinery or equipment from at least one remote location and/or to shut it down for emergencies or in accordance with any financial arrangement, leasing , taxing, etc.
  • monitored is any environmental data, or any application specific data like fuel or energy use or resource use water, air, etc.
  • Some other general application specific areas for the commercial management areas are; industrial, agricultural and construction.
  • Home Management Program H-ASMP is another application specific set of programs that can offer home nursing telemetry for specific physical conditions.
  • Figure 12 is an illustration showing the world and all the possible networking of systems that will make up this complete interactive data handling communication and confrol system , or create the monitoring network of the present invention the (MMNWWW).
  • Figure 2 shows satellites that su ⁇ ound the world and triangles denote commercial or private servers and government providers; the servers ⁇ providers are gateway nodes in most cases to land based phone service for computer net works for the government agencies commercial service companies, and/or the WWW.
  • (ps) means phone system hard wired;
  • (lg) in a circle is local government; [E] in a square is the emergency response; the little man is a lost child or convict, and also depicted is a tractor, boat, plane, bulldozer, factory and a car.
  • the radio towers are, for example, cell phone, digital and or pager towers, and/or RF systems and the capital of the US represents the national government and the stars are other national government around the world.
  • the triangles are servers in other countries.
  • This figure is meant to present the simple view to establish the concept of a world wide monito ⁇ ng system to link all forms of communication networks through the inventions PFN's to create the Machine Messaging Network the (MMN) which when its data is presented on the WWW as informative accountable web pages completes this task.
  • MSN Machine Messaging Network
  • Society once again will have the means and knowledge to use this monitoring and record keeping system to confrol functions either indirectly or directly with remote confrol in real time. But this will and probably should be done with caution and consciousness.
  • This world monitoring and control system is feasible and not just some inventors dream is because it is based on smaller networks which are presently emerging and already perform meaningful public desired services by combining telecommunications and vehicles together.
  • Figure 13 is a list of U.S. Government Agencies. And in fact it is actually a U.S. Federal Government Agency Directory prepared by LSU m a search engine format web page with hypertext and/or mosaic or gopher software architecture so that the browser can click on any under lined department or agency and go directly to that specific departments home web page.
  • the purpose is to develop a public product for rapid awareness of one's physical and economical environment from the local to the national level to greater insure the wise use of technology investment and create a more politically interactive public that can voice its views economically and by public comment through electronic polling in the most efficient and clear way.
  • the PFN accountability can keep a fair environment for all and all must relate their data to their source in any inquiry or lose their claim or position.
  • a better, safer and more informed society with fair play to insure all have as much freedom and security as legally possible with gathered information and for all gathered information the PFN TRAC/FACT system can insure this life condition, but it takes all of us to make these practices constitutional and proper and it takes all of us to maintain this machine messaging network and all information technology m this manner.
  • This sharing of data can more easily be achieved through the advances in fiber optic land lines and Internet routing systems like those developed by Cisco Systems and Cerent Industries for data systems and the Internet.
  • Figure 14 is the entire inventions confrol system from the Primary Focal Node and Trusted Remote Activity Controller on every piece of equipment to all monitoring, accounting processes and/or confrol and management systems from public government and every agency and commercial interest desired to the general accountable presentation of this Data to the public in general via local state and national accountable Web pages.
  • This is the PFN ⁇ TRACYMMN.WWW providing general data as a social economic and environmental technology accounting system for Democratic Governments through a responsible free enterprise and free communications system with all the security controls necessary to provide accountable remote and automated services world wide and monitored by everyone for general knowledge and data.
  • At the very top of the page is a group often icons symbolizing where the PFN's would be utilized.
  • PFN's can have more than one purpose e.g. they can be used to bill (through CEW applications) for commercial service or for specific service of a machine and simultaneously be gathering data on any incident or accident event or provide additional confrols by offboard confrol and/or management systems in an emergency or m the case of a compromised operator in real-time.
  • this PFN machine messaging network into vehicles and equipment it can provide responsible good governance and/organize all machine systems m an accountable manner to insure that any abuse or miss use of these automated systems are accounted for and available to the individual citizen for public protection and retribution. Data on individuals will always be secluded and at least one step away from public review.
  • the icons from the top left are frees with a (PFN) box to monitor the environment, weather, air pollution, etc., either sensors or video camera or any number or types of sensing devices will provide elecfrical signals to the m house PFN computer or processor, which will m turn provide discernible data via varied forms of wired and/or wireless communication to either a commercial server if contractually employed by the PFN owners or to a phone node gateway to the appropriate government agencies and then on as area prepared data to regional or local web sites for the public to review (General public, educational and research institutions, commerce and industry, and all levels of government, etc..
  • This box is given a zigzag line to indicate a wireless transmission in a remote area but just as easily could be hard wired if available.
  • the invention will add communication, local memory and many other assets to them if they do not have them and return their data in real time to the agencies for processing that are to govern them and any private or commercial operators that are licensed and contracted to monitor and operate this equipment and accompanying software. If these are self policing operations by commercial interests they can be given a tax rebate and assistance in their problem areas m recognizing their genuine cost of doing business in real time, but they must be licensed and adhere to any and all legal rules regulations and/or laws governing the use and handling of data as it is categorize.
  • the local PFN will provide the first stage of accountability for the acquisition and distribution of data and the performance of local activity confrols and system management. Any posting or CC-mg from mass storage or data management be they private, public or government agencies under the design of this invention will require total accountability for substance issuance and/or any authorization by responsible party's acceptance and records of activity and use on demand to complete total accountability for any acquired data.
  • This data will be gathered m real-time processed and presented in as close to real-time to all if it is not sensitive (containing personal data or national security data or monitored for public safety and proper policing procedures) So, any proper storage, management and/or delivery of data will be determined by the appropriate governing agency and their demands m software for their autho ⁇ zed and/or licensed commercial contractors, or for their phone node gateways or any other government agencies listed or individuals listed or known to handle any same-such data.
  • the PFN's software will be configured to retrieve the data in an easy to handle format to simplify this process. Part of the accounting system is to be able to support this mass data acquisition system with out breaking anyone group, e.g.. the individual, the governments, and/or any commercial enterprises.
  • the next icon up on the left is a generating plant and it shows a direct black line going to the commercial server's semi circle.
  • This is a land line phone link and also a squiggly line is present to indicate a wireless transmission if needed as a back up or for a more cost effective modality, etc.
  • the invention could list here all the standards for air quality for S02 point source standards, particle point source standards, NOx point source standards, all the green house gas C0 2 etc. However, there are government agencies and private watchdog groups already involved in monitoring this and they have established standards which can be used a s a starting point. The invention will house all the appropriate sensor arrays to detect these toxin or most probably just utilize the "Nose recently sent into space by NASA .
  • This sensing device can detect odors so insignificant that they are microscopic in origin and minuscule in volume.
  • the nose attached to the PFN computers running the nose software identification library files either locally or downloaded on an automated request or provided to all government agencies to insure real-time compliance for safe and lawful substances and/or matter handling providing real-time reporting of any violation in real-time to increase the proper response by the appropriate personnel and equipment in the most expedient time frame to insure public safety, national secu ⁇ ty and provide the most latitude for truly free and safe individual activities movements and freedom m the safest manner.
  • These PFNs or industry provided units would report to the general public on a local web page and also regionally and also nationally so the public can responded knowledgeably to the information gathered and presented.
  • Commercial Governmental, Educational and even individual citizens can respond and post discussion for hyper link and text spots on the web pages for review by all.
  • the RF transceiver is for networking all monitored farm equipment to one land line, transceiver where ever possible and the pagers will be used for inexpensive longer transmissions, also this will provide for the repeater function of a short range signal to a long range transmission or telephone communication line, e.g., people locator (Child find) (another proprietary device of this invention).
  • people locator Choild find
  • an emergency network could be developed making every land line part of the repeater net system coupled to all vehicle PFN's.
  • the short range transmitter would have the same one tuning crystal the same as the (tot spot) system mentioned earlier (other related patent application) this would be a specially dedicated frequency by the F.C.C. (possible from one in figure 9 or 10.
  • figure 13 has 26 pages of all the government web pages already existing and these web pages would be hyper-lmked from the local state and federal web pages addressing data m the order of the hyper link and interest.
  • GPS systems are employed by Archer Daniel Midland (ADM) for the governing of irrigation and crop monitoring from satellite systems.
  • ADM Archer Daniel Midland
  • these systems could be interfaced and updated to return accurate crop data back to the government and to send aid and services to help a farmer or farming district in trouble due to weather or blight etc.
  • the farmer could be given a tax break with respect to crop investment and loss.
  • the data gathered in a specific area was used for public use or commercial use the farmer could be reimbursed for the access to their electronic gathered data. For example speculators and investors m the market could best figure what to invest in .
  • the next icon is a factory and depending on how many pieces of equipment and the proximity they are to land lines these pieces of PFN equipment may also only have a short range radio transceiver that is in communication with a secondary node with in the company (land based line )and reports directly to a company control system in which these machines are monitored and recorded for their operations, but can also be provided instructions from plant management directly to their operators or are operated with robotics without operators.
  • This m house PFN TRAC network system could provide a data link for service contractors and show a history of operational readings which when run through their software diagnostic programs and/or those programs owned by the factory would limit the repair choices and suggest the materials needed to effect an appropriate repair prior to arriving on the job. This would be a great time saver and money saver. Also personal calls could be routed to the operator without them having to leave their machine or work station to answer them.
  • the radio receiver station for the coast guard would receive a data link transmission along with any voice transmissions
  • Data signals would provide the boats ESN and/or full registry and a full report as to its mechanical condition along with any SOS broadcast automatically sent or initiated by the boat occupants or automated equipment.
  • the car icon is very well described in this whole application and is used to describe most all the PFN's properties and qualities in all the other industries.
  • Trucks will be provided with sensors on their tire pressure that will translate into axle weights and only drive through check for accuracy scales will be in place to check this equipment by contacting the PFN and receiving the PFNYTRAC for trucks data on each individual truck. Any tolls or charges will be automatically accessed and billed to the correct E-mail address or paid in real-time through credit card or debit accounts. The truck how ever will not release the brakes on the frailer if the weights are over the legal safe limit at the time of loading.
  • a warning sound will be sent while the truck and frailer are still at the loading dock. This is only ones safety check for commercial trucking but all vehicle will be self monitoring the physical conditions of the mechanical components and give adequate warning to the operators before shutting the vehicle down in a stationary position or in real-time if deemed necessary either automated and/or by remote control through this inventions PASSS and PAGASSS software programs and remote confrol activators detailed in the third formal patent and incorporated herein by reference.
  • the railway trains and subways, etc. already have many monitoring systems or networks. These systems would be tied into the all inclusive network system to account for energy use and environmental impact as well as monitor manage and confrol all surface and air transportation the specific local regional and national controllers.
  • PFNs on every piece of mobile equipment the exact location condition and possible collisions and/or impacts can be accessed and the appropriate real-time warnings and help can be provided as well as maintain the most accurate record of the entire event if need be So trains and even planes might carry these PFN systems in addition to the systems they now employ to provide more services or they will use them as a back up to all these systems (failsafe).
  • the PFNs will be universalized and only be specific as to the jobs they perform.
  • the first ring is the commercial communication server and MMN gateway via Land line systems. More and more m the future standard phone systems are going to have faster switching and for any one to operate a commercial node they must have all their phone support lines be Asymmetric
  • the second ring in and the first ring provides any emergency service if the PFN did not call or was not able to reach an emergency service phone node for some reason.
  • the commercial server will maintain any and all contact e.g. voice and data links till the customer is served or connected to the emergency personnel, otherwise the second ring can provide any number of services from making web connections to down loading entertainment packages for the board driver.
  • the next three smaller circles are for energy accounting and environment, transportation and traffic, and the criminal incident based reporting system.
  • the voting node will allow for the public to vote on the road or in the home with their special pin Id, fingerprint verification Originally configured to respond to issues as they drive home to let their representatives know how they feel on the issues that are at hand and proposed for input on the four web pages and/or hyper-hnked to the appropriate representative. They can view the issues etc. in their cars on LCD screens or see by hologram wind shields, and hear data delivered by voice. (Not Radio) This system would be developed to sanction a vote with a positive finger print ID and/or an accompanying pm code. Also a driver could send a voice mail that coverts to a written message to address an issue on, e.g., area roads and specific conditions time and geographically automatically encoded.
  • the two inner circles will be a continual running account of commercial and public cost and gams so an area can judge how well it is doing and also to determine where best to invent or create its finances and use its resources.
  • This data would p ⁇ ma ⁇ ly be gathered over land lines and this accounting system could be used to make cases commercially to communities to lower taxes or provide support aid in a lean time or help to refrain workers in an eventual lay off. This is not the way business is done to day but it should and could provide a better way of life without stress for all in the future. Business would learn its local community can help guarantee its survival even if it has to change the way it is doing business.
  • the inner center of the top semi circle is local government and all the way down through the center of the drawing is government with three pegs interlocking the local government the state government and the national government with the local account web pages that are displayed as local, state, national and international web pages.
  • the pegs have letters in them and they spell out REPS for representative or the elected officials.
  • the objective here is to integrate the process of individual power and responsibility for any one representative to be directly responsible to the empowerment structure held by the public's individuals.
  • the two inner circles provide in real-time the financial cost and ga s and representatives and citizens can view this information and the representatives can make policy on taxing or crediting back or providing aid and the rest of the public will have the opportunity to completely see this transaction and voice there opinion m real time
  • an accounting process all the way to the federal banking commission All the data is accounted for so that the financial and economical confrols can be better balanced to meet the needs to provide for its society while stimulating growth.
  • the lower section semi circle is the delivery of data to the web account pages with government numbers on money spent and received locally, in the state, and nationally, Stock reports and financial reports on the local commercial companies, the regional companies and corporations, and the national and world stock markets.
  • the bottom semicircle there are four web account pages that anyone can access from commercial servers communication data links, the world wide web or mass media. Most all of these support response back systems even cable TV with a web box, although there is still a lot of problems getting service to all citizens so access could would and should be provided at any responsive PFN that supports a video display. And in public places as well like police departments and libraries.
  • the four web pages would list issues plainly for the public to view and respond to. And their would be a section to frame issues in which the public could start a question.
  • the figures from left to right at the bottom of the page are agriculture being remotely controlled.
  • the highway systems being monitored and ultimately remotely controlled,
  • the car is receiving remote service and the house being monitored and for its energy use, all kinds of home management including in home automated nursing to reduce health care cost for the growing elderly and to allow them more liberty freedom and self reliance.
  • PFNs will perform physical telemetry and even administer automated medications through the protected primary focal node and accountable monitoring system that will allow remote and automated medical care under safe inexpensive and more secure delivery systems.
  • the computer with its a web access will be able to view all the web pages and act as another terminal to the web pages as usual, but will be provided all the automated PFN data as well.
  • the TV at 6 o'clock is mass media with a web response box as another means to have contact with the Internet and all the PFN/TRAC data and to also respond to and cast opinions and votes in the future.
  • PFN 7TRAC/FACT factory all activities can be reviewed privately and all that is displayed on the Internet all that is open to public comment regarding the public's opinion and government policy will be totally accessible . Even the world could receive all the data from every where and all the world populous can see how the planet and any other humans are faring around the world.
  • FIGS 14A &B are two pages of charts and descriptions that were taken off the Internet detailing The International Standards Organization or (ISO) Reference Model. And with a basic discussion in reference to the Open System Interconnection or the (OSI) of networking including the seven levels to creating net work communications between computers
  • This ISO reference model was created back in 1980 by the organization to create a standard for computer networking and the Internet .
  • This Open System Interconnection is the actual standardized protocols that people use to communicate with computers . Because their was so much proprietary software in each computer manufacture the ISO developed a seven layer model which would provide a common basis for the development of standards that would allow different systems of communication to be connected .
  • the PFN as a machine messaging system of communication will seek to universalize at the application level (level 7) encrypted technology that can be individually personalized and accessed by secured random synchronized encryption through the TRAC software programs and more specifically the FACT and or CEW sub programs that can run many of the existing COTS software products , which are encrypted and at the application level on both ends of a communication data exchange already.
  • level 7 application level
  • FACT and or CEW sub programs that can run many of the existing COTS software products , which are encrypted and at the application level on both ends of a communication data exchange already.
  • the invention does not seek to compete or develop any such new application products in level seven for any product manufacturers that can achieve what the invention prescribes as a level of acceptable performance for accountable aggressive remote and automated confrol of equipment vehicles and machines hosting a PFN and communicating to a national registry for ultimate accountability management and confrol .
  • the invention prescribes as a level of acceptable performance for accountable aggressive remote and automated confrol of equipment vehicles and machines hosting a PFN and communicating to a national registry for ultimate accountability management and confrol .
  • there needs to be a standard set just for this application level of activity where automation and remote confrol or shared management and confrol with local operators of a host machine can be accessible to the registry control apparatus for vital confrol and management functions to insure greater public safety and national security by the appropriate authorities.
  • As one possible modality to achieve this unified access to level seven proprietary application systems might be to create an additional level.
  • FACT software has to be part of any level seven application or separately created communicative 8 th level unified security protocol established m any device and/or component or piece of equipment that is going to be responsible for PFN/TRAC/FACT/CEW confrol and management functions no matter what other applications are cohabiting any transmission. Both in the PFN and received in the remote location. Accountability for broadcast and use of all data is the key to making FACT a reality m this democracy. As stated throughout this invention all data collected must be performed to management protocols that follow the Constitution. For example, all Government agencies will be able to access the PFN/TRAC system through their own encrypted codes via the registry's controls to access data to freeze data and/or to retrieve data as part of the National Registry detailed m later figures.
  • the first two purposes access data or freeze data will notify the operator m a local display and voice message and asks for consent (as well as notify an absent owner if listed in PFN/TRAC/FACT inf. header) and/or the second scenario will allow for confrol by public safety officials which still notifies the driver through voice and display and takes aggressive confrol of the host equipment and is capable of placing a freeze on local records and memory with a PASSS program or PAGASS program.
  • legal constitutional procedures must be followed for the people, equipment and the handling of any records both locally and remotely (e.g. Discovery laws , Miranda Rights , etc.)
  • the third confrol level is with no notification to the driver or owner and can only take place through a judicial order or Executive? order that is not obtainable normally through the FACT Registry program alone Most likely over seen by the Justice Departments FBI,.
  • This Judicial order is obtained by a second random time clock of identity pm numbers and it creates three memories two in remote locations to all obtained data. The first locally with the standard PFN/TRAC two levels of memory
  • the second at the proper requesting authority's surveillance location and the other remote location under the supervising Judge issuing the tap and confrol and mvadmg order on an individual's rights to privacy.
  • LAWs LAWs for those allegedly involved in a crime.
  • the suspect citizen Upon the completion of a surveillance the suspect citizen will be called in and given all records and data obtained during the court order from both the policing authorities and the Judicial second data storage. Protection under the law for the Policing and judicial authorities should provide with no tort recourse by the citizen unless the data was improperly handled and that any personal injury was incurred. There should be no existing copies once the citizen has been returned their data and the data should be destroyed, (this is of course only a hypothetical protocol. And legislation would have to be drafted to be constitutional and fair to all parties involved.
  • ESN Electronic Se ⁇ al Number
  • the ESN allows each element within the matrix to be securely and accurately tracked, inventoried or confrolled, either through a local control loop or remotely, by an authorized application or agency.
  • An example of a remote application might be local law enforcement personnel disabling a vehicle being chased by police officers.
  • proper secu ⁇ ty measures would obviously need to be taken to prevent replication or copying of device or system ESNs for the purposes of fraud, unauthorized control or interception of data, or other criminal or te ⁇ o ⁇ st activity.
  • the FACT ESNs would also be the basis for digital encryption of information passed between the PFN device and the controlling entity (A National Registry) with local network processing nodes through public communications channels such as the phone lines or Internet initiated m many cases wirelessly from mobile PFNs accompanied by their Mobile Identification Number(MIN) .
  • This technology is nearly equivalent to that used m today's wireless systems and will incorporate many of the COTS encrypted security systems at the application level. Therefore it will require little research and development to implement; only modification of cu ⁇ ently used commercial technology is needed to expand these applications of ESN/encryption technology to other areas (components, devices, equipment) interfaced through the PFNs .
  • Component FACT chips are a micro-controller chip and/or smart chip that is integrated and/or interfaced with a silicon switching relay m every power regulating circuit or send the necessary data signal for any and every electronically controlled piece of equipment, devices and/or commercially available circuit.
  • the FACT system will be able to interface into any confrol circuit and restrict operation through a chip or software and direct all input signals to a designated onboard memory that is also provided time, date, location and the author of command ( pm finger print ID or ins eye) as well as the command strings and all responses there to; be they automated or due to human activities.
  • the individual software will be capable through PFN interface communications to provide their stored data (firmware or flash memory to the National Registry upon a new installations and will be able to immediately in real-time report this data.
  • the registry will record the new FACT component installation with accompanying (PFN operating mventory)to the appropriate PFN file in the mam registry and apply the appropriate taxes and fees for the product installation This will be accomplished through a publicly provided registry phone none or a licensed and bonded commercial server that is registered and periodically inspected and reviewed to have and provide a secure Data Base Connection or encrypted Web connection with the appropriate government agencies (the National Registry, FCC, FBI etc ). This is all part of the Trusted Remote Activity Controller System.
  • This FACT program will provide a secure command string and access path from the origination to any mass memory storage system that is search-able from the National Registry by any appropriate authority or agency.
  • Some failsafe security for the system is provided by the component software of FACT at the application level establishing a handshake with local memory in the PFN and legitimate remote registry equipment and a secondary integrity check from prior legitimate registry contact data, (possibly a Random code number established in the last contact with the PFN and Registry.
  • the registry will provide all public providers and commercial servers with the alert flag data so any receiving system will be able to inform the PFN of national security alerts for potentially dangerous devices (terrorist altered components that could be used to activate explosives, chemical, or bacterial or viral microbes contaminants) through the commercial (PFN) remote and management confrol systems
  • PFN commercial
  • the appropriate authorities would be alerted to any of the national secu ⁇ ty high risk installation attempts m real -time.
  • the immediate action could be performed by either predetermined automated protocols or by real-time commands handled directly by the appropriate authorities. Because, the exact piece of equipment can be ID by its FACT chip along with all its Original Equipment Manufacture OEM's firmware (Lot No.
  • TRACS/FACT programming will be issuing Stolen alert bulletins, and or any security alert flag at periodic times for PFN's to do internal integrity and security tests as this information is reported or becomes available . Otherwise, any device, system and/or component will be assessed for its legitimacy and real-time use at the time date location of installation along with the PFN ESN and what ever other data is determined to be applicable. At this time it will be appraised and billed to the responsible party for its use and impact on society, its infrastructure and the environment.
  • this singular identity component chip is to track any and all use of the attached device and/or component that it has been incorporated into and to report any and all data in a complete and integral fashion, as prescribed by any code, regulation, law, and/or standard decreed by any sovereign or governing authorities.
  • Number 2 in Fig 16 is the SMART CHIPS and/or a magnetic strip can be provided as part of the components unit packaging and/or a bar code so that an immediate check of the component can be search either by a OCR scanner or a hand held magnetic sfrip reader. With the more extensive amount of data handled by smart cards and chips this is another inexpensive modality that will help in tracking and reporting stolen materials. A hard or plastic card would be issued to the purchaser of any TRACS/FACT device so that they could scan their stolen property data to the National Registry.
  • Number 3 is the universal plug and play buss inside the PFN containment that create the elecfrical interface platform for all the components. This buss will carry the appropriate power connection and confrol connections from the PFN/TRAC/FACT controller to activate, deactivate or specifically confrol any and all components. Power can be cut off to a specific component through the BUSS or it can instruct the individual component's FACT CHIP to intercept power (power input or regulator circuit.
  • FACT CHIPS must provide firm ware or stored data of identity, OEM data, last application, etc. to comply with any standard or regulation developed for a national registry or any such security system.
  • FACT is a major part of the main operating system in TRAC its software is also modular and can be in any form or hardware application.
  • the hardware chips and firmware modality detailed in this application should in no way be considered the only modality to create a nation wide security and management that is capable of realtime confrol of individual components, devices, and equipment. However, any other modality should be considered with the nature and scope of this invention. And this is area #6 of figure 16.
  • the chip also can perform activation and deactivation of the component and that is what is meant by saymg it "must provide confrol"
  • the second friangle is for cellular phone systems and is completely detailed in figure 6 as a more sophisticated communication system capable of handling and delive ⁇ ng very good data signal m volume and quality for applications needing such quality such as real-time video, etc.
  • the 3 rd triangle 0- mfinity frequency refers to any and all kinds of Radio Frequency equipment (including cordless phones and high quality and high powered RF equipment equally capable of providing large data streams modulated on their signals .
  • the 4 th friangle with the word locate can be either cellular phone proximity tracking, GPS,
  • TRAC is of course the Trusted Remote Activity Controller a modular based software program of which FACT the Federal Access and control Technology is an intricate part. These programs are run by the PFN mm-computers and they send their commands and direct the data received by the uni buss to the appropriate data storage. Either a hard drive or the specially preserved non-volatile FACT memory that can either be down loaded or physically removed to be used in a court of law in the proper manner as determined by any rule regulations or laws governing evidence and its acquisition, preparation and presentation for a society.
  • this universal Buss can extend outside any protected area with the immediate electronic protected capability to recognize and protect against any deliberate shorting or questionable interface.
  • the universal buss illustrates its capability to handle power as well as in put and output control transmissions . It is also important to make clear that this involves a universal secluded antenna buss or reception will be provided for by certain types of physical structural elements in the PFN's structure to allow for patch antennas or physically small profile antenna structure to function with in any standard regulation or legally presc ⁇ bed manner.
  • the National Registry will be a large routing system for mass management with only a system processing storage protocol and system that will handle data m a prescribed and secured manner through any and all of the 6 transparent IP layers to the approp ⁇ ate seventh application layer detailed earlier where it is transposed by the application encryption to insure security. This will be the same for all forms of communications wired and wireless as they are processed through their respective communication nodes and gateways (licensed Providers and Servers) to land lines, fiber optic cable systems or land cable systems.
  • the center three blocks are the facets and functions of the national and local registry for government, to develop security for all in the nation and to provide better public safety and to build trust withm all of civilization, because of accountability and fairness.
  • This is a safe guard system for man and machine messaging that is accessible by all of a nations society first individually through internet connections and if not accessible at least by any portion of civilization accountable to all involved parties through comment or constitutional procedures provided m the TRAC/FACT software. Internet dialog and media awareness for all types of media (mass and individual) as well as responsive and public access and input will spawn a much more involved individual citizen and functional democracy.
  • the first center block is termed AUTHORIZED INSTALLATION REGISTRY.
  • This may be a network of secured computers in different locations or it might be one system in none location.
  • the inventions purpose is to create realistic functional modality that can create this national and local registry level of accountability presently out of existing computer systems and to project some future consolidations of local nodes for related activities and data to help structure efficient data communications for all the government agencies an commercial services.
  • the Actual structure of course will be part of a large standards effort and civil legislative effort.
  • the PFN system can help to develop trust to insure an accountable answer to all of Societies legitimate concerns first for individual survival and then to be part of a mutually healthy co-existence with all of civilization , and all forms of worldly life.
  • the Authorization Installation Registry function is to record and make available by request and/or to recognize any PFN use of an electrical device in conjunction with the PFN and first run a compare function to any and all legally known produced , and legitimately marketed products in a legitimate sovereign locality through local and/or toll free telephony or RF or MISC. communications technology employing isolated network connection and/or the Internet (IP).
  • IP Internet
  • the authorization installation will require a complete OEM specification and desc ⁇ ption that can be used to specifically identify individual devices and/or components (Requirements to be determined by the sovereign authorities). This data will provide depreciating value levels and integrity checks that will be beneficial m tracking use and varying performance for secu ⁇ ng public safety. Also the depreciation schedule will enjoy a diminished cost of operational tax relevant to the products prior use and/or time of use. This provides a use tax not a sales tax for governing structures to apply to real time use. This frees the Internet to trade and free communication for general transactions and allows for the legitimate taxing structure for actual impact on society's infrastructure and environment by machines and the work they do
  • the second block is the Restricted Autho ⁇ zation or Crime Registry.
  • This data is supplied by everyone and anyone but primarily cleared and reviewed by the national and state or regional governing agencies.
  • the really great part of this section of the system is that the private individual can m real-time participate in a personal injury theft by telephony with scan data or through personal contact with law enforcement agencies. With total accountability all parties will have to face their own actions in the proper legal settings. And basically there will be no use or miss - use of stolen property.
  • the third center block deals with the communication capability. Ideally this will be accomplished by toll free telephony or RF nodes for the public in using the publics' privately owned equipment and PFN link ups as a hospitable commercial service with all other gained accessible service options and provided free by government or public providers for the tax and public interest provisions.
  • the 4 th block in the center of figure 18 is the centerpiece of my inventive technology for each individual piece of equipment in this machine messaging net work.
  • PFN Protected Primary Focal Node or PFN created as a protected electrical interface platform to merge, focus all host equipment's accessories and component's power and confrol circuits into one local accountable control and communication center
  • This PFN on every vehicle or piece of equipment is then linked, coordinated and managed with all other machine use and activities by a greater mass communication and management set of computer network systems (through RF, telephony and nodes or gateways) either for surface (land and sea) coordination and/or for aviation.
  • FACT software in the PFN and/or possibly individual CHIPs that are at the bottom of the page as octagons or (mini-stop signs).
  • the PFN computer will signal or request information from the individual FACT chip in the sound system (SS-ESN-F). This can either be sent by isolated confrol hardware (wires, etc.) or by sending a modulated digital signal on one of the power legs or it can be accomplished by short range transmissions if this modality is employed in future wireless vehicle and equipment confrol systems to ease plug and play capability and reduce the need for so much hard wiring. No mater the means the PFN will inquire for an individual fact chip as soon as it senses cu ⁇ ent draw.
  • the PFN will request and/or review vehicle conformations for any trouble codes logged in the charging system or any battery draws or charging problems .
  • This is performed by a TRAC software algo ⁇ thmn and standard cu ⁇ ent sensing micro chips in the uni-buss and in the host equipment's elecfrical system, which can generate either analog or digital signal that the PFN/ processor can receive and recognize through any of the above m vehicle communication modalities
  • This cu ⁇ ent sensing system is part of an anti-tamper system of the PFN. It will give driver alerts to the abnormal draw unless an individual component FACT chip sends an ESN and data signal that is recognized for a specific authorization or security protocol.
  • This figure depicts a universal PFN system with some usual device applications and varied hardware hook ups to communicate with the remote locations and physically perform the Accountable Remote and Automated Control for society and its institutions.
  • the bold black line with universal PFN enclosed is to indicate that this is a protected area not just physically but legally.
  • the enclosure 1901 is a commercial off the shelf COTS cellular phone it show one modality of connectability through a PCMCIA modem connection to the processor and internal TRACYFACT software. In this application all the software is commercial off the shelf supplied by the cellular phone company and/or the PCMCIA modem card interface. Obviously this preprogrammed software would be down loaded and the approp ⁇ ate dial out phone numbers installed in the command string.
  • the block called Complete Card This is a desired modality for cellular phone use m the invention. It employs a commercial off the shelf COTS product a PCMCIA Complete Card TM. The complete card also supplies its own software and hooks up in the same manner as a PCMCIA standard modem card. However this system also incorporates the Cellular phone system and antenna.
  • the appropriate hardware is known in the industry and the appropriate configurations can be accomplished by anyone skilled m the art to link up the euro 100 boards with the
  • the bottom box is modem and can be part of the top box PCMCIA connection when used with telephony or with any application from the lower box 1908.
  • Number 1908 box shows all the different types of communication devices employed in the PFN's. 1 way Radio, 2way radio J way paging, 2way paging, light or sound and GPS or locating systems These different communication devices are well covered in the m figures 3,4,5, and 6 and will not be revisited at this time. However, as this drawing illustrates they would process their data streams through the modem and on into the processor to be handled by the TRAC/ FACT/CEW programs etc. The modem would be capable of converting the applicable data steam and communication source to be used by the PFN processors.
  • confrol signal is part of this technology as desc ⁇ bed m figure 6a as natural evolution of this invention, whether it is for a mobile application (car) and/or a stationary devices the confrol power and signals to the processor can basically use the same kind of plug and play Buss 1903 is the mini-computer containing the TRAC/FACT programs.
  • the round circle is for the CEW program Commercial Encryption on the WEB
  • This software program is provided by the credit card companies and will have a special modem capability and handle 128/64 b ⁇ t.1902 is a card swipe or reader that is connected to the processor either through the uni-buss or the old R232,TTL, or PS2 type of connections. These three are shown here as the present standard connectable modalities known to present industry. However the un-Buss connector would be a more ideal modality for space greater data flow, and efficiency. These old standard connections are shown to be available to other components interfaced in the PFN and can be employed to give forward and backward engmeenng versatility.
  • the device would still have to have an electronic FACT ESN or identity system or would require special registration to be interfaced. 1902 the credit card reader would be able to handle commercial credit cards and driver licenses and FACT SYSTEM identity cards.
  • the FACT application specific event memory is not shown but it is a redundant memory to the continuing running on the hard drive.
  • the event recordings are controlled either automatically by resident PFN programs, remotely activated and confrolled by an authorized external source (Logged command st ⁇ ng) or by the resident operator or occupant. In any event all machine and man actions and interactions are recorded and logged in the FACT Memory preserved in the protected restricted access area as depicted and detailed m figure 2C , 2F and 2G.
  • 300C in figure 19 is the commercial server who can be any gateway node the customer picks or can be a service provider for the OEM host equipment or an energy provider or a bank card provider or a communication company or any type or number of these commercial servers. However they must be licensed and provide enough mass storage to handle all critical TRACS/FACT data to operate in any geographic area. They also have to be able to handle it in a secure accountable manner. For simplicity purposes the 300C have been placed at the bottom of the 3 basic different types of present wireless communication. To the right cellular phone system ,to the lower left of figure 19 is the present one and two-way paging systems and for the lower right is the Radio frequency systems.
  • the bottom of the triangle has LOCAL GOVERNMENT in big bold letters. This is done for two reasons. First local node and gateways will keep cost down for Registry network and second regional state and local government is the agencies that impact the individual in most cases. As has been detailed earlier m figure 13 all the government agencies are now maintaining web pages and data phone nodes and through basic routing using ISDN of Cerent Industry new fiber optics and Cisco systems routing capability these agencies can be given an efficient data management for local regional and national Data base connection and inter agency connections as well to allow for the fast local disc ⁇ mmation of data as well as provide much of this general data on the web for the public on or through the media.
  • the call in received by the PFN data from the new component check compares the ESN and manufacture data to OEM supplied registry lists and known crimes of stolen property registered m the registry. I f all is clear the registry approval is given and the transmitted back to an approved registration program in the PFN.
  • the component is listed as its appraised value is taxed and shown on the display for the operator and/or owner of the host piece of equipment.
  • the same redundant data is sent to the appropriate governing agency and a tax bill is prepared, unless the operator decides to pay in real-time with either a credit card or bank debit card m the card reader on the PFN.
  • the entire transaction is timed dated and the run status is added to the inventory list of the vehicle or piece of equipment. If hard copies of the transaction are required a return E-mail address can be sent to a home unit for printing or memory storage or printed on location from the PFN or downloaded to a laptop. If a component is flagged with an alert it will be accompanied with specific software commands or additional alerts depending on the severity of the situation.
  • a simple theft protocol might activate the unit normally with out notifying the user and alert the appropriate local authorities to the location of the stolen property and then regain custody of the stolen property and inquire as to how the person in possession received that property. If there is a Te ⁇ o ⁇ st alert to a particular component as soon as the person install the unit the alarms will be activated in all emergency responding agencies and even kill all power to the PFN and/or set off alarms and warnings. This depends on the nature of the emergency and will allow for on the spot real-time commands to augment any response.
  • FACT can provide a stealth eves dropping mode so that operator owner and occupants can not tell that they are being monitored and/or recorded but this access mode will require a signed judges order and his personal access codes that are changed by time mode to send this command. Once again any miss use or abuse will of this mode will meet with serious criminal and civil penalties for the individuals involved and/or any agency private or commercial entity. Freedom of information act will apply to any legal own of their PFN controlled equipment and they will be able to down load their individual memory that will show a complete access and use of their system coded with the agencies ID (local and national as well as for commercial access)
  • this software flow starts in the TRAC's System or in the mam registry.
  • alert flags are generated with the co ⁇ ect FACT ESN and case number for fast cross-referencing m the IBSR or the UCR operated nationally by the FBI.
  • FACT cards held by the legitimate owner will allow for rapid scan in or card swipe by a magnetic reader. These encoded cards can be prepared and programmed at the time of a legitimate purchase and any and all identifying data will be available to complete a crime report with the exception of listing the geographic location unless the theft was automatically reported by the PFN as it was being tampered with.
  • This system would allow for parolees to be back in society while their movements and activities were monitored and governed by an automated computer system that would track physical movement through GPS, or LoJack or Cellular and/or RF friangulation on a personally ca ⁇ ied device that monitors body temperature, pulse rate and provide for positive identification, e.g., fingerprint or eye iris evaluation
  • the device would be confrolled by the master controller and support local Web page access and hyperlink capability.
  • Tactile and galvanic sensors would be capable of detecting chemical changes in perspiration and determine the chemical equivalent for a specific person drinking and provide a specific elecfrical signal that is fransmitted back to the parole center for a con beep and direction to either report in or take a skin prick check or a breathalyzer.
  • Locations of area liquor dispensing or known drug activities and be plugged in as trail markers on the GPS and flag a convict's questionable activities or ask for the above checks. Prior victims of crimes that an ex-con is convicted will be notified of the TRACK A CON.COM and the convict will be given a reasonable distance to stay away from the victims.
  • the appropriate frail markers will be posted as GPS, etc. Geographic coordinates and will notify authorities and victims of flagged improper movements.
  • the convict will be alerted as will and warned to report in and move out of the area.
  • the victims can be outfitted with a mobile page and/or Track system warned directly of a past ex-cons close proximity. Additionally, the victim and community can track the parolee on the system by contacting the web pages.

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

L'invention concerne un noeud focal primaire protégé (PROTECTED PRIMARY FOCAL NODE = PFN) utilisé pour les applications télécommandées de haute (HS) et moyenne (MS) sécurité (100-107) pour commander à distance et en toute sécurité des machines, des équipements et des véhicules par le biais de divers niveaux de systèmes et réseaux télécommandés de surveillance. Le système PFN TRAC (200-204) permet d'ajouter et de renforcer des modules et des fonctions afin d'accroître l'efficacité de la configuration de matériels, de logiciels ou de micrologiciels de manière à fournir une commande à distance et une gestion responsables de l'interaction entre l'homme et la machine.
PCT/US2000/004737 1999-02-26 2000-02-25 Equipement de suivi et de surveillance pour applications de securite WO2000051360A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU32439/00A AU3243900A (en) 1999-02-26 2000-02-25 Tracking and monitoring equipment with security applications

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US12210899P 1999-02-26 1999-02-26
US60/122,108 1999-02-26
US13975999P 1999-06-15 1999-06-15
US60/139,759 1999-06-15

Publications (1)

Publication Number Publication Date
WO2000051360A1 true WO2000051360A1 (fr) 2000-08-31

Family

ID=26820167

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/004737 WO2000051360A1 (fr) 1999-02-26 2000-02-25 Equipement de suivi et de surveillance pour applications de securite

Country Status (2)

Country Link
AU (1) AU3243900A (fr)
WO (1) WO2000051360A1 (fr)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2387875A (en) * 2002-04-25 2003-10-29 David Martin Keene Vehicle immobiliser system
US7066023B2 (en) 2003-07-14 2006-06-27 Environmental Security Corporation Distributed sensor array for fluid contaminant monitoring
US7483392B1 (en) 2004-03-19 2009-01-27 Bbn Technologies Corp. Multinode arrangement
US7930878B2 (en) 2007-02-27 2011-04-26 Ford Global Technologies, Llc Method and apparatus for rapidly thawing frozen NOx reductant
US8095248B2 (en) 2007-09-04 2012-01-10 Modular Mining Systems, Inc. Method and system for GPS based navigation and hazard avoidance in a mining environment
CN103814393A (zh) * 2011-10-10 2014-05-21 博革新元件国际公司 用于监视加工活动的系统和方法
US8838417B2 (en) 2010-05-14 2014-09-16 Harnischfeger Technologies, Inc Cycle decomposition analysis for remote machine monitoring
US9253452B2 (en) 2013-08-14 2016-02-02 Digital Ally, Inc. Computer program, method, and system for managing multiple data recording devices
US9712730B2 (en) 2012-09-28 2017-07-18 Digital Ally, Inc. Portable video and imaging system
US9841259B2 (en) 2015-05-26 2017-12-12 Digital Ally, Inc. Wirelessly conducted electronic weapon
US9958228B2 (en) 2013-04-01 2018-05-01 Yardarm Technologies, Inc. Telematics sensors and camera activation in connection with firearm activity
US10013883B2 (en) 2015-06-22 2018-07-03 Digital Ally, Inc. Tracking and analysis of drivers within a fleet of vehicles
US10075681B2 (en) 2013-08-14 2018-09-11 Digital Ally, Inc. Dual lens camera unit
US10192277B2 (en) 2015-07-14 2019-01-29 Axon Enterprise, Inc. Systems and methods for generating an audit trail for auditable devices
CN109635751A (zh) * 2018-12-14 2019-04-16 永城职业学院 一种计算机网络身份验证装置
US10272848B2 (en) 2012-09-28 2019-04-30 Digital Ally, Inc. Mobile video and imaging system
US10390732B2 (en) 2013-08-14 2019-08-27 Digital Ally, Inc. Breath analyzer, system, and computer program for authenticating, preserving, and presenting breath analysis data
US10409621B2 (en) 2014-10-20 2019-09-10 Taser International, Inc. Systems and methods for distributed control
US10521675B2 (en) 2016-09-19 2019-12-31 Digital Ally, Inc. Systems and methods of legibly capturing vehicle markings
CN110795115A (zh) * 2018-08-01 2020-02-14 飞狐信息技术(天津)有限公司 一种探针程序更新方法及系统
US10764542B2 (en) 2014-12-15 2020-09-01 Yardarm Technologies, Inc. Camera activation in response to firearm activity
US10904474B2 (en) 2016-02-05 2021-01-26 Digital Ally, Inc. Comprehensive video collection and storage
US10911725B2 (en) 2017-03-09 2021-02-02 Digital Ally, Inc. System for automatically triggering a recording
US10917614B2 (en) 2008-10-30 2021-02-09 Digital Ally, Inc. Multi-functional remote monitoring system
US10964351B2 (en) 2013-08-14 2021-03-30 Digital Ally, Inc. Forensic video recording with presence detection
US11024137B2 (en) 2018-08-08 2021-06-01 Digital Ally, Inc. Remote video triggering and tagging
CN113724048A (zh) * 2021-09-02 2021-11-30 国泰新点软件股份有限公司 专家抽取系统
US11577854B2 (en) * 2018-12-18 2023-02-14 Stelia Aerospace Modular instrument panel
US11950017B2 (en) 2022-05-17 2024-04-02 Digital Ally, Inc. Redundant mobile video recording

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4977399A (en) * 1988-08-09 1990-12-11 At&E Corporation Mobile radio paging test system
US5539645A (en) * 1993-11-19 1996-07-23 Philips Electronics North America Corporation Traffic monitoring system with reduced communications requirements
US5576716A (en) * 1994-12-07 1996-11-19 Sadler; Kermit M. Owner oriented system for locating lost or stolen property
US5625556A (en) * 1995-04-28 1997-04-29 Trimble Navigation Limited Accurate time standard for vehicle operation
US5631947A (en) * 1991-03-04 1997-05-20 Megatrend Telecommunications, Inc. Mobile telephone device for storing a plurality of changable charge rates and time limit data
US5767788A (en) * 1996-03-19 1998-06-16 Ness; James C. Computer aided dispatch and locator cellular system
US5966285A (en) * 1997-06-06 1999-10-12 Compaq Computer Corporation Mobile portable computer docking/office station
US5983156A (en) * 1997-09-03 1999-11-09 Cummins Engine Company System for controlling engine fueling according to vehicle location
US6005494A (en) * 1996-10-16 1999-12-21 Chrysler Corporation Energy minimization routing of vehicle using satellite positioning an topographic mapping

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4977399A (en) * 1988-08-09 1990-12-11 At&E Corporation Mobile radio paging test system
US5631947A (en) * 1991-03-04 1997-05-20 Megatrend Telecommunications, Inc. Mobile telephone device for storing a plurality of changable charge rates and time limit data
US5539645A (en) * 1993-11-19 1996-07-23 Philips Electronics North America Corporation Traffic monitoring system with reduced communications requirements
US5576716A (en) * 1994-12-07 1996-11-19 Sadler; Kermit M. Owner oriented system for locating lost or stolen property
US5625556A (en) * 1995-04-28 1997-04-29 Trimble Navigation Limited Accurate time standard for vehicle operation
US5767788A (en) * 1996-03-19 1998-06-16 Ness; James C. Computer aided dispatch and locator cellular system
US6005494A (en) * 1996-10-16 1999-12-21 Chrysler Corporation Energy minimization routing of vehicle using satellite positioning an topographic mapping
US5966285A (en) * 1997-06-06 1999-10-12 Compaq Computer Corporation Mobile portable computer docking/office station
US5983156A (en) * 1997-09-03 1999-11-09 Cummins Engine Company System for controlling engine fueling according to vehicle location

Cited By (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2387875A (en) * 2002-04-25 2003-10-29 David Martin Keene Vehicle immobiliser system
GB2387875B (en) * 2002-04-25 2005-09-28 David Martin Keene Vehicle immobiliser system
US7066023B2 (en) 2003-07-14 2006-06-27 Environmental Security Corporation Distributed sensor array for fluid contaminant monitoring
US7483392B1 (en) 2004-03-19 2009-01-27 Bbn Technologies Corp. Multinode arrangement
US8305905B2 (en) 2004-03-19 2012-11-06 Verizon Corporate Services Group Inc. Multinode arrangement
US7930878B2 (en) 2007-02-27 2011-04-26 Ford Global Technologies, Llc Method and apparatus for rapidly thawing frozen NOx reductant
US8534054B2 (en) 2007-02-27 2013-09-17 Ford Global Technologies, Llc Method and apparatus for rapidly thawing frozen NOx reductant
US8095248B2 (en) 2007-09-04 2012-01-10 Modular Mining Systems, Inc. Method and system for GPS based navigation and hazard avoidance in a mining environment
US8816883B2 (en) 2007-09-04 2014-08-26 Modular Mining Systems, Inc. Method and system for GPS based navigation and hazard avoidance in a mining environment
US10917614B2 (en) 2008-10-30 2021-02-09 Digital Ally, Inc. Multi-functional remote monitoring system
US9372482B2 (en) 2010-05-14 2016-06-21 Harnischfeger Technologies, Inc. Predictive analysis for remote machine monitoring
US9971346B2 (en) 2010-05-14 2018-05-15 Harnischfeger Technologies, Inc. Remote monitoring of machine alarms
US8838417B2 (en) 2010-05-14 2014-09-16 Harnischfeger Technologies, Inc Cycle decomposition analysis for remote machine monitoring
US11092951B2 (en) 2010-05-14 2021-08-17 Joy Global Surface Mining Inc Method and system for predicting failure of mining machine crowd system
CN103814393A (zh) * 2011-10-10 2014-05-21 博革新元件国际公司 用于监视加工活动的系统和方法
CN103814393B (zh) * 2011-10-10 2022-09-20 博革新元件国际公司 用于监视加工活动的系统和方法
US11310399B2 (en) 2012-09-28 2022-04-19 Digital Ally, Inc. Portable video and imaging system
US9712730B2 (en) 2012-09-28 2017-07-18 Digital Ally, Inc. Portable video and imaging system
US10257396B2 (en) 2012-09-28 2019-04-09 Digital Ally, Inc. Portable video and imaging system
US10272848B2 (en) 2012-09-28 2019-04-30 Digital Ally, Inc. Mobile video and imaging system
US11466955B2 (en) 2013-04-01 2022-10-11 Yardarm Technologies, Inc. Firearm telematics devices for monitoring status and location
US11131522B2 (en) 2013-04-01 2021-09-28 Yardarm Technologies, Inc. Associating metadata regarding state of firearm with data stream
US9958228B2 (en) 2013-04-01 2018-05-01 Yardarm Technologies, Inc. Telematics sensors and camera activation in connection with firearm activity
US10107583B2 (en) 2013-04-01 2018-10-23 Yardarm Technologies, Inc. Telematics sensors and camera activation in connection with firearm activity
US10866054B2 (en) 2013-04-01 2020-12-15 Yardarm Technologies, Inc. Associating metadata regarding state of firearm with video stream
US10964351B2 (en) 2013-08-14 2021-03-30 Digital Ally, Inc. Forensic video recording with presence detection
US9253452B2 (en) 2013-08-14 2016-02-02 Digital Ally, Inc. Computer program, method, and system for managing multiple data recording devices
US10074394B2 (en) 2013-08-14 2018-09-11 Digital Ally, Inc. Computer program, method, and system for managing multiple data recording devices
US10075681B2 (en) 2013-08-14 2018-09-11 Digital Ally, Inc. Dual lens camera unit
US10390732B2 (en) 2013-08-14 2019-08-27 Digital Ally, Inc. Breath analyzer, system, and computer program for authenticating, preserving, and presenting breath analysis data
US10757378B2 (en) 2013-08-14 2020-08-25 Digital Ally, Inc. Dual lens camera unit
US11544078B2 (en) 2014-10-20 2023-01-03 Axon Enterprise, Inc. Systems and methods for distributed control
US10901754B2 (en) 2014-10-20 2021-01-26 Axon Enterprise, Inc. Systems and methods for distributed control
US11900130B2 (en) 2014-10-20 2024-02-13 Axon Enterprise, Inc. Systems and methods for distributed control
US10409621B2 (en) 2014-10-20 2019-09-10 Taser International, Inc. Systems and methods for distributed control
US10764542B2 (en) 2014-12-15 2020-09-01 Yardarm Technologies, Inc. Camera activation in response to firearm activity
US10337840B2 (en) 2015-05-26 2019-07-02 Digital Ally, Inc. Wirelessly conducted electronic weapon
US9841259B2 (en) 2015-05-26 2017-12-12 Digital Ally, Inc. Wirelessly conducted electronic weapon
US10013883B2 (en) 2015-06-22 2018-07-03 Digital Ally, Inc. Tracking and analysis of drivers within a fleet of vehicles
US11244570B2 (en) 2015-06-22 2022-02-08 Digital Ally, Inc. Tracking and analysis of drivers within a fleet of vehicles
US10848717B2 (en) 2015-07-14 2020-11-24 Axon Enterprise, Inc. Systems and methods for generating an audit trail for auditable devices
US10192277B2 (en) 2015-07-14 2019-01-29 Axon Enterprise, Inc. Systems and methods for generating an audit trail for auditable devices
US10904474B2 (en) 2016-02-05 2021-01-26 Digital Ally, Inc. Comprehensive video collection and storage
US10521675B2 (en) 2016-09-19 2019-12-31 Digital Ally, Inc. Systems and methods of legibly capturing vehicle markings
US10911725B2 (en) 2017-03-09 2021-02-02 Digital Ally, Inc. System for automatically triggering a recording
CN110795115A (zh) * 2018-08-01 2020-02-14 飞狐信息技术(天津)有限公司 一种探针程序更新方法及系统
CN110795115B (zh) * 2018-08-01 2023-08-08 飞狐信息技术(天津)有限公司 一种探针程序更新方法及系统
US11024137B2 (en) 2018-08-08 2021-06-01 Digital Ally, Inc. Remote video triggering and tagging
CN109635751A (zh) * 2018-12-14 2019-04-16 永城职业学院 一种计算机网络身份验证装置
CN109635751B (zh) * 2018-12-14 2022-09-13 永城职业学院 一种计算机网络身份验证装置
US11577854B2 (en) * 2018-12-18 2023-02-14 Stelia Aerospace Modular instrument panel
CN113724048A (zh) * 2021-09-02 2021-11-30 国泰新点软件股份有限公司 专家抽取系统
US11950017B2 (en) 2022-05-17 2024-04-02 Digital Ally, Inc. Redundant mobile video recording

Also Published As

Publication number Publication date
AU3243900A (en) 2000-09-14

Similar Documents

Publication Publication Date Title
WO2000051360A1 (fr) Equipement de suivi et de surveillance pour applications de securite
US20060026017A1 (en) National / international management and security system for responsible global resourcing through technical management to brige cultural and economic desparity
US20030221118A1 (en) Automated accounting system that values, controls, records and bills the uses of equipment/vehicles for society
US20060206246A1 (en) Second national / international management and security system for responsible global resourcing through technical management to brige cultural and economic desparity
US20060287783A1 (en) Automated accounting system that values, controls, records and bills the uses of equipment/vehicles for society
CA2397911C (fr) Interface protegee responsabilisee sous forme de noeud focal primaire
WO2000078057A1 (fr) Logiciel trac programmable, modulaire, utilisable et securise
Garcia Design and evaluation of physical protection systems
US20070079012A1 (en) Universal electronic payment system: to include "PS1 & PFN Connect TM", and the same technology to provide wireless interoperability for first responder communications in a national security program
Polemi Port cybersecurity: securing critical information infrastructures and supply chains
Fries et al. Transportation infrastructure security utilizing intelligent transportation systems
Winkelman et al. When autonomous vehicles are hacked, who is liable?
Stauffer et al. Forensic investigation of stolen-recovered and other crime-related vehicles
CA2318139A1 (fr) Systeme de comptabilite automatise qui evalue, verifie, enregistre et facture les utilisations de materiel et/ou de vehicules pour une societe
Goodison et al. Autonomous Road Vehicles and Law Enforcement
US20210133406A1 (en) Control, monitoring, and/or security, apparatus and method for premises, vehicles, and/or articles
Denef et al. ICT trends in European policing
Donath et al. Homeland security and the trucking industry
TW548563B (en) Automated accounting system that values, controls, records and bills the uses of equipment/vehicles for society
Dobiáš Insurance of Cyber Risks in International Transport
Jenkins et al. Implementation and Development of Vehicle Tracking and Immobilization Technologies
Rusev et al. Organised vehicle crime in Europe: Six country case studies on organised vehicle crime and potential barriers to prevent the facilitation of online distribution of stolen vehicles and vehicle parts
STRATEGY 27. THE 9/11 INTELLIGENCE FAILURE
Yan et al. Check for updates Modus Operandi, Factors, Implications and Governance of Ransomware Attacks on Transportation Systems
Johansmeyer Securing public safety vehicles: reducing vulnerabilities by leveraging smart technology and design strategies

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWE Wipo information: entry into national phase

Ref document number: 09914299

Country of ref document: US

122 Ep: pct application non-entry in european phase